"The Disconnection thesis": delivered at Dublin City University, 23 October 2011.
In his 1993 article ‘The Coming Technological Singularity: How to survive in the posthuman era’ the computer scientist Virnor Vinge speculated that developments in artificial intelligence might reach a point where improvements in machine intelligence result in smart AI’s producing ever-smarter AI’s. According to Vinge the ‘singularity’, as he called this threshold of recursive self-improvement, would be a ‘transcendental event’ transforming life on Earth in ways that unaugmented humans are not equipped to envisage.
In this paper I argue Vinge’s idea of a technologically led intelligence explosion is philosophically important because it requires us to consider the prospect of a posthuman condition succeeding the human one. What is the ‘humanity’ to which the posthuman is ‘post’? Does the possibility of a posthumanity presuppose that there is a ‘human essence’, or is there some other way of conceiving the human-posthuman difference?
I argue that the difference should be conceived as a historically emergent disconnection between individuals, not in terms of the presence or lack of essential properties. I also suggest that these individuals should not be conceived in narrow biological terms but in ‘wide’ terms permitting biological, cultural and technological relations of descent between human and posthuman.
Finally, I consider the ethical implications of this metaphysics of the posthuman. If, as I claim, the posthuman difference is not one between kinds but between individuals, we cannot specify its nature a priori but only a posteriori. Thus the only way to evaluate the posthuman condition would be to witness the emergence of posthumans. The implications of this are somewhat paradoxical. We are not currently in a position to evaluate the posthuman condition. Since there are no posthumans, the condition of posthumanity is not defined. However, posthumans could result from some iteration of our current technical activity, so we have an interest in understanding what they might be like. It follows that we have an interest in making or becoming posthumans.
"The Disconnection thesis": delivered at Dublin City University, 23 October 2011.
In his 1993 article ‘The Coming Technological Singularity: How to survive in the posthuman era’ the computer scientist Virnor Vinge speculated that developments in artificial intelligence might reach a point where improvements in machine intelligence result in smart AI’s producing ever-smarter AI’s. According to Vinge the ‘singularity’, as he called this threshold of recursive self-improvement, would be a ‘transcendental event’ transforming life on Earth in ways that unaugmented humans are not equipped to envisage.
In this paper I argue Vinge’s idea of a technologically led intelligence explosion is philosophically important because it requires us to consider the prospect of a posthuman condition succeeding the human one. What is the ‘humanity’ to which the posthuman is ‘post’? Does the possibility of a posthumanity presuppose that there is a ‘human essence’, or is there some other way of conceiving the human-posthuman difference?
I argue that the difference should be conceived as a historically emergent disconnection between individuals, not in terms of the presence or lack of essential properties. I also suggest that these individuals should not be conceived in narrow biological terms but in ‘wide’ terms permitting biological, cultural and technological relations of descent between human and posthuman.
Finally, I consider the ethical implications of this metaphysics of the posthuman. If, as I claim, the posthuman difference is not one between kinds but between individuals, we cannot specify its nature a priori but only a posteriori. Thus the only way to evaluate the posthuman condition would be to witness the emergence of posthumans. The implications of this are somewhat paradoxical. We are not currently in a position to evaluate the posthuman condition. Since there are no posthumans, the condition of posthumanity is not defined. However, posthumans could result from some iteration of our current technical activity, so we have an interest in understanding what they might be like. It follows that we have an interest in making or becoming posthumans.
This article aims to present the great revolution represented by the human singularity that may occur in the future. What is Singularity? It is the characteristic of what is unique: infrequent, out of the ordinary or extraordinary. Singularity is a term that refers to something or someone who has a unique characteristic. The idea of uniqueness can be used to present physical characteristics and behaviors of human beings that are distinguished from what is considered standard. Human singularity refers to the use of science and technology to create a new category of more evolved human beings. Human uniqueness means making human beings defy the limits imposed by nature. This is the idea of transhumanism, a theory that believes that the use of science and technology can help to create a new category of evolved human beings even with the conquest of immortality. In the same way that technological singularity can arise with artificial superintelligence, so can human singularity with the formation of supermen.
Kim Solez Singularity explained and promoted winter 2014Kim Solez ,
Dr. Kim Solez presents "The technological Singularity explained and promoted" in the Technology and Future of Medicine course on January 16, 2014, at the University of Alberta in Edmonton, Canada. Copyright (c) 2014 JustMachines Inc.
Framework Categories Technology Concepts 33 SlidesJacques L. Hamel
Categories of Technology Concepts for Revealing a Truly African Type of Modernity: opening a path from the mostly totemic, enchanted, mystified, supernatural, patriarchal / phallocratic and over-religious worldviews and mindsets of pre-modern Africa to the more desacralized, secular, rational, liberal, enlightened and autonomous worldviews and mindsets of modernity
Digital Emotion : How Audiences React to Robots on Screencaijjournal
The experience of interacting with robots is becoming a more pervasive part of our day-to-day life. When considering the experience of interacting with other technologies and artefacts, interaction with robots presents a distinct and potentially unique component: physical connection. Robots share our physical
space; this is a prominent part of the interaction experience. Robots offer a lifelike presence and the Human-Robot Interaction (HRI) issues go beyond the traditional interactions of more passive technologies and artefacts. The attention paid to HRI has grown dramatically as robotic systems have become more capable and as human contact with those systems has become more commonplace [1]. Immediately recognizable, culturally ubiquitous, androids, cyborgs, and robots, need no introduction. Yet their very familiarity obscures their participation in culture and media, and our perennial fascination with
such artificial humans when seen on the screen. While robots are growing more capable of many tasks, people are often hesitant at introducing technology into older, more traditional art forms. However, robots of varying kinds are appearing with increasing frequency in all manner of cinematic productions [2].
Robots and artificial humans have been a staple of our sci-fi screen experiences, however, unlike previous technology such as smartphones or laptops, robots are currently being given more character roles in films. Therefore, like animated characters, audiences are beginning to anthropomorphize and have emotional experiences with the robot characters.
This paper attempts to unpack how humans see these artificial humans and how we interpret their representation in cinema through a discussion of the use of ‘physical’ robots as a natural next stage of cinema performance and drama. The paper presents and experiment involving cyborg performances in a
series of short films. In this study, participants attended a screening where they viewed these films, and their responses to, and feelings about, the films were measured. It was hypothesized that film audiences have become comfortable with seeing robots in sci-fi films over the years. Therefore, it is expected that current and future audiences will begin to give these robot characters human attributes such as gender.
Presentation for a guest lecture for a colleague's Media History and Contemporary Issues course. She wanted me to cover technological determinism and social constructivism, as well as through in some content about my research on multitasking and online reading.
Constructing and revising a web development textbookRandy Connolly
A Pecha Kucha for WWW2016 in Montreal. Web development is widely considered to be a difficult topic to teach successfully within post-secondary computing programs. One reason for this difficulty is the large number of shifting technologies that need to be taught along with the conceptual complexity that needs to be mastered by both student and professor. Another challenge is helping students see the scope of web development, and their role in an era where the web is a part of everyday human affairs. This presentation describes our 2014 textbook and our plans for a second edition revision (which will be published in early 2017).
This article aims to present the great revolution represented by the human singularity that may occur in the future. What is Singularity? It is the characteristic of what is unique: infrequent, out of the ordinary or extraordinary. Singularity is a term that refers to something or someone who has a unique characteristic. The idea of uniqueness can be used to present physical characteristics and behaviors of human beings that are distinguished from what is considered standard. Human singularity refers to the use of science and technology to create a new category of more evolved human beings. Human uniqueness means making human beings defy the limits imposed by nature. This is the idea of transhumanism, a theory that believes that the use of science and technology can help to create a new category of evolved human beings even with the conquest of immortality. In the same way that technological singularity can arise with artificial superintelligence, so can human singularity with the formation of supermen.
Kim Solez Singularity explained and promoted winter 2014Kim Solez ,
Dr. Kim Solez presents "The technological Singularity explained and promoted" in the Technology and Future of Medicine course on January 16, 2014, at the University of Alberta in Edmonton, Canada. Copyright (c) 2014 JustMachines Inc.
Framework Categories Technology Concepts 33 SlidesJacques L. Hamel
Categories of Technology Concepts for Revealing a Truly African Type of Modernity: opening a path from the mostly totemic, enchanted, mystified, supernatural, patriarchal / phallocratic and over-religious worldviews and mindsets of pre-modern Africa to the more desacralized, secular, rational, liberal, enlightened and autonomous worldviews and mindsets of modernity
Digital Emotion : How Audiences React to Robots on Screencaijjournal
The experience of interacting with robots is becoming a more pervasive part of our day-to-day life. When considering the experience of interacting with other technologies and artefacts, interaction with robots presents a distinct and potentially unique component: physical connection. Robots share our physical
space; this is a prominent part of the interaction experience. Robots offer a lifelike presence and the Human-Robot Interaction (HRI) issues go beyond the traditional interactions of more passive technologies and artefacts. The attention paid to HRI has grown dramatically as robotic systems have become more capable and as human contact with those systems has become more commonplace [1]. Immediately recognizable, culturally ubiquitous, androids, cyborgs, and robots, need no introduction. Yet their very familiarity obscures their participation in culture and media, and our perennial fascination with
such artificial humans when seen on the screen. While robots are growing more capable of many tasks, people are often hesitant at introducing technology into older, more traditional art forms. However, robots of varying kinds are appearing with increasing frequency in all manner of cinematic productions [2].
Robots and artificial humans have been a staple of our sci-fi screen experiences, however, unlike previous technology such as smartphones or laptops, robots are currently being given more character roles in films. Therefore, like animated characters, audiences are beginning to anthropomorphize and have emotional experiences with the robot characters.
This paper attempts to unpack how humans see these artificial humans and how we interpret their representation in cinema through a discussion of the use of ‘physical’ robots as a natural next stage of cinema performance and drama. The paper presents and experiment involving cyborg performances in a
series of short films. In this study, participants attended a screening where they viewed these films, and their responses to, and feelings about, the films were measured. It was hypothesized that film audiences have become comfortable with seeing robots in sci-fi films over the years. Therefore, it is expected that current and future audiences will begin to give these robot characters human attributes such as gender.
Presentation for a guest lecture for a colleague's Media History and Contemporary Issues course. She wanted me to cover technological determinism and social constructivism, as well as through in some content about my research on multitasking and online reading.
Constructing and revising a web development textbookRandy Connolly
A Pecha Kucha for WWW2016 in Montreal. Web development is widely considered to be a difficult topic to teach successfully within post-secondary computing programs. One reason for this difficulty is the large number of shifting technologies that need to be taught along with the conceptual complexity that needs to be mastered by both student and professor. Another challenge is helping students see the scope of web development, and their role in an era where the web is a part of everyday human affairs. This presentation describes our 2014 textbook and our plans for a second edition revision (which will be published in early 2017).
Art and Culture - 02 - Bronze Age OverviewRandy Connolly
Second module for GNED 1201 (Aesthetic Experience and Ideas). This one covers the early Bronze Age historical and cultural context, from the beginnings of urban culture in Mesopotamia up to the Assyrians.
This course is a required general education course for all first-year students at Mount Royal University in Calgary, Canada. My version of the course is structured as a kind of Art History and Culture course. Some of the content overlaps with my other Gen Ed course.
Sixth module for GNED 1201 (Aesthetic Experience and Ideas). This one covers the art and culture of that broad period of time known as the Medieval era, which in this course I am referring to the time of late antiquity (circa 500 CE) to the Late Middle Ages (circa 1400).
This course is a required general education course for all first-year students at Mount Royal University in Calgary, Canada. My version of the course is structured as a kind of Art History and Culture course. Some of the content overlaps with my other Gen Ed course.
Art and Culture - Module 09 - Renaissance (Late)Randy Connolly
Ninth module for GNED 1201 (Aesthetic Experience and Ideas). This one mainly covers the late or high Renaissance. It begins with the political context of the early 16th Century in Italy. The presentation then focuses in depth on the three great Renaissance masters: Leonardo Da Vinci, Michelangelo, and Raphael. The presentation ends by trying to make an argument that Raphael is as an artist, the ideal artistic archetype for contemporary students.
This course is a required general education course for all first-year students at Mount Royal University in Calgary, Canada. My version of the course is structured as a kind of Art History and Culture course. Some of the content overlaps with my other Gen Ed course.
The Bronze Age is a period characterized by the use of bronze, proto-writing, and other early features of urban civilization.
The Bronze Age is the second principal period of the three-age Stone-Bronze-Iron system, as proposed in modern times by Christian Jürgensen Thomsen, for classifying and studying ancient societies.
STONE -As A Building Material.
Stones have been considered as one of the popular building material from the olden days due to their availability in abundance from the natural rocks. Building stones should possess enough strength and durability.
The stones which are suitable for the construction of the structures such as retaining walls, abutments, dams, barrages, roads etc are known as building stones.
Computers and Society 02 - What is TechnologyRandy Connolly
Presentation for COMP 3309 (Computers and Society), a third-year course in our CIS degree. This presentation unpacks the different meanings of technology and examines some of the different evaluative approaches to take to the study of technology. Also has a section on mythological understandings of technology.
Kim Solez Singularity explained and promoted fall 2016Kim Solez ,
Dr. Kim Solez presents "The Singularity Explained and Promoted" September 6, 2016 in the Technology and Future of Medicine course LABMP 590 at the University of Alberta in Edmonton, Alberta, Canada. Copyright (c) 2016, JustMachines Inc.
Kim Solez Singularity explained promoted winter 2015Kim Solez ,
Dr. Kim Solez presents "The Technological Singularity Explained and Promoted" on January 13th, 2015 in the course on Technology and the Future of Medicine LABMP 590 http://www.singularitycourse.com at the University of Alberta in Edmonton, Canada. Copyright (c) 2015, JustMachines Inc.
Women&Technologies: Research and Innovation. Nell'ambito del prestigioso WCC, (World Computer Congress), una conferenza nella conferenza dedicata alle donne e alle tecnologie, con un particolare focus su ricerca e innovazione. Presentazione per l'intervento a distanza di Nik Nailah Binti Abdullah (Information Systems Architecture Research Division, National Institute of Informatics, Tokyo, Japan), intitolato "Art and Affective Computing: Holistic approach"
Analysis of techno-utopianist ideas and thinking in Silicon Valley. How it developed, what's the status quo, and its implications and benefits for entrepreneurialism.
In the twentieth century, it was believed that the only reliable means to improve the human condition came from the new machines, chemicals and many different techniques. Including recurrent social ills and the environment that accompanies technological advances rarely have affected this faith. Today, there is a clear perception that science and technology have provided progress for humanity, but, along with it, have the ability to also destroy it.
Due date Saturday March 21, 2015.Answers for each question sho.docxjacksnathalie
Due date Saturday March 21, 2015.
Answers for each question should be at least 100 words.
1. Exam Questions:
Topic #3 – Economic Actors
1. Explain Myrdal’s concept of cumulative and circular causation and compare and contrast it to Veblen’s concept of cumulative causation.
2. Explain Robert Montgomery’s theory of how institutional practices come about and come to be thought of and practiced over time.
3. What is Montgomery’s theorized relationship between technological change and cultural change and give (articulate) an example outside of the Montgomery reading.
Reading:
1. Montgomery: Historical Fact
2. Myrdal: Institutional Economics
4. Exam Questions:
Topic #9 – Money
1. How does the standard story of the invention of money differ from the Institutionalist/Post Keynesian theory?
2. What does the Institutionalist/Post Keynesian theory of money says about the financial constraints on an economy to provisioning for the elderly?
Reading:
Wray: An irreverent overview of the history of money from the beginning of the beginning through to the present.
Question 1
a) The law that will be applied. . . .
b) The court will decide the effect of the the purported acceptance in the following way: . . .
c) The additional terms . . .
Question 2
a) She was only joking:
The offeror would argue that . . .
b) She didn't know that an offer was being made:
The offeror would argue that . . .
c) She knew she was signing an offer but he didn't read all of the terms:
The offeror would argue that . . .
d) She did not understand some of the terms and conditions:
The offeror would argue that . . .
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
An irreverent overview of the history of money from the beginning of the begi...
L Randall Wray
Journal of Post Keynesian Economics; Summer 1999; 21, 4; ABI/INFORM Global
pg. 679
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with p ...
NTRODUCTION TO FINANCIAL MARKET Financial market is where financial securities like stocks and bonds and commodities like valuable metals are exchanged at efficient market prices. Efficient market prices means the unbiased price that reflects belief at collective speculation of all investors about the future prospect. The trading of stocks and bonds in the financial market can take directly between buyers and sellers or by medium of stock exchange. Financial market can be domestic or international. MONEY MARKETS Money market is a centre for Money market become a dealing mainly of a short term component of the financial character, in monetary assets; markets for assets involved in it meets the short-term short term borrowing, lending, requirements of the borrowers buying and selling with original and provides liquidity or cash maturities of one year or less. to lenders.
CHAPTER ONE The Nature of Technology Today’s technol.docxtiffanyd4
CHAPTER ONE
The Nature of Technology
Today’s technology leaves us both exhilarated and terrified. Recent technological developments
have presented us with such marvels as spacecraft leaving the solar system, instant access to
billions of internet Web pages, and diseases cured through gene therapy. At the same time,
however, the seemingly inexorable march of technology has produced global pollution,
overpopulation, and the threat of nuclear annihilation. On many occasions, technological change
has also produced social disruptions, as when automation destroys jobs in a particular industry or
a new weapon upsets the balance of power between nations. And when technologies fail, some
of them do so in a big way, as exemplified by the loss of the Challenger and Columbia space
shuttles, the massive oil spill in the Gulf of Mexico, the catastrophic failure of the Fukushima
nuclear plant in Japan, and the disastrous breaching of the levees in New Orleans in the wake of
Hurricane Katrina.
Despite all the crises, disruptions, and disasters that have accompanied it, modern technology is
still viewed in a favorable light, according to public opinion surveys. Although significant
minorities of respondents express their disapproval of certain technologies like nuclear power
and genetically modified foods, the positive achievements of technology as a whole are seen to
substantially outweigh the negative ones.1 But this support of technology is based more on faith
than on understanding. When confronting technology, most of us are poorly informed spectators,
seemingly incapable of understanding an esoteric realm of lasers, microprocessors, gene splicing,
and nanomaterials.
This inability to understand technology and perceive its effects on our society and on ourselves is
one of the greatest, if most subtle, problems of an age that has been so heavily influenced by
technological change. But ignorance need not be a permanent condition. Although no one can
hope to comprehend the inner workings of even a small number of the most significant
technologies, it is still possible to come to a better understanding of the major causes and
consequences of technological change. All technologies, be they high-definition televisions or
reinforced concrete bridges, have some basic features in common. It will be the task of this
chapter to show what they are.
Defining Technology
Gaining an understanding of the meaning of words is often the beginning of knowledge. Before
plunging into a discussion of the nature of technology, it is necessary to provide a more precise
definition of what is meant when we use the term. The linguistic roots of the word “technology”
can be traced to the Indo-European stem tekhn-, which seems to have referred to woodworking.
It is the source of the Greek word tekne, which can be variously translated as “art,” “craft,” or
“skill.” It is also the root of the Latin word texere, “to wea.
Celebrating the Release of Computing Careers and DisciplinesRandy Connolly
Talk given at CANNEXUS 2020 on the release of our Computing Careers and Disciplines booklet, which has gone on to be downloaded over 200000 times since its release.
Public Computing Intellectuals in the Age of AI CrisisRandy Connolly
This talk advocates for a conceptual archetype (the Public Computer Intellectual) as a way of practically imagining the expanded possibilities of academic practice in the computing disciplines, one that provides both self-critique and an outward-facing orientation towards the public good.
Lightning Talk given at the start of the celebration evening for the ten-year anniversary of our Bachelor of Computer Information Systems at Mount Royal University.
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...Randy Connolly
Talk given at SIGCSE'19. Web development continues to grow as an essential skill and knowledge area for employed computer science graduates. Yet within the ACM CS2013 curriculum recommendation and within computing education research in general, web development has been shrinking or even disappearing all together. This paper uses an informal systematic literature review methodology to answer three research questions: what approaches are being advocated in existing web development education research, what are current trends in industry practice, and how should web development be taught in light of these current trends. Results showed a significant mismatch between the type of web development typically taught in higher education settings in comparison to web development in industry practice. Consequences for the pedagogy of web development courses, computer science curriculum in general, and for computing education research are also discussed.
Mid-semester presentation for my Computers & Society course at Mount Royal University. Has some technical detail about how the internet works, web protocols, data centres, and typical security threats.
Helping Prospective Students Understand the Computing DisciplinesRandy Connolly
Presentation at Cannexus 2018 in Ottawa in which we discussed the results of our three-year research project on student understandings of the computing disciplines and described the 32-page full-color booklet for advisers and prospective students.
Keynote address at barcamp: the next web conference in Salzburg on April 21, 2017. The presentation explains why textbooks in this area still make sense and describes the difficulties in writing a textbook in this area.
Talk given at University of Applied Sciences at Krems , Austria for Master Forum 2017. Provides a rich overview of contemporary web development suitable for managers and business people.
Disrupting the Discourse of the "Digital Disruption of _____"Randy Connolly
Talk given at University of Applied Sciences for Management and Communication in Vienna in January 2017. It critically interrogates the narrative of digital disruption. It will describe some of the contemporary psychological and social research about the digital lifeworld and make some broader observations about how to best think about technological change.
Every year at our new student orientation, I used to give this talk to our first year students. Instead of telling them what they should do to achieve success, we thought it would be more effective and humourous to tell them instead how best to fail your courses. This was the last version of this talk from 2017.
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...Randy Connolly
This 2016 presentation (for a paper) updates the findings of a multi-year study that is surveying major and non-major students’ understanding of the different computing disciplines. This study is a continuation of work first presented by Uzoka et al in 2013, which in turn was an expansion of work originally conducted by Courte and Bishop-Clark from 2009. In the current study, data was collected from 668 students from four universities from three different countries. Results show that students in general were able to correctly match computing tasks with specific disciplines, but were not as certain as the faculty about the degree of fit. Differences in accuracy between student groups were, however, discovered. Software engineering and computer science students had statistically significant lower accuracy scores than students from other computing disciplines. Consequences and recommendations for advising and career counselling are discussed.
Computing is Not a Rock Band: Student Understanding of the Computing DisciplinesRandy Connolly
This presentation reports the initial findings of a multi-year study that is surveying major and non-major students’ understanding of the different computing disciplines. This study is based on work originally conducted by Courte and Bishop-Clark from 2009, but which uses a broadened study instrument that provided additional forms of analysis. Data was collected from 199 students from a single institution who were computer science, information systems/information technology and non-major students taking a variety of introductory computing courses. Results show that undergraduate computing students are more likely to rate tasks as being better fits to computer disciplines than are their non-major (NM) peers. Uncertainty among respondents did play a large role in the results and is discussed alongside implications for teaching and further research.
Citizenship: How do leaders in universities think about and experience citize...Randy Connolly
This presentation explores the concept of citizenship based on the experience of student leaders from a mid-sized university in western Canada. Five student leaders participated in semi-structured individual interviews to explore their experience with, and understanding of, citizenship. Interviews concentrated on personal view points and definitions of citizenship, explored whether or not there are “good” and “great” citizens, and the role universities play in fostering strong citizenship amongst its student body. The measurement of citizenship and opportunities to foster citizenship were also explored. Qualitative content analysis revealed five themes, including political participation, social citizenship/solidarity, engagement, transformative action and autonomy. Citizenship, while highly valued by this population, also appears to be impossible to measure. If post-secondary institutions are aiming to create better citizens, more work needs to be done to create a common understanding of the intended outcome. Based on these findings, a new potential model of citizenship is proposed, in line with the work of Dalton and others who emphasize a shift towards personal involvement over traditional political engagement. Further, these results suggest that students could benefit from understanding themselves as political agents, capable of inculcating change within the university context and beyond.
A longitudinal examination of SIGITE conference submission dataRandy Connolly
Presents our examination of submission data for the SIGITE conference between the years 2007-2012. SIGITE is an ACM computing conference on IT education. The presentation describes which external factors and which internal characteristics of the submissions are related to eventual reviewer ratings. Ramifications of the findings for future authors and conference organizers are also discussed. If you want to read the full paper, visit http://dl.acm.org/citation.cfm?id=2656450.2656465
This presentation is based on the 16th chapter of our textbook Fundamentals of Web Development. The book is published by Addison-Wesley. It can be purchased via http://www.amazon.com/Fundamentals-Web-Development-Randy-Connolly/dp/0133407152.
This book is intended to be used as a textbook on web development suitable for intermediate to upper-level computing students. It may also be of interest to a non-student reader wanting a single book that encompasses the entire breadth of contemporary web development.
This book will be the first in what will hopefully be a textbook series. Each book in the series will have the same topics and coverage but each will use a different web development environment. The first book in the series will use PHP.
To learn more about the book, visit http://www.funwebdev.com.
Is Human Flourishing in the ICT World of the Future Likely?Randy Connolly
The role that information and computing technology (ICT) plays in improving human flourishing is not always clear. This presentation examines current research on one aspect of ICT, namely electronic reading, to demonstrate that in this case the ICT in question may actually diminish flourishing. It begins with an overview of the idea of flourishing in positive psychology, and then presents research on electronic reading comprehension, multitasking and distraction, and online scanning behaviors. The paper then makes an argument about the close connection between reading and flourishing, and then concludes by hypothesizing that mindful‐based reading practices may mitigate some of the worst features of electronic reading.
Textbooks are an essential part of the student experience, but may seem a daunting prospect to write. This presentation describes my experience with a recently-written textbook. It covers such issues as: writing a prospectus, the current textbook market, writing schedules, production issues, and marketing.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Thinking About Technology
1.
2. A study of the implications of information technology for society and its individuals. What is this course about? Historical perspectives, social context of computing, legal and ethical problems, economic issues, and philosophical frameworks for analysis will be covered.
3. Thinking about Technology Specific Topics include: Historical Context of Computerization Privacy and Surveillance Community Intellectual Property Free Speech Identity and Virtuality Work and Economics
4. Classic/ACM Approach to This Type of Course: Learn two evaluative ethical approaches (consequentialist vs universalist) Use these ethical approaches to evaluate and judge various high-tech issues. While important, it is a limited approach I prefer a more historical/contextualization approach
8. technologia Greek art, skill, craft, method systematic treatment of an art, craft, or technique techne logikos reasoning, thinking tec Proto-Indo-Euro To make
9. Some claim that the first appearance of the word technology in its modern meaning was in Dr. Jacob Bigelow’s 1829 book The Elements of Technology .
10. Today, the word technology can refer to: 1. Things 2. Techniques 3. Abstract Knowledge
11. 4. Technology as a System Technological system is complex of hardware, knowledge, inventors, operators, consumers, corporations, laws, and others involved in a technology. Thinking critically about technology thus requires knowledge of the system as a whole, how it was created (history), and how the parts interact.
12. The Ancient Greeks on Technology Some see myths as an expression of a pre-scientific understanding of human societies and the world they exist within. Others have claimed that in fact myths can provide a privileged insight into the origins and development of key human issues and concerns.
13. Oedipus and the Sphinx Thebes is suffering from a menace of nature: the Sphinx what walks on four feet, and two feet, and three feet and has only one voice; when it walks on most feet, it is weakest?
14. Humans The third foot is techne , our ability to craft and use technology. In the myth, it is this third foot, humanity’s technological know-how, that is at the root of Oedipus’s success and failure.
15. This third foot can also be a sword Just prior to Oedipus's confrontation with the Sphinx, Oedipus slays a stranger—his father—at a crossroad with his sword. Oedipus thus personifies the ambiguity of the human creature, an ambiguity that lies in his third foot, his ability to use his craft-knowledge for both good and evil at the same time.
16. This is a tragic vision: Technology is both a blessing and a curse, and these two natures are indivisible. If we want the blessings, then we have to live with the drawbacks. But this wasn’t the only way that the ancient Greeks viewed technology.
18. Yet at the heart of this technological marvel is a true menace: the minotaur. One can journey into the labyrinth, but slaying the monster concealed in the technology is more difficult … … as is escaping from the technology
19. Theseus escaped via the forethought and reason of Ariadne’s thread. A way out of the confusing labyrinth that is technological change is possible via rational appraisal and by maintaining a link to the past. This course is an attempt at maintaining a thread of Ariadne …
20. Prometheus Gift of Fire to Humanity His punishment: Having his liver eaten every day Humanity’s punishment: ?
22. Plato in his dialogue Protagoras: Prometheus steals fire as well as “wisdom in the crafts” “ Although man, acquired in this way wisdom of daily life, civic wisdom he had not, since this was still in the possession of Zeus”
23. Thus according to Plato, Prometheus (and humanity at large) suffer because Prometheus stole only part of what we need to live good lives: Prometheus stole fire (technology), but did not acquire civic wisdom. That is, having technological mastery without grounding it properly in a just political order is a recipe for suffering.
24. Plato argued that the tragedy of technology can be almost totally avoided by first and foremost thinking about technology in the context of its surrounding society and its political order. This course is all about this practice …
26. Technologies are extensions or expansions of ourselves “ Now the point of this myth is the fact that men at once become fascinated by any extension of themselves in any material other than themselves.” “ To behold, use or perceive any extension of ourselves in technological form is necessarily to embrace it.” “ It is this continuous embrace of our own technology … that puts us in the Narcissus role of … numbness in relation to these images [extensions] of ourselves.”
27. Within the Narcissus trance, we are too numb to recognize that “Man in the normal use of technology … is perpetually modified by it.” As such, we tend to be completely unconscious of the real effects of technology on the individual and on society and simply embrace each new technology uncritically. “ Man becomes, as it were, the sex organs of the machine world, as the bee of the plant world, enabling it to fecundate and to evolve ever new forms.”
28. For McLuhan, the best way to avoid this Narcissus trance in the face of technological change “is simply in knowing that the spell can occur immediately upon contact.” That is also part of what we will try to be doing in this course: understand both the obvious and also the sometimes subliminal and subtle consequences of our technological infrastructure.