How to extend Lectora for use on mobile devices with external libraries & scripts. by Michael Sheyahshe
Originally presented at the Lectora User Conference 2013, San Antonio, TX.
This document discusses guerrilla usability testing techniques that can provide quick feedback from users. It introduces whiteboards, coffee time testing, sketch boards, and online resources as methods. Whiteboards involve posting interfaces on a whiteboard and collecting anonymous comments. Coffee time testing buys people's time in exchange for coffee to get quick feedback. Sketch boards use templates for users to provide input over 45-60 minutes. Online resources like UsabilityHub and Usability.gov provide free templates and guides. The goal is to start conversations with users early to understand what they do and do not want.
This document provides an overview of Module 1 of the NEKLS Technology Lab which focuses on software and hardware. The module includes a weekly Zoom meeting, reading assignments, quizzes or projects, and forums for discussion. The objectives are to be able to identify computer hardware, cables and ports, demonstrate technology terminology, and troubleshoot hardware and software problems. Diagrams are provided to learn parts of computers and how to identify components. Terminology from various technology categories are defined. Quizzes assess knowledge of hardware, software, and troubleshooting techniques. Additional resources for further learning are also included.
Stuff I wish someone told me about being an engineerjwalter748
The document provides advice for engineers, with tips grouped under headings. It recommends not basing your identity on your title, finding a process that works for you, asking for help when needed, and knowing that imposter syndrome is common. Other tips include pair programming to avoid mistakes, focusing on problem solving over syntax, constantly self-evaluating, and prioritizing tasks. Technical debt and estimation are difficult, and passion can be misleading. Fundamentals, patterns, and difficult topics like testing require dedicated study. Interpersonal skills and avoiding discrimination are also important.
Anything that can go wrong will go wrong! That’s how Murphy’s law states that the fact that outages are inevitable and systems often misbehave.
As developers, we are working hard to build reliable and scalable systems, and it’s our job to keep the ship floating and the services up. In this session, we will talk about fires, how to put them out, and how to be ready for them. We will discuss abuser stories, degradation of service, and dependencies management as possible techniques to fight fires. We will discuss these techniques through some war stories and how they helped or could have helped service owners.
Agenda:
- What brought me here?
- What is fire?
- Firefighting Vs. The dev team
- How do you end up with fire?
- Your dependencies will fail.
- Feature toggles are your friends
- Abuser stories
This document provides a summary of 40+ tech tips, tricks, and tools presented by Michael Sauers, the Technology Innovation Librarian at the Nebraska Library Commission. It lists various shortcuts and tools for accessing free ebooks, scanning documents, using whiteboards digitally, navigating YouTube videos, selecting and removing hyperlinks in documents, and conducting polls. The document encourages tracking how many of the tips may be useful in the future and notes that URLs were omitted but tools can be found through searches.
Becoming a SharePoint Chef: A Non-Culinary CallingPhil Greer
This document discusses becoming a SharePoint chef, which requires going beyond just following recipes and instead working from first principles to innovate and create new solutions. It recommends learning SharePoint through hands-on practice, working with a mentor, attending user groups, and being willing to make mistakes. When issues arise, troubleshooting techniques include examining logs, considering how components interact, and using online resources. The key is to have a plan for any SharePoint project and not customize without understanding goals and options. User groups are beneficial for networking, co-learning, and getting questions answered from experienced members.
The document discusses some of the common tensions that exist between database administrators (DBAs) and developers, and provides guidance on how the two groups can work together more effectively as part of the same team. It outlines key responsibilities of DBAs related to security, availability, integrity, recoverability and performance of the database. It also provides tips for developers on interacting with DBAs during planning, design, development, deployment and ongoing support to help ensure projects run smoothly.
Burhan Khalid presented on secure software development practices. He discussed the three Ps of security - People, Process, and Persistence/Practice. He emphasized that security is not just about products but also development practices. Standards for secure development include SSE-CMM, TSP-Secure, and SAMM. Practical best practices include standardizing infrastructure, isolating development environments, peer reviews, centralized bug tracking, and using appropriate tools and frameworks. Common myths debunked are that complex passwords are secure, closed source is less secure than open source, and third party testing ensures code security.
This document discusses guerrilla usability testing techniques that can provide quick feedback from users. It introduces whiteboards, coffee time testing, sketch boards, and online resources as methods. Whiteboards involve posting interfaces on a whiteboard and collecting anonymous comments. Coffee time testing buys people's time in exchange for coffee to get quick feedback. Sketch boards use templates for users to provide input over 45-60 minutes. Online resources like UsabilityHub and Usability.gov provide free templates and guides. The goal is to start conversations with users early to understand what they do and do not want.
This document provides an overview of Module 1 of the NEKLS Technology Lab which focuses on software and hardware. The module includes a weekly Zoom meeting, reading assignments, quizzes or projects, and forums for discussion. The objectives are to be able to identify computer hardware, cables and ports, demonstrate technology terminology, and troubleshoot hardware and software problems. Diagrams are provided to learn parts of computers and how to identify components. Terminology from various technology categories are defined. Quizzes assess knowledge of hardware, software, and troubleshooting techniques. Additional resources for further learning are also included.
Stuff I wish someone told me about being an engineerjwalter748
The document provides advice for engineers, with tips grouped under headings. It recommends not basing your identity on your title, finding a process that works for you, asking for help when needed, and knowing that imposter syndrome is common. Other tips include pair programming to avoid mistakes, focusing on problem solving over syntax, constantly self-evaluating, and prioritizing tasks. Technical debt and estimation are difficult, and passion can be misleading. Fundamentals, patterns, and difficult topics like testing require dedicated study. Interpersonal skills and avoiding discrimination are also important.
Anything that can go wrong will go wrong! That’s how Murphy’s law states that the fact that outages are inevitable and systems often misbehave.
As developers, we are working hard to build reliable and scalable systems, and it’s our job to keep the ship floating and the services up. In this session, we will talk about fires, how to put them out, and how to be ready for them. We will discuss abuser stories, degradation of service, and dependencies management as possible techniques to fight fires. We will discuss these techniques through some war stories and how they helped or could have helped service owners.
Agenda:
- What brought me here?
- What is fire?
- Firefighting Vs. The dev team
- How do you end up with fire?
- Your dependencies will fail.
- Feature toggles are your friends
- Abuser stories
This document provides a summary of 40+ tech tips, tricks, and tools presented by Michael Sauers, the Technology Innovation Librarian at the Nebraska Library Commission. It lists various shortcuts and tools for accessing free ebooks, scanning documents, using whiteboards digitally, navigating YouTube videos, selecting and removing hyperlinks in documents, and conducting polls. The document encourages tracking how many of the tips may be useful in the future and notes that URLs were omitted but tools can be found through searches.
Becoming a SharePoint Chef: A Non-Culinary CallingPhil Greer
This document discusses becoming a SharePoint chef, which requires going beyond just following recipes and instead working from first principles to innovate and create new solutions. It recommends learning SharePoint through hands-on practice, working with a mentor, attending user groups, and being willing to make mistakes. When issues arise, troubleshooting techniques include examining logs, considering how components interact, and using online resources. The key is to have a plan for any SharePoint project and not customize without understanding goals and options. User groups are beneficial for networking, co-learning, and getting questions answered from experienced members.
The document discusses some of the common tensions that exist between database administrators (DBAs) and developers, and provides guidance on how the two groups can work together more effectively as part of the same team. It outlines key responsibilities of DBAs related to security, availability, integrity, recoverability and performance of the database. It also provides tips for developers on interacting with DBAs during planning, design, development, deployment and ongoing support to help ensure projects run smoothly.
Burhan Khalid presented on secure software development practices. He discussed the three Ps of security - People, Process, and Persistence/Practice. He emphasized that security is not just about products but also development practices. Standards for secure development include SSE-CMM, TSP-Secure, and SAMM. Practical best practices include standardizing infrastructure, isolating development environments, peer reviews, centralized bug tracking, and using appropriate tools and frameworks. Common myths debunked are that complex passwords are secure, closed source is less secure than open source, and third party testing ensures code security.
Ike Ellis gave a presentation on the 14 habits of great SQL developers. Some of the key habits discussed included having strong testing practices like using mocking frameworks and testing that code runs correctly; always automating processes and never directly changing objects in production; questioning assumptions and re-evaluating decisions; understanding the true goal is to deliver value rather than just writing code; treating software development as a team sport through practices like code reviews and knowledge sharing; and constantly improving code quality by refactoring and fixing issues. The presentation emphasized habits like these can help developers increase their value.
NDC London 2020 - Challenges of Managing CoreFx Repo -- Karel ZikmundKarel Zikmund
NDC London 2020 conference in London, UK - 2020/1/29
Talk: Challenges of Managing CoreFx Repo by Karel Zikmund
https://sessionize.com/s/karel-zikmund/archived-challenges-of-managing-corefx-repo/24173
https://www.youtube.com/watch?v=zLB2_h-3ZS4
This slide created for shared internal and for everyone interesting clean code. Why we needed? Why you should use it?
Ps. Sorry if my grammar is very bad :D
Participating in the Community - Beyond Code: Presented by Cassandra Targett,...Lucidworks
This document discusses ways for non-programmers to contribute to the open source Solr project. It addresses common obstacles like not having enough time or Java skills. Suggested contributions include improving documentation by writing tutorials or use cases, helping new users on mailing lists, verifying open issues on JIRA, and advancing bug reports by reproducing or writing test cases for them. The documentation for Solr will also be improved by transitioning to a new system that allows code and documentation patches via pull requests.
This document discusses common mistakes made in Oracle Business Intelligence development. It is organized by categories including the three layers of the RPD, system/DevOps/security issues, multidimensional modeling failures, front-end usage mistakes, and analysis/dashboard errors. Specific examples provided include using incorrect data types, not creating dimensional hierarchies, manual security management instead of roles, treating cubes like relational sources, and using OBI as an Excel exporting or data entry tool. The document is intended to review worst practices to improve core OBI development skills.
Coderetreat is a one day intense workshop for software developers for imporving their development skills by practicing. This is the material I presented at the beginning of coderetreat I facilitated on May 2014.
The document discusses various "mini-waterfalls" that can emerge in Scrum teams through defined roles like analysts, developers, and testers working sequentially rather than collaboratively. Some examples provided include analysts completing work before passing it to developers or testing only occurring at the end after development is finished. This siloed work can reduce understanding, flexibility, speed, and quality. The document suggests empowering cross-functional teams and automating work to avoid these anti-patterns. It prompts readers to examine their own teams for similar issues and ways to continuously improve.
Don't get blamed for your choices - Techorama 2019Hannes Lowette
As developers, we make choices all the time: architecture, frameworks, libraries, cloud providers, etc. And if you’ve been around for a while, you probably ended up regretting at least some of your choices.
In this session, we'll explore the typical pitfalls of making development choices and how to avoid them. By the end of this session, you will be armed to take any decision they will throw at you.
Now, if only there was a way to prove to your peers and superiors that you acquired this skill...
Well, there is! RAD Certification! I'll end my talk by telling you about this awesome certification program!
Becoming a Software Craftsman takes a lot of practice. Using Code Katas in Coding Dojos is an excellent way to get that practice in a low stress fun way. Discover how to do that.
The document summarizes an "Extreme Programming" talk given by Johannes Brodwall. The talk demonstrates test-driven development and pair programming. It discusses the benefits of these practices, such as producing higher quality code through simplicity, communication, and feedback. It encourages programmers to practice deliberately, both at work and at home, in order to continuously improve. The conclusion emphasizes freeing the mind and practicing programming as an art.
The document discusses issues that can arise from siloed roles in Scrum teams, such as developers, testers, and Scrum Masters acting as separate functions. This leads to reduced understanding between roles, bottlenecks when resources are unavailable, and an overall lack of team accountability. The document suggests that defining roles rigidly can cement separations and inhibit collaboration, flexibility, and process improvement. It argues teams should avoid "mini-waterfalls" between roles and instead strive for full cross-functionality, shared understanding of requirements, collective responsibility, and empowerment of self-organizing teams.
Technical interviews often do not reflect the actual day-to-day work of a job and require a unique set of skills. The document provides advice on preparing for technical interviews, which may involve coding challenges, algorithms, data structures, frameworks and languages. It recommends practicing core skills, gaining interview experience through mock interviews, and learning from every interview. The goal is to be able to think through problems and code solutions calmly under pressure.
An admin's guide for getting work done with share point and powershell scriptingInnoTech
This document summarizes a presentation given by Marrell Sanders on using PowerShell scripting to automate tasks and get work done more efficiently in SharePoint administration. Some key points covered include:
- PowerShell allows admins to automate common tasks and save hours of work
- Real-world examples are provided of using PowerShell scripts to solve common admin problems like permissions issues, domain monitoring, and external website changes
- Additional PowerShell resources are recommended for admins looking to get started with the tool.
This document provides advice for developers at different levels and in working with various roles. It discusses that a developer is someone who writes software and outlines junior and senior developer levels. It also lists important skills and advises developers to work well with customers by listening to feedback, with marketing by clearly explaining concepts, and with QA by engaging in clear communication and defensive coding. The document emphasizes the importance of collaboration, continuous learning, and focus.
Oracle SQL Developer Tips and Tricks: Data EditionJeff Smith
Originally presented at Oracle Code One 2019, this is a collection of techniques dedicated to making your work with data easier and more enjoyable in Oracle Database with SQL Developer.
Many developers know that they should be writing tests for their apps. However, it’s often hard to know how to get started or to convince your manager that you should be spending half of your time writing and maintaining test code. In this talk, you will learn how you can integrate testing into your day-to-day workflow and you’ll learn why a good test suite will not cost you a lot of time. Instead, it should end up saving you time. And as you know, the manager loves it when you manage to save time. You will understand how TDD works, how to integrate the important bits of TDD and how to build a high-quality test suite that is a pleasure to maintain. To round things out, you will also learn about Xcode 11’s new test plans feature and how you can use it to make your test suite even better!
Ike Ellis gave a presentation on the 14 habits of great SQL developers. Some of the most important habits discussed were using source control, extensive testing, questioning assumptions, and fighting dependencies. Great SQL developers also work as a team, code for resiliency, and constantly improve code quality before moving on to new tasks. The goal is to deliver value and leave applications better organized and more maintainable than when development began.
This document summarizes a session on adding affordable 3D content to eLearning. It introduces several free and open-source 3D modeling tools like Adobe Fuse, Mixamo, MakeHuman and Blender that can be used to create 3D characters, animations, and environments. It also discusses how this 3D content can be embedded in documents, websites and used for augmented and virtual reality applications using services like Sketchfab. The session aims to showcase different 3D content creation options and encourage leveraging 3D to make eLearning more engaging.
More Related Content
Similar to Touch & GO: Quickly Enhancing Lectora for Gesture-Based Mobile Interaction
Ike Ellis gave a presentation on the 14 habits of great SQL developers. Some of the key habits discussed included having strong testing practices like using mocking frameworks and testing that code runs correctly; always automating processes and never directly changing objects in production; questioning assumptions and re-evaluating decisions; understanding the true goal is to deliver value rather than just writing code; treating software development as a team sport through practices like code reviews and knowledge sharing; and constantly improving code quality by refactoring and fixing issues. The presentation emphasized habits like these can help developers increase their value.
NDC London 2020 - Challenges of Managing CoreFx Repo -- Karel ZikmundKarel Zikmund
NDC London 2020 conference in London, UK - 2020/1/29
Talk: Challenges of Managing CoreFx Repo by Karel Zikmund
https://sessionize.com/s/karel-zikmund/archived-challenges-of-managing-corefx-repo/24173
https://www.youtube.com/watch?v=zLB2_h-3ZS4
This slide created for shared internal and for everyone interesting clean code. Why we needed? Why you should use it?
Ps. Sorry if my grammar is very bad :D
Participating in the Community - Beyond Code: Presented by Cassandra Targett,...Lucidworks
This document discusses ways for non-programmers to contribute to the open source Solr project. It addresses common obstacles like not having enough time or Java skills. Suggested contributions include improving documentation by writing tutorials or use cases, helping new users on mailing lists, verifying open issues on JIRA, and advancing bug reports by reproducing or writing test cases for them. The documentation for Solr will also be improved by transitioning to a new system that allows code and documentation patches via pull requests.
This document discusses common mistakes made in Oracle Business Intelligence development. It is organized by categories including the three layers of the RPD, system/DevOps/security issues, multidimensional modeling failures, front-end usage mistakes, and analysis/dashboard errors. Specific examples provided include using incorrect data types, not creating dimensional hierarchies, manual security management instead of roles, treating cubes like relational sources, and using OBI as an Excel exporting or data entry tool. The document is intended to review worst practices to improve core OBI development skills.
Coderetreat is a one day intense workshop for software developers for imporving their development skills by practicing. This is the material I presented at the beginning of coderetreat I facilitated on May 2014.
The document discusses various "mini-waterfalls" that can emerge in Scrum teams through defined roles like analysts, developers, and testers working sequentially rather than collaboratively. Some examples provided include analysts completing work before passing it to developers or testing only occurring at the end after development is finished. This siloed work can reduce understanding, flexibility, speed, and quality. The document suggests empowering cross-functional teams and automating work to avoid these anti-patterns. It prompts readers to examine their own teams for similar issues and ways to continuously improve.
Don't get blamed for your choices - Techorama 2019Hannes Lowette
As developers, we make choices all the time: architecture, frameworks, libraries, cloud providers, etc. And if you’ve been around for a while, you probably ended up regretting at least some of your choices.
In this session, we'll explore the typical pitfalls of making development choices and how to avoid them. By the end of this session, you will be armed to take any decision they will throw at you.
Now, if only there was a way to prove to your peers and superiors that you acquired this skill...
Well, there is! RAD Certification! I'll end my talk by telling you about this awesome certification program!
Becoming a Software Craftsman takes a lot of practice. Using Code Katas in Coding Dojos is an excellent way to get that practice in a low stress fun way. Discover how to do that.
The document summarizes an "Extreme Programming" talk given by Johannes Brodwall. The talk demonstrates test-driven development and pair programming. It discusses the benefits of these practices, such as producing higher quality code through simplicity, communication, and feedback. It encourages programmers to practice deliberately, both at work and at home, in order to continuously improve. The conclusion emphasizes freeing the mind and practicing programming as an art.
The document discusses issues that can arise from siloed roles in Scrum teams, such as developers, testers, and Scrum Masters acting as separate functions. This leads to reduced understanding between roles, bottlenecks when resources are unavailable, and an overall lack of team accountability. The document suggests that defining roles rigidly can cement separations and inhibit collaboration, flexibility, and process improvement. It argues teams should avoid "mini-waterfalls" between roles and instead strive for full cross-functionality, shared understanding of requirements, collective responsibility, and empowerment of self-organizing teams.
Technical interviews often do not reflect the actual day-to-day work of a job and require a unique set of skills. The document provides advice on preparing for technical interviews, which may involve coding challenges, algorithms, data structures, frameworks and languages. It recommends practicing core skills, gaining interview experience through mock interviews, and learning from every interview. The goal is to be able to think through problems and code solutions calmly under pressure.
An admin's guide for getting work done with share point and powershell scriptingInnoTech
This document summarizes a presentation given by Marrell Sanders on using PowerShell scripting to automate tasks and get work done more efficiently in SharePoint administration. Some key points covered include:
- PowerShell allows admins to automate common tasks and save hours of work
- Real-world examples are provided of using PowerShell scripts to solve common admin problems like permissions issues, domain monitoring, and external website changes
- Additional PowerShell resources are recommended for admins looking to get started with the tool.
This document provides advice for developers at different levels and in working with various roles. It discusses that a developer is someone who writes software and outlines junior and senior developer levels. It also lists important skills and advises developers to work well with customers by listening to feedback, with marketing by clearly explaining concepts, and with QA by engaging in clear communication and defensive coding. The document emphasizes the importance of collaboration, continuous learning, and focus.
Oracle SQL Developer Tips and Tricks: Data EditionJeff Smith
Originally presented at Oracle Code One 2019, this is a collection of techniques dedicated to making your work with data easier and more enjoyable in Oracle Database with SQL Developer.
Many developers know that they should be writing tests for their apps. However, it’s often hard to know how to get started or to convince your manager that you should be spending half of your time writing and maintaining test code. In this talk, you will learn how you can integrate testing into your day-to-day workflow and you’ll learn why a good test suite will not cost you a lot of time. Instead, it should end up saving you time. And as you know, the manager loves it when you manage to save time. You will understand how TDD works, how to integrate the important bits of TDD and how to build a high-quality test suite that is a pleasure to maintain. To round things out, you will also learn about Xcode 11’s new test plans feature and how you can use it to make your test suite even better!
Ike Ellis gave a presentation on the 14 habits of great SQL developers. Some of the most important habits discussed were using source control, extensive testing, questioning assumptions, and fighting dependencies. Great SQL developers also work as a team, code for resiliency, and constantly improve code quality before moving on to new tasks. The goal is to deliver value and leave applications better organized and more maintainable than when development began.
Similar to Touch & GO: Quickly Enhancing Lectora for Gesture-Based Mobile Interaction (20)
This document summarizes a session on adding affordable 3D content to eLearning. It introduces several free and open-source 3D modeling tools like Adobe Fuse, Mixamo, MakeHuman and Blender that can be used to create 3D characters, animations, and environments. It also discusses how this 3D content can be embedded in documents, websites and used for augmented and virtual reality applications using services like Sketchfab. The session aims to showcase different 3D content creation options and encourage leveraging 3D to make eLearning more engaging.
3D Clearance Rack: Add Affordable 3D Content to eLearning Simulations, AR, an...Michael Sheyahshe
Free and near-free tools, software, & web resources for creation, editing, animating, and displaying 3D models in eLearning.
Presented at eLearning Guild's Realities360 conference, JUN 2018.
Presented at Learning Dev Camp 2018 in SLC, UT.
Sure, we have a slew of tools to choose from to author eLearning, but creating a unique user experience that engages our learners is vastly important and relies on our skills as storytellers. We can improve our eLearning storytelling skills using comic book theory. Using special tricks and tips from comic books and graphic novels, we will create a unique user experience…no matter which authoring tool or platform you use. Attendees will gain keen insight on how to improve creative storytelling skills utilizing comic book theory to develop engaging learner-centric content. Participants will also learn the “language” of comics, graphic novels, and sequential art and how they effectively communicate within the visual milieu. Finally, attendees will go see real-world examples of how to implement these new-found storytelling skills in eLearning.
The document provides an overview of training on using Microsoft PowerPoint. It covers general topics like using the ribbon interface, adding and formatting slides, inserting images and text, applying themes, and customizing slide shows with animations, transitions, and multimedia. The training is divided into 5 sections, with each section focusing on a different aspect of PowerPoint and including goals, explanations of tools and functions, examples, and review questions. The document is intended to teach users how to effectively use PowerPoint's various features to create and design presentations.
Create Advanced Content with iSpring Right Out-of-the-BoxMichael Sheyahshe
How-tos on authoring enriched eLearning content using iSpring Suite, without having to extend it with external code or scripting. by Michael Sheyahshe
Originally presented at ATD CORE 4 Conference 2016, New Orleans, LA.
‘Nuff Said: Tips & Tricks from Digital Comics to Breathe Life into Your HTML5 Michael Sheyahshe
Use the language of comic books to create better eLearning and training. by Michael Sheyahshe.
Originally presented at mLearning DevCon 2012, Philadelphia, PA
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.