Talk I gave at Google on 10.07.2007. See http://climbtothestars.org/archives/2007/07/10/talk-languages-on-the-internet-at-google-tomorrow/ -- slightly modified version of the one I gave at reboot.
Waiting for the Babel Fish: Languages and Multilingualismsbooth
The document discusses the challenges of building tools that support multilingual users and allow for code switching between languages. It notes that most people are multilingual to some degree, but many online tools assume a one-language-per-user model. It provides recommendations for tools to support multilingual users better, such as localizing interfaces in multiple languages, allowing users to specify multiple languages, and designing features that facilitate mixing languages. The document argues for "multilingualization" rather than just translation to enable code switching online.
The language reading direction is probably one of the most determinant factors influencing the successful internationalization of graphical user interfaces, beyond their mere translation. Western languages are read from left to right and top to bottom, while Arabic languages and Hebrew are read from right to left and top to bottom, and Oriental languages are read from top to bottom. In order to address this challenge, we introduce flippable user interfaces that enable the end user to change the reading direction of a graphical user interface by flipping it into the desired reading direction by direct manipulation. This operation automatically and dynamically changes the user interface layout based on a generalized concept of reading direction and translates it according to the end user’s preferences.
Multilingualism and language choice in sub saharan africaManuela Noske
This document discusses language use in Sub-Saharan Africa. It notes that the region is highly multilingual with over a thousand languages spoken. While colonial powers established some European languages, indigenous African languages are increasingly taking on official status. Most Africans are multilingual, switching between local, national, and international languages depending on context. Some languages like Swahili have emerged as lingua francas across multiple countries. Effective localization requires understanding these complex language environments and dynamics.
The document provides an agenda for a meeting about Latino outreach in libraries. It discusses the Project Empecemos II grant which funds bilingual programming and materials. It shares details on past outreach activities like Hispanic Heritage Day events, ESL presentations, and computer classes in Spanish. Tips are provided for visiting Latino communities, attending local events, and generating contacts. Key websites for Spanish resources are also listed. The document ends with asking for any questions or comments.
2008 03 01 Blogtalk Structured Portable Social Networkssbooth
The case for Structured Portable Social Networks, from a user perspective. Video of talk: http://www.viddler.com/explore/steph/videos/35
Talk given at WebCampSNP in Cork, Ireland (02.03.2008, BlogTalk).
See: http://climbtothestars.org/archives/2007/08/16/we-need-structured-portable-social-networks-spsn/
Web Application Security: OWASP TOP 10 2010 tra rischi, attacchi e difeseSimone Onofri
"For the first time web application vulnerabilities have reached 50 per cent of all code flaws reported" - IBM X-Force Threat Report
L'X-force Threats Report ogni sei mesi riporta i trend dell’IT Security. Nell’edizione di Agosto 2010, oltre al Phishing e all’exploiting dei PDF, conferma che il 50% delle vulnerabilità si trova nelle applicazioni web. Che l’applicazione sia open source o closed source, creata da uno sviluppatore freelance o da una azienda di una qualsiasi dimensione, bisogna considerare tutti i fattori di rischio e impatto in caso di compromissione e conoscere i metodi più pratici ed economici per risolvere o mitigare le vulnerabilità.
Durante il talk, dopo una breve introduzione sulla sicurezza delle applicazioni web, vedremo - con alcuni esempi pratici e in maniera semplice - come attaccare, come difendersi e quali sono i rischi che corriamo con i 10 rischi più frequenti nel 2010 secondo l’OWASP: dalle Injection (di SQL o LDAP...) ai Redirect, passando per le XSS e CSRF e molto altro.
Standards WakeUp: XHTML, CSS, Accessibilità e SemanticaSimone Onofri
Il World Wide Web Consortium (W3C), insieme con altri gruppi e organismi di standardizzazione, ha fondato le tecnologie per la creazione e interpretazione di contenuti basati sul Web. Queste tecnologie, che noi chiamiamo “standard del Web”, sono accuratamente progettate per offrire tutti i vantaggi del Web al maggior numero di utenti e, nello stesso tempo, per assicurare lunga vita a qualsiasi documento pubblicato sul Web. L'intervento, proposto al RomeCamp 2007, riassume a grandi linee tali Standard e il loro utilizzo. Da XHTML a CSS, dall'UTF-8 a ECMAscript, dalle etichette ICRA ai metadati.
Waiting for the Babel Fish: Languages and Multilingualismsbooth
The document discusses the challenges of building tools that support multilingual users and allow for code switching between languages. It notes that most people are multilingual to some degree, but many online tools assume a one-language-per-user model. It provides recommendations for tools to support multilingual users better, such as localizing interfaces in multiple languages, allowing users to specify multiple languages, and designing features that facilitate mixing languages. The document argues for "multilingualization" rather than just translation to enable code switching online.
The language reading direction is probably one of the most determinant factors influencing the successful internationalization of graphical user interfaces, beyond their mere translation. Western languages are read from left to right and top to bottom, while Arabic languages and Hebrew are read from right to left and top to bottom, and Oriental languages are read from top to bottom. In order to address this challenge, we introduce flippable user interfaces that enable the end user to change the reading direction of a graphical user interface by flipping it into the desired reading direction by direct manipulation. This operation automatically and dynamically changes the user interface layout based on a generalized concept of reading direction and translates it according to the end user’s preferences.
Multilingualism and language choice in sub saharan africaManuela Noske
This document discusses language use in Sub-Saharan Africa. It notes that the region is highly multilingual with over a thousand languages spoken. While colonial powers established some European languages, indigenous African languages are increasingly taking on official status. Most Africans are multilingual, switching between local, national, and international languages depending on context. Some languages like Swahili have emerged as lingua francas across multiple countries. Effective localization requires understanding these complex language environments and dynamics.
The document provides an agenda for a meeting about Latino outreach in libraries. It discusses the Project Empecemos II grant which funds bilingual programming and materials. It shares details on past outreach activities like Hispanic Heritage Day events, ESL presentations, and computer classes in Spanish. Tips are provided for visiting Latino communities, attending local events, and generating contacts. Key websites for Spanish resources are also listed. The document ends with asking for any questions or comments.
2008 03 01 Blogtalk Structured Portable Social Networkssbooth
The case for Structured Portable Social Networks, from a user perspective. Video of talk: http://www.viddler.com/explore/steph/videos/35
Talk given at WebCampSNP in Cork, Ireland (02.03.2008, BlogTalk).
See: http://climbtothestars.org/archives/2007/08/16/we-need-structured-portable-social-networks-spsn/
Web Application Security: OWASP TOP 10 2010 tra rischi, attacchi e difeseSimone Onofri
"For the first time web application vulnerabilities have reached 50 per cent of all code flaws reported" - IBM X-Force Threat Report
L'X-force Threats Report ogni sei mesi riporta i trend dell’IT Security. Nell’edizione di Agosto 2010, oltre al Phishing e all’exploiting dei PDF, conferma che il 50% delle vulnerabilità si trova nelle applicazioni web. Che l’applicazione sia open source o closed source, creata da uno sviluppatore freelance o da una azienda di una qualsiasi dimensione, bisogna considerare tutti i fattori di rischio e impatto in caso di compromissione e conoscere i metodi più pratici ed economici per risolvere o mitigare le vulnerabilità.
Durante il talk, dopo una breve introduzione sulla sicurezza delle applicazioni web, vedremo - con alcuni esempi pratici e in maniera semplice - come attaccare, come difendersi e quali sono i rischi che corriamo con i 10 rischi più frequenti nel 2010 secondo l’OWASP: dalle Injection (di SQL o LDAP...) ai Redirect, passando per le XSS e CSRF e molto altro.
Standards WakeUp: XHTML, CSS, Accessibilità e SemanticaSimone Onofri
Il World Wide Web Consortium (W3C), insieme con altri gruppi e organismi di standardizzazione, ha fondato le tecnologie per la creazione e interpretazione di contenuti basati sul Web. Queste tecnologie, che noi chiamiamo “standard del Web”, sono accuratamente progettate per offrire tutti i vantaggi del Web al maggior numero di utenti e, nello stesso tempo, per assicurare lunga vita a qualsiasi documento pubblicato sul Web. L'intervento, proposto al RomeCamp 2007, riassume a grandi linee tali Standard e il loro utilizzo. Da XHTML a CSS, dall'UTF-8 a ECMAscript, dalle etichette ICRA ai metadati.
This document provides training on how to organize and build a successful network marketing business. It emphasizes treating the business seriously rather than as a hobby, setting schedules and goals, recruiting a strong downline team, prospecting for new customers, and using motivation and praise to encourage the downline. Building residual income through a large downline is key to eventual wealth in network marketing.
This document provides scriptural references related to end times and prophecy. It references passages in Daniel that speak of future events during the time of wrath and the end times. Galatians passages discuss how the gospel came by revelation from Jesus Christ rather than from man. 2 Thessalonians and Romans passages reference God's judgment and crushing of Satan. The document suggests these passages indicate events must soon take place and the time is near, and lists that there are 4 views on the subject.
The document discusses how the internet can be used for sharing ideas, singing, photographs, communicating with others, acquiring and sharing knowledge, collaborating on artistic works, creating social networks, and creating video channels. It also provides links to resources like Skype, Picasa, Flickr, YouTube, MySpace, Blogger, MediaWiki, Windows Live Messenger, and Wikipedia for these purposes. The overall message is that the internet can be fun when used for self-expression, communication, learning, and creativity.
This document provides training on how to organize and build a successful network marketing business. It emphasizes treating the business seriously rather than as a hobby, setting schedules and goals, recruiting a strong downline team, prospecting for new customers, and using motivation and praise to encourage the downline. Building residual income through a large downline is key to eventual wealth in network marketing.
This document discusses guidelines for using externally hosted web 2.0 services at the University of Edinburgh. It outlines legislative issues around data protection and freedom of information acts. It also covers university regulations regarding assessment, branding and computing. Key service concerns are identified such as security, confidentiality, data ownership and reliability. The document proposes establishing a risk management process including a risk register. It concludes that clear guidelines are needed as web 2.0 services develop, to help users understand risks without discouraging use, and to consider external access to internal university services.
A talk I gave at BlogOpen in Novi Sad, Serbia. It was streamed live on BlogTV, but unfortunately I think nobody filmed it. If you did, please let me know.
I will publish my talk notes on my blog within a few days.
This document is a student handbook for Preston Hall Middle School that provides information about policies, procedures, expectations and guidelines for students. It welcomes students to the new school year and emphasizes academics excellence, individualized education and respectful behavior. It outlines attendance policies, discipline procedures, prohibited behaviors, expectations for extracurricular activities and more. The handbook aims to guide students into making good choices and having a successful school year.
Online Culture: what parents, teenagers and teachers need to knowsbooth
The document discusses some of the key issues that parents, teenagers, and teachers need to be aware of regarding online culture. It notes problems like naked photos online, bullying, pornography, and unhealthy peer groups. It also notes a disconnect between how teenagers view the social internet and how parents and teachers view the informational internet. Because of anonymity and a lack of educated adults online, some teenagers engage in risky behaviors without realizing the public nature and permanence of their online actions. The document encourages speaking to parents, teenagers, and teachers about providing education and awareness regarding participating safely and positively in online culture.
This document discusses the history and concepts of Web 2.0, including its focus on user-generated content and collaboration. It describes how Web 2.0 enables new socio-technical systems by making it easy to track events and share information. The document also discusses how Web 2.0 can support personal learning environments that give learners more control over their education through collaborative learning and construction of online artifacts. While academic mindsets may need to change to fully leverage Web 2.0's potential, the document argues it allows moving in promising directions for both teaching and research.
The document summarizes WoW! Shop Solution, a telecommunications solution for small businesses presented by Communi Care Pte Ltd. It works by connecting terminals to their server via the internet instead of a local telco, saving customers $0.025 per minute. It is targeted at backpackers, foreign workers, traveling business people and tourists. The requirements to start are business knowledge, a small retail space in a high traffic area, and an investment of around $7,000 for technical setup.
This document discusses four approaches to interpreting biblical prophecy:
1) Preterist - focuses on prophecies fulfilled in the 1st century church. It references Matthew 24:21-22 about great distress coming upon the world.
2) Historicist - sees prophecy as a road map of world history. It lists biblical references paired with their historical fulfillments.
3) Futurist - views prophecy as a blueprint for end times events yet to come. It references Revelation 1:19 about writing what will happen later.
4) Idealist - interprets prophecy as conveying timeless spiritual principles, not literal events. It references 2 Peter 3:13 about a new heaven and earth.
This document provides an overview of key aspects of the biblical book of Revelation. It begins by summarizing Revelation 1:1-3 which introduces the revelation that was given by God to Jesus Christ to show his servants things that would shortly take place. It then lists some of the main components and interpretation approaches to Revelation, including judgments, symbols, creatures, the preterist/historicist/futurist/idealist views. It discusses different perspectives on Revelation from figures like John Calvin, Thomas Jefferson, and Martin Luther. It closes by summarizing Revelation 19:11-16 which describes a vision of a rider on a white horse who will strike down the nations with a sword and whose name is declared to be King of Kings
Blogs allow for public conversations and the redistribution of power on the internet. They enable two-way communication and humanization through comments. This conversational era represents a paradigm shift where people can freely express themselves to huge audiences. Blogs are also useful for learning by providing a permanent, networked, and conversational record of ideas, problem solving, feedback, and best practices that is easy to set up and use.
Service learning provides students with opportunities to apply classroom knowledge to help address real community issues. When implemented with quality standards, research shows service learning can improve academic achievement, civic engagement, and character development. It benefits students both during and after school by developing skills valued by colleges and employers such as collaboration, communication, problem solving, and leadership. Service learning allows all students, including those from disadvantaged backgrounds, to build confidence and contribute value through meaningful service.
Service learning provides students with opportunities to apply classroom knowledge to help address real community issues. When implemented with quality standards, it has been shown to improve academic achievement, civic engagement, and character development. It benefits students both during and after school by developing life skills, leadership abilities, and workplace skills that are valued by employers. Contrary to common myths, service learning can positively impact all students, including those from disadvantaged backgrounds, and promotes ethical decision making.
The document summarizes the WoW! callback system and overseas calling services provided by Communi Care Pte Ltd. It describes how the WoW! callback system allows users to make inexpensive international calls. It also explains how WoW! services like One Touch Calling, SMS Callback, and dedicated numbers allow users to receive calls and make outbound calls while overseas at lower rates than traditional roaming charges. Finally, it provides a comparison of rates for incoming/outgoing calls between major Singapore telcos and WoW! services to popular international destinations.
How to build language technology resources for the next 100 yearsGuy De Pauw
The document discusses how to build sustainable language technology resources for lesser-resourced languages over the next 100 years. It outlines an vision of linguistic diversity and language survival. Key challenges include limited resources, small language communities, and technological limitations. Approaches proposed to work around these include minimizing redundant work, maximizing reuse of resources, building user and developer communities, and preparing resources to work with future technologies. Specific topics covered are types of language technology resources, issues around character encoding, text input methods, and future-proofing keyboard layouts and recognition technologies for many languages.
This document provides training on how to organize and build a successful network marketing business. It emphasizes treating the business seriously rather than as a hobby, setting schedules and goals, recruiting a strong downline team, prospecting for new customers, and using motivation and praise to encourage the downline. Building residual income through a large downline is key to eventual wealth in network marketing.
This document provides scriptural references related to end times and prophecy. It references passages in Daniel that speak of future events during the time of wrath and the end times. Galatians passages discuss how the gospel came by revelation from Jesus Christ rather than from man. 2 Thessalonians and Romans passages reference God's judgment and crushing of Satan. The document suggests these passages indicate events must soon take place and the time is near, and lists that there are 4 views on the subject.
The document discusses how the internet can be used for sharing ideas, singing, photographs, communicating with others, acquiring and sharing knowledge, collaborating on artistic works, creating social networks, and creating video channels. It also provides links to resources like Skype, Picasa, Flickr, YouTube, MySpace, Blogger, MediaWiki, Windows Live Messenger, and Wikipedia for these purposes. The overall message is that the internet can be fun when used for self-expression, communication, learning, and creativity.
This document provides training on how to organize and build a successful network marketing business. It emphasizes treating the business seriously rather than as a hobby, setting schedules and goals, recruiting a strong downline team, prospecting for new customers, and using motivation and praise to encourage the downline. Building residual income through a large downline is key to eventual wealth in network marketing.
This document discusses guidelines for using externally hosted web 2.0 services at the University of Edinburgh. It outlines legislative issues around data protection and freedom of information acts. It also covers university regulations regarding assessment, branding and computing. Key service concerns are identified such as security, confidentiality, data ownership and reliability. The document proposes establishing a risk management process including a risk register. It concludes that clear guidelines are needed as web 2.0 services develop, to help users understand risks without discouraging use, and to consider external access to internal university services.
A talk I gave at BlogOpen in Novi Sad, Serbia. It was streamed live on BlogTV, but unfortunately I think nobody filmed it. If you did, please let me know.
I will publish my talk notes on my blog within a few days.
This document is a student handbook for Preston Hall Middle School that provides information about policies, procedures, expectations and guidelines for students. It welcomes students to the new school year and emphasizes academics excellence, individualized education and respectful behavior. It outlines attendance policies, discipline procedures, prohibited behaviors, expectations for extracurricular activities and more. The handbook aims to guide students into making good choices and having a successful school year.
Online Culture: what parents, teenagers and teachers need to knowsbooth
The document discusses some of the key issues that parents, teenagers, and teachers need to be aware of regarding online culture. It notes problems like naked photos online, bullying, pornography, and unhealthy peer groups. It also notes a disconnect between how teenagers view the social internet and how parents and teachers view the informational internet. Because of anonymity and a lack of educated adults online, some teenagers engage in risky behaviors without realizing the public nature and permanence of their online actions. The document encourages speaking to parents, teenagers, and teachers about providing education and awareness regarding participating safely and positively in online culture.
This document discusses the history and concepts of Web 2.0, including its focus on user-generated content and collaboration. It describes how Web 2.0 enables new socio-technical systems by making it easy to track events and share information. The document also discusses how Web 2.0 can support personal learning environments that give learners more control over their education through collaborative learning and construction of online artifacts. While academic mindsets may need to change to fully leverage Web 2.0's potential, the document argues it allows moving in promising directions for both teaching and research.
The document summarizes WoW! Shop Solution, a telecommunications solution for small businesses presented by Communi Care Pte Ltd. It works by connecting terminals to their server via the internet instead of a local telco, saving customers $0.025 per minute. It is targeted at backpackers, foreign workers, traveling business people and tourists. The requirements to start are business knowledge, a small retail space in a high traffic area, and an investment of around $7,000 for technical setup.
This document discusses four approaches to interpreting biblical prophecy:
1) Preterist - focuses on prophecies fulfilled in the 1st century church. It references Matthew 24:21-22 about great distress coming upon the world.
2) Historicist - sees prophecy as a road map of world history. It lists biblical references paired with their historical fulfillments.
3) Futurist - views prophecy as a blueprint for end times events yet to come. It references Revelation 1:19 about writing what will happen later.
4) Idealist - interprets prophecy as conveying timeless spiritual principles, not literal events. It references 2 Peter 3:13 about a new heaven and earth.
This document provides an overview of key aspects of the biblical book of Revelation. It begins by summarizing Revelation 1:1-3 which introduces the revelation that was given by God to Jesus Christ to show his servants things that would shortly take place. It then lists some of the main components and interpretation approaches to Revelation, including judgments, symbols, creatures, the preterist/historicist/futurist/idealist views. It discusses different perspectives on Revelation from figures like John Calvin, Thomas Jefferson, and Martin Luther. It closes by summarizing Revelation 19:11-16 which describes a vision of a rider on a white horse who will strike down the nations with a sword and whose name is declared to be King of Kings
Blogs allow for public conversations and the redistribution of power on the internet. They enable two-way communication and humanization through comments. This conversational era represents a paradigm shift where people can freely express themselves to huge audiences. Blogs are also useful for learning by providing a permanent, networked, and conversational record of ideas, problem solving, feedback, and best practices that is easy to set up and use.
Service learning provides students with opportunities to apply classroom knowledge to help address real community issues. When implemented with quality standards, research shows service learning can improve academic achievement, civic engagement, and character development. It benefits students both during and after school by developing skills valued by colleges and employers such as collaboration, communication, problem solving, and leadership. Service learning allows all students, including those from disadvantaged backgrounds, to build confidence and contribute value through meaningful service.
Service learning provides students with opportunities to apply classroom knowledge to help address real community issues. When implemented with quality standards, it has been shown to improve academic achievement, civic engagement, and character development. It benefits students both during and after school by developing life skills, leadership abilities, and workplace skills that are valued by employers. Contrary to common myths, service learning can positively impact all students, including those from disadvantaged backgrounds, and promotes ethical decision making.
The document summarizes the WoW! callback system and overseas calling services provided by Communi Care Pte Ltd. It describes how the WoW! callback system allows users to make inexpensive international calls. It also explains how WoW! services like One Touch Calling, SMS Callback, and dedicated numbers allow users to receive calls and make outbound calls while overseas at lower rates than traditional roaming charges. Finally, it provides a comparison of rates for incoming/outgoing calls between major Singapore telcos and WoW! services to popular international destinations.
How to build language technology resources for the next 100 yearsGuy De Pauw
The document discusses how to build sustainable language technology resources for lesser-resourced languages over the next 100 years. It outlines an vision of linguistic diversity and language survival. Key challenges include limited resources, small language communities, and technological limitations. Approaches proposed to work around these include minimizing redundant work, maximizing reuse of resources, building user and developer communities, and preparing resources to work with future technologies. Specific topics covered are types of language technology resources, issues around character encoding, text input methods, and future-proofing keyboard layouts and recognition technologies for many languages.
Staying Sane While Publishing in Multiple Languages Across Multiple FormatsElizabeth Henry
October 2013
Transmedia Meetup Zurich
I was asked to present a brief talk on Multilingual Publishing and Global Content Strategy.
It's a launching point for transmedia or cross-platform projects that must appear in multiple languages. How do you start? What are you actually trying to do with a transmedia project? What are you saying? Where are you saying it? How are you balancing technology and your core message to your audience?
Future of screens for Linguistic DiversityKaren Nemeth
This document discusses the need for apps and digital media to be inclusive of dual language learners (DLLs), who make up 25% of young children in the US. It notes that effective apps should support children's home languages as well as English. The document critiques some current apps for only including English text and translations, lacking cultural representation, and failing to make meaningful connections between languages. It provides a rubric for evaluating apps on factors like supported languages, developmentally appropriate practice, and recording children's productive language. The conclusion calls for more proactive, universally designed apps with culturally rich content to better serve DLLs.
The document discusses language translation. It defines translation as conveying written text from a source language to a target language clearly, completely, accurately, and appropriately. The translation process involves translation, editing, and proofreading. Training programs may be able to use translation to cost-effectively expand their offerings to other languages. The document also outlines some objectives of language translation tools, including developing a system to convert between languages, providing an easy interface, and translating most languages.
This document describes a tool to convert audio/text to Indian sign language using Python libraries. It discusses using natural language processing and machine learning algorithms to take text or audio as input and output the corresponding sign language video. The tool is being developed as a website to help deaf and hard of hearing people in India communicate. It covers related work on sign language recognition and conversion tools. It then describes the methodology which includes audio to text conversion, searching a database of sign language video clips, and combining clips to generate the output video. Screenshots of the frontend website and examples of inputs and outputs are provided. Future work discussed includes improving the UI and adding mobile apps to make the tool cross-platform.
Human Language Technologies in a Multilingual EuropeGeorg Rehm
The document summarizes a presentation on human language technologies in a multilingual Europe. Some key points:
- There are 24 official EU languages and many regional/minority languages that have equal status but most are under-supported by language technologies and face digital extinction.
- The META-NET alliance coordinates language technology research across Europe but the field remains fragmented. There is a need for high-quality, deployable language technologies to support applications like translation, conversational interfaces, and a multilingual digital single market.
- A proposed "Multilingual Value Programme" would help enable the multilingual digital single market through technologies for translating, analyzing, processing and curating natural language content.
- A long-term
Pigeon is a software solution that aims to overcome barriers in communication by providing real-time translation between different languages and media types using existing web and networking technologies. It allows users to translate speech, text, and voice commands across languages through interfaces on devices like PCs and cell phones. The document outlines Pigeon's interfaces and functionalities, technical details, existing resources used in development, and plans for future extensions.
This document discusses language translation and provides an overview of a language translation tool. It begins with an introduction that defines translation and its objectives. It then discusses why translation is necessary in different contexts like education, business, and media. The document outlines the hardware, software, and development tools required for the language translation tool, including using Python and Visual Studio Code. It describes the methodology used in the tool, which utilizes the Googletrans library to implement Google Translate API. The modes of the translation tool include writing text, processing, output, and listening. The document concludes with discussing the future of translation and the benefits of language translators.
A Digital Survival Kit for your Language.Pecyn Goresgyn y Bygythiadau i’ch Ia...Gareth Morlais
A Digital Survival Kit for your Language.Pecyn Goresgyn y Bygythiadau i’ch Iaith.
Presentation to Government Digital Services GDS-MHCLG
Evershed's Caerdydd, Cardiff 03/07/2018
Playing is simple, even a child can do it, but designing something simple is hard. How can we combine prototyping with production software to get our ideas in front of real people? How can we evolve our software over time? How do we measure if something is fun?
I will talk about how Ruby’s flexibility and a strong testing ethos can bring some sanity to this uncertain world. And when I say testing, I’m not just talking about RSpec, Cucumber or Capybara, I’ll share stories from Mightyverse about how we test whether our software actually “works” for the people who use it — sharing failures, I mean, learning, as well as success.
The document discusses Kutoa, a programming language and virtual machine for gluing software together. It aims to make software development simpler, more productive, and reusable by allowing programs to be written as scripts that send messages between objects. Kutoa avoids variables, classes, and upfront compilation, instead evaluating scripts lazily at runtime. The document provides examples of how Kutoa scripts work and invites the audience to collaborate on its development.
Lance Rougeux: DEN Virtual Conference "Lost In Translation"changingconnections
The Discovery Educator Network premieres the first of its kind National Virtual Conference hosted locally, experiencing the virtual world uniquely in face-to-face interactions at sites throughout the nation.
The document summarizes research on an app called Chatmunk, which allows users to practice speaking foreign languages without judgment. It includes:
1) User research showing most learn languages for personal enrichment or education, and prefer classes but find them lacking for real-life interactions.
2) Competitive analyses comparing Chatmunk's features to other language learning apps and translation tools, finding it unique in allowing unscripted conversations with natives.
3) Personas of potential users - a student studying abroad, traveler who wants immersion, and someone restarting a dormant language - who need affordable, stress-free practice.
The document compares the Swift programming language to an unknown language X, describing various features and capabilities. It poses questions about language X that hint it is focused on cross-platform development, open source, safety, and functional programming. It is eventually revealed that language X is F#, and provides links to learn more about F# and its use for both front-end and back-end development across platforms like iOS, Android, and Azure.
Creating a unified consistent UI language for scalable appsRamon Cliquet
How to enable Designers, Developers, BA's and PM's to speak the same language? How to create, build and maintain a consistent UI and UX ecosystem on mid to large product teams? How to accelerate UI development and design hand-over with reusable and styled interactive components?
Translating e learning files with lectora inspireDavid Smith
This document discusses translation, localization, globalization, and internationalization as they relate to publishing Lectora courses. It defines each term and explains why they are important when going global. Translating content is only part of the process - technology considerations also impact quality, time and cost. The document provides tips for writing translatable content and avoiding issues. It describes how to use Lectora's translation tool to export files for translation agencies and reimport translated content. Cultural differences and proper language identification are also addressed.
Computer languages allow humans to communicate with computers. There are two main types: low-level languages like machine language using 1s and 0s that are easy for computers to understand but hard for humans, and high-level languages like Python and Java that use words and symbols humans can understand but require compilation. Low-level languages interact directly with hardware while high-level languages are portable, easier to execute but less efficient in memory usage. High-level languages are more commonly used today.
Localising open-source software is important, as more languages means more users. However, it is equally important to provide high quality translations. This slideshow prov is an overview of the importance of quality translations in GNOME
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.