This presentation was given at SMX Advanced in Seattle on June 2, 2009. It is intended for paid search professionals, it's edgy, it's humorous and meant to get you thinking "outside the box" when writing ad copy.
The document provides tips for optimizing pay-per-click (PPC) advertising campaigns on platforms like Google AdWords and Microsoft adCenter. It discusses account settings like networks, geography, devices, and bidding strategies. Key recommendations include using match types beyond just broad, incorporating negative keywords, separating search and display campaigns, and structuring accounts in an organized way with tightly themed ad groups.
The International Geek Exchange - State of Search 2014Elizabeth Marsten
The document describes the International Geek Exchange (IGE), a program where search marketing companies can exchange experienced employees for 2 weeks to learn from each other. It discusses the costs and logistics of participating, as well as the benefits such as escaping silos, brain space, and reinvigorating employees. Ideal candidates are experienced search marketers empowered to drive change, and companies need a culture of learning and flexibility.
Martin Scorsese is an American film director known for films like Mean Streets, Taxi Driver, Raging Bull, and Goodfellas. The document discusses three of Scorsese's films - Raging Bull, Taxi Driver, and Goodfellas - and analyzes some of Scorsese's directorial trademarks seen in those films, such as the use of flashbacks and voiceovers, filming scenes from a first-person perspective to make the audience feel like spectators, and setting many of his films in New York City.
This document discusses frameworks for enabling ecodesign and life-cycle thinking among small and medium enterprises (SMEs) to address challenges of climate change and resource depletion. It examines how national innovation systems and policy can increase SME adoption of ecodesign. Previous interventions like grants and information diffusion had limited long-term impact. The study will refine a capacity building framework exploring internal and external contexts of ecodesign intervention for SMEs and build models to evaluate such policies.
This presentation was given at SMX Advanced in Seattle on June 2, 2009. It is intended for paid search professionals, it's edgy, it's humorous and meant to get you thinking "outside the box" when writing ad copy.
The document provides tips for optimizing pay-per-click (PPC) advertising campaigns on platforms like Google AdWords and Microsoft adCenter. It discusses account settings like networks, geography, devices, and bidding strategies. Key recommendations include using match types beyond just broad, incorporating negative keywords, separating search and display campaigns, and structuring accounts in an organized way with tightly themed ad groups.
The International Geek Exchange - State of Search 2014Elizabeth Marsten
The document describes the International Geek Exchange (IGE), a program where search marketing companies can exchange experienced employees for 2 weeks to learn from each other. It discusses the costs and logistics of participating, as well as the benefits such as escaping silos, brain space, and reinvigorating employees. Ideal candidates are experienced search marketers empowered to drive change, and companies need a culture of learning and flexibility.
Martin Scorsese is an American film director known for films like Mean Streets, Taxi Driver, Raging Bull, and Goodfellas. The document discusses three of Scorsese's films - Raging Bull, Taxi Driver, and Goodfellas - and analyzes some of Scorsese's directorial trademarks seen in those films, such as the use of flashbacks and voiceovers, filming scenes from a first-person perspective to make the audience feel like spectators, and setting many of his films in New York City.
This document discusses frameworks for enabling ecodesign and life-cycle thinking among small and medium enterprises (SMEs) to address challenges of climate change and resource depletion. It examines how national innovation systems and policy can increase SME adoption of ecodesign. Previous interventions like grants and information diffusion had limited long-term impact. The study will refine a capacity building framework exploring internal and external contexts of ecodesign intervention for SMEs and build models to evaluate such policies.
Präsentation von Dr. Johannes Mainusch (Vice President Operations XING AG) und Susanne Reppin (Project Manager XING AG) bei der W-JAX 09 über die Verwendung von Kanban für das Maintenance-Team.
Johannes Haus - The Impact of Social Networking on Banking & FinanceArjen Strijker
How your employees are using social media today, how it is changing your company and what you should gain from it. Johannes Haus - Director Subscriptions, XING
Splunk4Leaders: How to Supercharge your Decision Making CapabilitySplunk
The document discusses how to make better decisions faster using Splunk. It covers cognitive biases that can negatively impact decision making like confirmation bias and anchoring. The presentation agenda includes explaining why decision making is important now given increasing data and system complexity. Splunk can help embrace data chaos by investigating, monitoring, analyzing and acting on machine data from complex systems. Key takeaways are to see the world as complex and chaotic, combine human and data strengths, and focus on planning over static plans to improve resilience.
The document is a May 2013 market analytics and technical analysis report that analyzes economic, fundamental, risk, and sentiment indicators across various timeframes. It discusses slowing economic growth in China and commodities, declining corporate revenues and squeezed margins, historical parallels to periods preceding market downturns, high complacency and leverage in markets, and concludes that indicators paint an unclear picture resembling a "house of mirrors".
2018 goetzpartners presentation "Explore The Core"Wolfram Römhild
Our new paradigm "Explore the Core" adresses the core challences of the C-Level Agenda
*Strategy*: How capable is my BUSINESS MODEL in regards to future markets and competitive dynamics?
*M&A*: How can I manage my CORPORATE PORTFOLIO using disruptive moves?
*Transformation*: How can my ORGANIZATION constantly ADAPT?
"Explore the core" means
- We look beyond the surface, and dig deeper – down to the decisive core of entrepreneurial practice
- We work in unity with our clients to challenge and evolve the core of their business, and transform it into new business models
- “Explore the Core”, for us, is a
continuous process that creates added value for our clients and keeps them competitive into the future
Gamedev as a business - Studio setup from scratch to delivery / Kirill Goncha...DevGAMM Conference
2020 year appeared to be a real challenge, but also it’s the year of opportunities! Really a lot of people in my network regard the option to start own business in gamedev industry among others. I’ve taken part in at least 5 startup founding during the last 2 years, so I’ll be happy to share with you my experience how to start, how to make first steps and what is really important in my opinion.
The document provides guidance on conducting research on international companies. It discusses the types of information available, such as financial data, news, and background information. Resources recommended include Hoover's, Mergent, company websites, Amadeus, Investext, ISI Emerging Markets, ProQuest, EBSCO Business Source Premier, and journal/magazine articles. The document emphasizes balancing company website information with independent sources and highlights the importance of articles for learning about privately held firms.
Threat Hunting with Deceptive Defense and Splunk Enterprise SecuritySatnam Singh
Threat hunting has been primarily a playground for security experts in surfacing unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt on an ad hoc basis. The ad hoc approach is ineffective and does not yield sufficient results to cover the cost of threat hunting. Considering the scarcity of security analysts, the ad hoc threat hunting becomes a costly and expensive process. Also, threat hunting is typically performed by doing outlier detection of the data. For example, analysts usually do outlier detection to find suspicious processes out of Windows process logs. The outlier detection can be done using simple box plots, control charts, or using more sophisticated unsupervised machine learning techniques. However, the output of all the outlier detection techniques is outliers/anomalies that still need to be audited/investigated by the security analysts. This adds more workload to the already overwhelmed security analyst.
The fusion of data science and deceive security provides an opportunity to validate many alerts automatically and therefore provides an automated approach from threat hunting. Deceptive defense system offers a way to confirm an adversary presence with nearly 0% false alarms when the adversary bumps onto one of the deceptions. The modern set of deceptions is the reincarnation of honeypots, honeytokens, honeynets, and honey files that blends well within the network and can dynamically change their configurations. When an adversary access a deception, it raises a positive affirmation of a threat. In this approach, one needs to use alerts and contextual security events along with deceptive security to rank the existing alerts. It takes away a lot of manual verification of various security alerts.
The document discusses the evolution of business analysis from a traditional to an agile approach. It describes how BAs originally worked directly with customers but later focused more on documentation and reducing costs. The agile manifesto emphasizes individuals, working software, customer collaboration, and responding to change over processes, tools, documentation, and plans. For agile BAs to be successful, they must work closely with developers and customers, embrace changing requirements, and value working software over documentation.
The document discusses machine learning and Splunk's machine learning toolkit. It provides an overview of machine learning, the machine learning process, different machine learning algorithms, and examples of customer use cases where Splunk's machine learning toolkit has helped optimize operations and business results. Live demos are also offered to showcase the toolkit.
XING achieved 16% revenue growth in 2013 to €84.8 million, with accelerating growth quarter over quarter. EBITDA increased 11% to €24.3 million due to strong growth in the Network/Premium and E-Recruiting segments. The executive board is recommending increasing the regular dividend to €0.62 per share and paying a special dividend of €3.58 per share, returning €23.4 million to shareholders.
This document discusses the power of an agile business analyst. It begins by contrasting the original purpose of BAs with how their role turned less agile over time. It then reviews agile principles from the Agile Manifesto and 12 principles. Sections discuss challenges with moving to agile and how BAs can embrace exploration, remove perfectionism, and work with product owners in shared or scaled models. The document promotes BAs becoming "agile superheroes".
The document discusses Ukraine as an energy, economic, and military choke point between Russia and Western Europe. It notes Ukraine's importance as a transit country for Russian natural gas and oil exports to Europe, and how control over Ukraine could impact these energy flows. The document also discusses related geopolitical issues in other regions like Africa and Syria that involve strategic energy infrastructure and its influence on regional conflicts.
XING is a leading European online business network. It has transitioned from a traditionally structured development process to an agile one using Scrum and Kanban. This has improved communication, planning, and risk management. The company now does 50 software releases per year with around 100 employees in engineering, compared to just 7 releases previously with a less structured process. Agile methods have helped increase efficiency, transparency, and flexibility.
This document provides guidance on starting an online business. It discusses embracing 21st century technology like websites, blogs, and social media to reach a global audience. It emphasizes having the right mindset, which includes being self-confident, willing to take risks and fail in order to succeed, and having a positive mental attitude. The document recommends setting goals and outlines 7 steps to take, which include establishing foundations, construction, marketing, motivation, and global expansion.
This document is Profiler GmbH's 2019 Communication on Progress report regarding its support of the UN Global Compact and its Ten Principles relating to human rights, labor, environment and anti-corruption. It discusses Profiler's activities over the past year to increase visibility of the Principles in its culture and processes. Profiler has focused on diversity, employee development through training, work-life balance policies, health promotion, digital document management and prohibiting corruption. Profiler was also recognized as a top employer for its motivated workforce and commitment to employees.
The document outlines various creative design work done for clients by MS&L offices in different locations, including brochure design, PowerPoint templates, and presentation documents for clients like P&G, Oral-B, Wella, Lion Nathan, and others. It also mentions future collaboration between different MS&L offices for creative support.
David Vitrano, Director Marketing & New Business Sales der XING E-Recruiting GmbH & Co. KG, sprach im vollbesetzten Forum im Rahmen der Personal Süd am 10. Mai 2016 über Neuigkeiten bei XING und stellte die vielfältigen Rekrutierungs-Produkte vor.
XING AG - Vortrag auf der Zukunft Personal 2015 am 16. September 2015XING AG
Frank Hassler (XING AG) und Katrin Sünderhauf (Deutsche Bahn) haben am 16. September 2015 einen Vortrag auf der Zukunft Personal gehalten zum Thema "Die neue Generation Stellenanzeigen von XING."
More Related Content
Similar to Webtech 09 - Wer am Ziel ist, irrt sich
Präsentation von Dr. Johannes Mainusch (Vice President Operations XING AG) und Susanne Reppin (Project Manager XING AG) bei der W-JAX 09 über die Verwendung von Kanban für das Maintenance-Team.
Johannes Haus - The Impact of Social Networking on Banking & FinanceArjen Strijker
How your employees are using social media today, how it is changing your company and what you should gain from it. Johannes Haus - Director Subscriptions, XING
Splunk4Leaders: How to Supercharge your Decision Making CapabilitySplunk
The document discusses how to make better decisions faster using Splunk. It covers cognitive biases that can negatively impact decision making like confirmation bias and anchoring. The presentation agenda includes explaining why decision making is important now given increasing data and system complexity. Splunk can help embrace data chaos by investigating, monitoring, analyzing and acting on machine data from complex systems. Key takeaways are to see the world as complex and chaotic, combine human and data strengths, and focus on planning over static plans to improve resilience.
The document is a May 2013 market analytics and technical analysis report that analyzes economic, fundamental, risk, and sentiment indicators across various timeframes. It discusses slowing economic growth in China and commodities, declining corporate revenues and squeezed margins, historical parallels to periods preceding market downturns, high complacency and leverage in markets, and concludes that indicators paint an unclear picture resembling a "house of mirrors".
2018 goetzpartners presentation "Explore The Core"Wolfram Römhild
Our new paradigm "Explore the Core" adresses the core challences of the C-Level Agenda
*Strategy*: How capable is my BUSINESS MODEL in regards to future markets and competitive dynamics?
*M&A*: How can I manage my CORPORATE PORTFOLIO using disruptive moves?
*Transformation*: How can my ORGANIZATION constantly ADAPT?
"Explore the core" means
- We look beyond the surface, and dig deeper – down to the decisive core of entrepreneurial practice
- We work in unity with our clients to challenge and evolve the core of their business, and transform it into new business models
- “Explore the Core”, for us, is a
continuous process that creates added value for our clients and keeps them competitive into the future
Gamedev as a business - Studio setup from scratch to delivery / Kirill Goncha...DevGAMM Conference
2020 year appeared to be a real challenge, but also it’s the year of opportunities! Really a lot of people in my network regard the option to start own business in gamedev industry among others. I’ve taken part in at least 5 startup founding during the last 2 years, so I’ll be happy to share with you my experience how to start, how to make first steps and what is really important in my opinion.
The document provides guidance on conducting research on international companies. It discusses the types of information available, such as financial data, news, and background information. Resources recommended include Hoover's, Mergent, company websites, Amadeus, Investext, ISI Emerging Markets, ProQuest, EBSCO Business Source Premier, and journal/magazine articles. The document emphasizes balancing company website information with independent sources and highlights the importance of articles for learning about privately held firms.
Threat Hunting with Deceptive Defense and Splunk Enterprise SecuritySatnam Singh
Threat hunting has been primarily a playground for security experts in surfacing unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt on an ad hoc basis. The ad hoc approach is ineffective and does not yield sufficient results to cover the cost of threat hunting. Considering the scarcity of security analysts, the ad hoc threat hunting becomes a costly and expensive process. Also, threat hunting is typically performed by doing outlier detection of the data. For example, analysts usually do outlier detection to find suspicious processes out of Windows process logs. The outlier detection can be done using simple box plots, control charts, or using more sophisticated unsupervised machine learning techniques. However, the output of all the outlier detection techniques is outliers/anomalies that still need to be audited/investigated by the security analysts. This adds more workload to the already overwhelmed security analyst.
The fusion of data science and deceive security provides an opportunity to validate many alerts automatically and therefore provides an automated approach from threat hunting. Deceptive defense system offers a way to confirm an adversary presence with nearly 0% false alarms when the adversary bumps onto one of the deceptions. The modern set of deceptions is the reincarnation of honeypots, honeytokens, honeynets, and honey files that blends well within the network and can dynamically change their configurations. When an adversary access a deception, it raises a positive affirmation of a threat. In this approach, one needs to use alerts and contextual security events along with deceptive security to rank the existing alerts. It takes away a lot of manual verification of various security alerts.
The document discusses the evolution of business analysis from a traditional to an agile approach. It describes how BAs originally worked directly with customers but later focused more on documentation and reducing costs. The agile manifesto emphasizes individuals, working software, customer collaboration, and responding to change over processes, tools, documentation, and plans. For agile BAs to be successful, they must work closely with developers and customers, embrace changing requirements, and value working software over documentation.
The document discusses machine learning and Splunk's machine learning toolkit. It provides an overview of machine learning, the machine learning process, different machine learning algorithms, and examples of customer use cases where Splunk's machine learning toolkit has helped optimize operations and business results. Live demos are also offered to showcase the toolkit.
XING achieved 16% revenue growth in 2013 to €84.8 million, with accelerating growth quarter over quarter. EBITDA increased 11% to €24.3 million due to strong growth in the Network/Premium and E-Recruiting segments. The executive board is recommending increasing the regular dividend to €0.62 per share and paying a special dividend of €3.58 per share, returning €23.4 million to shareholders.
This document discusses the power of an agile business analyst. It begins by contrasting the original purpose of BAs with how their role turned less agile over time. It then reviews agile principles from the Agile Manifesto and 12 principles. Sections discuss challenges with moving to agile and how BAs can embrace exploration, remove perfectionism, and work with product owners in shared or scaled models. The document promotes BAs becoming "agile superheroes".
The document discusses Ukraine as an energy, economic, and military choke point between Russia and Western Europe. It notes Ukraine's importance as a transit country for Russian natural gas and oil exports to Europe, and how control over Ukraine could impact these energy flows. The document also discusses related geopolitical issues in other regions like Africa and Syria that involve strategic energy infrastructure and its influence on regional conflicts.
XING is a leading European online business network. It has transitioned from a traditionally structured development process to an agile one using Scrum and Kanban. This has improved communication, planning, and risk management. The company now does 50 software releases per year with around 100 employees in engineering, compared to just 7 releases previously with a less structured process. Agile methods have helped increase efficiency, transparency, and flexibility.
This document provides guidance on starting an online business. It discusses embracing 21st century technology like websites, blogs, and social media to reach a global audience. It emphasizes having the right mindset, which includes being self-confident, willing to take risks and fail in order to succeed, and having a positive mental attitude. The document recommends setting goals and outlines 7 steps to take, which include establishing foundations, construction, marketing, motivation, and global expansion.
This document is Profiler GmbH's 2019 Communication on Progress report regarding its support of the UN Global Compact and its Ten Principles relating to human rights, labor, environment and anti-corruption. It discusses Profiler's activities over the past year to increase visibility of the Principles in its culture and processes. Profiler has focused on diversity, employee development through training, work-life balance policies, health promotion, digital document management and prohibiting corruption. Profiler was also recognized as a top employer for its motivated workforce and commitment to employees.
The document outlines various creative design work done for clients by MS&L offices in different locations, including brochure design, PowerPoint templates, and presentation documents for clients like P&G, Oral-B, Wella, Lion Nathan, and others. It also mentions future collaboration between different MS&L offices for creative support.
Similar to Webtech 09 - Wer am Ziel ist, irrt sich (20)
David Vitrano, Director Marketing & New Business Sales der XING E-Recruiting GmbH & Co. KG, sprach im vollbesetzten Forum im Rahmen der Personal Süd am 10. Mai 2016 über Neuigkeiten bei XING und stellte die vielfältigen Rekrutierungs-Produkte vor.
XING AG - Vortrag auf der Zukunft Personal 2015 am 16. September 2015XING AG
Frank Hassler (XING AG) und Katrin Sünderhauf (Deutsche Bahn) haben am 16. September 2015 einen Vortrag auf der Zukunft Personal gehalten zum Thema "Die neue Generation Stellenanzeigen von XING."
This document discusses using visual language throughout the research process to boost user insights. It describes creating visual briefings to quickly onboard colleagues, visually explaining the research process, conducting visual brainstorming and workshops to design the perfect social network or a freelance co-creation session. It also mentions conducting in-depth interviews to understand how people use their address books and keep up to date with news. Finally, it states that a visual research poster will summarize the key insights.
This document discusses using visual language throughout the research process to provide insights. It describes creating visual briefings to quickly onboard colleagues, visually explaining the research process, conducting visual brainstorming and workshops to design a social network and discuss pains/gains of freelancing. It also mentions conducting in-depth interviews to understand how people use address books and keep up with news. Finally, it discusses creating a visual research poster to summarize key insights.
2013 10-17 world usability congress visual-virus_brittaullrichXING AG
The document provides examples from various employees on how they use visuals and drawing in their work to enhance memory, focus, communication, and fun. It shows pictures drawn for planning, meetings, presentations, workshops, certificates, and more. Employees found that visuals helped explain concepts better than words, made processes easier to understand, improved remembering key facts, and helped new people connect at meetings. The document encourages the use of visuals and drawing at work and questions whether others have had similar experiences.
Messe Personal Nord und Süd 2013 - Social Recruiting über XING – Fachkräfte f...XING AG
David Vitrano, Head of Marketing E-Recruiting bei der XING AG, sprach am
23. April 2013 in Stuttgart auf der Personal Süd und am 14. Mai 2013 in Hamburg auf der Personal Nord zum Thema "Social Recruiting über XING – Fachkräfte finden und ansprechen".
This document discusses the benefits of using visuals and drawing at work. It begins by warning of the "visual virus" at work and then provides examples of how various teams at XING have used visuals such as post-its, drawings and diagrams for planning, presentations, process mapping and more. Examples show how visuals have helped teams communicate more effectively, stay on track in meetings and break down complex topics. The document encourages learning basic drawing skills and shares tips for using techniques like shadows and effects. It concludes that visuals have changed how some teams work at XING, making their work more enjoyable while enhancing understanding, focus and memory.
Jobwechsel: XING Infografiken zur Forsa-Studie und kununu-AnalyseXING AG
Jeder dritte deutsche Arbeitnehmer ist bereit, in diesem Jahr den Job zu wechseln. Das ergibt eine repräsentative Studie, die Forsa im Auftrag von XING, dem größten beruflichen Netzwerk im deutschsprachigen Raum, im Dezember 2012 durchgeführt hat.
Presentation as held by Magith Noohukhan at the next 2012 in Berlin. In this presentation, we discuss the ever-growing importance of social data and the availability via APIs.
Online Recruiting: Trends & HerausforderungenXING AG
Gastvortrag von Birger Meier, Manager HR Marketing & Employer Branding bei der E-Plus-Gruppe, am 22. März 2012 auf dem Social-Recruting-Roadshow-Event in Köln.
Agiles PMO: Agile Entwicklung mit 100+ MitarbeiternXING AG
The document discusses an agile project management office (PMO) for managing 10+ agile development teams with over 100 employees at XING AG. Key points:
1) The agile PMO acts as a service department for and interface between development teams and management, scaling agile principles to multiple teams.
2) It ensures rapid development cycles are supported rather than hindered.
3) The traditional project management triangle of scope, time, cost is replaced by an agile triangle focusing on delivering valuable, high quality products within certain frameworks.
4) At XING, cross-functional permanent teams are organized along the lines of product value creation, and a meta-team structure replicates team roles
1. The document discusses methods for generating new product ideas through creativity games and visual language at XING. It outlines techniques like understanding the problem, ideating solutions, refining and validating ideas through iteration.
2. Core gamestorming skills that can help with fuzzy goals for creative projects are discussed, like asking questions, creating artifacts, using a visual alphabet, and thinking like a child when drawing.
3. The low tech social network game aims to better understand the problem of self-representation and identity online through interviewing and exploring themes to develop ideas.
This document discusses strategies for scaling Kanban and agile practices across multiple teams of over 150 people working on large projects while maintaining autonomy, leadership, and motivation. It recommends building autonomous, cross-functional teams organized by communication needs, using consistent planning practices and tools, adopting a modular architecture with clean code, frequent deployments to avoid big releases, and educating middle management in agile practices. Autonomy, vision, focus, and open communication are key to leadership at scale.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
6. 10% Lerneffekt bei der 1., 2., 4., 8., ... Wiederholung 10% 10% 10% delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt* 6
7. 20% Einsparungspotenzial, wenn das erste Projekt 10 Iterationen enthält... Basis: 10% Lerneffekt, 10 Iterationen delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt* 7
8. 20% Einsparungspotenzial im ersten Projekt 50% Agile Organisationen werden mit jeder Iteration effektiver!Basis: 10% Lerneffekt, 100 Iterationen delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt*delivermonitoradapt* 8
45. Lead Time Not Started In Progress Done Online Entscheidung
46. Wartezeiten erkennen… That's "lean"!The items this week were created, when the topic had a high priority. Right after creating the items, they were developed. …
47. That's "lean"!The items this week were created, when the topic had a high priority. Right after creating the items, they were developed. 72% in 4 Tagen
61. 61 01 Vielen DankfürIhreAufmerksamkeit Dr. Johannes Mainusch VicePresidentOperations Vielen Dank an Susanne Reppin, mit der ich diesen Vortrag gemeinsam erstellt habe. Thank you for your attention!
62. XING – Powering Relationships 62 DISCLAIMER This presentation was produced in November 2009 by XING AG (the "Company") solely for use as an information source for potential business partners and is strictly confidential. It has been made available to you solely for your own information and may not be copied, distributed or otherwise made available to any other person by any recipient. This presentation is not an offer for sale of securities in the United States.The distribution of this presentation to you does not constitute an offer or invitation to subscribe for, or purchase, any shares of the XING AG and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever. The facts and information contained herein are as up-to-date as is reasonably possible and are subject to revision in the future. Neither the Company nor any of its subsidiaries, any directors, officers, employees, advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. Neither the Company nor any of its subsidiaries, any directors, officers, employees, advisors or any other person shall have any liability whatsoever for any loss arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate. This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements are generally identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates," "targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. The Company does not represent or guarantee that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements.