This document discusses blogging as an independent career or hobby. It begins by defining blogging as an asynchronous conversation on the web through a log of events, thoughts, and opinions posted to a website. It then compares the reach of different communication methods, noting that blogging can potentially reach thousands or even millions of readers. The document outlines different types of blog content and purposes, from inward reflection to outward commentary and helping others. While there is no guaranteed formula for making money blogging, the document discusses various income models people are trying, such as advertising, sponsors, or being employed to blog directly. However, it notes that being employed to blog can hurt credibility and is generally difficult. The best way to potentially make indirect income is
An internal planning presentation (Jan 2007) on building a cash tracking system for the 800 Nemmadi telecentres in Karnataka, then operated by Comat.
Since this plan was not implemented and Comat is no longer operating Nemmadi, I don't believe there are any concerns with releasing this document.
Understanding technology in e-governance (December 2007)Kiran Jonnalagadda
Learnings from managing technology for the Nemmadi telecentre network, presented at the Technology, Governance and Citizenship summit in Bangalore, December 2007.
Web 2.0 communities for lifelong learning: a case analysisAntonio Fini
The document summarizes a case study of an online community called LTEver created by the Educational Technology Lab at the University of Florence to support lifelong learning. LTEver uses the open-source Elgg platform to create a semi-open network for students, alumni, teachers and others. It provides features like personal blogs, file sharing, profiles and communities to connect people formally involved in university courses and allow continued informal learning and networking. Evaluation found users joined for curiosity, connection and professional development, though more could be done to develop shared goals and deeper engagement within communities over time.
Building a Community Around your Blog 2 - Let the Comments be your Content!Brendan Sera-Shriar
This is number 2 in a series of presentations that discuss the hows and whys of building a community around your blog.
Let the comments be your content!
The document discusses leveraging LinkedIn for learning, leading, and leaving a legacy. It describes LinkedIn as a powerful professional networking tool with over 300 million users worldwide. It also outlines how LinkedIn can be used as a learning tool through status updates, publishing posts, and joining groups. The document then discusses how using LinkedIn can help increase influence and leadership abilities. Finally, it explains how LinkedIn allows schools to stay connected with alumni and track students after graduation.
Social media platforms like Facebook, blogs, Twitter, and virtual worlds like Second Life are increasingly being used by churches and religious groups to engage with their communities. These tools allow for conversation, networking, sharing updates and media, and going deeper in discussion of religious issues. While adults currently make up the majority of social media users, younger generations are predicted to engage more through mobile devices in the future. Churches are utilizing the accessibility and community-building aspects of these platforms to spread their messages and connect with members worldwide.
This document discusses blogging as an independent career or hobby. It begins by defining blogging as an asynchronous conversation on the web through a log of events, thoughts, and opinions posted to a website. It then compares the reach of different communication methods, noting that blogging can potentially reach thousands or even millions of readers. The document outlines different types of blog content and purposes, from inward reflection to outward commentary and helping others. While there is no guaranteed formula for making money blogging, the document discusses various income models people are trying, such as advertising, sponsors, or being employed to blog directly. However, it notes that being employed to blog can hurt credibility and is generally difficult. The best way to potentially make indirect income is
An internal planning presentation (Jan 2007) on building a cash tracking system for the 800 Nemmadi telecentres in Karnataka, then operated by Comat.
Since this plan was not implemented and Comat is no longer operating Nemmadi, I don't believe there are any concerns with releasing this document.
Understanding technology in e-governance (December 2007)Kiran Jonnalagadda
Learnings from managing technology for the Nemmadi telecentre network, presented at the Technology, Governance and Citizenship summit in Bangalore, December 2007.
Web 2.0 communities for lifelong learning: a case analysisAntonio Fini
The document summarizes a case study of an online community called LTEver created by the Educational Technology Lab at the University of Florence to support lifelong learning. LTEver uses the open-source Elgg platform to create a semi-open network for students, alumni, teachers and others. It provides features like personal blogs, file sharing, profiles and communities to connect people formally involved in university courses and allow continued informal learning and networking. Evaluation found users joined for curiosity, connection and professional development, though more could be done to develop shared goals and deeper engagement within communities over time.
Building a Community Around your Blog 2 - Let the Comments be your Content!Brendan Sera-Shriar
This is number 2 in a series of presentations that discuss the hows and whys of building a community around your blog.
Let the comments be your content!
The document discusses leveraging LinkedIn for learning, leading, and leaving a legacy. It describes LinkedIn as a powerful professional networking tool with over 300 million users worldwide. It also outlines how LinkedIn can be used as a learning tool through status updates, publishing posts, and joining groups. The document then discusses how using LinkedIn can help increase influence and leadership abilities. Finally, it explains how LinkedIn allows schools to stay connected with alumni and track students after graduation.
Social media platforms like Facebook, blogs, Twitter, and virtual worlds like Second Life are increasingly being used by churches and religious groups to engage with their communities. These tools allow for conversation, networking, sharing updates and media, and going deeper in discussion of religious issues. While adults currently make up the majority of social media users, younger generations are predicted to engage more through mobile devices in the future. Churches are utilizing the accessibility and community-building aspects of these platforms to spread their messages and connect with members worldwide.
Framework for training on the essentials parts of Online Community Management.
This framework was used in a facilitated workshop where participants were actively involved and experienced:
- Difference between a following and a community.
- Why it is important to be very clear on the target group, the mission and the values in a community.
- What is takes to create a safe community for sharing information.
Participants learned about:
- Community KPI's.
- What community tasks to focus on.
- How to advance the community to the next phase.
- To tap into the wisdom of the group and community.
With advent of the internet and global connectivity, the way business is done is changing, the way we utilize the people and their potential is changing, the way we interact with people is changing. Nobody is a stranger now and we are connected to one another with the network of networks.
Virtual Communities are interaction platforms for the new age millennials and beyond. The presentation explores different dimensions of establishing and fostering such Communities and the way their potential can be harnessed for the process of co-Creation.
This document discusses blogs and their relationship to journalism. It begins by defining blogs and outlining their dual nature as both a technology and genre. It then explores various functions and differences between blogging and traditional journalism, such as blogs providing space for discussion outside institutional rules and their interactive nature. The document also examines how media companies have reacted by hiring bloggers or providing blogging platforms. It concludes by listing the sources that inform the discussion.
Science Story-telling at Restoration 2012 (slideshare version)ikemp
This is a modified version of the talk I gave at Restoration 2012 about the importance of science blogs and the role they play in science communication. I also address common questions and concerns that scientists have about blogging.
A presentation for the 2011 Virginia Annual Statewide Legal Aid Conference.
It's important that every advocate understand the impact of Facebook, Twitter, LinkedIn, and other social media tools on their clients and casework. This presentation introduces the different tools and suggests ways advocates can use them for outreach, research, pro bono attorney support, and advocacy. Also, we'll look at uses of the tools that can potentially endanger a legal aid client's case.
#LadyGaGa'sBreakfast : Social Media as a Curator's ToolALISS
This document summarizes a presentation about using social media as a curator's tool. It examines different types of social media like Facebook, Twitter, blogs and their benefits for libraries. It explores how social media can help curators share information and collections, engage with users, and disseminate current updates while also noting potential drawbacks like privacy and succession planning concerns. The presentation emphasizes creating and linking content using hashtags and tags to virtually curate collections across different social media platforms.
Gave this talk at SSSW'13; The 10th Summer School on Ontology Engineering and the Semantic Web
7 - 13 July, 2013. Cercedilla, Spain. http://sssw.org/2013/
The document discusses using blogs for academic communication. It defines blogs as dynamic, interactive and conversational online platforms compared to traditional static webpages. The document provides advice on starting an academic blog, including choosing a platform, finding readers, practicing an engaging writing style, and generating post ideas. Examples are given of popular academic blogs that cover research, teaching, and professional activities. Overall, the document outlines the pros and cons of blogging for academics and early career researchers.
This document discusses personal learning networks (PLNs) and how to establish one. It defines a PLN as using web tools like blogs, wikis and social networks to expand learning, increase reflection, enable collaboration and make global connections. It emphasizes that PLNs leverage technology to connect information and people. The document provides tips for setting up a PLN, including choosing an RSS reader to aggregate relevant feeds and regularly scanning updates. It recommends starting with a small number of subscriptions and investing 10-15 minutes daily to maintain an effective PLN.
Online conversations (and even offline ones) are, deep down, networks. But how to visualize network data so that they make sense to non-network scientists?
Presentation at the second CATALYST consortium meeting.
Online Community Evaluation of Care2 Care Equal Rights for Women Grouparaeshbhe710
This is a slideshow presenting the results from a heuristics evaluation on sociability and usability of the social networking site Care2Care, specifically of the group page for Equal Rights for Women.
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
Becoming A Successful Online Ambassador to Online Communitieswaterwordsthatwork
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
Bdd - how to solve communication problemsReload! A/S
1) The document discusses BDD (Behavior Driven Development) and how it can be used as a communication tool to align understanding between stakeholders. BDD involves having conversations about examples in order to explore requirements rather than just discussing abstract requirements.
2) Some exercises are provided to demonstrate how communication breakdowns can occur and how BDD techniques like conversation and examples help to prevent misunderstandings.
3) BDD is presented as being more about the conversations than just automating test cases. The goal is for stakeholders to understand why something needs to be built rather than just what should be built.
4C13 J.15 Larson "Twitter based discourse community"rhetoricked
This document summarizes Brian Larson's research examining Twitter discourse communities among composition scholars. It outlines the motivation for studying whether certain Twitter practices constitute genres. It then discusses challenges in sampling the large Twitter population and proposes using hashtags and follower networks as a starting point. The document presents network analysis concepts and provides an example analysis of tweets from the 2012 CCCCs conference. It stresses the need for qualitative research to understand how users experience online communities and outlines next steps such as studying smaller hashtag datasets and collaborating with other researchers.
AirJaldi is a wireless network located in the attic of the Tibetan Children's Village in Dharamsala, India. It has 2000 nodes serving over 10,000 users in the area. The network uses various types of directional and omnidirectional antennas mounted on poles to provide wide-angle wireless coverage over an area of about 2 kilometers. The custom-designed routers have a weatherproof box and use a dual-radio circuit for improved network performance over large single-radio routers.
The document discusses different forms of online communication and their properties. It covers ephemeral communication methods like instant messaging and voice chat that disappear when closed compared to more permanent methods like blogs, mailing lists, and websites. It describes key aspects of blogs like reverse chronological posting, archives organized by date and category, and permalinks. Blogs also allow for feedback through comments. The document contrasts mass production and consumption with individual calibration and validation online. It examines speech as private, public or secret and how distribution is shaped by technology, culture and business factors.
More Related Content
Similar to What ails the Sarai Reader List? (August 2005)
Framework for training on the essentials parts of Online Community Management.
This framework was used in a facilitated workshop where participants were actively involved and experienced:
- Difference between a following and a community.
- Why it is important to be very clear on the target group, the mission and the values in a community.
- What is takes to create a safe community for sharing information.
Participants learned about:
- Community KPI's.
- What community tasks to focus on.
- How to advance the community to the next phase.
- To tap into the wisdom of the group and community.
With advent of the internet and global connectivity, the way business is done is changing, the way we utilize the people and their potential is changing, the way we interact with people is changing. Nobody is a stranger now and we are connected to one another with the network of networks.
Virtual Communities are interaction platforms for the new age millennials and beyond. The presentation explores different dimensions of establishing and fostering such Communities and the way their potential can be harnessed for the process of co-Creation.
This document discusses blogs and their relationship to journalism. It begins by defining blogs and outlining their dual nature as both a technology and genre. It then explores various functions and differences between blogging and traditional journalism, such as blogs providing space for discussion outside institutional rules and their interactive nature. The document also examines how media companies have reacted by hiring bloggers or providing blogging platforms. It concludes by listing the sources that inform the discussion.
Science Story-telling at Restoration 2012 (slideshare version)ikemp
This is a modified version of the talk I gave at Restoration 2012 about the importance of science blogs and the role they play in science communication. I also address common questions and concerns that scientists have about blogging.
A presentation for the 2011 Virginia Annual Statewide Legal Aid Conference.
It's important that every advocate understand the impact of Facebook, Twitter, LinkedIn, and other social media tools on their clients and casework. This presentation introduces the different tools and suggests ways advocates can use them for outreach, research, pro bono attorney support, and advocacy. Also, we'll look at uses of the tools that can potentially endanger a legal aid client's case.
#LadyGaGa'sBreakfast : Social Media as a Curator's ToolALISS
This document summarizes a presentation about using social media as a curator's tool. It examines different types of social media like Facebook, Twitter, blogs and their benefits for libraries. It explores how social media can help curators share information and collections, engage with users, and disseminate current updates while also noting potential drawbacks like privacy and succession planning concerns. The presentation emphasizes creating and linking content using hashtags and tags to virtually curate collections across different social media platforms.
Gave this talk at SSSW'13; The 10th Summer School on Ontology Engineering and the Semantic Web
7 - 13 July, 2013. Cercedilla, Spain. http://sssw.org/2013/
The document discusses using blogs for academic communication. It defines blogs as dynamic, interactive and conversational online platforms compared to traditional static webpages. The document provides advice on starting an academic blog, including choosing a platform, finding readers, practicing an engaging writing style, and generating post ideas. Examples are given of popular academic blogs that cover research, teaching, and professional activities. Overall, the document outlines the pros and cons of blogging for academics and early career researchers.
This document discusses personal learning networks (PLNs) and how to establish one. It defines a PLN as using web tools like blogs, wikis and social networks to expand learning, increase reflection, enable collaboration and make global connections. It emphasizes that PLNs leverage technology to connect information and people. The document provides tips for setting up a PLN, including choosing an RSS reader to aggregate relevant feeds and regularly scanning updates. It recommends starting with a small number of subscriptions and investing 10-15 minutes daily to maintain an effective PLN.
Online conversations (and even offline ones) are, deep down, networks. But how to visualize network data so that they make sense to non-network scientists?
Presentation at the second CATALYST consortium meeting.
Online Community Evaluation of Care2 Care Equal Rights for Women Grouparaeshbhe710
This is a slideshow presenting the results from a heuristics evaluation on sociability and usability of the social networking site Care2Care, specifically of the group page for Equal Rights for Women.
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
Becoming A Successful Online Ambassador to Online Communitieswaterwordsthatwork
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
Bdd - how to solve communication problemsReload! A/S
1) The document discusses BDD (Behavior Driven Development) and how it can be used as a communication tool to align understanding between stakeholders. BDD involves having conversations about examples in order to explore requirements rather than just discussing abstract requirements.
2) Some exercises are provided to demonstrate how communication breakdowns can occur and how BDD techniques like conversation and examples help to prevent misunderstandings.
3) BDD is presented as being more about the conversations than just automating test cases. The goal is for stakeholders to understand why something needs to be built rather than just what should be built.
4C13 J.15 Larson "Twitter based discourse community"rhetoricked
This document summarizes Brian Larson's research examining Twitter discourse communities among composition scholars. It outlines the motivation for studying whether certain Twitter practices constitute genres. It then discusses challenges in sampling the large Twitter population and proposes using hashtags and follower networks as a starting point. The document presents network analysis concepts and provides an example analysis of tweets from the 2012 CCCCs conference. It stresses the need for qualitative research to understand how users experience online communities and outlines next steps such as studying smaller hashtag datasets and collaborating with other researchers.
Similar to What ails the Sarai Reader List? (August 2005) (20)
AirJaldi is a wireless network located in the attic of the Tibetan Children's Village in Dharamsala, India. It has 2000 nodes serving over 10,000 users in the area. The network uses various types of directional and omnidirectional antennas mounted on poles to provide wide-angle wireless coverage over an area of about 2 kilometers. The custom-designed routers have a weatherproof box and use a dual-radio circuit for improved network performance over large single-radio routers.
The document discusses different forms of online communication and their properties. It covers ephemeral communication methods like instant messaging and voice chat that disappear when closed compared to more permanent methods like blogs, mailing lists, and websites. It describes key aspects of blogs like reverse chronological posting, archives organized by date and category, and permalinks. Blogs also allow for feedback through comments. The document contrasts mass production and consumption with individual calibration and validation online. It examines speech as private, public or secret and how distribution is shaped by technology, culture and business factors.
The document provides an introduction to Python and Zope, describing Python as a high-level and dynamic programming language well-suited for rapid application development, and Zope as a web application server framework built using Python that provides capabilities like a web server, database engine, search engine, and templating languages to help develop web applications. It discusses key features of Python like its interactive interpreter, data types, classes, inheritance, operator overloading, and containers, as well as components of Zope like its ZServer web server, ZODB database engine, ZCatalog search engine, DTML and ZPT templating languages, and typical file system layout.
The document discusses different models of communication and media using database relations analogies:
1) One to one communications include individual conversations like phone calls or instant messages.
2) One to many is broadcast media like newspapers, magazines, TV where a few creators share content with many consumers.
3) Many to one enables feedback like surveys, comments, or letters to the editor from many users to a single creator/organization.
4) Many to many includes group discussions online through chat rooms or forums. However, these are not as scalable or long-lasting as other models.
The document goes on to analyze online news sites that incorporate elements of the different models and to discuss how the internet
The technology of the Human Protein Reference Database (draft, 2003)Kiran Jonnalagadda
The document discusses the development of the Human Protein Reference Database (HPRD). It describes how Zope, an open source content management system, was used to build the database. Zope allowed for dynamic data structures and an object-oriented approach, handling changing data definitions. The document also outlines challenges in project management for a geographically distributed team and lessons learned around tools for collaboration.
This document provides an overview and comparison of XML-RPC and SOAP, which are two RPC systems that use open internet standards. XML-RPC implements RPC using open web standards by encoding data in XML and making RPC calls over HTTP. SOAP attempts to overcome limitations of XML-RPC by supporting user-defined data types and object introspection. While SOAP is more full-featured, XML-RPC remains simpler and more lightweight. Examples are provided of making XML-RPC calls from Python.
A presentation made to the Bangalore Linux User Group in January 2002. Most people don't realize just how far ahead of its time Zope was as an application server and NoSQL database.
LastUser is a identity aggregating web service written in Python using the Flask framework. It provides an OAuth server that proxies for various popular identity providers.
The document summarizes several e-governance projects undertaken by Comat Technologies in Karnataka, India, including the Bhoomi rural land records system and Nemmadi rural information telecentre projects. It discusses how the Bhoomi project computerized over 1200 existing land tenure systems in Karnataka into a standardized system of 256 types to create transparency and reduce corruption. It also describes how the Nemmadi project set up 800 telecentres across 27 districts and 177 taluks in rural areas using various technologies to expand access to information for rural citizens and provide government and private services.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
3. Contrast in
Participation
My participation in the Reader List and
LiveJournal,* Dec 2004 to August 2005:
Total posters on Reader List:
520
Total posts to Reader List: 1546
Commentators on LiveJournal:
333
Comments received on Reader List: 0
Comments received on LJ: 3076 (0-77)
* LiveJournal’s nature makes it hard to do a one-on-one comparison;
this is an approximation
3
4. Typical
Complaints
Too many posts; hard to keep up
Too many posters; hard to get familiar
Hard to follow individual threads
Flood of posts every 25th
So how does LiveJournal sustain so
much traffic so effortlessly? 1546
overall versus 3076 comments
addressed to a single person!
4
5. The
Sarai Reader List is
crumbling. The list needs to figure
out how to effectively channelise
traffic so readers are not burdened.
Imagine reading a newspaper that prints all the
news in the world in a single narrow, long sheet.
10. Identity on
LiveJournal
Globally unique id
User profile with contact
and participation details
Reference via <lj user=“”>
User pictures linked to
keywords (emotions)
Choice of picture when
participating anywhere
10
11. Problem 3:
Intimacy and
Possession
The mailing list is not personal space
LiveJournal provides personal journals
Are you addressing one while a
thousand peer at you?
Or are you addressing one while a
thousand go about their own lives?
LiveJournal achieves the latter
11
12. Problem 4:
Archival
Hard to find an old post;
No search
Threading unreliable and
broken across months
LiveJournal: the archive
is the primary interface
LiveJournal also lacking
when searching for posts
12
13. Rescuing the
Reader List
Initial plan: make LiveJournal
installation for the Reader List.
Abandoned for technical difficulties
Blue sky plan: make new system
But who’ll create and maintain it?
Current plan: make better interaction
system on top of existing MailMan list
13