Presentation about how businesses can leverage Foursquare in their business. This presentation was given on 3-23-11 at the Catawba County Chamber of Commerce
This is a presentation about how photos and video has a greater impact than just text. Flickr and YouTube are highlighted in this presentation. The Flickr and YouTube logos are trademarks of their respective companies.
CTOs in London "The Challenges of Evaluating Development Technology Within th...Daniel Bryant
As a technology-focused CTO it can be very challenging to effectively bridge the goals between the business and technology. A primary challenge is maintaining an awareness of current (and future) technologies that could add value to your business, and developing the knowledge and skills to correctly evaluate them the unique perspective (and incentives) of the CTO position. This talk aims to share some of the techniques the OpenCredo team have identified over the past decade of working alongside technology leaders from a variety of organisations.
Micro Manchester Meetup: "The Seven (More) Deadly Sins of Microservices"Daniel Bryant
There is trouble brewing in the land of microservices – today’s shiny technology is tomorrow’s legacy, and there is concern that we will all be dealing with spaghetti services in 2018…
It is often a sign of an architectural approach’s maturity that in addition to the emergence of well established principles and practices, that anti-patterns also begin to be identified and classified. In this talk we introduce the 2016 edition of the seven deadly sins that if left unchecked could easily ruin your next microservices project…
Social Media in an Emergency - Crash, BOOM, tweet...with a twistLee Yount
During this presentation discussed how social media is a valuable tool during an emergency/disaster.This presentation was given at the CIO Forum & Executive IT Summit on 11-30-10.
This is a presentation about how photos and video has a greater impact than just text. Flickr and YouTube are highlighted in this presentation. The Flickr and YouTube logos are trademarks of their respective companies.
CTOs in London "The Challenges of Evaluating Development Technology Within th...Daniel Bryant
As a technology-focused CTO it can be very challenging to effectively bridge the goals between the business and technology. A primary challenge is maintaining an awareness of current (and future) technologies that could add value to your business, and developing the knowledge and skills to correctly evaluate them the unique perspective (and incentives) of the CTO position. This talk aims to share some of the techniques the OpenCredo team have identified over the past decade of working alongside technology leaders from a variety of organisations.
Micro Manchester Meetup: "The Seven (More) Deadly Sins of Microservices"Daniel Bryant
There is trouble brewing in the land of microservices – today’s shiny technology is tomorrow’s legacy, and there is concern that we will all be dealing with spaghetti services in 2018…
It is often a sign of an architectural approach’s maturity that in addition to the emergence of well established principles and practices, that anti-patterns also begin to be identified and classified. In this talk we introduce the 2016 edition of the seven deadly sins that if left unchecked could easily ruin your next microservices project…
Social Media in an Emergency - Crash, BOOM, tweet...with a twistLee Yount
During this presentation discussed how social media is a valuable tool during an emergency/disaster.This presentation was given at the CIO Forum & Executive IT Summit on 11-30-10.
MicroManchester 2016 "Microservices from 30000ft: Organisation, Architecture ...Daniel Bryant
The technology changes required when implementing a microservice-based application are only one part of the equation. The business and organisation will also most likely have to fundamentally change. In an ideal world, this shouldn’t be a problem – what with the rise of agile, lean and DevOps – but this is not always the situation Daniel encounters in his consulting travels. He would like to share with you some stories of successful (and not so successful) strategies and tactics he has used over the past four years when introducing service-oriented architecture into organisations.
Join Daniel for a whistle-stop tour of the business and technical people challenges that he has experienced first hand when implementing a greenfield microservice project, and also breaking down a monolith. You will discover ‘divided companies’ vs ‘connected companies’, determine the actual impact of Conway’s Law on architecture and operations, briefly touch on the lean startup/enterprise mindset, dive into change management without the management double-speak, and look at the lightweight processes needed to ensure the technical success of a microservices implementation.
Two years ago at Devoxx UK we talked about DevOps, what it was, why it was important and how to get started. Boy, was it scary. Now we’re wiser. More battle-scarred. The large scale of the challenge for application writers exploiting cloud and DevOps is clearer, but so is the path forward. Understanding the DevOps approach is important, but equally you must understand specific deployment technologies, security issues, operational reliability, and how to drive organisational transformation. Whether creating simple applications or sophisticated microservice architectures many of the challenges are the same. Join us to learn how you can apply this within your team and company.
This presentation about leveraging social media is from a workshop I lead at Catawba Valley Community College via the Small Business Center on 01/20/2012
Presentation at the 2009 NCLGISA Fall Conference in Asheville, NC. Discusses Social Media and different tools used in Social Media. Lee Yount, Jr. Catawba County Government, Newton, NC
DLJCJUG 2015: The Seven Deadly Sins of MicroservicesDaniel Bryant
All is not completely rosy in microservice-land. It is often a sign of an architectural approach’s maturity that in addition to the emergence of well-established principles and practices, that anti-patterns also begin to be identified and classified. In this talk we introduce seven deadly sins that if left unchecked could easily ruin your next microservices project...
This talk will take a tour of some of the nastiest anti-patterns in microservices, giving you the tools to not only avoid but also slay these demons before they tie up your project in their own special brand of hell. Topics covered include: Pride - selfishly ignoring the new requirements for testing; Envy - introducing inappropriate intimacy within services by creating a shared domain model; Wrath - failing to deal with the inevitable bad things that occur within a distributed system; Sloth - composing services in a lazy fashion, which ultimately leads to the creation of a “Distributed Monolith”; and Lust - embracing the latest and greatest technology without evaluating the operational impact incurred by these choices.
Microservice Summit 2016 "Microservices: The Organisational and People Impact"Daniel Bryant
Microservices are where it's at. Everything is easier to manage when it's micro, right? Micro code bases (less than 10 LOC), micro containers (less than 10Mb), and micro teams (less than one person???). 'Micro' things may appear to be easier to manage, but there is always a macro context, and working with people and teams is no exception. This talk presents some of the challenges the OpenCredo team have seen when implementing microservices within a range of organisations, and we'll suggest tricks and techniques to help you manage your 'micro' teams and the 'macro' level.
Topics covered include: empathy - because understanding others is at the heart of everything you do; leadership - advice on creating shared understanding, conveying strategy, and developing your team; organisational structure - from Zappos' holocracy to MegaOrg's strict hierarchy, from Spotify's squads, chapters and guilds, to BigCorp's command and control. There is a management style for everybody; and more
Leveraging Social Media. Some new stuff...thinking differentlyLee Yount
I had the opportunity to speak at the Charlotte Chapter of the ADJA on 11/16/2010. We discussed Leveraging Social Media, in the events and entertainment arena, specifically Disk Jockeys.
Leveraging Social Media - CVCC 03-09-2012Lee Yount
This presentation about leveraging social media is from a workshop I lead at Catawba Valley Community College via the Small Business Center on 03-09-2012
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
MicroManchester 2016 "Microservices from 30000ft: Organisation, Architecture ...Daniel Bryant
The technology changes required when implementing a microservice-based application are only one part of the equation. The business and organisation will also most likely have to fundamentally change. In an ideal world, this shouldn’t be a problem – what with the rise of agile, lean and DevOps – but this is not always the situation Daniel encounters in his consulting travels. He would like to share with you some stories of successful (and not so successful) strategies and tactics he has used over the past four years when introducing service-oriented architecture into organisations.
Join Daniel for a whistle-stop tour of the business and technical people challenges that he has experienced first hand when implementing a greenfield microservice project, and also breaking down a monolith. You will discover ‘divided companies’ vs ‘connected companies’, determine the actual impact of Conway’s Law on architecture and operations, briefly touch on the lean startup/enterprise mindset, dive into change management without the management double-speak, and look at the lightweight processes needed to ensure the technical success of a microservices implementation.
Two years ago at Devoxx UK we talked about DevOps, what it was, why it was important and how to get started. Boy, was it scary. Now we’re wiser. More battle-scarred. The large scale of the challenge for application writers exploiting cloud and DevOps is clearer, but so is the path forward. Understanding the DevOps approach is important, but equally you must understand specific deployment technologies, security issues, operational reliability, and how to drive organisational transformation. Whether creating simple applications or sophisticated microservice architectures many of the challenges are the same. Join us to learn how you can apply this within your team and company.
This presentation about leveraging social media is from a workshop I lead at Catawba Valley Community College via the Small Business Center on 01/20/2012
Presentation at the 2009 NCLGISA Fall Conference in Asheville, NC. Discusses Social Media and different tools used in Social Media. Lee Yount, Jr. Catawba County Government, Newton, NC
DLJCJUG 2015: The Seven Deadly Sins of MicroservicesDaniel Bryant
All is not completely rosy in microservice-land. It is often a sign of an architectural approach’s maturity that in addition to the emergence of well-established principles and practices, that anti-patterns also begin to be identified and classified. In this talk we introduce seven deadly sins that if left unchecked could easily ruin your next microservices project...
This talk will take a tour of some of the nastiest anti-patterns in microservices, giving you the tools to not only avoid but also slay these demons before they tie up your project in their own special brand of hell. Topics covered include: Pride - selfishly ignoring the new requirements for testing; Envy - introducing inappropriate intimacy within services by creating a shared domain model; Wrath - failing to deal with the inevitable bad things that occur within a distributed system; Sloth - composing services in a lazy fashion, which ultimately leads to the creation of a “Distributed Monolith”; and Lust - embracing the latest and greatest technology without evaluating the operational impact incurred by these choices.
Microservice Summit 2016 "Microservices: The Organisational and People Impact"Daniel Bryant
Microservices are where it's at. Everything is easier to manage when it's micro, right? Micro code bases (less than 10 LOC), micro containers (less than 10Mb), and micro teams (less than one person???). 'Micro' things may appear to be easier to manage, but there is always a macro context, and working with people and teams is no exception. This talk presents some of the challenges the OpenCredo team have seen when implementing microservices within a range of organisations, and we'll suggest tricks and techniques to help you manage your 'micro' teams and the 'macro' level.
Topics covered include: empathy - because understanding others is at the heart of everything you do; leadership - advice on creating shared understanding, conveying strategy, and developing your team; organisational structure - from Zappos' holocracy to MegaOrg's strict hierarchy, from Spotify's squads, chapters and guilds, to BigCorp's command and control. There is a management style for everybody; and more
Leveraging Social Media. Some new stuff...thinking differentlyLee Yount
I had the opportunity to speak at the Charlotte Chapter of the ADJA on 11/16/2010. We discussed Leveraging Social Media, in the events and entertainment arena, specifically Disk Jockeys.
Leveraging Social Media - CVCC 03-09-2012Lee Yount
This presentation about leveraging social media is from a workshop I lead at Catawba Valley Community College via the Small Business Center on 03-09-2012
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Foursquare has changed a little since I was a kid.
Foursquare is a service that helps find where your friends are hanging out and offers tips from other users on what to do once you get there. You use your phone to “check in” at different places you visit, from bars and restaurants to parks, museums and even the grocery store! Foursquare rewards you for checking in with badges, points and mayorships.
How to get started?Download one of Foursquare’s mobile apps on your phone. They provide apps for iPhone, Android, Blackberry and Palm phones. Third party developers have built applications for other platforms, likeSymbian and Windows Mobile. If there’s no app for your phone, you can check in through Foursquare’s mobile site.Register for an account on Foursquare’s website or through the mobile app. Be sure to upload a profile picture so you can be eligible for mayorships! Link your Facebook and Twitter accounts to make it easy to find your friends and share your current location on your favorite social networking sites.
Foursquare has apps for the iPhone, Android, and Blackberry and here is what each look like.If you have a phone that doesn't have a web browser and you would like to check in on foursquare via text message, you can use our SMS shortcode to check-in by sending messages to 50500 (like this: @ Ace Bar ! enjoying happy hour). This is currently available in the U.S. only.
Check in at the places you visitChecking in lets your friends know where you are. To check in, open the mobile app on your phone and Foursquare will use your phone’s GPS to find your current location. Click the “places” button or tab to see a list of nearby places where you can check in. If the place you’re looking for isn’t in the list, add it directly from your phone!When you check in, you’ll have the option to share your location with your Foursquare friends and with Facebook and Twitter. You can change the default settings for these buttons on your settings page. If you check in without sharing with your friends, Foursquare will show your location as “off the grid,” so no one else will know exactly where you are.
Check out tips and leave them for othersOne of Foursquare’s greatest features is the ability to leave tips on a venue. People leave tips about their favorite dishes, things to do, how to get a discount and even where to find clean bathrooms. You’ll find tips like “the Gyro Pizza is the best you’ll ever eat” or “avoid the hot and spicy burrito — it’s neither hot nor spicy.”You can check out the tips left by other users or leave tips for other people to find directly from your mobile app. If any of your friends have left a tip on a venue you’re checking in to — or one nearby — you’ll see a popup on your phone letting you know what they recommend. Brands like the New York Times, TLC and the cast of Showtime’s The Real L Word have also left tips on venues for you to check out.You can track things you’ve done by clicking “I’ve done this” next to a tip or you can add something that sounds good to your to do list. You’ll be reminded to try it the next time you check in there.
This is Catawba County Government’s Partner Page. We leave tips about places of interest around Catawba County. After a user follows Catawba County, they will be notified of nearby tips when they check in at different venues.
Become the mayor by checking in more than anyone elseThe mayor is the person who’s checked in the most times at a venue over the past 60 days. Everyone knows you really love a place when you visit enough times to be the mayor. You’ll get recognized on the venue’s Foursquare profile page and other users will see your picture when they check in. Some companies, like Starbucks, reward their mayors with discounts and freebies!
Badges? Points?Each time you check in, Foursquare awards you points. The more times you check in, the more points you get. You can compare yourself to your nearby friends and Foursquare’s 1.5-million-plus other users on the leaderboard in your mobile app. The points don’t really do anything, but they’re fun to get an idea where you stand against other Foursquare users.Badges are a fun reward for checking in a certain number of times or at certain places. Some badges are sponsored by different companies, like the History Channel, Wall Street Journaland Bravo. Here are a just few examples of badges you could earn:
Badge Examples
Get a DiscountSome businesses have started to use Foursquare as a “digital loyalty card” to track users who visit their stores. To reward you for being a regular customer, they might offer you a free drink every fifth visit or 10% off your bill the tenth time you check in. Other places offer discounts to the mayor. You’ll see any specials a business is offering in your mobile app when you check out the list of nearby venues.
Get a DiscountSome businesses have started to use Foursquare as a “digital loyalty card” to track users who visit their stores. To reward you for being a regular customer, they might offer you a free drink every fifth visit or 10% off your bill the tenth time you check in. Other places offer discounts to the mayor. You’ll see any specials a business is offering in your mobile app when you check out the list of nearby venues.
Crumbs Bake Shop in NYC
Special Offer at Crumbs Bake Shop – I showed it to the girl behind the counter and asked if I could have a Free Medium Iced Coffee and she said “sure!” and prepared it for me on the spot!
Success!
HowCast Video - How to Unlock Your World With Foursquare
HowCast Video - How to Acquire, Engage, and Retain Customers with Foursquare
Which type of venue are you?
The basic steps for how to get started.
Special Types:Friends Special – Group of Foursquare friends check in – you control how many.Swarm Special – Activated if a certain number of people check in within a 3-hour window.Flash Special – A special that is offered on a first come first serve basis and then it expires.Newbie Special – This is a great special to get people using Foursquare at your business. It’s for 1st timers at your venue.Check-in special – A basic special that the customer receives just for checking in to your venue.
Special Types: Mayor Special – for the person that checks in the most.Loyalty Special – kind of like a loyalty “punch” card
Special ExamplesNewbieCheck-inLoyalty
There are several different ways that a customer/potential customer can find your specials, here are a few.
Promote your specials with a window cling, flyer, or any other creative way that you can think of. You do not want it to be a secret!
This is what your special will look like once someone unlocks it.
Flyer to help Customers know what to do. Promote It!
Flyer to help Employees know what you look for.
Monitor the results of your campaign with the free Manager Tools.
To get started, simply search for your venue. If you do not see it, create it and then claim it.
Thank You – Contact InformationLee Yount, Jr.Programmer AnalystCatawba County Governmenthttp://www.catawbacountync.gov@leeyounthttp://leeyount.comleeqdmb@gmail.com828-320-4901