This document summarizes an experiment attempting to investigate personal filter bubbles on the internet. The author describes testing different search engines, browsers, and search terms both alone and with others. Few differences were found initially. However, a targeted ad later suggested to the author raised concerns about how much data companies like Google collect. The author realizes her own bubble has been aided by personalization. Ways to promote awareness and opt out of personalization are discussed.
This document summarizes Stephen Abram's presentation on trends beyond technology in libraries. It discusses symptoms of dysfunction in libraries, challenges from ebooks and new technology, and the need for libraries to be future ready. It also addresses changing demographics in library staffing, focusing services around user questions rather than collections, and developing knowledge portals rather than focusing on books. The presentation emphasizes the importance of advocacy, analytics, collaboration, and storytelling in demonstrating the value of libraries.
This document provides an overview of library research skills taught by Mrs. Bernet, the Upper School Librarian. It covers topics such as academic integrity, avoiding plagiarism, using library resources, critical thinking skills for research, and citation tools. Key points emphasized are understanding what constitutes plagiarism, evaluating online sources using the C.A.R.P. method, utilizing databases and library guides, and properly citing sources in a bibliography using EasyBib. The document aims to introduce students to fundamental research practices and help them complete quality work with integrity.
Emotional Data: hipsters, human beings and mapping of taste dataTara Hunt
This document discusses how people's tastes and preferences are signaled through the products they choose. It explores how things like clothing brands, food, music and activities can indicate personality traits like openness, conscientiousness, extraversion, agreeableness and neuroticism. While tools now aim to understand this data, humans still better grasp the cultural contexts and combinations of items that communicate deeper meanings. Personal choices have emotional dimensions that reflect identities people want to project.
The document discusses how libraries need to shift away from their traditional focus on books and move towards becoming knowledge portals and community centers that are aligned with user behaviors and needs, such as by developing question-driven services and content and expanding their social media presence for information literacy programs. It also emphasizes the importance of advocacy, strategic analytics to measure impact and value, and collaboration over traditional social programs.
This document discusses the evolution of librarianship through social media and technology. It explores how librarians have always discovered, collected, organized and shared information but now do so through new tools like blogs, wikis, virtual worlds and social networks. It examines risks like intellectual property issues, privacy concerns, and information overload as well as strategies librarians use to navigate these challenges and remain influential guides. The document argues librarians must embrace new technologies and media to continue connecting communities and furthering open access to knowledge.
The document provides an overview of trends in libraries beyond technology presented by Stephen Abram at the Teton County Public Library in Jackson Hole, WY in January 2012. It discusses challenges libraries face like poor advocacy, slow response to ebooks, and generational tensions. It also covers opportunities like how libraries can enhance the user experience and leverage social media. The presentation emphasizes that libraries remain important community institutions for learning, discovery, and cultural preservation despite technological changes.
This document discusses privacy issues related to libraries. It begins by distinguishing between security problems that inadvertently violate privacy and legal uses of information that can still violate privacy. It explores definitions of privacy, why privacy matters for intellectual freedom and concerns over vulnerable individuals. The document examines how freedom to read relates to privacy historically and today. It reviews potential privacy laws and policies, why privacy problems occur, and known privacy issues regarding public records, reidentification, email, commercial privacy violations on the web and examples related to Facebook, ebooks, Amazon and social media buttons.
This document discusses various options for funding cultural works and scholarly communication. It begins by noting that using sales as a proxy for cultural value has limitations and that libraries often rely too heavily on this approach. The document then outlines several options for funding culture, including selling products or events, crowdfunding, donations, collective/community efforts, patronage, and grants. It discusses how these apply to areas like publishing, archives, and libraries. The document argues that there are multiple ways to fund culture and that libraries should consider providing more direct funding support through options like open access.
This document summarizes Stephen Abram's presentation on trends beyond technology in libraries. It discusses symptoms of dysfunction in libraries, challenges from ebooks and new technology, and the need for libraries to be future ready. It also addresses changing demographics in library staffing, focusing services around user questions rather than collections, and developing knowledge portals rather than focusing on books. The presentation emphasizes the importance of advocacy, analytics, collaboration, and storytelling in demonstrating the value of libraries.
This document provides an overview of library research skills taught by Mrs. Bernet, the Upper School Librarian. It covers topics such as academic integrity, avoiding plagiarism, using library resources, critical thinking skills for research, and citation tools. Key points emphasized are understanding what constitutes plagiarism, evaluating online sources using the C.A.R.P. method, utilizing databases and library guides, and properly citing sources in a bibliography using EasyBib. The document aims to introduce students to fundamental research practices and help them complete quality work with integrity.
Emotional Data: hipsters, human beings and mapping of taste dataTara Hunt
This document discusses how people's tastes and preferences are signaled through the products they choose. It explores how things like clothing brands, food, music and activities can indicate personality traits like openness, conscientiousness, extraversion, agreeableness and neuroticism. While tools now aim to understand this data, humans still better grasp the cultural contexts and combinations of items that communicate deeper meanings. Personal choices have emotional dimensions that reflect identities people want to project.
The document discusses how libraries need to shift away from their traditional focus on books and move towards becoming knowledge portals and community centers that are aligned with user behaviors and needs, such as by developing question-driven services and content and expanding their social media presence for information literacy programs. It also emphasizes the importance of advocacy, strategic analytics to measure impact and value, and collaboration over traditional social programs.
This document discusses the evolution of librarianship through social media and technology. It explores how librarians have always discovered, collected, organized and shared information but now do so through new tools like blogs, wikis, virtual worlds and social networks. It examines risks like intellectual property issues, privacy concerns, and information overload as well as strategies librarians use to navigate these challenges and remain influential guides. The document argues librarians must embrace new technologies and media to continue connecting communities and furthering open access to knowledge.
The document provides an overview of trends in libraries beyond technology presented by Stephen Abram at the Teton County Public Library in Jackson Hole, WY in January 2012. It discusses challenges libraries face like poor advocacy, slow response to ebooks, and generational tensions. It also covers opportunities like how libraries can enhance the user experience and leverage social media. The presentation emphasizes that libraries remain important community institutions for learning, discovery, and cultural preservation despite technological changes.
This document discusses privacy issues related to libraries. It begins by distinguishing between security problems that inadvertently violate privacy and legal uses of information that can still violate privacy. It explores definitions of privacy, why privacy matters for intellectual freedom and concerns over vulnerable individuals. The document examines how freedom to read relates to privacy historically and today. It reviews potential privacy laws and policies, why privacy problems occur, and known privacy issues regarding public records, reidentification, email, commercial privacy violations on the web and examples related to Facebook, ebooks, Amazon and social media buttons.
This document discusses various options for funding cultural works and scholarly communication. It begins by noting that using sales as a proxy for cultural value has limitations and that libraries often rely too heavily on this approach. The document then outlines several options for funding culture, including selling products or events, crowdfunding, donations, collective/community efforts, patronage, and grants. It discusses how these apply to areas like publishing, archives, and libraries. The document argues that there are multiple ways to fund culture and that libraries should consider providing more direct funding support through options like open access.
Betty is a 22-year-old woman from Morelos, Mexico with over 5,000 Facebook friends and 800 Twitter followers. Though she does not post often, her posts about politics, her city, and work are well-liked. While Betty seems trusting, she knows how to stand up for herself, recently blocking a user who posted a violent comment. Betty keeps her profile public to understand how traffickers use Facebook to target women. She receives many job offers, mostly from men in a nearby town, but suspects they may involve human trafficking. Experts warn that traffickers use social media to deceive and convince women to travel abroad where they become exploited. Betty works to educate others on internet safety and prevention
Gavin Bell Toc09 Long Tail Needs Community SmGavin Bell
The document discusses how publishers can build community and social interaction around books to benefit in the coming years. It argues that supporting community is important for non-fiction books beyond blockbusters. The presentation suggests analyzing reading behaviors, aggregating user data from books, and creating applications to extend interactions with readers beyond purchases. It provides examples from music and other industries and stresses the need to understand the unique activities and social behaviors around different types of books.
1. There are currently 146 confirmed moons in our solar system plus 23 provisional moons that are awaiting confirmation.
2. Earth has 1 moon. Mars has 2 moons - Phobos and Deimos. Jupiter has the most with 79 known moons.
3. The large moons in our solar system likely formed from circumplanetary disks of gas and dust around their parent planets shortly after the planets themselves formed. Smaller moons were likely captured asteroids or comet fragments.
This document discusses the need for libraries to adapt to changing times and new technologies. It notes symptoms of dysfunction in some libraries and challenges them to be "future ready" by embracing change. It discusses how libraries can redefine their purpose and focus on experiences over books. The document advocates for libraries to build knowledge portals focused on user questions and needs. It also suggests focusing on content quality rather than format, expanding social media programs, and collaborating rather than just socializing. The overall message is that libraries must respect generations, put the end user first, and measure their impact and value to remain relevant institutions.
How to manage distractions and achieve your goalMary Sorial
Distractions destroy our ability to focus on important tasks. The document discusses what distractions are and provides examples like social media, texting, and multitasking. It recommends doing one thing at a time and setting times for technology versus no technology. The story of Lot and his wife teaches that we should not linger in distractions, but instead escape to focus on spiritual things ahead of us.
Social Software and Publishers - Gavin Bell - O'Reilly Tools of Change 2007Gavin Bell
A talk at the O'Reilly Tools of Change for Publishers conference. I spoke about social software and how to make it work for book publishers, summng up with a core list of activities publishers need to do to engage their readers better.
This document summarizes a discussion between Robert Bloomfield and Tyler Cowen on the podcast Metanomics. Some of the key topics discussed include:
1) Tyler Cowen's view that autistic thinking styles are well-suited to online environments and activities like blogging, collecting information, and imposing order on disordered information.
2) Cowen's argument that concerns over technologies like Google making people less able to focus or engage in deep reading overlook the ability to choose focus or multitasking.
3) The trend toward shorter, bite-sized cultural works and whether this represents a positive development, with Cowen arguing it allows for more individual control and variety while not replacing all long-form
An invited speaker presentation for the MLGSCA Meeting in Cerritos California. Looks at the evolving roles of librarianship and how social media and healthcare community support fit within a model of Collaborative Librarianship.
This document summarizes a discussion between Robert Bloomfield and Tyler Cowen on the podcast Metanomics. Some of the key topics discussed include:
1) Tyler Cowen's view that autistic thinking styles are well-suited to ordering and making sense of large amounts of information available online. He sees similarities between autistic traits like focus and information collecting and how many people interact with the internet.
2) Cowen argues that concerns over technologies like Google making people less able to focus or engage in "deep reading" overlook how individuals can choose to use technologies. He believes people are still reading long-form works and that shorter formats allow ideas to spread more quickly.
3) The discussion touches
The document discusses trends for libraries beyond technology. It notes symptoms of dysfunction in some libraries and argues that libraries must change to remain relevant. Some key points are that libraries should focus on the user experience and answering users' questions, build knowledge portals around common inquiries, and tell stories about their impact to advocate for themselves. Libraries must also focus on quality over format and expand social media programs on information literacy. The future of libraries depends on understanding users, measuring impact, and collaborating instead of just socializing.
This document discusses how social media and technology can be leveraged to promote children's literature and reading. It notes that while kids are active online, they primarily interact with peers rather than adults. It encourages embracing new tools and finding ways to tie stories to technology through innovations like live Twitter chats with authors. The key is not casting books as the heroes and technology as villains, but finding trusted online sources and communities to spread awareness of children's literature in a positive manner.
Ever get the impression that Facebook, Twitter and the like are just "for the kids"? How about us old folks, you know, people over thirty. Can we get any value out of this social networking "stuff"? Sure we can. This presentation runs through some of "the stuff" (Facebook, Twitter, LinkedIN), and shares some considerations for using them in a safe, effective manner, whether it is to build and promote a strong personal brand online, maintain a strong personal and professional network, or all of the above.
Book as api hugh mc guire and alistair croll - toc nyc 2013Alistair Croll
1. The document discusses the idea of books as bundles of content, structure, and format that should adapt to how they are being used.
2. It argues that the concept of a fixed "publication date" is misleading given that book content is constantly shifting, and books must be linked to outside information in the age of big data.
3. The future of books is seen as their application programming interface (API) that separates content from structure, allowing the two to evolve independently and be recombined in new ways.
Introduction to Social Marketing - Hofstra CEFrank Dinolfo
This was part of a course I am teaching with Robert O'regan at Hofstra University that is aimed at helping small and medium sized businesses integrate digital marketing strategies into their marketing strategies.
This document summarizes Stephen Abram's presentation on social institutions and the social web. In 3 sentences: Abram discusses how libraries can leverage social tools like web 2.0 to better engage patrons and focus on questions rather than books/transactions; he advocates building knowledge portals around common questions and emphasizing quality content over quantity; and recommends that libraries measure impact and value through strategic analytics to demonstrate their continued relevance in a digital age.
The document discusses designing for social sharing and includes the following key points:
1. Social networks have evolved from individual profiles to sharing objects and content. New networks focus on sharing photos, videos, bookmarks, and rating news stories.
2. Social sharing involves people connecting through shared objects and interests. Popular shared items rise to the top, creating streams of information.
3. When designing for social sharing, one should consider how to facilitate people in sharing content and connecting through shared objects and interests. Focus on the shared content rather than individual profiles.
The Filter Bubble: How to Fix Content CurationTania Kasongo
Presentation from 2011 Mashable Media Summit by Eli Pariser, Author of The Filter Bubble and President/Founding Board MemberMoveon.org and Accessnow.org
Filter bubbles occur when websites use algorithms to selectively show users information they are more likely to agree with based on their search history and other personal data. Search engines like Google use complex algorithms that analyze a user's search history, location, browser used, time of day, and other signals to determine what results to display. This personalization of results can unintentionally limit the diversity of information users are exposed to.
The document discusses how personalized filters create separate "bubbles" or universes for each person by selectively showing information aligned with their interests and identities, undermining democracy's need for shared facts and differing perspectives. It notes how these filters shape what information people consume in the same way factory farming shapes our food, and how they promote topical, scandalous, and viral content over other pages by tracking what gets read most frequently. The filters also make people, including experts, more vulnerable to confirmation bias by increasing the proportion of content that validates their existing views.
The document discusses Eli Pariser's concept of the "filter bubble", where personalized algorithms filter information on the internet based on a user's preferences and browsing history. It notes that Google and Facebook use personalization algorithms that can shape what news users see. The document also provides a link to a TED talk by Pariser on this topic and discusses how the front page of major newspapers can be influenced by what Facebook shows in the top right corner.
Betty is a 22-year-old woman from Morelos, Mexico with over 5,000 Facebook friends and 800 Twitter followers. Though she does not post often, her posts about politics, her city, and work are well-liked. While Betty seems trusting, she knows how to stand up for herself, recently blocking a user who posted a violent comment. Betty keeps her profile public to understand how traffickers use Facebook to target women. She receives many job offers, mostly from men in a nearby town, but suspects they may involve human trafficking. Experts warn that traffickers use social media to deceive and convince women to travel abroad where they become exploited. Betty works to educate others on internet safety and prevention
Gavin Bell Toc09 Long Tail Needs Community SmGavin Bell
The document discusses how publishers can build community and social interaction around books to benefit in the coming years. It argues that supporting community is important for non-fiction books beyond blockbusters. The presentation suggests analyzing reading behaviors, aggregating user data from books, and creating applications to extend interactions with readers beyond purchases. It provides examples from music and other industries and stresses the need to understand the unique activities and social behaviors around different types of books.
1. There are currently 146 confirmed moons in our solar system plus 23 provisional moons that are awaiting confirmation.
2. Earth has 1 moon. Mars has 2 moons - Phobos and Deimos. Jupiter has the most with 79 known moons.
3. The large moons in our solar system likely formed from circumplanetary disks of gas and dust around their parent planets shortly after the planets themselves formed. Smaller moons were likely captured asteroids or comet fragments.
This document discusses the need for libraries to adapt to changing times and new technologies. It notes symptoms of dysfunction in some libraries and challenges them to be "future ready" by embracing change. It discusses how libraries can redefine their purpose and focus on experiences over books. The document advocates for libraries to build knowledge portals focused on user questions and needs. It also suggests focusing on content quality rather than format, expanding social media programs, and collaborating rather than just socializing. The overall message is that libraries must respect generations, put the end user first, and measure their impact and value to remain relevant institutions.
How to manage distractions and achieve your goalMary Sorial
Distractions destroy our ability to focus on important tasks. The document discusses what distractions are and provides examples like social media, texting, and multitasking. It recommends doing one thing at a time and setting times for technology versus no technology. The story of Lot and his wife teaches that we should not linger in distractions, but instead escape to focus on spiritual things ahead of us.
Social Software and Publishers - Gavin Bell - O'Reilly Tools of Change 2007Gavin Bell
A talk at the O'Reilly Tools of Change for Publishers conference. I spoke about social software and how to make it work for book publishers, summng up with a core list of activities publishers need to do to engage their readers better.
This document summarizes a discussion between Robert Bloomfield and Tyler Cowen on the podcast Metanomics. Some of the key topics discussed include:
1) Tyler Cowen's view that autistic thinking styles are well-suited to online environments and activities like blogging, collecting information, and imposing order on disordered information.
2) Cowen's argument that concerns over technologies like Google making people less able to focus or engage in deep reading overlook the ability to choose focus or multitasking.
3) The trend toward shorter, bite-sized cultural works and whether this represents a positive development, with Cowen arguing it allows for more individual control and variety while not replacing all long-form
An invited speaker presentation for the MLGSCA Meeting in Cerritos California. Looks at the evolving roles of librarianship and how social media and healthcare community support fit within a model of Collaborative Librarianship.
This document summarizes a discussion between Robert Bloomfield and Tyler Cowen on the podcast Metanomics. Some of the key topics discussed include:
1) Tyler Cowen's view that autistic thinking styles are well-suited to ordering and making sense of large amounts of information available online. He sees similarities between autistic traits like focus and information collecting and how many people interact with the internet.
2) Cowen argues that concerns over technologies like Google making people less able to focus or engage in "deep reading" overlook how individuals can choose to use technologies. He believes people are still reading long-form works and that shorter formats allow ideas to spread more quickly.
3) The discussion touches
The document discusses trends for libraries beyond technology. It notes symptoms of dysfunction in some libraries and argues that libraries must change to remain relevant. Some key points are that libraries should focus on the user experience and answering users' questions, build knowledge portals around common inquiries, and tell stories about their impact to advocate for themselves. Libraries must also focus on quality over format and expand social media programs on information literacy. The future of libraries depends on understanding users, measuring impact, and collaborating instead of just socializing.
This document discusses how social media and technology can be leveraged to promote children's literature and reading. It notes that while kids are active online, they primarily interact with peers rather than adults. It encourages embracing new tools and finding ways to tie stories to technology through innovations like live Twitter chats with authors. The key is not casting books as the heroes and technology as villains, but finding trusted online sources and communities to spread awareness of children's literature in a positive manner.
Ever get the impression that Facebook, Twitter and the like are just "for the kids"? How about us old folks, you know, people over thirty. Can we get any value out of this social networking "stuff"? Sure we can. This presentation runs through some of "the stuff" (Facebook, Twitter, LinkedIN), and shares some considerations for using them in a safe, effective manner, whether it is to build and promote a strong personal brand online, maintain a strong personal and professional network, or all of the above.
Book as api hugh mc guire and alistair croll - toc nyc 2013Alistair Croll
1. The document discusses the idea of books as bundles of content, structure, and format that should adapt to how they are being used.
2. It argues that the concept of a fixed "publication date" is misleading given that book content is constantly shifting, and books must be linked to outside information in the age of big data.
3. The future of books is seen as their application programming interface (API) that separates content from structure, allowing the two to evolve independently and be recombined in new ways.
Introduction to Social Marketing - Hofstra CEFrank Dinolfo
This was part of a course I am teaching with Robert O'regan at Hofstra University that is aimed at helping small and medium sized businesses integrate digital marketing strategies into their marketing strategies.
This document summarizes Stephen Abram's presentation on social institutions and the social web. In 3 sentences: Abram discusses how libraries can leverage social tools like web 2.0 to better engage patrons and focus on questions rather than books/transactions; he advocates building knowledge portals around common questions and emphasizing quality content over quantity; and recommends that libraries measure impact and value through strategic analytics to demonstrate their continued relevance in a digital age.
The document discusses designing for social sharing and includes the following key points:
1. Social networks have evolved from individual profiles to sharing objects and content. New networks focus on sharing photos, videos, bookmarks, and rating news stories.
2. Social sharing involves people connecting through shared objects and interests. Popular shared items rise to the top, creating streams of information.
3. When designing for social sharing, one should consider how to facilitate people in sharing content and connecting through shared objects and interests. Focus on the shared content rather than individual profiles.
The Filter Bubble: How to Fix Content CurationTania Kasongo
Presentation from 2011 Mashable Media Summit by Eli Pariser, Author of The Filter Bubble and President/Founding Board MemberMoveon.org and Accessnow.org
Filter bubbles occur when websites use algorithms to selectively show users information they are more likely to agree with based on their search history and other personal data. Search engines like Google use complex algorithms that analyze a user's search history, location, browser used, time of day, and other signals to determine what results to display. This personalization of results can unintentionally limit the diversity of information users are exposed to.
The document discusses how personalized filters create separate "bubbles" or universes for each person by selectively showing information aligned with their interests and identities, undermining democracy's need for shared facts and differing perspectives. It notes how these filters shape what information people consume in the same way factory farming shapes our food, and how they promote topical, scandalous, and viral content over other pages by tracking what gets read most frequently. The filters also make people, including experts, more vulnerable to confirmation bias by increasing the proportion of content that validates their existing views.
The document discusses Eli Pariser's concept of the "filter bubble", where personalized algorithms filter information on the internet based on a user's preferences and browsing history. It notes that Google and Facebook use personalization algorithms that can shape what news users see. The document also provides a link to a TED talk by Pariser on this topic and discusses how the front page of major newspapers can be influenced by what Facebook shows in the top right corner.
This document discusses strategies for understanding and leveraging search engine filters and algorithms. It begins by demonstrating how two users searching the same topic can receive different results, and encourages engaging students in discussions about how search tools influence results. Students are guided through an activity where they discuss their perspectives on personalized search filters. The document then provides strategies students can use to better control and direct their search results, such as using quotation marks, specific search terms, and different search engines or country codes. It emphasizes the importance of knowing one's search purpose and applying techniques like SWOT analyses to compare search tools. The overall message is that while search filters can't be avoided, they can be understood and leveraged to expand perspectives.
Eli Pariser presents The Filter Bubble at Canvas8Canvas8
Eli presented The Filter Bubble alongside StreetSpark in a Canvas8 event on 'By chance or by design? Serendipity and the internet'
A great talk, well received at the Prince's Trust in Shoreditch, London. The event was sponsored by Penguin.
What Facebook’s New Features Mean for JournalismTania Kasongo
Facebook is a major platform for discovering and sharing news, with over 800 million monthly active users and 350 million mobile users. The document discusses several ways journalists and news organizations can leverage Facebook to distribute their content, including through the News Feed, video chat, subscribing to sources, and using their Page and applications like Livestream. It also provides tips for journalists on best practices like including analysis, using engaging photos, and posting at optimal times of day to increase audience engagement on their Facebook Pages.
The Netflix Cinematch system provides movie recommendations to Netflix customers based on 1.4 billion movie ratings from 5 million customers. Cinematch uses item-to-item collaborative filtering to generate recommendations, analyzing relationships between movies based on user ratings. It can predict ratings for 30% of movies and predicts 1 billion ratings per day with an accuracy that improves as more ratings are received for each movie. Cinematch is critical to Netflix's success in retaining customers by helping them find movies they will enjoy.
The document discusses how personalized algorithms filter our access to information on the internet, creating "filter bubbles" that limit our exposure to new ideas and information. It notes that search engines and social media platforms use algorithms to curate our results, but we have little control or visibility into how this filtering works and what relevant information may be excluded. The document calls for increased transparency into how algorithms filter content, more exposure to new information outside our normal preferences, encoding responsibility into algorithms to avoid excessive filtering, and giving users more control over personal filtration settings.
Apache Hama at Samsung Open Source ConferenceEdward Yoon
Apache Hama is a general-purpose Bulk Synchronous Parallel (BSP) computing engine built on top of Apache Hadoop. It allows for distributed, iterative processing of large-scale graphs and matrices. Some key features of Hama include streaming graph processing, machine learning algorithms like neural networks and gradient descent, and support for Hadoop, YARN and Mesos. Sogou uses a 7,200 core Hama cluster to run its SiteRank algorithm on a 400GB web graph containing 6 billion edges. Future work on Hama includes improved serialization and GPU acceleration.
The document discusses the impact of digital information and personalization on libraries. It notes that search engines now deliver personalized results, creating "filter bubbles" where users are only exposed to information aligned with their past searches. This poses dangers like intellectual isolation and reduced serendipity. The document argues libraries should implement personalized services like custom profiles and subject groups, but also make filters transparent and allow opting out to avoid these risks. Filters should combine machine and human elements with more randomness to prevent intellectual stagnation.
1) The document discusses the evolution of web technologies and big data systems from Google's early developments like MapReduce, BigTable, and SawZall to open source projects like Hadoop, Pig, Hive, HBase, Storm, and Giraph.
2) It provides an overview of key Apache Hadoop projects including HDFS, MapReduce, YARN, and how CDH4 will incorporate newer computation frameworks beyond traditional MapReduce.
3) The author, Edward Yoon, is the founder of Apache Hama and a leader in the Apache BigTop and Hadoop communities who traces the development of technologies from Google's internal systems to their open sourcing and the rise of alternative computation models in big data systems
101 slides about the past, the present, and the future of the World Wide Web space, including information about Web 2.0 (Social Web) and Web 3.0 (Web of Data, Semantic Web).
Slides of my talk at DataWeek 2012 - We engineers love data and algorithms. They help create amazing things. But if and when we forget that people create data and that data can be improved by people, we will miss the promise of Big Data. It's time we all thought of this not as social vs algorithm but as humanrithm.
Τα παιδιά ως κοινωνικοί ερευνητές. Οδηγός για δασκάλους και ...Αννα Παππα
Η ανάμιξη παιδιών στην κοινωνική έρευνα προσφέρει στους εκπαιδευτικούς λειτουργούς μια απαράμιλλη ευκαιρία να βοηθήσουν τα παιδιά να αναπτύξουν χρήσιμες δεξιότητες που θα τους χρειαστούν στον ολοένα και πιο απαιτητικό, βασισμένο σε γνώσεις, κόσμο. Έτσι, τα παιδιά μπορούν να μάθουν να συλλέγουν και να επεξεργάζονται πληροφορίες, να τις περιγράφουν και να τις επεξηγούν, να έχουν κριτική σκέψη και να βγάζουν συμπεράσματα, να αμφισβητούν αυτό που είναι δεδομένο, και να αναπτύσσουν τις προφορικές, γραπτές ή αριθμητικές τους δεξιότητες. Μαθαίνουν να δουλεύουν σε ομάδες, να ακούνε με προσοχή και να προβάλλουν επιχειρήματα, να παίρνουν αποφάσεις και να επικοινωνούν αποτελεσματικά με άλλους στις
κοινότητές τους.
The document discusses the evolution of the internet from Web 1.0 to Web 3.0. Web 1.0 consisted of traditional media companies pushing content to passive users, while Web 2.0 enabled user-generated content through platforms that allowed everyone to publish. However, very few people were able to earn a living from publishing on these platforms. Web 3.0 aims to enable user-generated business by providing everyone with professional publishing and business management tools to run their own media businesses and make a living from their creativity.
This document discusses the challenges of digital changes and social changes. It covers two upcoming sessions on humans and machines. It then provides biographical information about the author as a senior advisor, investor, and speaker. The document discusses how the future of business involves letting go and various quotes on embracing change. It covers how young children are already internet users and how the world changes daily. The overall message is that the only constant is change.
This document discusses strategies for combating fake news and hate speech, especially among young people. It notes that many students have trouble identifying real and fake news sources. It then provides examples of fake news headlines and offers tips for fact checking claims and sources. The document also discusses the harms of hate speech and gives strategies for responding to it, including capturing evidence and reporting inappropriate content. Overall, the document aims to educate youth on critically evaluating information online and addressing issues like fake news and hate speech in a constructive manner.
The document discusses photovoltaics in the United Kingdom. It begins with defining photovoltaics as the direct conversion of sunlight into electricity using solar cells. It then reviews literature on photovoltaics, discussing what they are, the basic process of how they produce electricity from sunlight, and issues highlighted in the objectives that will be addressed. The chapter forms a basis for comparing the research to previous publications and opinions on photovoltaics in the UK.
The document discusses Mexican ethnicity and identity. It notes that ethnic groups share a unique social and cultural background, and that feelings of belonging to a group are normal for humans. However, it questions why people can't identify with more than one ethnicity. Many people in the US are of Mexican descent but have a mixed background. Being Mexican American can be difficult due to stereotypes and discrimination, but also brings a sense of pride in culture. It emphasizes that Mexican Americans come in a variety of appearances and shouldn't be assumed to be a single race.
The document discusses 5 steps for using the HelpWriting.net service to get writing assistance:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline.
3. Review bids from writers and choose one based on qualifications.
4. Review the completed paper and authorize payment if pleased.
5. Request revisions to ensure satisfaction, with a refund option for plagiarism.
What Science Fiction Can Teach Us About Building Communities: EdinburghDawn Foster
Presented at LinuxCon Europe in Edinburgh.
Communities are one of the defining attributes that shape every open source project, not unlike how Asimov's 3 laws of robotics shape the behavior of robots and provide the checks and balances that help make sure that robots and community members continue to play nicely with others. When looking at open source communities from the outside, they may seem small and well-defined until you realize that they seem much larger and complex on the inside, and they may even have a mind of their own, not unlike the TARDIS from Doctor Who. We can even learn how we should not behave in our communities by learning more about the Rules of Acquisition and doing the opposite of what a good Ferengi would do. My favorite rules to avoid include, "Greed is eternal", â"You can always buy back a lost reputation" and "When in doubt, lie". This session focuses on tips told through science fiction.
What Science Fiction Can Teach Us About Building CommunitiesDawn Foster
Presented at LinuxCon NA in New Orleans.
Communities are one of the defining attributes that shape every open source project, not unlike how Asimov's 3 laws of robotics shape the behavior of robots and provide the checks and balances that help make sure that robots and community members continue to play nicely with others. When looking at open source communities from the outside, they may seem small and well-defined until you realize that they seem much larger and complex on the inside, and they may even have a mind of their own, not unlike the TARDIS from Doctor Who. We can even learn how we should not behave in our communities by learning more about the Rules of Acquisition and doing the opposite of what a good Ferengi would do. My favorite rules to avoid include, "Greed is eternal", â"You can always buy back a lost reputation" and "When in doubt, lie". This session focuses on tips told through science fiction.
Explanatory Synthesis Essay. Explanatory Synthesis Essays. 2Laura Smith
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, and the company offers refunds for plagiarized work.
Essay About Culture. . Importance of our culture essaysElizabeth Montes
Culture Essay Example for Free - 756 Words | EssayPay. Outstanding Cultural Diversity Essay ~ Thatsnotus. Essay on Culture Understanding. Growing Up in Filipino Culture Personal Essay on Samploon.com. Expository essay: Reflective essay on cultural differences. essay about culture. Cultural Diversity Essay | Essay on Cultural Diversity for Students and .... Cultural Differences Essay | Essay on Cultural Differences for Students .... My Culture And Society Essay. Importance of our culture essays. (PDF) Introductory Essay Material Culture and the Meaning of Objects. Importance of Culture Essay.docx - Importance of Culture Essay .... culture essay | Essays | Thesis. The Importance of Culture | Essay Sample by Handmadewritng.com. Sample essay on cultural identity. Popular Culture - GCSE Miscellaneous - Marked by Teachers.com. My culture essay – The Friary School. Mastering the Importance of Culture Essay: Pro Tips, Examples, and .... Culture and society essay.
Buy Pre Written Term Papers Research Paper Thesis, ReBrooke Heidt
1. Markets and customer needs are constantly evolving, requiring companies to adapt their products and services to remain competitive.
2. New technologies emerge regularly, disrupting existing business models and creating opportunities that companies must explore.
3. Remaining static risks becoming outdated and less efficient over time, jeopardizing a company's long-term viability in a dynamic business environment where change is the norm. Embracing and facilitating organizational change helps companies thrive amid inevitable shifts.
Essay On Learning A Foreign Language. Online assignment writing service.Melanie Dunkel
Lord Byron's poem Don Juan uses irony to portray morality in a satirical way. While the poem features an unheroic protagonist in Don Juan and has been viewed as immoral, it was actually intended as a satire of the abuses of society at the time. Byron presents morals and hope for humanity through ironic means, as the poem is a satire. The ironic style makes the message difficult to miss.
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund offered for plagiarized work. The process aims to match clients with qualified writers and ensure client satisfaction.
Social media can impact the economy of an entire country. Costa Rica aims to use platforms like Facebook and Instagram to promote and sell its coffee internationally. However, accurately measuring social media's effects remains challenging. Building an online audience requires careful planning, creative content, and engagement with followers through comments and replies. It is also important to verify information from social media accounts to avoid spreading misinformation from fake or automated accounts. While attention on social platforms can drive economic gains, it also enables the spread of propaganda and false narratives that influence public opinion.
Summer Writing Templates Freebie By Mr And Mrs BriApril Smith
The document provides instructions for using the HelpWriting.net writing assistance website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a request form with instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with a full refund option for plagiarized work. The summary focuses on the key steps involved in using the writing assistance service.
The document discusses how 2010 marked a watershed year in which new technologies empowered activists and journalists to speak out against repressive governments and push for greater respect of human rights. It suggests that repressive governments now face the real possibility that their days are numbered due to technologies that allow information to spread more freely. The summary highlights how new technologies have given voice to critics of authoritarian regimes and represent a threat to governments that try to strictly control information.
023 Essay Example Maxresdefault Write My ThatSarah Morrow
Here is a literature review on childhood obesity:
Introduction
Childhood obesity has become a growing epidemic in many countries around the world. This literature review will examine some of the key research on factors contributing to childhood obesity as well as potential interventions and prevention strategies.
Contributing Factors
Several studies have identified environmental and lifestyle factors that increase the risk of childhood obesity. Increased access to fast food and sugar-sweetened beverages has been linked to higher obesity rates (Kim et al., 2016; Bleich et al., 2017). Children who live in neighborhoods without access to parks or recreational facilities are also more likely to be obese (Datar & Chung, 2015). Additionally, increased screen time such as watching TV, playing video games
This document discusses the impact of digital technologies and social media on identity, relationships, and society. It identifies four trends toward a 100% digital world:
1) You are your identity - People create digital identities through blogs, social media, etc.
2) You are your network - Social networks and relationships are increasingly digital. Content is less important than conversation.
3) You are the Internet - Sharing personal information and content online helps shape one's identity and presence on the internet. Transparency online brings challenges regarding privacy and integrity.
4) You don't care - Most people are indifferent to the technical aspects of digital technologies and just want services to work seamlessly like electricity or water.
Choose The Best Essay Writing Service In UK Best Essay Writing ...Lindsay Alston
The document discusses the steps involved in requesting and obtaining essay writing help from the website HelpWriting.net. It outlines 5 steps: 1) Creating an account with an email and password. 2) Completing a form with assignment details, sources, and deadline. 3) Reviewing bids from writers and choosing one based on qualifications. 4) Reviewing the completed paper and authorizing payment if satisfied. 5) Having the option to request multiple revisions to ensure satisfaction, with a refund offered if the paper is plagiarized.
The document summarizes Jack London's short story "To Build a Fire" and analyzes its key themes. It discusses how the story follows an unnamed man traveling alone through the frigid Yukon wilderness to meet friends. Due to his lack of experience and overconfidence, the man fails to properly respect the dangers of the extreme cold, ultimately putting himself in a life-threatening situation. The analysis argues the main moral of the story is to always trust one's instincts over judgment, as the man ignores warnings from his companion dog.
Should Marijuana Be Legal For Medical Purposes EssayAshley Hargrove
Should Cannabis be legalised? - A-Level General Studies - Marked by .... Should Marijuana be Legalized for Medical Purposes Essay. Medical Marijuana Should be Legalized Throughout the US - Free Essay .... Whether or not Medical Marijuana Should be Legalized in all 50 States .... Marijuana legalization argumentative essay. Why Marijuana Should Be Legalized. Legalize Marijuana Essay Essay on Legalize Marijuana for Students and .... Top Should Marijuana Be Legalized Essay Thatsnotus. The Single Strategy To Use For An Official Primer To Legalized Cannabis .... Marijuana should be legalized - GCSE English - Marked by Teachers.com. LEGALIZATION OF MARIJUANA FOR MEDICAL USE IN THE PHILIPPINES .... Should Cannabis Be Legalised - GCSE English - Marked by Teachers.com. Marijuana Legalization For Medical Purposes. Should cannabis be legalised? - GCSE English - Marked by Teachers.com. Medical marijuana: Know the facts - Harvard Health. Medicinal Marijuana Essay Essay on Medicinal Marijuana for Students .... Should Marijuana be legal? - University Social studies - Marked by .... Should Cannabis Be Legalised? - GCSE English - Marked by Teachers.com. should cannabis be legalised - GCSE Sociology - Marked by Teachers.com. Quotes About Legalizing Marijuana. QuotesGram. Marijuana Legalization Essay. What Conditions Can Medical Marijuana Help Treat? - Free Essay Example .... Should cannabis be legalized? - GCSE Religious Studies Philosophy .... Why marijuana should be legal. Pros of legalizing weed essay titles. Frightening Argumentative Essay On Legalizing Weed Thatsnotus. Marijuana Essay PDF Cannabis Drug Substance Abuse. legalizing marijuana thesis statement. Legalizing marijuana argumentative essay. Argumentative Essay On .... Should Cannabis be legalised in the UK? - A-Level General Studies .... Legalization of Recreational Marijuana - Free Essay Example PapersOwl.com. Should cannabis be legalised? - GCSE Sociology - Marked by Teachers.com. Marijuana should it be legal? SiOWfa16: Science in Our World .... Marijuana should be legalised for medicinal purposes. - A-Level ... Should Marijuana Be Legal For Medical Purposes Essay Should Marijuana Be Legal For Medical Purposes Essay
Similar to What's in your filter bubble? Or, how has the internet censored you today? (20)
To Badge or Not? Towards an intersection of neoliberalism and information lit...Emily Ford
Presentation at WILU 2016 Conference in Vancouver, BC.
As technology in higher education rapidly changes, new pedagogical tools are being tested, developed, and implemented. Digital badge systems are one such tool that can be used to certify student skills and competencies, including information literacy skills. But at what point do micro-credentialing systems and competency-based approaches intersect with neoliberalism? Neoliberalism, a disturbing trend in higher education, values competencies and skills to prepare “market and job-ready” students, whereas non market-based traditional approaches to higher education aim to create an informed and engaged citizenry for the public good. Can micro-credentialing systems co-exist with this ideological aim? Are badges and micro-credentialing systems a product of neoliberalism? Do they inherently further these neoliberal aims or can they further an ideological aim of education as a public good? On the one hand today’s college students face rising tuition and course materials costs. As a result students focus their learning on skills acquisition and job-market competitiveness after college. Students frequently learn information literacy and critical thinking skills throughout their course of study and outside of discrete class-based learning outcomes. Using badges to certify and clearly communicate these skills to students and future employers, then, assists students in their learning and post-educational goals. On the other hand, information literacy and critical thinking skills can be integrated into course instruction without the use of micro-credentialing systems like badges. This session will examine and compare two sections of a community health class utilizing an embedded information literacy and critical thinking curriculum. One section used badges to certify learning outcomes; the other did not. Drawing from their experiences and findings from pre- and post-course student surveys, presenters will discuss the intersection and balance of neoliberal approaches to information literacy with the value of education as a public good.
This document discusses open peer review, which involves making peer review reports publicly available alongside published research. Open peer review aims to increase transparency and accountability. It can enhance scholarly discourse and help authors improve their work through a developmental review process. However, open peer review also faces challenges like potential bias, difficulty recruiting reviewers, and adoption barriers. Overall, the pros of open peer review include increased reviewer accountability, potential for better quality reviews, and transparency in editorial decisions. The cons include challenges with implementation and potential bias. Participation may require addressing concerns over privacy and managing the review process openly.
The document summarizes information from various online sources related to Portland State University. It lists the date and location of a PSU governing board meeting where the board voted to raise tuition. It includes quotes from a book about feminist ethics and care. It also lists the names of PSU faculty who participated in an AAUP rally and information about a librarian at PSU.
Digital Badges: A Tool for Embedded Library InstructionEmily Ford
Digital badges, much like embroidered scouting badges, signify an earner’s skills. In higher education educators are using badges to certify student achievements. Badges communicate to students, faculty, and the public what skills students earn during their course of study much better than can a letter grade, certificate, or diploma.
This session will begin with a theoretical background informing badging including: gamification, motivation, neoliberalization of education, technological innovation, and competency-based curriculum. Next we will discuss how our team--three Community Health professors and one librarian from Portland State University--embedded badges for information literacy into three undergraduate Community Health courses during Fall 2014. Finally, we will present what we learned from the experience. By discussing our learning outcomes-based approach to instructional design, “how tos” of implementing badge technology, and discussing lessons learned, session attendees will discover ways to approach and implement badges at their home institutions.
Emily Ford, Urban & Public Affairs Librarian, Portland State University
Betty Izumi, Assistant Professor of Community Health, Portland State University
Jost Lottes, Research Associate, Institute on Aging, Portland State University
Dawn Richardson, Assistant Professor of Community Health, Portland State University
Badge it! Using Digital Badges to Certify Information Literacy Skills withing...Emily Ford
This presentation was given at the 2014 Library Instruction West conference in Portland, Oregon.
As technology in higher education rapidly changes, new pedagogical tools are being tested, developed, and implemented. Digital badges systems are one such tool that can be used to certify student skills and competencies, including information literacy skills. Despite new teaching technologies and pedagogical approaches, it remains difficult for instruction librarians to lead experimentation. As a result, librarians depend on collaborative relationships with disciplinary faculty to experiment with pedagogies and tools like badging. At Portland State University, however, librarians are leading a collaborative digital badges project with Community Health Faculty to develop, deliver, assess, and track student achievements in information literacy. In this session Library and Community Health faculty presenters will discuss the ins-and-outs of integrating digital badges into course curriculum to certify information literacy and other achievements.
Digital Badges in Libraries: Skills-based Instruction, Code-shifting, and Col...Emily Ford
Presentation slides for the snowed out <a>Online Northwest</a> 2014 conference.
Emily Ford, Urban & Public Affairs Librarian, Portland State University
Nicholas Schiller, Systems & Instruction Librarian, Washington State University- Vancouver
Dawn Richardson, Assistant Professor of Community Health, Portland State University
Digital badges present librarians with new ways of engaging with patrons including recognizing patron achievement and improved communication. This session will provide an overview of digital badges--including an explanation of underlying pedagogical aims--and will address badging as “code-shifting” or using different communication methods for different audiences. Finally, it will present a major collaboration between Portland State University Library and disciplinary faculty to integrate badges in undergraduate courses, providing librarian and disciplinary faculty perspectives.
Open Peer Review: Directions and ChallengesEmily Ford
Slides from my presentation at the 2014 conference: Publish or Perish: The Future of Academic Publishing and Careers. http://icis.ucdavis.edu/?page_id=22
From 3x5 to LCD: Considerations and How-tos for Online Card Sort StudiesEmily Ford
This document discusses card sorting studies and considerations for conducting them online versus using physical cards. It provides an overview of open, closed, and 3x5 card sorting methods. For 3x5 card sorts, the document outlines the process and notes they provide rich qualitative and quantitative data but are time intensive. It then discusses the process and pros/cons of online or LCD card sorts before providing considerations for determining whether to use a 3x5 or LCD method.
Reap What You Sow. A &!@*# [millennial] perspective on mentoringEmily Ford
The document presents an informal perspective on mentoring that rejects traditional power structures. It advocates for a highly informal approach to mentoring that is tuned into social capital and networks rather than formal hierarchies. Examples show how informal mentoring relationships can develop from various personal and professional connections through friends, family, colleagues and online networks rather than being assigned through a program.
This document discusses librarianship's struggle with identity and purpose. It explores how librarians have long grappled with questions about their role, through examples from 1959 to present day. It also examines how personalization algorithms on the internet create "filter bubbles" that shape individuals' worldviews, and argues that librarians could serve as information curators to address this issue. In conclusion, the document asks colleagues to consider what librarians do and why, as these identity questions remain important.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
4. In Portland:
Me – 30s, Female, Librarian, far left
S. – 30s, male, PhD but works for a
health insurance company, Libertarian
D. – 40s, female, model maker, far left
In Helena:
A. – 30s, Female, Librarian, politics
unknown
In Corvallis: In NYC:
L. – 30s ?, Female, Librarian, politics D. – 30s, Female, Librarian, far
unknown left
In Eugene: L. – 30s, Female, Librarian, far left
M. – 30s, Female, Librarian, far left
In Tallahassee:
A. – 30s, Male, Librarian, politics
unknown
5.
6.
7.
8.
9. Browser: Google Chrome
Google Account: forder@pdx.edu
Browser: Firefox
Google Account: fordemily@gmail.com
13. “Emily, did you know that viewers
of this show also like (Planned)
Parenthood?”
14.
15. The Conclusion? • My test searches were bad.
• My test subjects weren’t
representative enough.
• I have created my own bubble and
Google has aided and abetted me in
doing so.
• #*@#$*@&!!!
16. How old I am
What degrees I’ve earned and where I
earned them
Who are my friends
Who are my family
Omg what does Who I have dated
the internet Where I live
Google know Where and when I’ve traveled and with
about me??? whom
Where I work
My bike route to work
What organizations I support financially
My political views
What car I drive
What bike I ride
Who I email most often and what I say
When my cat died and what vet hospital
I patronized
My favorite blog
My favorite food this week and last year
My favorite author
17. Who I had happy hour with on July 29,
Omg what does 2010 and where we were
the internet
What videos I’ve watched on YouTube
Google know
and when and how many times
about me???
What kind of phone I use and what
applications are on it and when I use
those applications
My penchant for fictional family dramas
What podcasts I listen to
What book my book club is reading,
where we’re meeting, and when…
18. So What do we 1. Burn your cookies.
do? 2. Erase your web history.
3. Tell Facebook to keep your data
Pariser’s 10 Ways private
to Pop your Filter
4. It’s your birthday and you can hide it
Bubble
if you want to.
5. Turn off targeted ads, and tell the
stalking sneakers to buzz off.
6. Go incognito.
7. Or better yet, go anonymous.
8. Depersonalize your browser.
9. Tell Google and Facebook to make
it easier to see and control your
filters.
thefilterbubble.com/10-things-you-can-do
10. Tell Congress you care.
19. So What do we do? 1. Be aware and informed.
2. Tell local decision-makers you care.
A Librarian’s 10
3. Tell Congress you care.
ways to pop the filter
bubble 4. Use a different search engine.
5. Build mutually beneficial relationships
with vendors.
6. Create our own tools.
7. Integrate awareness into our actions
and interactions.
8. Provide feedback when asked.
9. Discover what the Internet already
knows and change it.
10. Spread the word.
20. Thanks to the • flickr.com/photos/39580703@N02/6122020531/
folks who have • flickr.com/photos/cakper/5978028199/
licensed their • flickr.com/photos/mirindas/5890851809/
flickr images with
• flickr.com/photos/ncc_badiey/3095099782/
creative commons
licenses. • flickr.com/photos/84568447@N00/2278294489/
21. Other resources On the Media Interview Transcript with
Eli Pariser
onthemedia.org/2011/may/20/the-filter-bubble/transcript
The Filter Bubble Web site
thefilterbubble.com
Eli’s TED Talk
ted.com/talks/eli_pariser_beware_online_filter_bubbles.
22. Questions/ Emily Ford
comments/ Urban & Public Affairs Librarian
ETC Portland State University
Branford P. Millar Library
forder@pdx.edu
24. • Personalization
• Editorial Role
• The web is a land
of opportunity (ie $
$$$$)
This book was written and published.
Pariser shows how we are being algorithmically filtered. This filtering is
to achieve a few things:
Personalization
Marketing
We’ve all personalized things. We personalize our houses with paint
colors, our bodies with tattoos, our identities with our clothing, etc.
and this all translated to the web. Our cell phones and our e-mail
inboxes have so many personalization options. They are intended to
optimize the functionality of these tools so that we can be effective
and have fun doing it.
25. If my world was indeed captured in a little bubble, I wanted to
investigate it and understand it. So I decided I’d try to
(unscientifically) see if I could find evidence of my filter bubble.
I tried to repeat the gist of what Pariser did when he talked about
having two separate people google the same thing at the same time
and see what happened. In his case, “
Brooke Gladstone: …Even a small search yields different results for
different people, says Pariser, as when two people he knows
searched “BP” during the oil spill.
ELI PARISER:
And one person saw information about the oil spill - what you can do
about it, the environmental consequences - and another person saw
26. In Portland:
Me – 30s, Female, Librarian, far left
S. – 30s, male, PhD but works for a
health insurance company, Libertarian
D. – 40s, female, model maker, far left
In Helena:
A. – 30s, Female, Librarian, politics
unknown
In Corvallis: In NYC:
L. – 30s ?, Female, Librarian, politics D. – 30s, Female, Librarian, far
unknown left
In Eugene: L. – 30s, Female, Librarian, far left
M. – 30s, Female, Librarian, far left
In Tallahassee:
A. – 30s, Male, Librarian, politics
unknown
So I tried to replicate the experiment that Parisier talks about in his
book. For background, he asked two women to google the same
thing at the same time. The search was “bp.”
29. Except this one. This particular result came from S. – 30s, male, PhD
but works for a health insurance company, Libertarian
30. So I tried to have my participants re-do the search that Pariser had the
ladies do. My subjects searched for BP. I noticed some slight
differences, as in those who live in areas with BP gas stations had
those mapped and listed up top. Other than that, there was not much
difference at all.
31. Browser: Google Chrome
Google Account: forder@pdx.edu
Browser: Firefox
Google Account: fordemily@gmail.com
So then I thought maybe it’s a browser thing? And I tried an experiment
on myself. At work I have two browsers open, one with work stuff,
one with personal. And I don
32. Browser: Internet Explorer
Google Account: not signed in
And I tried using IE, too, which I try to never use.
33. My conclusion was: meh. It failed. Yeah, maybe my searches were a
little different, but nothing of significance.
34. And then this
happened…
I was innocently curled up on my big arm chair sipping on wine with the
dog sleeping by my feet, about to watch one of my shows on Hulu (I
don’t have cable).
35. “Emily, did you know that viewers
of this show also like (Planned)
Parenthood?”
This popped onto my screen. (Parentheses is what I heard– I’m still not
sure if that’s what it said.)
36.
37. The Conclusion? • My test searches were bad.
• My test subjects weren’t
representative enough.
• I have created my own bubble and
Google has aided and abetted me in
doing so.
• #*@#$*@&!!!
38. How old I am
What degrees I’ve earned and where I
earned them
Who are my friends
Who are my family
Omg what does Who I have dated
the internet Where I live
Google know Where and when I’ve traveled and with
about me??? whom
Where I work
My bike route to work
What organizations I support financially
My political views
What car I drive
What bike I ride
Who I email most often and what I say
When my cat died and what vet hospital
I patronized
My favorite blog
My favorite food this week and last year
My favorite author
So I looked at my Google Dashboard. And I downloaded my Facebook
data. And this is just a sample list of what Google and Facebook,
combined, know about me. Potentially what has been sold to
companies like Axciom. This more information than my partner, my
parents, and best friends know about me.
39. Who I had happy hour with on July 29,
Omg what does 2010 and where we were
the internet
Google know What videos I’ve watched on YouTube
and when and how many times
about me???
What kind of phone I use and what
applications are on it and when I use
those applications
My penchant for fictional family dramas
What podcasts I listen to
What book my book club is reading,
where we’re meeting, and when…
And it can get even more precise…
40. So What do we 1. Burn your cookies.
do? 2. Erase your web history.
3. Tell Facebook to keep your data
Pariser’s 10 Ways private
to Pop your Filter
4. It’s your birthday and you can hide it
Bubble
if you want to.
5. Turn off targeted ads, and tell the
stalking sneakers to buzz off.
6. Go incognito.
7. Or better yet, go anonymous.
8. Depersonalize your browser.
9. Tell Google and Facebook to make
it easier to see and control your
filters.
thefilterbubble.com/10-things-you-can-do
10. Tell Congress you care.
OMG What does Google Think I should Know?
OMG What does Google Want me to know?
Education/Awareness—librarians are really good at this.
Opting out – Delete cookies regularly. Have your browser ask about
cookies. Use plugins like Disconnect.
Talk to your local and national decision-makers– technology decisions
can have impacts that reach far into the future
41. So What do we do? 1. Be aware and informed.
2. Tell local decision-makers you care.
A Librarian’s 10
3. Tell Congress you care.
ways to pop the filter
bubble 4. Use a different search engine.
5. Build mutually beneficial relationships
with vendors.
6. Create our own tools.
7. Integrate awareness into our actions
and interactions.
8. Provide feedback when asked.
9. Discover what the Internet already
knows and change it.
10. Spread the word.
Local decision makers may include your library director, your
supervisor, etc. Without having these conversations I don’t think we’ll
get anywhere, which is why I moved them up on the list.
Duckduckgo
42. Thanks to the • flickr.com/photos/39580703@N02/6122020531/
folks who have • flickr.com/photos/cakper/5978028199/
licensed their • flickr.com/photos/mirindas/5890851809/
flickr images with
• flickr.com/photos/ncc_badiey/3095099782/
creative commons
licenses. • flickr.com/photos/84568447@N00/2278294489/
43. Other resources On the Media Interview Transcript with
Eli Pariser
onthemedia.org/2011/may/20/the-filter-bubble/transcript/
The Filter Bubble Web site
thefilterbubble.com
Eli’s TED Talk
ted.com/talks/eli_pariser_beware_online_filter_bubbles.html
44. Questions/ Emily Ford
comments/ Urban & Public Affairs Librarian
ETC Portland State University
Branford P. Millar Library
forder@pdx.edu