Overview of
> Perspective on Web 2.o in Government
> Tools (Types not tokens)
... to provide the context for ideation and strategy for integration of emerging tools @ FSIS, USDA.
Youth, the Largest buyer of everything from mobiles to Motorbikes, Apparels to LCD’s, brimming with Impulse purchase and eCommerce the segment is fast going global. With an average time spent of 45 mins per consumer our set of 3000+ youth I cafes cater to a daily captive audience of 1.9 Lac Global Indians every day across top cities.
Overview of
> Perspective on Web 2.o in Government
> Tools (Types not tokens)
... to provide the context for ideation and strategy for integration of emerging tools @ FSIS, USDA.
Youth, the Largest buyer of everything from mobiles to Motorbikes, Apparels to LCD’s, brimming with Impulse purchase and eCommerce the segment is fast going global. With an average time spent of 45 mins per consumer our set of 3000+ youth I cafes cater to a daily captive audience of 1.9 Lac Global Indians every day across top cities.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
7. Ieri - Oggi
● Compaq Portable ● MacBook Air
● Modem Radio Shack ● EEE PC 1101
● Accoppiatore ● iPhone
● Valigia Samsonite ● Vodafone Key
(circa 20 kg) ● Zaino (3 kg)
8. Generazioni Online 2009
Makeup of Adult Internet Population by Generation
(does not include teens)
Gen Y
(ages 18-32)
30% Gen X
(ages 33-44)
23%
G.I. Generation
(age 73+)
4%
Silent Generation
(ages 64-72) Younger
7% Boomers
Older Boomers (ages 45-54)
(ages 55-63) 22%
13%
9. Younger Older Silent G.I.
Rank Gen Y Gen X
Boomers Boomers Generation Generation
1 Email Email Email Email Email Email
2 Search Search Search Search Search Search
3 Research product Research product Research product Get health info Research product Get health info
4 Make travel
Get news Get health info Get health info Research product Get health info
reservations
5 Make travel
Watch video Buy something Get news Buy something Research product
reservations
Above this line,
6 Make travel
Buy something Get news
reservations
Get news Visit gov’t site Buy something over 50% of
7 Make travel Make travel internet users
Get health info Buy something Buy something Get news
reservations reservations in the given
8 Visit SNS Bank Visit gov’t site Visit gov’t site Get news Visit gov’t site generation
9 Make travel engage in this
Visit gov’t site Research for job Bank Bank Get religious info
reservations online activity
10 Get job info Research for job Bank Research for job Research for job Bank
11 Create SNS profile Watch video Watch video Get job info Get religious info IM
12 IM Get job info Get job info Watch video Rate product Play games
13 Download music Download music Get religious info Rate product Play games Rate product
14 Bank IM Rate product Get religious info IM Read blog
15 Visit gov’t site Get religious info IM Play games Watch video Watch video
16 Research for job Play games Auction Auction Read blog Download video
17 Play games Visit SNS Read blog Read blog Auction Get job info
18 Read blog Rate product Play games IM Download music Podcast
19 Download video Read blog Download music Download music Download video Research for job
20 Rate product Download video Download video Download video Get job info Auction
21 Get religious info Auction Visit SNS Podcast Visit SNS Create blog
22 Auction Create SNS profile Podcast Visit SNS Podcast Download music
23 Podcast Podcast Create SNS profile Create SNS profile Create blog Visit SNS
24 Create blog Create blog Create blog Create blog Create SNS profile Create SNS profile
25 Visit virtual world Visit virtual world Visit virtual world Visit virtual world Visit virtual world Visit virtual world
14. Generational Differences in Online Activities
Teens and Gen Y are more likely to engage in the following activities compared with older users
^ Source for Online Teens data: Pew Internet & American Life Project Surveys conducted Oct.-Nov. 2006 and Nov. 2007-Feb. 2008. Margin of error for online teens is ± 4% for Oct.-Nov. 2006 and ±3% for Nov. 2007-
Feb. 2008.
^^ Source for Online Adult data: Pew Internet & American Life Project Surveys conducted August 2006, Feb.-March 2007, Aug.-Sept. 2007, Oct.-Dec. 2007, May 2008, August 2008, November 2008, December 2008,
and Mar.-April 2009. Margin of error for all online adults is ±3% for these surveys. The average margin of error for each age group can be considerably higher than ± 3%, particularly for the "Matures" and "After Work"
age groups.
~ Most recent teen data for these activities comes from the Pew Internet & American Life Project Teens and Parents Survey conducted Oct.-Nov. 2004. Margin of error is ± 4%.
19. How teens communicate with friends
using social networking sites
The percentage of teen social networking site (SNS) users who...
Source: Pew Internet Project Survey of Parents and Teens, Oct-Nov. 2006. Margin of error is +/-5%
for teens who use social networking sites. Teen SNS users n=493.
20. STATI EMOTIVI ASSOCIATI AL CELLULARE
BASE: Totale interviste, popolazione Internet 16-54 anni user cellulare (casi 1.168)
Cosa rappresenta per te il cellulare? Indica tutte le parole che associ maggiormente al cellulare.
[Dettaglio: “AMORE”, “AMICIZIA”, “LAVORO”, “FAMIGLIA”]
20
21. STATI EMOTIVI ASSOCIATI AL CELLULARE
BASE: Totale interviste, popolazione Internet 16-54 anni user cellulare (casi 1.168)
Cosa rappresenta per te il cellulare? Indica tutte le parole che associ maggiormente al cellulare.
21
22. A COSA SERVE IL CELLULARE
BASE: Totale interviste, popolazione Internet 16-54 anni user cellulare (casi 1.168)
Il cellulare per te è principalmente …?
22
23. IMPORTANZA DEL CELLULARE NEL RAPPORTO CON GLI AMICI
BASE: Totale interviste, popolazione Internet 16-54 anni user cellulare (casi 1.168)
Quanto ritieni importante il cellulare nel rapporto con i tuoi amici?
23
24. AMICIZIA E CELLULARE
BASE: Totale interviste, popolazione Internet 16-54 anni user cellulare (casi 1.168)
Pensando ai tuoi amici e a come sei solito comunicare e rapportarti con loro quanto è importante il cellulare? Indica
quanto ti riconosci nelle seguenti affermazioni
Il cellulare come
«Fuga dalla
solitudine» per il
60% dei 24-35enni
24
25. AMICIZIA E CELLULARE: CHI UTILIZZA EMAIL/IM/SN DAL CELL.
BASE: Totale interviste, popolazione Internet 16-54 anni user cellulare (casi 1.168), user di Email/IM/SN dal cellulare nei 3 mesi precedenti casi 263
Pensando ai tuoi amici e a come sei solito comunicare e rapportarti con loro quanto è importante il cellulare? Indica
quanto ti riconosci nelle seguenti affermazioni
% - Molto + Abbastanza d’accordo
25
26. UTILIZZO DEL CELLULARE CON GLI AMICI
BASE: Totale interviste, popolazione Internet 16-54 anni user cellulare (casi 1.168)
Pensando a come utilizzi abitualmente il cellulare con i tuoi amici, quali sono i 3 principali motivi delle tue telefonate
in una giornata tipo con il cellulare?
26
27. ATTIVITA’ SUI SOCIAL NETWORK DAL CELLULARE
BASE: Visitatori 16-54 anni dei SN dal cellulare nei 3 mesi precedenti (casi 137)
Quali attività hai fatto quando ti sei connesso a siti di socializzazione (es. Facebook, Twitter, MySpace)
dal cellulare negli ultimi 3 mesi?
27
28. Social Network Più Popolari
● TOTALE ● GIOVANI (>25)
● Facebook (61,6%) ● Facebook (90,3%)
● YouTube (60,9%) ● YouTube (89,2%)
● Messenger (50,5%) ● Messenger (89,1%)
● Skype (37,6%) ● MySpace (68,8%)
● MySpace (31,8%) ● Skype (62,9%)
29. Facebook
● Mantenere i contatti con gli amici (70,5%)
● Ritrovare vecchi compagni di scuola ed ex colleghi (57,8%)
● Guardare le bacheche degli amici (41,2%)
● Inviare messaggi personali (40,5%)
● Inserire commenti nelle bacheche degli amici (37,2%)
● Chattare con chi e in linea (35,7%)
● Utilizzare le applicazioni disponibili come test e giochi (24,6%)
● Inserire foto, video o file musicali (21,3%)
30. Fonti
● PEW Internet Project
● Mobile Youth
● Microsoft / Nextplora
● Censis