Social media doesn't drive sales. Or does it?Visible
IBM research around the US thanksgiving holiday suggested social media had a tiny effect on sales. This presentation shows how it does have a commercial effect, but says we are measuring the wrong thing anyway.
These slides are from a short talk I was asked to give about influences on my own aesthetic interests. I chose to talk about storytelling and narrative structure. The slides won't mean much without the talk itself. But there some good nostalgia here.
Shake&Stir presentation for SquareMeal Venues+Events live 2016Dovile Daugelaite
This document provides an overview of a Shake & Stir masterclass that introduces cocktail trends, teaches three sample cocktails (Brambletini, Vanilla Sky, Kixtarter), and discusses Shake & Stir's services including event design, menu design, consultancy, staffing, and masterclasses. Current cocktail trends highlighted include classics with a twist, unusual spirits, premium ingredients, molecular mixology techniques, consistency and speed for events, and sustainability.
The document logs a series of successful connections to a server, messages sent with an InBufferSize of 12 and SvcCommand of 0, and successful reads from the server. This process is repeated over 60 times with identical results each time.
Social media doesn't drive sales. Or does it?Visible
IBM research around the US thanksgiving holiday suggested social media had a tiny effect on sales. This presentation shows how it does have a commercial effect, but says we are measuring the wrong thing anyway.
These slides are from a short talk I was asked to give about influences on my own aesthetic interests. I chose to talk about storytelling and narrative structure. The slides won't mean much without the talk itself. But there some good nostalgia here.
Shake&Stir presentation for SquareMeal Venues+Events live 2016Dovile Daugelaite
This document provides an overview of a Shake & Stir masterclass that introduces cocktail trends, teaches three sample cocktails (Brambletini, Vanilla Sky, Kixtarter), and discusses Shake & Stir's services including event design, menu design, consultancy, staffing, and masterclasses. Current cocktail trends highlighted include classics with a twist, unusual spirits, premium ingredients, molecular mixology techniques, consistency and speed for events, and sustainability.
The document logs a series of successful connections to a server, messages sent with an InBufferSize of 12 and SvcCommand of 0, and successful reads from the server. This process is repeated over 60 times with identical results each time.
School Library Journal Leadership Summit: The Play's The ThingErica Perl
This document outlines a program that uses theater and playwriting to get kids excited about reading and writing. The program has four steps - warming up, learning how to read a play, thinking like an actor, and developing dialogue. It is presented as benefiting students by providing an engaging creative community, benefiting educators by allowing them to try new teaching styles, and benefiting all participants by providing cooperative learning experiences outside their comfort zones.
Capgemini's vision for cybersecurity is to reduce risks from IT use by making prudent choices. Their mission is to deliver convenient, cost-effective cybersecurity services that adapt to clients' changing needs. They focus on identity and access management, which is the cornerstone of effective security. Capgemini uses a strategic approach to balance security, costs, and business needs. Their Identity and Access Management strategy aims to make security processes largely automated and risk-based.
Avaliação escolar e democratização: o direito de errar.Affonso César
O documento discute as práticas de avaliação nas escolas e a necessidade de transformá-las para apoiar a democratização do ensino. Atualmente, a avaliação é usada principalmente para medir o desempenho e punir erros, em vez de apoiar a aprendizagem. É necessário que professores, alunos e pais participem da mudança para uma avaliação que valorize o processo de aprendizagem e o direito de errar.
The Agency's View on Holiday Mobile ShoppingOgilvy
This document discusses mobile shopping trends during the holiday season. It finds that while the majority of holiday purchases still occur in stores, smartphone usage for shopping is increasing. It segments shoppers into five groups based on technology adoption - Innovators, Opinion Leaders, Early Majority, Late Majority, and Laggards. For each group, it lists which mobile technologies and services they commonly use for shopping. The document recommends that retailers aggregate product information across channels, optimize mobile search and location-based targeting, and empower store staff to connect the online and in-store shopping journey.
PuppetCamp Sydney 2012 - Building a Multimaster EnvironmentGreg Cockburn
This document discusses a solution for providing Puppet services globally across multiple regions with poor WAN connectivity. The solution involves building a "Puppeteer" master that acts as a central point of entry for code updates and certificate management. It ensures Puppet masters in each region are in sync. LDAP is used as an external node classifier to provide node definitions across regions. The Puppet file server replicates configuration between masters. F5 load balancers route clients to the nearest master and provide high availability if any master fails. Workflows for adding new servers and masters are also summarized.
Sinpred preservação digital em arquivos - 07 a 09 maio 2014, Prof. Dr. Dani...Daniel Flores
O documento resume os principais pontos sobre preservação digital em arquivos, incluindo: 1) O documento arquivístico digital possui especificidades que podem comprometer sua autenticidade; 2) A preservação digital envolve ações para garantir o acesso contínuo à informação digital a longo prazo; 3) Sistemas de software livre podem ajudar na preservação digital ao promoverem padrões abertos e interoperabilidade.
Onnistunut ketterä hankinta - Codenton aamiaistilaisuus 16.1.2014Otso Kivekäs
Kuinka onnistua tietojärjestelmien hankinnassa?
Esitys myös videona: https://vimeo.com/84859084
Muut seminaarin esitykset: http://www.slideshare.net/codento
Trendoki adalah usaha kuliner dan fashion yang didirikan pada tahun 2015 di Bandung. Perusahaan ini bergerak di bidang kuliner dengan mengembangkan produk dorayaki isi greentea dan soes isi greentea. Visi perusahaan adalah menjadi perusahaan yang memberikan kepuasan dan kenikmatan untuk konsumen dengan produk berkualitas dan cita rasa tinggi.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
School Library Journal Leadership Summit: The Play's The ThingErica Perl
This document outlines a program that uses theater and playwriting to get kids excited about reading and writing. The program has four steps - warming up, learning how to read a play, thinking like an actor, and developing dialogue. It is presented as benefiting students by providing an engaging creative community, benefiting educators by allowing them to try new teaching styles, and benefiting all participants by providing cooperative learning experiences outside their comfort zones.
Capgemini's vision for cybersecurity is to reduce risks from IT use by making prudent choices. Their mission is to deliver convenient, cost-effective cybersecurity services that adapt to clients' changing needs. They focus on identity and access management, which is the cornerstone of effective security. Capgemini uses a strategic approach to balance security, costs, and business needs. Their Identity and Access Management strategy aims to make security processes largely automated and risk-based.
Avaliação escolar e democratização: o direito de errar.Affonso César
O documento discute as práticas de avaliação nas escolas e a necessidade de transformá-las para apoiar a democratização do ensino. Atualmente, a avaliação é usada principalmente para medir o desempenho e punir erros, em vez de apoiar a aprendizagem. É necessário que professores, alunos e pais participem da mudança para uma avaliação que valorize o processo de aprendizagem e o direito de errar.
The Agency's View on Holiday Mobile ShoppingOgilvy
This document discusses mobile shopping trends during the holiday season. It finds that while the majority of holiday purchases still occur in stores, smartphone usage for shopping is increasing. It segments shoppers into five groups based on technology adoption - Innovators, Opinion Leaders, Early Majority, Late Majority, and Laggards. For each group, it lists which mobile technologies and services they commonly use for shopping. The document recommends that retailers aggregate product information across channels, optimize mobile search and location-based targeting, and empower store staff to connect the online and in-store shopping journey.
PuppetCamp Sydney 2012 - Building a Multimaster EnvironmentGreg Cockburn
This document discusses a solution for providing Puppet services globally across multiple regions with poor WAN connectivity. The solution involves building a "Puppeteer" master that acts as a central point of entry for code updates and certificate management. It ensures Puppet masters in each region are in sync. LDAP is used as an external node classifier to provide node definitions across regions. The Puppet file server replicates configuration between masters. F5 load balancers route clients to the nearest master and provide high availability if any master fails. Workflows for adding new servers and masters are also summarized.
Sinpred preservação digital em arquivos - 07 a 09 maio 2014, Prof. Dr. Dani...Daniel Flores
O documento resume os principais pontos sobre preservação digital em arquivos, incluindo: 1) O documento arquivístico digital possui especificidades que podem comprometer sua autenticidade; 2) A preservação digital envolve ações para garantir o acesso contínuo à informação digital a longo prazo; 3) Sistemas de software livre podem ajudar na preservação digital ao promoverem padrões abertos e interoperabilidade.
Onnistunut ketterä hankinta - Codenton aamiaistilaisuus 16.1.2014Otso Kivekäs
Kuinka onnistua tietojärjestelmien hankinnassa?
Esitys myös videona: https://vimeo.com/84859084
Muut seminaarin esitykset: http://www.slideshare.net/codento
Trendoki adalah usaha kuliner dan fashion yang didirikan pada tahun 2015 di Bandung. Perusahaan ini bergerak di bidang kuliner dengan mengembangkan produk dorayaki isi greentea dan soes isi greentea. Visi perusahaan adalah menjadi perusahaan yang memberikan kepuasan dan kenikmatan untuk konsumen dengan produk berkualitas dan cita rasa tinggi.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.