Technology is moving so fast that it’s easy to get bogged down in the technology, facts and figures — gadgets, sensors, data volumes etc etc. This is all interesting, but actually what difference can and will it make?
Big data in healthcare can help improve efficiency and data quality. Currently, healthcare data is collected through many paper forms but must be typed into computers, introducing errors. With big data, patients can directly submit information electronically, avoiding typing errors. This allows data to be analyzed much faster using cloud-based tools with no training. Insights from big data analyses can then be used to improve various aspects of healthcare in just minutes rather than years. Overall, big data has the potential to streamline healthcare data collection and analysis processes.
This document discusses using interactive safety simulations to improve safety culture. It identifies some common risk factors like insufficient knowledge of risks and regulatory requirements. High-risk groups include males, youth, older workers, self-employed, and those with low literacy. Even highly literate workers can be busy and distracted.
The document provides examples of safety simulations used in New Zealand, including ones for fire services procedures, farm safety, and medical training. Research shows safety simulations can increase skill and factual knowledge retention compared to traditional training. Benefits include accessibility, scalability, measurability, and ability to rehearse high-risk situations safely. An evaluation of ACC's "SafeHouse" home safety game pilot found thousands of people voluntarily played
In this presentation we will see why, according to several sources, our work is becoming more and more risk-prone.
Where all sources all agree about causes of this tendency, they also agree on solution: Experimentation.
Experiments can go wrong and therefore our duty is not just "to be agile" but to lower the cost of our experiments failure.
As conclusion we will see three ideas (TrialSourcing, Products management and #NoEstimates movement) all leveraging on experiments to gain organization advantages.
7 years after calling the next wave of disruptive technologies -- social, mobile, analytics, cloud (SMAC) -- I'm prepared to talk about the next wave of disruptive technologies. This represents both the next evolution of SMAC as well as a new set of disruptive technologies that represents that next wave of technology disruption.
[Webinar] Navigating Covid-19: How to effectively equip your employees to wor...Squiz
The rise of Covid-19 has added immense pressure on business leaders to accommodate for team-wide remote working. This sudden shift has led to increased concerns around productivity and subsequent impacts on the way we live and work.
Given organisations with low employee engagement scores experience 18% lower productivity and 16% lower profitability, exploring ways to maintain high engagement is crucial in these unprecedented times. (Source: Gallup)
Squiz has assembled a panel of industry leaders such as Heidi Davidson, Head of P&C, Rotor Studios (Ex-CBA, Ex-Newscorp), Juhi King, HR Technology Expert, and Richard Wells, Digital Comms Manager, Dept of NSW Customer Service to share insights and best practices on keeping remote employees engaged and connected.
In this expert panel, industry leaders will share:
- How to keep employees engaged, connected and collaborating while working remotely.
- Impacts on businesses amidst the Covid-19 pandemic and potential opportunities for the future.
- How to reduce drops in productivity by up to 25% through effectively equipping employees to work remotely.
The Now and Next of Learning and TechnologyDavid Kelly
These slides were used in support of a talk I deliver at conferences and events..
If you're interested in bringing this talk/workshop into your event or organization, please contact me at LnDDave@gmail.com.
Big data in healthcare can help improve efficiency and data quality. Currently, healthcare data is collected through many paper forms but must be typed into computers, introducing errors. With big data, patients can directly submit information electronically, avoiding typing errors. This allows data to be analyzed much faster using cloud-based tools with no training. Insights from big data analyses can then be used to improve various aspects of healthcare in just minutes rather than years. Overall, big data has the potential to streamline healthcare data collection and analysis processes.
This document discusses using interactive safety simulations to improve safety culture. It identifies some common risk factors like insufficient knowledge of risks and regulatory requirements. High-risk groups include males, youth, older workers, self-employed, and those with low literacy. Even highly literate workers can be busy and distracted.
The document provides examples of safety simulations used in New Zealand, including ones for fire services procedures, farm safety, and medical training. Research shows safety simulations can increase skill and factual knowledge retention compared to traditional training. Benefits include accessibility, scalability, measurability, and ability to rehearse high-risk situations safely. An evaluation of ACC's "SafeHouse" home safety game pilot found thousands of people voluntarily played
In this presentation we will see why, according to several sources, our work is becoming more and more risk-prone.
Where all sources all agree about causes of this tendency, they also agree on solution: Experimentation.
Experiments can go wrong and therefore our duty is not just "to be agile" but to lower the cost of our experiments failure.
As conclusion we will see three ideas (TrialSourcing, Products management and #NoEstimates movement) all leveraging on experiments to gain organization advantages.
7 years after calling the next wave of disruptive technologies -- social, mobile, analytics, cloud (SMAC) -- I'm prepared to talk about the next wave of disruptive technologies. This represents both the next evolution of SMAC as well as a new set of disruptive technologies that represents that next wave of technology disruption.
[Webinar] Navigating Covid-19: How to effectively equip your employees to wor...Squiz
The rise of Covid-19 has added immense pressure on business leaders to accommodate for team-wide remote working. This sudden shift has led to increased concerns around productivity and subsequent impacts on the way we live and work.
Given organisations with low employee engagement scores experience 18% lower productivity and 16% lower profitability, exploring ways to maintain high engagement is crucial in these unprecedented times. (Source: Gallup)
Squiz has assembled a panel of industry leaders such as Heidi Davidson, Head of P&C, Rotor Studios (Ex-CBA, Ex-Newscorp), Juhi King, HR Technology Expert, and Richard Wells, Digital Comms Manager, Dept of NSW Customer Service to share insights and best practices on keeping remote employees engaged and connected.
In this expert panel, industry leaders will share:
- How to keep employees engaged, connected and collaborating while working remotely.
- Impacts on businesses amidst the Covid-19 pandemic and potential opportunities for the future.
- How to reduce drops in productivity by up to 25% through effectively equipping employees to work remotely.
The Now and Next of Learning and TechnologyDavid Kelly
These slides were used in support of a talk I deliver at conferences and events..
If you're interested in bringing this talk/workshop into your event or organization, please contact me at LnDDave@gmail.com.
How Technology is Changing the Future of LearningDavid Kelly
The document discusses how technology is disrupting traditional training and changing the future of learning. It outlines how e-learning was the first disruption, and how new technologies like multi-device learning, data analytics, wearable tech, and the internet of things will further transform learning and shift it towards more performance support. The document encourages readers to plug in, listen, discuss, contextualize and play to stay informed on these changes.
Using Permaculture to Cultivate a Sustainable Security ProgramDistil Networks
For centuries mankind’s greatest innovations came about through careful examination of natural systems. Information Security is no different. This presentation will explore how information security professionals can use the agricultural concept of “permaculture” (the practice of using design principles observed in natural ecosystems) to cultivate a sustainable, data-driven security program.
In this fast-paced, thought-provoking session you’ll learn:
- The basic tenets of permaculture and how they apply to information security strategy
- How to build a security program that fosters collaboration, coupled with feedback loops and metrics
- How embracing differences within an organization can lead to increases in productivity and security
- Effective policy and control designs that enhance business objections as opposed to stifling them
The High Cost of Interruptions at WorkTushar Vakil
Modern technology enables constant connectivity and interruptions which research shows reduces productivity. The average office worker only has 11 minutes between interruptions and it takes 25 minutes to refocus on the original task. While half of interruptions are from external sources like notifications, the other half are self-inflicted as our brains seek constant stimulation. To improve focus and productivity, we must design our work environment and habits to limit distractions and exercise control over technology use.
How do we thrive in a world that is constantly changing? Proposed by Joi Ito of the MIT Media Lab, this Ignite from DevOpsDays Austin applies these nine principles for navigating the 21st century.
Dr. Lawrence Ampofo discusses the benefits of focused work in the digital age. Knowledge workers spend one day per week dealing with digital distractions, and people who feel more stress have higher awareness of stressful events in others' lives from technology. When shifting attention between tasks, it takes 20-30 minutes to overcome distraction. Dr. Ampofo advocates for focus training techniques like mindful technologies, deep work, and email batching to decrease distractions and increase productivity, ability to complete complex tasks, and creativity.
Accessible version: http://wearability.org/wearable-future-accessibility.html
This presentation for CSUN 2016 explores the current landscape of wearable devices and how future devices will impact the lives of people with a physical, sensory, and/or cognitive disability.
SCALE12X DevOps Day LA: 9 Principles for Navigating ChangeMatt Ray
"Specialization is for insects." This Robert Heinlein quote is more appropriate than ever, the pace of change continues to accelerate and the standards of today are the relics of tomorrow. How do we thrive in a world that is constantly changing? Proposed by Joi
Ito of the MIT Media Lab, this talk will apply these nine principles for navigating the 21st century.
Open Source, Agile and DevOps are fundamental to adapting to change, managing risk through resiliency, and cultivating a culture of networked improvement. We may not know what the future holds, but we can get ready for it today.
Growing Up Digital: Raising Tech-Savvy KidsPaul McAleer
In this proposed SXSW session, Elysse Zarek and Paul McAleer will discuss how parents can instill positive, healthy tech relationships with their children.
[Click on "Notes" Tab below for my notes to this talk.] From an invited keynote for DigitFest at Penn State Behrend in Erie, 31 MAR 2017.
ABSTRACT: As a field of study, digital humanities is not merely about the application of digital tools and methods to humanistic questions, but also about turning a humanistic lens back onto those very tools and methods. As such, DH offers students and their collaborators -- from the academy to the community -- opportunities to intervene meaningfully in this information-rich, technologically-driven moment. In my talk I will flesh out what "meaningful intervention" has looked like in my context, especially vis-a-vis student research, and offer some thoughts about where this might go from here.
Security Differently - DevSecOps Days Austin 2019Aaron Rinehart
The document discusses the concept of "security differently", which focuses on relying on people's expertise and insights rather than a compliance-based approach to security. It argues that current security practices often view people as the problem rather than the solution. Security differently aims to halt the over-bureaucratization of security work and instead ask people what they need while focusing on competency and common sense. The document also notes that complex systems are inherently difficult to secure and that outages and breaches will continue without rethinking traditional security approaches.
Greg Wilson - We Know (but ignore) More Than We Think#DevTO
This document contains the slides from a presentation on best practices for scientific computing. It discusses several key findings from studies on software engineering practices. Some of the main points summarized are:
- Early studies found that rigorous code inspections can remove 60-90% of errors before testing begins. Later work refined this by finding the first review and hour matter most.
- A classic 1975 study found that most errors are introduced during requirements and design, and errors become more expensive to fix the later they are found.
- More recent studies found that an individual's distance in an organization's structure is a better predictor of software quality than their geographic distance.
EdTech Europe 2014 Innovation Showcase: Smart SparrowEdTech Europe
Dr. Dror Ben-Naim is the founder and CEO of Smart Sparrow, a platform for next generation adaptive courseware. The platform provides interactive and adaptive online content that is controlled by teachers, unlike traditional online content which is static and "one size fits all". Smart Sparrow solves the problem of boring online content by enabling learning through doing with intelligent and adaptive lessons, tutorials, labs and other tools. The platform aims to empower academics and instructional designers to create a new class of courseware.
ADDO - Navigating the DevSecOps App-ocalypse 2020 Aaron Rinehart
The speed and scale of complex system operations within cloud-driven architectures make them extremely difficult for humans to mentally model their behavior. This often results in unpredictable and catastrophic outcomes that become costly when unexpected security incidents occur. There is a need to realign the actual state of operational security measures in order to maintain an acceptable level of confidence that our security actually works when we need it to.
As an alternative to simply reacting to failures, the security industry has been overlooking valuable chances to further understand and nurture ‘accidents’ or ‘mistakes’ as opportunities to proactively strengthen system resilience. Chaos Engineering allows us to proactively expose the failures, build resilient systems, and develop an "Applied Security" model to minimize the impact of failures.
Chaos Engineering allows for security teams to proactively experiment and derive new information about underlying factors that were previously unknown. This is done by developing live fire exercises that can be measured, managed, and automated. Contrary to Red/Purple Team exercises, chaos engineering does not use threat actor or adversarial tactics, techniques and procedures. As far as we know it Chaos Engineering is the only proactive mechanism for detecting availability and security incidents before they happen. We proactively introduce turbulent conditions, faults, and failures into our systems to determine the conditions by which our security will fail before it actually does.
In this session we will introduce a new concept known as Security Chaos Engineering and how it can be applied to create highly secure, performant, and resilient distributed systems.
This document discusses the deliberate undermining of projects, known as project sabotage. It notes that while many factors can contribute to project failure, sabotage is underrecognized. The document outlines research finding high rates of IT project failures and challenges. It argues project managers should acknowledge the potential for non-beneficial project participants and address sabotage by analyzing stakeholders, understanding sabotage motives, and adapting governance strategies rather than solely focusing on structures or incompetence when projects fail. The key message is that project sabotage is real and project management needs to incorporate tools to identify and deal with sabotage, not just technical or human aspects of projects.
IoT Day 2017 Rotterdam - Data and the Self - introductionIskander Smit
As introduction of the theme we choose for the hackathon at this years IoT Day Rotterdam, organised by Creating010, I introduced the theme Data and the Self.
1_Maverick Introduction To Digital Literacy.pdfPaul Woodhead
Learning "Digital Skills for the Workplace" sessions. These are in person workshops in Rochdale, sponsored by RBH and New Pioneers and delivered by No Worries IT Ltd
The document discusses collaborating across disciplines like data science, behavioral science, design, and product management. It provides examples of how machine learning and behavioral insights are used in products to personalize experiences. It advocates bringing these fields together to design using a transdisciplinary approach, with an emphasis on testing hypotheses, designing experiments collaboratively, and defining problems jointly. The document outlines principles for collaborating across teams and designing with human behaviors and limitations in mind.
How Technology is Changing the Future of LearningDavid Kelly
The document discusses how technology is disrupting traditional training and changing the future of learning. It outlines how e-learning was the first disruption, and how new technologies like multi-device learning, data analytics, wearable tech, and the internet of things will further transform learning and shift it towards more performance support. The document encourages readers to plug in, listen, discuss, contextualize and play to stay informed on these changes.
Using Permaculture to Cultivate a Sustainable Security ProgramDistil Networks
For centuries mankind’s greatest innovations came about through careful examination of natural systems. Information Security is no different. This presentation will explore how information security professionals can use the agricultural concept of “permaculture” (the practice of using design principles observed in natural ecosystems) to cultivate a sustainable, data-driven security program.
In this fast-paced, thought-provoking session you’ll learn:
- The basic tenets of permaculture and how they apply to information security strategy
- How to build a security program that fosters collaboration, coupled with feedback loops and metrics
- How embracing differences within an organization can lead to increases in productivity and security
- Effective policy and control designs that enhance business objections as opposed to stifling them
The High Cost of Interruptions at WorkTushar Vakil
Modern technology enables constant connectivity and interruptions which research shows reduces productivity. The average office worker only has 11 minutes between interruptions and it takes 25 minutes to refocus on the original task. While half of interruptions are from external sources like notifications, the other half are self-inflicted as our brains seek constant stimulation. To improve focus and productivity, we must design our work environment and habits to limit distractions and exercise control over technology use.
How do we thrive in a world that is constantly changing? Proposed by Joi Ito of the MIT Media Lab, this Ignite from DevOpsDays Austin applies these nine principles for navigating the 21st century.
Dr. Lawrence Ampofo discusses the benefits of focused work in the digital age. Knowledge workers spend one day per week dealing with digital distractions, and people who feel more stress have higher awareness of stressful events in others' lives from technology. When shifting attention between tasks, it takes 20-30 minutes to overcome distraction. Dr. Ampofo advocates for focus training techniques like mindful technologies, deep work, and email batching to decrease distractions and increase productivity, ability to complete complex tasks, and creativity.
Accessible version: http://wearability.org/wearable-future-accessibility.html
This presentation for CSUN 2016 explores the current landscape of wearable devices and how future devices will impact the lives of people with a physical, sensory, and/or cognitive disability.
SCALE12X DevOps Day LA: 9 Principles for Navigating ChangeMatt Ray
"Specialization is for insects." This Robert Heinlein quote is more appropriate than ever, the pace of change continues to accelerate and the standards of today are the relics of tomorrow. How do we thrive in a world that is constantly changing? Proposed by Joi
Ito of the MIT Media Lab, this talk will apply these nine principles for navigating the 21st century.
Open Source, Agile and DevOps are fundamental to adapting to change, managing risk through resiliency, and cultivating a culture of networked improvement. We may not know what the future holds, but we can get ready for it today.
Growing Up Digital: Raising Tech-Savvy KidsPaul McAleer
In this proposed SXSW session, Elysse Zarek and Paul McAleer will discuss how parents can instill positive, healthy tech relationships with their children.
[Click on "Notes" Tab below for my notes to this talk.] From an invited keynote for DigitFest at Penn State Behrend in Erie, 31 MAR 2017.
ABSTRACT: As a field of study, digital humanities is not merely about the application of digital tools and methods to humanistic questions, but also about turning a humanistic lens back onto those very tools and methods. As such, DH offers students and their collaborators -- from the academy to the community -- opportunities to intervene meaningfully in this information-rich, technologically-driven moment. In my talk I will flesh out what "meaningful intervention" has looked like in my context, especially vis-a-vis student research, and offer some thoughts about where this might go from here.
Security Differently - DevSecOps Days Austin 2019Aaron Rinehart
The document discusses the concept of "security differently", which focuses on relying on people's expertise and insights rather than a compliance-based approach to security. It argues that current security practices often view people as the problem rather than the solution. Security differently aims to halt the over-bureaucratization of security work and instead ask people what they need while focusing on competency and common sense. The document also notes that complex systems are inherently difficult to secure and that outages and breaches will continue without rethinking traditional security approaches.
Greg Wilson - We Know (but ignore) More Than We Think#DevTO
This document contains the slides from a presentation on best practices for scientific computing. It discusses several key findings from studies on software engineering practices. Some of the main points summarized are:
- Early studies found that rigorous code inspections can remove 60-90% of errors before testing begins. Later work refined this by finding the first review and hour matter most.
- A classic 1975 study found that most errors are introduced during requirements and design, and errors become more expensive to fix the later they are found.
- More recent studies found that an individual's distance in an organization's structure is a better predictor of software quality than their geographic distance.
EdTech Europe 2014 Innovation Showcase: Smart SparrowEdTech Europe
Dr. Dror Ben-Naim is the founder and CEO of Smart Sparrow, a platform for next generation adaptive courseware. The platform provides interactive and adaptive online content that is controlled by teachers, unlike traditional online content which is static and "one size fits all". Smart Sparrow solves the problem of boring online content by enabling learning through doing with intelligent and adaptive lessons, tutorials, labs and other tools. The platform aims to empower academics and instructional designers to create a new class of courseware.
ADDO - Navigating the DevSecOps App-ocalypse 2020 Aaron Rinehart
The speed and scale of complex system operations within cloud-driven architectures make them extremely difficult for humans to mentally model their behavior. This often results in unpredictable and catastrophic outcomes that become costly when unexpected security incidents occur. There is a need to realign the actual state of operational security measures in order to maintain an acceptable level of confidence that our security actually works when we need it to.
As an alternative to simply reacting to failures, the security industry has been overlooking valuable chances to further understand and nurture ‘accidents’ or ‘mistakes’ as opportunities to proactively strengthen system resilience. Chaos Engineering allows us to proactively expose the failures, build resilient systems, and develop an "Applied Security" model to minimize the impact of failures.
Chaos Engineering allows for security teams to proactively experiment and derive new information about underlying factors that were previously unknown. This is done by developing live fire exercises that can be measured, managed, and automated. Contrary to Red/Purple Team exercises, chaos engineering does not use threat actor or adversarial tactics, techniques and procedures. As far as we know it Chaos Engineering is the only proactive mechanism for detecting availability and security incidents before they happen. We proactively introduce turbulent conditions, faults, and failures into our systems to determine the conditions by which our security will fail before it actually does.
In this session we will introduce a new concept known as Security Chaos Engineering and how it can be applied to create highly secure, performant, and resilient distributed systems.
This document discusses the deliberate undermining of projects, known as project sabotage. It notes that while many factors can contribute to project failure, sabotage is underrecognized. The document outlines research finding high rates of IT project failures and challenges. It argues project managers should acknowledge the potential for non-beneficial project participants and address sabotage by analyzing stakeholders, understanding sabotage motives, and adapting governance strategies rather than solely focusing on structures or incompetence when projects fail. The key message is that project sabotage is real and project management needs to incorporate tools to identify and deal with sabotage, not just technical or human aspects of projects.
IoT Day 2017 Rotterdam - Data and the Self - introductionIskander Smit
As introduction of the theme we choose for the hackathon at this years IoT Day Rotterdam, organised by Creating010, I introduced the theme Data and the Self.
1_Maverick Introduction To Digital Literacy.pdfPaul Woodhead
Learning "Digital Skills for the Workplace" sessions. These are in person workshops in Rochdale, sponsored by RBH and New Pioneers and delivered by No Worries IT Ltd
The document discusses collaborating across disciplines like data science, behavioral science, design, and product management. It provides examples of how machine learning and behavioral insights are used in products to personalize experiences. It advocates bringing these fields together to design using a transdisciplinary approach, with an emphasis on testing hypotheses, designing experiments collaboratively, and defining problems jointly. The document outlines principles for collaborating across teams and designing with human behaviors and limitations in mind.
Using AI to Solve Data and IT Complexity -- And Better Enable AIDana Gardner
A discussion on how the rising tidal wave of data must be better managed, and how new tools are emerging to bring artificial intelligence to the rescue.
This document provides tips for coming up with business ideas. It discusses identifying problems to solve, problems that may arise in the future, adapting to evolving needs, saving people money, making people's lives easier, gamifying tasks, turning hobbies into businesses, fulfilling needs, and appealing to base emotions. The key ideas are to look for problems, frustrations, and inefficiencies that can be addressed through new products or services. Identifying needs and finding ways to meet them in novel ways are also discussed as strategies for generating business ideas.
Accretive Health - Quality Management in Health CareAccretiveHealth
This document discusses the role of data science and insights in helping businesses and individuals make better decisions. It argues that having large amounts of data alone is not sufficient - what matters more are the insights generated from the data. The document outlines the typical phases of a data science project from asking the right questions to deploying models and iterating. It acknowledges challenges in healthcare data but sees opportunities given the importance and potential impact of using data science in healthcare.
Dolapo Amusat - How to begin to build stuff @ IEEE SPAC, IbadanDolapo Amusat
A presentation delivered by Dolapo Amusat at the IEEE Students Professional Awareness Conference (SPAC) held at the University of Ibadan, Nigeria in January 2018.
Lifelogging - A long term data analytics challengeCathal Gurrin
This document discusses lifelogging, which refers to the process of digitally storing data about all life experiences for future use. It envisions a "digital self" archive that captures a person's total experiences through sensors and creates a record that grows over time. Several challenges around organizing, searching, and analyzing such large datasets are discussed. The progress made in lifelogging research from early concepts to current technologies is reviewed. Potential future opportunities and issues around privacy, data access, and long-term preservation are also examined.
This document summarizes a discussion between Tim O'Reilly and Cory Doctorow on opportunities and challenges in the Internet of Things (IoT). Some key points discussed include:
1) Using IoT technologies to completely rethink industries like healthcare by using sensors and data to improve outcomes.
2) IoT provides opportunities to enhance human abilities and give people "superpowers" through technologies like GPS and augmented reality.
3) IoT enables more efficient ways for people to work together collaboratively through networked physical objects and sensors.
4) Effecting change in the public sector can be challenging due to slow government processes, but progress can be made through markets, litigation, and technologies that "do the right thing
Ways I've Tried to Change the World and FailedSteven Skoczen
The document discusses the author's many failed attempts to change the world through various projects and initiatives. Some of his failed projects include developing software for small non-profits, creating an open-source scientific journal, and founding an intellectual discourse website. For each failure, he lists the reasons they did not work such as not finding product-market fit, issues with scalability, burnout from working long hours, and not properly understanding the target audience. The author acknowledges that changing the world is difficult and failure is to be expected. He provides advice about learning from failures to improve oneself and notes that meaningful change often starts from small committed groups of people.
Collaboration is key to success in data science according to the document. Data science requires collaboration between data scientists and those who understand the business problem to solve. This collaboration helps data scientists learn applied thinking and improves communication. The document also emphasizes that algorithms alone cannot solve problems - the data must contain relevant information, and solid statistical analysis is important. Maintaining a balance between rigor and speed of results is another important skill.
This document provides an overview of a community and directory for all things related to artificial intelligence. It summarizes discussions from various speakers on topics like the future of AI, how AI will impact jobs and business, creativity and art, ethics and privacy, and career opportunities in AI. The document also provides advice on how to prepare for a career in AI through attending events, learning from newsletters and podcasts, getting experience, and networking with people working in the field.
Why is AI so uncomfortable - A therapy sessionKye Andersson
Keynote from Wonderland AI Summit, focusing on why it is so hard to truly embrace AI for leaders, organizations and states. To go beyond using AI simply for a little extra efficiency, and actually dare to let AI give you new insights - which will require you to let go of the old way of doing things, and change.
Artificial Intelligence is back, Deep Learning Networks and Quantum possibili...John Mathon
AI has gone through a number of mini-boom-bust periods. The current one may be short lived as well but I have reasons to think AI is finally making some sustained progress that will see its way into mainstream technology.
Presented at Agile on the Beach (6th September 2012)
Apparently, everyone knows about patterns. Except for the ones that don't. Which is basically all the people who've never come across patterns... plus most of the people who have.
Singleton as a rite of patternhood and a source of excitement. Patterns as the raw materials of blueprint-driven architecture and design by diktat. Patterns as something you don't need to know any more because you've got frameworks, libraries and middleware by the download. Patterns as something you don't need to know because you're building on UML, legacy code or emergent design. All these misconceptions... and more.
In this talk, let's take an alternative tour of patterns, one that is based on improving the habitability of code, communication, exploration, empiricism, reasoning, incremental development, sharing design and bridging rather than barricading different levels of expertise.
Copy of getting into ai event slides (PDF)Matthew Miller
1) The document discusses key principles of AI discussed at a conference: AI should enhance rather than replace humans, be transparent to build trust, and consider social impact.
2) Speakers addressed topics like the future of creativity, business, jobs, and education with AI, and that humans and computers together can better solve problems.
3) To be a data scientist requires skills like asking questions, experimenting, understanding failure, passion for a sector, and enjoying learning.
This document discusses nine drivers of change that are impacting businesses: globalization, molecularization, digitalization, virtualization, internetworking, re-intermediation, immediacy, innovation, and knowledge. It provides examples for each driver and discusses their impact on human resources and information and communications technology. The document advocates for starting change from the top and breaking old rules and ideas before others do so. It also emphasizes the need for companies to adapt and be ready for constant change.
Tessella Consulting provides advice on successfully implementing AI and avoiding common pitfalls. The document discusses defining AI and machine learning, where each is suitable, potential issues to avoid such as focusing only on technology and not expertise, and how Tessella can help with comprehensive consulting, data science, engineering, and operationalizing AI projects from initial strategy through delivery of business value.
Stoso 2014 there you go Presentation From Frans van der ReepHans Kooistra
Presentation given by Frans van der Reep at the STOSO 2014 congress 28 May 2014 "Our Reliance on technology".This presentation in given at the STOSO 2014 congress "Our Reliance on technology". Frans speaks about "technology is freedom and fun" and the possible downside as well like "being framed and zombied"
Architecting a Post Mortem - Velocity 2018 San Jose TutorialWill Gallego
Engineers are frequently tasked with being front and center in intense, highly demanding situations that require clear lines of communication. Our systems fail not because of a lack of attention or laziness but due to cognitive dissonance between what we believe about our environments and the objective interactions both internal and external to them.
It’s time to revisit your established beliefs surrounding failure scenarios, with an emphasis not on the “who” in decision making but instead on the “why” behind those decisions. With attention to growth mindset, you can encourage your teams to reject shallow explanations of human error for said failures and focus on how to gain greater understanding of these complexities and push the boundaries on what you believe to be static, unchanging context outside your sphere of influence.
Will Gallego walks you through the structure of postmortems used at large tech companies with real-world examples of failure scenarios and debunks myths regularly attributed to failures. You’ll learn how to incorporate open dialogue within and between teams to bridge these gaps in understanding.
Similar to You wear it well - Wearable Technology Show 2015, London 11th March 2015 (20)
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
4. And the technology possibilities are still growing…
Got network.
Knows location.
Connects to cloud.
Doesn’t need a phone.
5. But just because you can, should you?
“Engineers like to solve problems. If
there are no problems handily
available, they will create their own
problems.”
Dilbert
6. Start with the user. They’re the most important person.
“Never love anyone who treats
you like you're ordinary.”
Oscar Wilde
7. Translating wearables to an experience — finding a model.
Health
Impact
Wearables
Data
Intervention
8. The three core ingredients of a great wearable experience.
Context Insight
Action
9. Instrument but don’t intrude (or lose).
Weight
Time
Pulse Oximetry
Age
Speed
Cadence
Location
Heart Rate Respiration
Weather
Temperature
Light
Sleep
Context
10. Turn the instrumentation into knowledge and advice.
Sleep badly.
Feel tired.
Eat chocolate.
Feel guilty
Snap at family.
Go for ice cream.
Insight
11. Do things that matter at the time they matter most.
The healthy snack before you binge.
The nap before you snap.
The run that doesn’t pass the chip shop.
The hotel just next to the local gym.
The suggestion just when you’re ordering.
Action
12. We’ve got all the pieces. Now to put them together.
“The future is already here – it's
just not evenly distributed.”
William Gibson