Dissecting the freelancer / client relationship. Walking through common issues and problems that arise and showing how the freelancer can hopefully avoid or minimize them.
Grow your business from a freelancer to an agency. This is a presentation i gave at Wordcamp San Antonio 2015. If you have any questions feel free to contact James Walters at www.ClickandCreate.us
The Top Skills That Can Get You Hired in 2017LinkedIn
We analyzed all the recruiting activity on LinkedIn this year and identified the Top Skills employers seek. Starting Oct 24, learn these skills and much more for free during the Week of Learning.
#AlwaysBeLearning https://learning.linkedin.com/week-of-learning
Do you want to write great User Stories that provide the vehicle for conversation and confirmation that we build the right thing? Do you struggle with splitting stories so that they still provide business value but can be accomplished within a fraction of your iteration? We will do a quick refresher on User Story formatting to include Acceptance Criteria. Additionally we will learn techniques for splitting stories in this interactive workshop.
Grow your business from a freelancer to an agency. This is a presentation i gave at Wordcamp San Antonio 2015. If you have any questions feel free to contact James Walters at www.ClickandCreate.us
The Top Skills That Can Get You Hired in 2017LinkedIn
We analyzed all the recruiting activity on LinkedIn this year and identified the Top Skills employers seek. Starting Oct 24, learn these skills and much more for free during the Week of Learning.
#AlwaysBeLearning https://learning.linkedin.com/week-of-learning
Do you want to write great User Stories that provide the vehicle for conversation and confirmation that we build the right thing? Do you struggle with splitting stories so that they still provide business value but can be accomplished within a fraction of your iteration? We will do a quick refresher on User Story formatting to include Acceptance Criteria. Additionally we will learn techniques for splitting stories in this interactive workshop.
Master the art of the interview process to become the super recruiter in the industry. Sanjoe Tom Jose, CEO, Talview and Shwetha Jain, HR, Wockhardt, speaks about mastering the modernized interview process.
Cloud computing, DevOps, IOT or just connecting the local active directory or {put any LOB system here}: The applications we build are getting more and more distributed. Now guess who's guilty if your application fails, because there was some error outside of your code (even outside of your control influence)? This session is about designing, developing and deploying rock solid applications.
Let's Sharpen Your Agile Ax, It's Story Splitting TimeExcella
This slide deck is from the recent presentation Brian Sjoberg gave at the DC Scrum User Group on August 25, 2016. It is about User Stories and how to split them.
Do you want to write great User Stories (a.k.a. small features that are part of a product) that provide the vehicle for conversation and confirmation that we build the right thing? Do you struggle with splitting stories so that they still provide business value but can be accomplished within a fraction of your iteration and be potentially shippable to production? We will do a quick refresher on User Story formatting to include Acceptance Criteria. Additionally we will learn techniques for splitting stories in this interactive workshop.
Here is a link the meetup - https://www.meetup.com/DC-Scrum/events/232765657/
Does your company need translation management? Here are seven common problems you may encounter when interacting with vendors and some thoughts on how to improve your chances of making a good "buy" decision.
Cloud-Computing, Dev-Ops, IOT, einfach eine Verbindung zum lokalen Active Directory oder {jegliches LOB-System hier einsetzen}: Die Anwendungen, die wir bauen sind mehr und mehr verteilt. Dreimal dürfen Sie raten, wer schuld ist, wenn Ihre Anwendung knallt, obwohl ein Drittsystem, außerhalb Ihres Codes und ihrer Zuständigkeit, nicht erreichbar war. Diese Session behandelt das Design, die Entwicklung und Verteilung von Anwendungen, unter widrigen Bedingungen – Auch bekannt als Realität.
Cloud computing, DevOps, IOT or just connecting the local active directory or {put any LOB system here}: The applications we build are getting more and more distributed. Now guess who's guilty if your application fails, because there was some error outside of your code (even outside of your control influence)? This session is about designing, developing and deploying rock solid applications.
NRWConf, DE: Defensive programming, resilience patterns & antifragilityDaniel Fisher
Cloud computing, DevOps, IOT or just connecting the local active directory or {put any LOB system here}: The applications we build are getting more and more distributed. Now guess who's guilty if your application fails, because there was some error outside of your code (even outside of your control influence)? This session is about designing, developing and deploying rock solid applications.
Freelance software developers can be a project nightmare as there are many inherently associated problems with them. They never tell a true picture about their technical expertise and resources that leads to a low-quality work.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Master the art of the interview process to become the super recruiter in the industry. Sanjoe Tom Jose, CEO, Talview and Shwetha Jain, HR, Wockhardt, speaks about mastering the modernized interview process.
Cloud computing, DevOps, IOT or just connecting the local active directory or {put any LOB system here}: The applications we build are getting more and more distributed. Now guess who's guilty if your application fails, because there was some error outside of your code (even outside of your control influence)? This session is about designing, developing and deploying rock solid applications.
Let's Sharpen Your Agile Ax, It's Story Splitting TimeExcella
This slide deck is from the recent presentation Brian Sjoberg gave at the DC Scrum User Group on August 25, 2016. It is about User Stories and how to split them.
Do you want to write great User Stories (a.k.a. small features that are part of a product) that provide the vehicle for conversation and confirmation that we build the right thing? Do you struggle with splitting stories so that they still provide business value but can be accomplished within a fraction of your iteration and be potentially shippable to production? We will do a quick refresher on User Story formatting to include Acceptance Criteria. Additionally we will learn techniques for splitting stories in this interactive workshop.
Here is a link the meetup - https://www.meetup.com/DC-Scrum/events/232765657/
Does your company need translation management? Here are seven common problems you may encounter when interacting with vendors and some thoughts on how to improve your chances of making a good "buy" decision.
Cloud-Computing, Dev-Ops, IOT, einfach eine Verbindung zum lokalen Active Directory oder {jegliches LOB-System hier einsetzen}: Die Anwendungen, die wir bauen sind mehr und mehr verteilt. Dreimal dürfen Sie raten, wer schuld ist, wenn Ihre Anwendung knallt, obwohl ein Drittsystem, außerhalb Ihres Codes und ihrer Zuständigkeit, nicht erreichbar war. Diese Session behandelt das Design, die Entwicklung und Verteilung von Anwendungen, unter widrigen Bedingungen – Auch bekannt als Realität.
Cloud computing, DevOps, IOT or just connecting the local active directory or {put any LOB system here}: The applications we build are getting more and more distributed. Now guess who's guilty if your application fails, because there was some error outside of your code (even outside of your control influence)? This session is about designing, developing and deploying rock solid applications.
NRWConf, DE: Defensive programming, resilience patterns & antifragilityDaniel Fisher
Cloud computing, DevOps, IOT or just connecting the local active directory or {put any LOB system here}: The applications we build are getting more and more distributed. Now guess who's guilty if your application fails, because there was some error outside of your code (even outside of your control influence)? This session is about designing, developing and deploying rock solid applications.
Freelance software developers can be a project nightmare as there are many inherently associated problems with them. They never tell a true picture about their technical expertise and resources that leads to a low-quality work.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.