Submit Search
Upload
Open source: can you ignore it?
•
Download as ODP, PDF
•
18 likes
•
2,763 views
CS, NcState
Follow
Tim Menzies
Read less
Read more
Technology
Report
Share
Report
Share
1 of 43
Download now
Recommended
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet. The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialisation of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L14 From the Internet to Blockchain
L14 From the Internet to Blockchain
Ólafur Andri Ragnarsson
Did you know that the term "Computer" once meant a profession? And what did people or computers actually do? They computed mathematical problems. Some problems were tedious and error prone. And it is not surprising that people started to develop machines to aid in the effort. The first mechanical computers were actually created to get rid of errors in human computation. Then came tabulating machines and cash registers. It was not until telephone companies were well established that computing machines became practical. First computers were huge mainframes, but soon minicomputers like DEC’s PDP started to appear. The transistor was introduced in 1947, but its usefulness was not truly realized until in 1958 when the integrated circuit was invented. This led to the invention of the microprocessor. Intel, in 1971, marketed the 4004 – and the personal computer revolution started. One of the first Personal Computers was MITS’ Altair. This was a simple device and soon others saw the opportunities. In this lecture we start our coverage of computing and look at some of the early machines and the impact they had.
L13 The Rise of the Machine
L13 The Rise of the Machine
Ólafur Andri Ragnarsson
After the computing industry got started, a new problem quickly emerged. How do you operate this machines and how to you program them. The development of operating systems was relatively slow compared to the advances in hardware. First system were primitive but slowly got better as demand for computing power increased. The ideas of the Graphical User Interfaces or GUI (Gooey) go back to Doug Engelbarts Demo of the Century. However, this did not have much impact on the computer industry. One company though, Xerox, a photocopy company explored these ideas with Palo Alto Park. Steve Jobs of Apple and Bill Gates of Microsoft took notice and Apple introduced first Apple Lisa and the Macintosh. In this lecture on we look so lessons for the development of software, and see how our business theories apply. In this lecture on we look so lessons for the development of algorithms or software, and see how our business theories apply. In the second part we look at where software is going, namely Artificial Intelligence. Resent developments in AI are causing an AI boom and new AI application are coming all the time. We look at machine learning and deep learning to get an understanding of the current trends.
L17 Algorithms and AI
L17 Algorithms and AI
Ólafur Andri Ragnarsson
The normal interaction with computers is with keyboard and a mouse. For display a rectangular somewhat small screen is used with 2D windowing systems. The mouse was invented more the 40 years ago and has been for 20 years dominant input. Now we are seeing new types of input devices. Multi-touch adds new dimensions and new applications. Natural user interfaces or gesture interfaces where people point to drag objects. Computers are also beginning to recognize facial expressions of people, so it knows if you are smiling. Voice and natural language understanding is getting to a usable stage. All this calls all types of new applications. Displays are getting bigger. What if any surface was a screen? If you could spray the wall with screen? Or have you phone project images to the wall. This lectures explores some of these new types of interactions with computers and software. It makes the old mouse look old.
L15 Augmented and Virtual Reality
L15 Augmented and Virtual Reality
Ólafur Andri Ragnarsson
After the computing industry got started, a new problem quickly emerged. How do you operate this machines and how to you program them. The development of operating systems was relatively slow compared to the advances in hardware. First system were primitive but slowly got better as demand for computing power incresed. The ideas of the Graphical User Interfaces or GUI (Gooey) go back to Doug Engelbarts Demo of the Century. However, this did not have much impact on the computer industry. One company though, Xerox, a photocopy company explored these ideas with Palo Alto Park. Steve Jobs of Apple and Bill Gates of Microsoft took notice and Apple introduced first Apple Lisa and the Macintosh. In this lecture on we look so lessons for the development of software, and see how our business theories apply. In this lecture on we look so lessons for the development of software, and see how our business theories apply. In the second part we look at where software is going, namely Artifical Intelligence. Resent developmens in AI are causing an AI boom and new AI application are coming all the time. We look at machine learning and deep learning to get an understanding of the current trends.
L14 Software and AI
L14 Software and AI
Ólafur Andri Ragnarsson
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L16 A World Wide Network
L16 A World Wide Network
Ólafur Andri Ragnarsson
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet. The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L16 A Worldwide Network
L16 A Worldwide Network
Ólafur Andri Ragnarsson
At any given time, with all the knowledge we have, new knowledge can emerge. We call this the adjacent possible. It explains why new inventions are invented when they are, and why they are not possible before. Adjacent possible is a very useful term to understand the progress of technology. Technology evolves by using prevailing technologies to improve upon. Thus technology is combinatorial and built in layers. With each layer new ideas can be built upon the previous layers. Thus Gall´s Law says that any complex system that works is built of simpler systems that work. We will look at the adjacent possible and some ideas that came when all the enabling technologies are available. We also look at an idea that was not possible to build at the time, Charles Babbage engines.
L04 Adjacent Possible
L04 Adjacent Possible
Ólafur Andri Ragnarsson
Recommended
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet. The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialisation of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L14 From the Internet to Blockchain
L14 From the Internet to Blockchain
Ólafur Andri Ragnarsson
Did you know that the term "Computer" once meant a profession? And what did people or computers actually do? They computed mathematical problems. Some problems were tedious and error prone. And it is not surprising that people started to develop machines to aid in the effort. The first mechanical computers were actually created to get rid of errors in human computation. Then came tabulating machines and cash registers. It was not until telephone companies were well established that computing machines became practical. First computers were huge mainframes, but soon minicomputers like DEC’s PDP started to appear. The transistor was introduced in 1947, but its usefulness was not truly realized until in 1958 when the integrated circuit was invented. This led to the invention of the microprocessor. Intel, in 1971, marketed the 4004 – and the personal computer revolution started. One of the first Personal Computers was MITS’ Altair. This was a simple device and soon others saw the opportunities. In this lecture we start our coverage of computing and look at some of the early machines and the impact they had.
L13 The Rise of the Machine
L13 The Rise of the Machine
Ólafur Andri Ragnarsson
After the computing industry got started, a new problem quickly emerged. How do you operate this machines and how to you program them. The development of operating systems was relatively slow compared to the advances in hardware. First system were primitive but slowly got better as demand for computing power increased. The ideas of the Graphical User Interfaces or GUI (Gooey) go back to Doug Engelbarts Demo of the Century. However, this did not have much impact on the computer industry. One company though, Xerox, a photocopy company explored these ideas with Palo Alto Park. Steve Jobs of Apple and Bill Gates of Microsoft took notice and Apple introduced first Apple Lisa and the Macintosh. In this lecture on we look so lessons for the development of software, and see how our business theories apply. In this lecture on we look so lessons for the development of algorithms or software, and see how our business theories apply. In the second part we look at where software is going, namely Artificial Intelligence. Resent developments in AI are causing an AI boom and new AI application are coming all the time. We look at machine learning and deep learning to get an understanding of the current trends.
L17 Algorithms and AI
L17 Algorithms and AI
Ólafur Andri Ragnarsson
The normal interaction with computers is with keyboard and a mouse. For display a rectangular somewhat small screen is used with 2D windowing systems. The mouse was invented more the 40 years ago and has been for 20 years dominant input. Now we are seeing new types of input devices. Multi-touch adds new dimensions and new applications. Natural user interfaces or gesture interfaces where people point to drag objects. Computers are also beginning to recognize facial expressions of people, so it knows if you are smiling. Voice and natural language understanding is getting to a usable stage. All this calls all types of new applications. Displays are getting bigger. What if any surface was a screen? If you could spray the wall with screen? Or have you phone project images to the wall. This lectures explores some of these new types of interactions with computers and software. It makes the old mouse look old.
L15 Augmented and Virtual Reality
L15 Augmented and Virtual Reality
Ólafur Andri Ragnarsson
After the computing industry got started, a new problem quickly emerged. How do you operate this machines and how to you program them. The development of operating systems was relatively slow compared to the advances in hardware. First system were primitive but slowly got better as demand for computing power incresed. The ideas of the Graphical User Interfaces or GUI (Gooey) go back to Doug Engelbarts Demo of the Century. However, this did not have much impact on the computer industry. One company though, Xerox, a photocopy company explored these ideas with Palo Alto Park. Steve Jobs of Apple and Bill Gates of Microsoft took notice and Apple introduced first Apple Lisa and the Macintosh. In this lecture on we look so lessons for the development of software, and see how our business theories apply. In this lecture on we look so lessons for the development of software, and see how our business theories apply. In the second part we look at where software is going, namely Artifical Intelligence. Resent developmens in AI are causing an AI boom and new AI application are coming all the time. We look at machine learning and deep learning to get an understanding of the current trends.
L14 Software and AI
L14 Software and AI
Ólafur Andri Ragnarsson
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L16 A World Wide Network
L16 A World Wide Network
Ólafur Andri Ragnarsson
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet. The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L16 A Worldwide Network
L16 A Worldwide Network
Ólafur Andri Ragnarsson
At any given time, with all the knowledge we have, new knowledge can emerge. We call this the adjacent possible. It explains why new inventions are invented when they are, and why they are not possible before. Adjacent possible is a very useful term to understand the progress of technology. Technology evolves by using prevailing technologies to improve upon. Thus technology is combinatorial and built in layers. With each layer new ideas can be built upon the previous layers. Thus Gall´s Law says that any complex system that works is built of simpler systems that work. We will look at the adjacent possible and some ideas that came when all the enabling technologies are available. We also look at an idea that was not possible to build at the time, Charles Babbage engines.
L04 Adjacent Possible
L04 Adjacent Possible
Ólafur Andri Ragnarsson
Polinter03
Polinter03
Jeffrey Hart
In the early days of product development, the technology is inferior and lacking in performance. The focus is very much on the technology itself. The users are enthusiast who like the idea of the product, find use for it, and except the lack of performance. Then as the product becomes more mature, other factors become important, such as price, design, features, portability. The product moves from being a technology to become a consumer item, and even a community. In this lecture we explore the change from technology focus to consumer focus, and look at why people stand in line overnight to buy the latest gadgets.
L07 Becoming Invisible
L07 Becoming Invisible
Ólafur Andri Ragnarsson
Artificial Intelligence and open source are intimately related. In this talk, we explain how AI exists because of open source, and open source exists because of AI.
Artificial intelligence and open source
Artificial intelligence and open source
Carlos Toxtli
Slides on the New Technology Summer 2020 Course. Contains information about the content and requirements.
New Technology Summer 2020 Course Introduction
New Technology Summer 2020 Course Introduction
Ólafur Andri Ragnarsson
Did you know that the term "Computer" once meant a profession? And what did people or computers actually do? They computed mathematical problems. Some problems were tedious and error prone. And it is not surprising that people started to develop machines to aid in the effort. The first mechanical computers were actually created to get rid of errors in human computation. Then came tabulating machines and cash registers. It was not until telephone companies were well established that computing machines became practical. First computers were huge mainframes, but soon minicomputers like DEC’s PDP started to appear. The transistor was introduced in 1947, but its usefulness was not truly realized until in 1958 when the integrated circuit was invented. This led to the invention of the microprocessor. Intel, in 1971, marketed the 4004 – and the personal computer revolution started. One of the first Personal Computers was MITS’ Altair. This was a simple device and soon others saw the opportunities. In this lecture we start our coverage of computing and look at some of the early machines and the impact they had.
L13 The Rise of the Machine
L13 The Rise of the Machine
Ólafur Andri Ragnarsson
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet. The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L14 From the Internet to Blockchain
L14 From the Internet to Blockchain
Ólafur Andri Ragnarsson
The ideas for cellular phones were developed in the 1940s. However, it was not until the microprocessor becomes available that practical commercial solutions are possible. Today there are more than 4.7 billion unique mobile phone subscriptions in the world and of them about 2 billion are smartphones. This device is so powerful that people check it over 40 times a day. In this lecture we look mobile. We also look at the history of communication since the telegraph and how the mobile market developed in the 80s and 90s until the iPhone was released in 2007. That same year Western Union stopped sending telegraph messages.
L17 The Mobile Revolution
L17 The Mobile Revolution
Ólafur Andri Ragnarsson
At any given moment it is easy to look back to see how technology has changed over time. At the same time it is difficult to see what transformations are taking place in current moment, and even more difficult to see where things are going. We will explore what technology is. For us it may be the latest tech stuff we see, something new. But what about everyday objects that we take for granted. Are those not technologies also? How does technology evolve and where did it come from? We look at some ideas on evolution of technology and how it is similar to biology in some ways. We will also look at the origin of the word technology. Finally we will define the term we will use in the course. Terms defined are technology, product performance, and innovation to name few.
New Technology 2019 L01 Introduction
New Technology 2019 L01 Introduction
Ólafur Andri Ragnarsson
The ideas for cellular phones were developed in the 1940s. However, it was not until the microprocessor becomes available that practical commercial solutions are possible. Today there are more than 5 billion unique mobile phone subscriptions in the world and of them about 2.5 billion are smartphones. This device is so powerful that people check it over 40 times a day. In this lecture we look mobile. We also look at the history of communication since the telegraph and how the mobile market developed in the 80s and 90s until the iPhone was released in 2007. That same year Western Union stopped sending telegraph messages.
L14 The Mobile Revolution
L14 The Mobile Revolution
Ólafur Andri Ragnarsson
History has many examples of great innovators who had difficult time convincing their contemporaries of new technology. Even incumbent and powerful companies regarded new technologies as inferior and dismissed it as "toys". Then when disruptive technologies take off they often are overhyped and can cause bubbles like the Internet bubble of the late 1990s. In this lecture we look at some examples of disruptive technologies and the impact they had. We look at the The Disruptive Innovation Theory by Harvard Professor Clayton Christensen.
L09 Disruptive Technology
L09 Disruptive Technology
Ólafur Andri Ragnarsson
We humans are ingenious groups in this world. Right from the moment when someone rubbed two stones to light a fire, or bashed a rock to make the first tool, to the development of Internet and Mars rovers, we have already made some revolutionary advancements in several areas of science and technology. Beginning from a nail or a wheel to compass and to millions of new things that were never seen or felt before is a pure magic with their ability to improve the quality of life and advancement in human lives. Let us look at the top 10 greatest modern inventions.
Top 10-recent-invention-of-science-without-video
Top 10-recent-invention-of-science-without-video
msnsela
At any given time, with all the knowledge we have, new knowledge can emerge. We call this the adjacent possible. It explains why new inventions are invented when they are, and why they are not possible before. Adjacent possible is a very useful term to understand the progress of technology. Technology evolves by using prevailing technologies to improve upon. Thus technology is combinatorial and built in layers. With each layer new ideas can be built upon the previous layers. Thus Gall´s Law says that any complex system that works is built of simpler systems that work. We will look at the adjacent possible and some ideas that came when all the enabling technologies are available. We also look at an idea that was not possible to build at the time, Charles Babbage engines.
L04 Adjacent Possible
L04 Adjacent Possible
Ólafur Andri Ragnarsson
Did you know that the term "Computer" once meant a profession? And what did people or computers actually do? They computed mathematical problems. Some problems were tedious and error prone. And it is not surprising that people started to develop machines to aid in the effort. The first mechanical computers were actually created to get rid of errors in human computation. Then came tabulating machines and cash registers. It was not until telephone companies were well established that computing machines became practical. First computers were huge mainframes, but soon minicomputers like DEC’s PDP started to appear. The transistor was introduced in 1947, but its usefulness was not truly realized until in 1958 when the integrated circuit was invented. This led to the invention of the microprocessor. Intel, in 1971, marketed the 4004 – and the personal computer revolution started. One of the first Personal Computers was MITS’ Altair. This was a simple device and soon others saw the opportunities. In this lecture we start our coverage of computing and look at some of the early machines and the impact they had.
L13 The Rise of the Machine
L13 The Rise of the Machine
Ólafur Andri Ragnarsson
History has many examples of great innovators who had difficult time convincing their contemporaries of new technology. Even incumbent and powerful companies regarded new technologies as inferior and dismissed it as "toys". Then when disruptive technologies take off they often are overhyped and can cause bubbles like the Internet bubble of the late 1990s. In this lecture we look at some examples of disruptive technologies and the impact they had. We look at the The Disruptive Innovation Theory by Harvard Professor Clayton Christensen.
L08 Disruptive Technology
L08 Disruptive Technology
Ólafur Andri Ragnarsson
The ideas for cellular phones were developed in the 1940s. However, it was not until the microprocessor becomes available that practical commercial solutions are possible. Today there are more than 4.7 billion unique mobile phone subscriptions in the world and of them about 2 billion are smartphones. This device is so powerful that people check it over 40 times a day. In this lecture we look mobile. We also look at the history of communication since the telegraph and how the moble market developed in the 80s and 90s until the iPhone was released in 2007. That same year Western Union stopped sending telegraph messages.
L18 The Mobile Revolution
L18 The Mobile Revolution
Ólafur Andri Ragnarsson
Utsav-2011 Biz-Tech Prelims
Utsav-2011 Biz-Tech Prelims
quizzinebmsquizclub
Sentia 2012 IT Quiz Prelims
Sentia 2012 IT Quiz Prelims
Oliver Zico Mendes
This deck provides an overview of the history of Silicon Valley, mainly as it pertains to the high-tech sector. There are also a few slides on SAP in Silicon Valley, as the company has a big presence in Palo Alto and is very involved in the local community.
A History of Silicon Valley
A History of Silicon Valley
Christine Johnson
Sentia 2012 IT Quiz Finals
Sentia 2012 IT Quiz Finals
Oliver Zico Mendes
At any given moment it is easy to look back to see how technology has changed over time. At the same time it is difficult to see what transformations are taking place in current moment, and even more difficult to see where things are going. We will explore what technology is. For us it may be the latest tech stuff we see, something new. But what about everyday objects that we take for granted. Are those not technologies also? How does technology evolve and where did it come from? We look at some ideas on evolution of technology and how it is similar to biology in some ways. We will also look at the origin of the word technology. Finally we will define the term we will use in the course. Terms defined are technology, product performance, and innovation to name few.
New Technology 2018 Lecture L01 Introduction
New Technology 2018 Lecture L01 Introduction
Ólafur Andri Ragnarsson
Os revolution reaction paper
Os revolution reaction paper
Marklin
Week 6 cyberpolitics
Week 6 cyberpolitics
oiwan
More Related Content
What's hot
Polinter03
Polinter03
Jeffrey Hart
In the early days of product development, the technology is inferior and lacking in performance. The focus is very much on the technology itself. The users are enthusiast who like the idea of the product, find use for it, and except the lack of performance. Then as the product becomes more mature, other factors become important, such as price, design, features, portability. The product moves from being a technology to become a consumer item, and even a community. In this lecture we explore the change from technology focus to consumer focus, and look at why people stand in line overnight to buy the latest gadgets.
L07 Becoming Invisible
L07 Becoming Invisible
Ólafur Andri Ragnarsson
Artificial Intelligence and open source are intimately related. In this talk, we explain how AI exists because of open source, and open source exists because of AI.
Artificial intelligence and open source
Artificial intelligence and open source
Carlos Toxtli
Slides on the New Technology Summer 2020 Course. Contains information about the content and requirements.
New Technology Summer 2020 Course Introduction
New Technology Summer 2020 Course Introduction
Ólafur Andri Ragnarsson
Did you know that the term "Computer" once meant a profession? And what did people or computers actually do? They computed mathematical problems. Some problems were tedious and error prone. And it is not surprising that people started to develop machines to aid in the effort. The first mechanical computers were actually created to get rid of errors in human computation. Then came tabulating machines and cash registers. It was not until telephone companies were well established that computing machines became practical. First computers were huge mainframes, but soon minicomputers like DEC’s PDP started to appear. The transistor was introduced in 1947, but its usefulness was not truly realized until in 1958 when the integrated circuit was invented. This led to the invention of the microprocessor. Intel, in 1971, marketed the 4004 – and the personal computer revolution started. One of the first Personal Computers was MITS’ Altair. This was a simple device and soon others saw the opportunities. In this lecture we start our coverage of computing and look at some of the early machines and the impact they had.
L13 The Rise of the Machine
L13 The Rise of the Machine
Ólafur Andri Ragnarsson
The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet. The Internet grew out of US efforts to build the ARPANET, a network of peer computers built during the cold war. The two major players were military and academia. The network was simple and required no efforts for security or social responsibility. The early Internet community was mainly highly educated and respectable scientist. In the early 1990s the World Wide Web, a hypertext system is introduced, and soon browsers start to appear, leading the commercialization of Net. New businesses emerge and a technology boom known as the dot-com era. The network, now over 40, is being stretched. Problems such as spam, viruses, antisocial behaviour, and demands for more content are prompting reinvention of the Net and threatening its neutrality. Add to this government efforts to regulate and limit the network. In this lecture we look at the Internet and the impact of the network. We will also look at the future of the Internet.
L14 From the Internet to Blockchain
L14 From the Internet to Blockchain
Ólafur Andri Ragnarsson
The ideas for cellular phones were developed in the 1940s. However, it was not until the microprocessor becomes available that practical commercial solutions are possible. Today there are more than 4.7 billion unique mobile phone subscriptions in the world and of them about 2 billion are smartphones. This device is so powerful that people check it over 40 times a day. In this lecture we look mobile. We also look at the history of communication since the telegraph and how the mobile market developed in the 80s and 90s until the iPhone was released in 2007. That same year Western Union stopped sending telegraph messages.
L17 The Mobile Revolution
L17 The Mobile Revolution
Ólafur Andri Ragnarsson
At any given moment it is easy to look back to see how technology has changed over time. At the same time it is difficult to see what transformations are taking place in current moment, and even more difficult to see where things are going. We will explore what technology is. For us it may be the latest tech stuff we see, something new. But what about everyday objects that we take for granted. Are those not technologies also? How does technology evolve and where did it come from? We look at some ideas on evolution of technology and how it is similar to biology in some ways. We will also look at the origin of the word technology. Finally we will define the term we will use in the course. Terms defined are technology, product performance, and innovation to name few.
New Technology 2019 L01 Introduction
New Technology 2019 L01 Introduction
Ólafur Andri Ragnarsson
The ideas for cellular phones were developed in the 1940s. However, it was not until the microprocessor becomes available that practical commercial solutions are possible. Today there are more than 5 billion unique mobile phone subscriptions in the world and of them about 2.5 billion are smartphones. This device is so powerful that people check it over 40 times a day. In this lecture we look mobile. We also look at the history of communication since the telegraph and how the mobile market developed in the 80s and 90s until the iPhone was released in 2007. That same year Western Union stopped sending telegraph messages.
L14 The Mobile Revolution
L14 The Mobile Revolution
Ólafur Andri Ragnarsson
History has many examples of great innovators who had difficult time convincing their contemporaries of new technology. Even incumbent and powerful companies regarded new technologies as inferior and dismissed it as "toys". Then when disruptive technologies take off they often are overhyped and can cause bubbles like the Internet bubble of the late 1990s. In this lecture we look at some examples of disruptive technologies and the impact they had. We look at the The Disruptive Innovation Theory by Harvard Professor Clayton Christensen.
L09 Disruptive Technology
L09 Disruptive Technology
Ólafur Andri Ragnarsson
We humans are ingenious groups in this world. Right from the moment when someone rubbed two stones to light a fire, or bashed a rock to make the first tool, to the development of Internet and Mars rovers, we have already made some revolutionary advancements in several areas of science and technology. Beginning from a nail or a wheel to compass and to millions of new things that were never seen or felt before is a pure magic with their ability to improve the quality of life and advancement in human lives. Let us look at the top 10 greatest modern inventions.
Top 10-recent-invention-of-science-without-video
Top 10-recent-invention-of-science-without-video
msnsela
At any given time, with all the knowledge we have, new knowledge can emerge. We call this the adjacent possible. It explains why new inventions are invented when they are, and why they are not possible before. Adjacent possible is a very useful term to understand the progress of technology. Technology evolves by using prevailing technologies to improve upon. Thus technology is combinatorial and built in layers. With each layer new ideas can be built upon the previous layers. Thus Gall´s Law says that any complex system that works is built of simpler systems that work. We will look at the adjacent possible and some ideas that came when all the enabling technologies are available. We also look at an idea that was not possible to build at the time, Charles Babbage engines.
L04 Adjacent Possible
L04 Adjacent Possible
Ólafur Andri Ragnarsson
Did you know that the term "Computer" once meant a profession? And what did people or computers actually do? They computed mathematical problems. Some problems were tedious and error prone. And it is not surprising that people started to develop machines to aid in the effort. The first mechanical computers were actually created to get rid of errors in human computation. Then came tabulating machines and cash registers. It was not until telephone companies were well established that computing machines became practical. First computers were huge mainframes, but soon minicomputers like DEC’s PDP started to appear. The transistor was introduced in 1947, but its usefulness was not truly realized until in 1958 when the integrated circuit was invented. This led to the invention of the microprocessor. Intel, in 1971, marketed the 4004 – and the personal computer revolution started. One of the first Personal Computers was MITS’ Altair. This was a simple device and soon others saw the opportunities. In this lecture we start our coverage of computing and look at some of the early machines and the impact they had.
L13 The Rise of the Machine
L13 The Rise of the Machine
Ólafur Andri Ragnarsson
History has many examples of great innovators who had difficult time convincing their contemporaries of new technology. Even incumbent and powerful companies regarded new technologies as inferior and dismissed it as "toys". Then when disruptive technologies take off they often are overhyped and can cause bubbles like the Internet bubble of the late 1990s. In this lecture we look at some examples of disruptive technologies and the impact they had. We look at the The Disruptive Innovation Theory by Harvard Professor Clayton Christensen.
L08 Disruptive Technology
L08 Disruptive Technology
Ólafur Andri Ragnarsson
The ideas for cellular phones were developed in the 1940s. However, it was not until the microprocessor becomes available that practical commercial solutions are possible. Today there are more than 4.7 billion unique mobile phone subscriptions in the world and of them about 2 billion are smartphones. This device is so powerful that people check it over 40 times a day. In this lecture we look mobile. We also look at the history of communication since the telegraph and how the moble market developed in the 80s and 90s until the iPhone was released in 2007. That same year Western Union stopped sending telegraph messages.
L18 The Mobile Revolution
L18 The Mobile Revolution
Ólafur Andri Ragnarsson
Utsav-2011 Biz-Tech Prelims
Utsav-2011 Biz-Tech Prelims
quizzinebmsquizclub
Sentia 2012 IT Quiz Prelims
Sentia 2012 IT Quiz Prelims
Oliver Zico Mendes
This deck provides an overview of the history of Silicon Valley, mainly as it pertains to the high-tech sector. There are also a few slides on SAP in Silicon Valley, as the company has a big presence in Palo Alto and is very involved in the local community.
A History of Silicon Valley
A History of Silicon Valley
Christine Johnson
Sentia 2012 IT Quiz Finals
Sentia 2012 IT Quiz Finals
Oliver Zico Mendes
At any given moment it is easy to look back to see how technology has changed over time. At the same time it is difficult to see what transformations are taking place in current moment, and even more difficult to see where things are going. We will explore what technology is. For us it may be the latest tech stuff we see, something new. But what about everyday objects that we take for granted. Are those not technologies also? How does technology evolve and where did it come from? We look at some ideas on evolution of technology and how it is similar to biology in some ways. We will also look at the origin of the word technology. Finally we will define the term we will use in the course. Terms defined are technology, product performance, and innovation to name few.
New Technology 2018 Lecture L01 Introduction
New Technology 2018 Lecture L01 Introduction
Ólafur Andri Ragnarsson
What's hot
(20)
Polinter03
Polinter03
L07 Becoming Invisible
L07 Becoming Invisible
Artificial intelligence and open source
Artificial intelligence and open source
New Technology Summer 2020 Course Introduction
New Technology Summer 2020 Course Introduction
L13 The Rise of the Machine
L13 The Rise of the Machine
L14 From the Internet to Blockchain
L14 From the Internet to Blockchain
L17 The Mobile Revolution
L17 The Mobile Revolution
New Technology 2019 L01 Introduction
New Technology 2019 L01 Introduction
L14 The Mobile Revolution
L14 The Mobile Revolution
L09 Disruptive Technology
L09 Disruptive Technology
Top 10-recent-invention-of-science-without-video
Top 10-recent-invention-of-science-without-video
L04 Adjacent Possible
L04 Adjacent Possible
L13 The Rise of the Machine
L13 The Rise of the Machine
L08 Disruptive Technology
L08 Disruptive Technology
L18 The Mobile Revolution
L18 The Mobile Revolution
Utsav-2011 Biz-Tech Prelims
Utsav-2011 Biz-Tech Prelims
Sentia 2012 IT Quiz Prelims
Sentia 2012 IT Quiz Prelims
A History of Silicon Valley
A History of Silicon Valley
Sentia 2012 IT Quiz Finals
Sentia 2012 IT Quiz Finals
New Technology 2018 Lecture L01 Introduction
New Technology 2018 Lecture L01 Introduction
Similar to Open source: can you ignore it?
Os revolution reaction paper
Os revolution reaction paper
Marklin
Week 6 cyberpolitics
Week 6 cyberpolitics
oiwan
Linksvayer, M. (2009, July 28). Panel on Open Source, The Commons as a collective intelligence meta-innovation. Retrieved Retrieved May 7, 2010, from http://slidesha.re/9ZXtHl.
Cc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_source
William Kraemer, MIT, MPS
Slides to support a talk to the "History of Ideas Group".
The Open Source Movement
The Open Source Movement
Howard Berry
Presentation at Week 6 GPA1035, Chinese University Hong Kong
Free Software Movement and Open Source Communities
Free Software Movement and Open Source Communities
Haggen So
Presentation for Make Open Source Software 2015 (http://mossconf.ro) talking about a little history in open source and how open source some very interesting projects at the edge of open source.
Open Source - the Big Picture
Open Source - the Big Picture
Lucian Ghinda
Blogged at http://gondwanaland.com/mlog/2009/08/01/singularityu/
Singularity University Open Source Panel
Singularity University Open Source Panel
Mike Linksvayer
OpenSource introduction to how to become an IT professional.
OpenSource
OpenSource
Adeyemi Fowe
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
Mike Linksvayer
Gives awareness about free software. by Vaibhav Gupta.
Free Software Introduction
Free Software Introduction
shirish agarwal
This presentation originally developed as part of FOSSSL 2006 (FOSSMil), was recently slightly updated and delivered at CERT SL Conference. In my talk, I discuss why FOSS is generally considered to be more secure than proprietary software.
FOSS and Security
FOSS and Security
Bud Siddhisena
The assertion "Information wants to be free" is a peculiar expression of desire on the part of an abstraction. This essay distinguishes between software and information and argues that a claim that may apply to software is applied unthinkingly to "information".
The Myth of Free Information
The Myth of Free Information
Kamesh Aiyer
Free Software and Free Music
Free Software And Free Music
Free Software And Free Music
Kletskous
Open source an origin story to freedom covers the origin on open source, the two main currents in the landscape and the options we now have how to go forward.
Open source an origin story to freedom
Open source an origin story to freedom
Edzo Botjes
This presentation talks about the history, benefits and the true meaning of open source.
Introduction To Open Source
Introduction To Open Source
Uchechukwu Obimma
Presentation to G:UP (Growing up in the West Midlands) about open source software and how third sector organisations can benefit from it.
Gup2011| open source
Gup2011| open source
Outserve
Opensource
Opensource
Dave Everitt
Linux and opensource. Operating Systems
Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7
Khawar Nehal khawar.nehal@atrc.net.pk
Economics of Open Source Software
Economics of Open Source Software
Ray Toal
This presentation talks about the following: - Quick intro to FOSS - Why we should use it in development. - A proposed strategy overview
Intro to FOSS & using it in development
Intro to FOSS & using it in development
Ahmed Mekkawy
Similar to Open source: can you ignore it?
(20)
Os revolution reaction paper
Os revolution reaction paper
Week 6 cyberpolitics
Week 6 cyberpolitics
Cc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_source
The Open Source Movement
The Open Source Movement
Free Software Movement and Open Source Communities
Free Software Movement and Open Source Communities
Open Source - the Big Picture
Open Source - the Big Picture
Singularity University Open Source Panel
Singularity University Open Source Panel
OpenSource
OpenSource
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
Free Software Introduction
Free Software Introduction
FOSS and Security
FOSS and Security
The Myth of Free Information
The Myth of Free Information
Free Software And Free Music
Free Software And Free Music
Open source an origin story to freedom
Open source an origin story to freedom
Introduction To Open Source
Introduction To Open Source
Gup2011| open source
Gup2011| open source
Opensource
Opensource
Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7
Economics of Open Source Software
Economics of Open Source Software
Intro to FOSS & using it in development
Intro to FOSS & using it in development
More from CS, NcState
Pointers to my google slides
Talks2015 novdec
Talks2015 novdec
CS, NcState
Science has escaped the lab and is roaming free in the world. People use software to understand the world . What tools are needed to support that work?
Future se oct15
Future se oct15
CS, NcState
Multi-objective evolutionary algorithms (MOEAs) help software engineers find novel solutions to complex problems. When automatic tools explore too many options, they are slow to use and hard to comprehend. GALE is a near-linear time MOEA that builds a piecewise approximation to the surface of best solutions along the Pareto frontier. For each piece, GALE mutates solutions towards the better end. In numerous case studies, GALE finds comparable solutions to standard methods (NSGA-II, SPEA2) using far fewer evaluations (e.g. 20 evaluations, not 1,000). GALE is recommended when a model is expensive to evaluate, or when some audience needs to browse and understand how an MOEA has made its conclusions.
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software Engineering
CS, NcState
Vivek Nair, Tim Menzies {vivekaxl,tim.menzies}@gmail.com HPCC Eng. Summit - Sept 29, 2015
Big Data: the weakest link
Big Data: the weakest link
CS, NcState
Discussions about sharing - Too much fear - Not enough about benefits Can we learn more from sharing that hoarding ? - Yes (results from SE) Three laws of trusted data sharing: - For SE quality prediction.. - Better models from shared privatized data that from all raw data Q: does this work for other kinds of data? A: don’t know… yet
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
CS, NcState
Lexisnexis june9
Lexisnexis june9
CS, NcState
Tim Menzies, NC State, USA Abhik Roychoudhury, NUS, Singapore
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).
CS, NcState
Technical Briefing, ICSE'15, Florence, Italy, May, 2015 Tim Menzies, Leandrom Minku, Fayola Peters
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data Science
CS, NcState
SAM'15 keynote, ICSE 2015, Florence, Italy
Kits to Find the Bits that Fits
Kits to Find the Bits that Fits
CS, NcState
Ai4se lab template
Ai4se lab template
CS, NcState
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSU
CS, NcState
CSC 510 North Carolina State University Dr. Tim Menzies
Requirements Engineering
Requirements Engineering
CS, NcState
SA @ WV(software assurance research at West Virginia) Kenneth McGill NASA IV&V Facility Research Lead 304.367.8300 Kenneth.McGill@ivv.nasa.gov Dr. Tim Menzies Ph.D. (WVU) Software Engineering Research Chair tim@menzies.us
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia
CS, NcState
Career advice: learn model-based reasoning (its the next big thing in SE).
Automated Software Engineering
Automated Software Engineering
CS, NcState
Q: How have dummies (like me) managed to gain (some) control over a (seemingly) complex world? A:The world is simpler than we think. ◆ Models contain clumps ◆ A few collar variables decide which clumps to use.
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)
CS, NcState
Perspectives from “PROMISE”:lessons learned, issues raisedtim.menzies@gmail.com
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data Science
CS, NcState
Goldrush
Goldrush
CS, NcState
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
CS, NcState
Recommender workshop, ICSE'14
Know thy tools
Know thy tools
CS, NcState
ICSE’14 Tutorial
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software Data
CS, NcState
More from CS, NcState
(20)
Talks2015 novdec
Talks2015 novdec
Future se oct15
Future se oct15
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software Engineering
Big Data: the weakest link
Big Data: the weakest link
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Lexisnexis june9
Lexisnexis june9
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data Science
Kits to Find the Bits that Fits
Kits to Find the Bits that Fits
Ai4se lab template
Ai4se lab template
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSU
Requirements Engineering
Requirements Engineering
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia
Automated Software Engineering
Automated Software Engineering
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data Science
Goldrush
Goldrush
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
Know thy tools
Know thy tools
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software Data
Recently uploaded
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
This project focuses on implementing real-time object detection using Raspberry Pi and OpenCV. Real-time object detection is a critical aspect of computer vision applications, allowing systems to identify and locate objects within a live video stream instantly.
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Discover the advantages of hiring UI/UX design services! Our blog explores how professional design can enhance user experiences, boost brand credibility, and increase customer engagement. Learn about the latest design trends and strategies that can help your business stand out in the digital landscape. Elevate your online presence with Pixlogix's expert UI/UX design services.
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Slack App Development 101
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
An excellent report on AI technology, specifically generative AI, the next step after ChatGPT from Epam. Impact Assessments, Road Charts with fully updated Results and new charts.
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Presented by Sergio Licea and John Hendershot
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Breathing New Life into MySQL Apps With Advanced Postgres Capabilities
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
In this session, we will delve into strategic approaches for optimizing knowledge management within Microsoft 365, amidst the evolving landscape of Copilot. From leveraging automatic metadata classification and permission governance with SharePoint Premium, to unlocking Viva Engage for the cultivation of knowledge and communities, you will gain actionable insights to bolster your organization's knowledge-sharing initiatives. In this session, we will also explore how to facilitate solutions to enable your employees to find answers and expertise within Microsoft 365. You will leave equipped with practical techniques and a deeper understanding of how there is more to effective knowledge management than just enabling Copilot, but building actual solutions to prepare the knowledge that Copilot and your employees can use.
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Cisco CCNA
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
What are drone anti-jamming systems? The drone anti-jamming systems and anti-spoof technology protect against interference, jamming, and spoofing of the UAVs. To protect their security, countries are beginning to research drone anti-jamming systems, also known as drone strike weapons. The anti-jam and anti-spoof technology protects against interference, jamming and spoofing. A drone strike weapon is a drone attack weapon that can attack and destroy enemy drones. So what is so unique about this amazing system?
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
This presentations targets students or working professionals. You may know Google for search, YouTube, Android, Chrome, and Gmail, but did you know Google has many developer tools, platforms & APIs? This comprehensive yet still high-level overview outlines the most impactful tools for where to run your code, store & analyze your data. It will also inspire you as to what's possible. This talk is 50 minutes in length.
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
MySQL Webinar, presented on the 25th of April, 2024. Summary: MySQL solutions enable the deployment of diverse Database Architectures tailored to specific needs, including High Availability, Disaster Recovery, and Read Scale-Out. With MySQL Shell's AdminAPI, administrators can seamlessly set up, manage, and monitor these solutions, ensuring efficiency and ease of use in their administration. MySQL Router, on the other hand, provides transparent routing from the application traffic to the backend servers in the architectures, requiring minimal configuration. Completely built in-house and supported by Oracle, these solutions have been adopted by enterprises of all sizes for their business-critical applications. In this presentation, we'll delve into various database architecture solutions to help you choose the right one based on your business requirements. Focusing on technical details and the latest features to maximize the potential of these solutions.
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Building Digital Trust in a Digital Economy Veronica Tan, Director - Cyber Security Agency of Singapore Apidays Singapore 2024: Connecting Customers, Business and Technology (April 17 & 18, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Sara Mae O’Brien Scott and Tatiana Baquero Cakici, Senior Consultants at Enterprise Knowledge (EK), presented “AI Fast Track to Search-Focused AI Solutions” at the Information Architecture Conference (IAC24) that took place on April 11, 2024 in Seattle, WA. In their presentation, O’Brien-Scott and Cakici focused on what Enterprise AI is, why it is important, and what it takes to empower organizations to get started on a search-based AI journey and stay on track. The presentation explored the complexities of enterprise search challenges and how IA principles can be leveraged to provide AI solutions through the use of a semantic layer. O’Brien-Scott and Cakici showcased a case study where a taxonomy, an ontology, and a knowledge graph were used to structure content at a healthcare workforce solutions organization, providing personalized content recommendations and increasing content findability. In this session, participants gained insights about the following: Most common types of AI categories and use cases; Recommended steps to design and implement taxonomies and ontologies, ensuring they evolve effectively and support the organization’s search objectives; Taxonomy and ontology design considerations and best practices; Real-world AI applications that illustrated the value of taxonomies, ontologies, and knowledge graphs; and Tools, roles, and skills to design and implement AI-powered search solutions.
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Explore 'The Codex of Business: Writing Software for Real-World Solutions,' a compelling SlideShare presentation that delves into digital transformation in healthcare. Discover through a detailed case study how Agile methodologies empower healthcare providers to develop, iterate, and refine digital solutions that address real-world challenges. Learn how strategic planning, user feedback, and continuous improvement drive success in deploying technologies that enhance patient care and operational efficiency. Ideal for healthcare professionals, IT specialists, and digital transformation advocates seeking actionable insights and practical examples of technology making a real difference.
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
What is a good lead in your organisation? Which leads are priority? What happens to leads? When sales and marketing give different answers to these questions, or perhaps aren't sure of the answers at all, frustrations build and opportunities are left on the table. Join us for an illuminating session with Cian McLoughlin, HubSpot Principal Customer Success Manager, as we look at that crucial piece of the customer journey in which leads are transferred from marketing to sales.
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Recently uploaded
(20)
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Slack Application Development 101 Slides
Slack Application Development 101 Slides
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Open source: can you ignore it?
1.
2.
3.
4.
Everybody Loves
Eric Raymond
5.
6.
7.
8.
9.
10.
11.
12.
Everybody Loves
Eric Raymond
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
Download now