Evaluation Question 4: How did you use media technologies in the construction...mags249
New media technologies were used extensively throughout the construction, research, planning, and evaluation stages of the project. Blogging sites like Blogger were used to create a group blog and embed work. YouTube was important for presenting films, researching techniques, and annotating films for evaluation. Photoshop and digital cameras were used to create promotional materials. Communication apps like WhatsApp helped coordinate meetings and discussions, while social media promoted the finished film. Overall, a wide variety of digital tools supported all phases of the project.
The document discusses the various media technologies used by the author and their group at different stages of their media production project. These included:
- Blogger for their group blog to organize and present their work. The author also used it for weekly updates.
- YouTube to present their film, research techniques, and annotate their film for evaluation.
- Final Cut Pro for logging footage during production.
- A DSLR camera for photos and location notes. Photoshop was used to edit these.
- Photobucket and Flickr to present photos online. Survey Monkey for creating and sharing surveys.
- Various other sites like Issuu, Prezi, and Slideshare were used to upload and present documents
This document summarizes an ERP presentation that discusses:
1) The necessity of ERP systems to address business challenges and integrate functions.
2) Characteristics of ERP like integrating all departments and allowing new technologies.
3) Benefits of ERP like reduced costs, improved information accuracy, and better decision making.
4) Major ERP software companies like SAP, Oracle, and PeopleSoft. SAP R/3 is highlighted as the leading ERP software.
This document discusses SAP R/3 architecture. It provides an overview of SAP as a company and software, describes the three-tier architecture of SAP R/3 with data, application, and client layers, and reviews components like the internet communication manager and dispatcher. It also covers features such as scalability and standard support, and issues including lack of cache memory and support for only ABAP programming.
This document discusses SAP architecture and components. It describes homogeneous and heterogeneous SAP systems and the standard R/3 architecture with presentation, application, and database tiers. It outlines the main R/3 communication protocols and explains the installation process. It also provides an overview of core R/3 modules, supported platforms, and industry solutions.
COMPUTEX TAIPEI 2013 - Smart Living Industry Forum
Topic: Adding Intelligence to Grids - Siemens Smart Grid Solutions for a Sustainable Future
Speaker:Erdal Elver
President and Chief Executive Officer, Siemens Ltd., Taiwan
Mobile apps are increasingly incorporating artificial intelligence capabilities to enhance user experience. Developers can leverage AI and machine learning technologies to gain insights from user data and customize apps for individual preferences and behaviors. This allows apps to become more intuitive, personalized and useful for consumers over time through ongoing analysis of how people interact with their mobile devices.
Evaluation Question 4: How did you use media technologies in the construction...mags249
New media technologies were used extensively throughout the construction, research, planning, and evaluation stages of the project. Blogging sites like Blogger were used to create a group blog and embed work. YouTube was important for presenting films, researching techniques, and annotating films for evaluation. Photoshop and digital cameras were used to create promotional materials. Communication apps like WhatsApp helped coordinate meetings and discussions, while social media promoted the finished film. Overall, a wide variety of digital tools supported all phases of the project.
The document discusses the various media technologies used by the author and their group at different stages of their media production project. These included:
- Blogger for their group blog to organize and present their work. The author also used it for weekly updates.
- YouTube to present their film, research techniques, and annotate their film for evaluation.
- Final Cut Pro for logging footage during production.
- A DSLR camera for photos and location notes. Photoshop was used to edit these.
- Photobucket and Flickr to present photos online. Survey Monkey for creating and sharing surveys.
- Various other sites like Issuu, Prezi, and Slideshare were used to upload and present documents
This document summarizes an ERP presentation that discusses:
1) The necessity of ERP systems to address business challenges and integrate functions.
2) Characteristics of ERP like integrating all departments and allowing new technologies.
3) Benefits of ERP like reduced costs, improved information accuracy, and better decision making.
4) Major ERP software companies like SAP, Oracle, and PeopleSoft. SAP R/3 is highlighted as the leading ERP software.
This document discusses SAP R/3 architecture. It provides an overview of SAP as a company and software, describes the three-tier architecture of SAP R/3 with data, application, and client layers, and reviews components like the internet communication manager and dispatcher. It also covers features such as scalability and standard support, and issues including lack of cache memory and support for only ABAP programming.
This document discusses SAP architecture and components. It describes homogeneous and heterogeneous SAP systems and the standard R/3 architecture with presentation, application, and database tiers. It outlines the main R/3 communication protocols and explains the installation process. It also provides an overview of core R/3 modules, supported platforms, and industry solutions.
COMPUTEX TAIPEI 2013 - Smart Living Industry Forum
Topic: Adding Intelligence to Grids - Siemens Smart Grid Solutions for a Sustainable Future
Speaker:Erdal Elver
President and Chief Executive Officer, Siemens Ltd., Taiwan
Mobile apps are increasingly incorporating artificial intelligence capabilities to enhance user experience. Developers can leverage AI and machine learning technologies to gain insights from user data and customize apps for individual preferences and behaviors. This allows apps to become more intuitive, personalized and useful for consumers over time through ongoing analysis of how people interact with their mobile devices.
Waves of Innovation: Using Google Wave in the ESL ClassroomDavid Bartsch
This document provides an overview of using Google Wave in ESL classrooms. It begins with some assumptions about the audience and their interest in and comfort with technology. It then describes what Wave is and its key features, such as collaborative editing, playback, and gadgets. Various uses of Wave for language learning are proposed, both in and out of the classroom. The theoretical justification for using Wave and CALL is discussed based on social constructivism. Both strengths and weaknesses of Wave are presented. Predictions are made about Wave's potential to transform language learning.
The document provides an overview of common ERP modules like finance, plant maintenance, quality management, and materials management. It describes the objectives and key functions of each module. For example, it states that the finance module handles accounting, controlling costs, treasury management, and enterprise reporting. It also provides detailed descriptions of sub-modules and processes within each ERP module.
GSM is the most widely used mobile technology globally, with over 500 million users. However, it has limited data capabilities. GPRS provides a packet-switched way to access GSM networks for both interim and long-term packet data access. GPRS was defined in 1996 and began wide deployment in 2001, providing both voice and higher speed packet data access over GSM networks as an interim solution until 3G networks like UMTS are more widely available.
Neural networks are mathematical models inspired by biological neural networks. They are useful for pattern recognition and data classification through a learning process of adjusting synaptic connections between neurons. A neural network maps input nodes to output nodes through an arbitrary number of hidden nodes. It is trained by presenting examples to adjust weights using methods like backpropagation to minimize error between actual and predicted outputs. Neural networks have advantages like noise tolerance and not requiring assumptions about data distributions. They have applications in finance, marketing, and other fields, though designing optimal network topology can be challenging.
This document provides an overview of Google Wave terminology and features. It defines the key terms "wave", "wavelet", and "blip" which refer to different levels of threaded conversations. It also describes extensions like gadgets and robots that can be added to waves. Finally it demonstrates how to perform common tasks in waves like adding contacts, inserting pictures, videos, documents and more.
This document discusses Google Wave and provides an overview of its key features and capabilities. It describes Wave as a communications and collaboration platform that allows information to be shared in real-time waves. It outlines some of Wave's interface elements and how extensions can be built through gadgets and robots to enhance its functionality. Examples of potential enterprise uses through business process modeling and productivity improvements are also mentioned.
What is Intelligent agent, Abstract Intelligent Agents, Autonomous Intelligent Agents, Classes of intelligent agents, Application of an intelligent agent, Capabilities of an intelligent agent, Limitations of an intelligent agent.
This document discusses using artificial neural networks for image compression and decompression. It begins with an introduction explaining the need for image compression due to large file sizes. It then describes biologically inspired neurons and artificial neural networks. The document outlines the backpropagation algorithm, various compression techniques, and how neural networks were implemented in MATLAB and on an FPGA board for this project. It discusses the advantages of neural networks for this application, some disadvantages, and examples of applications. In conclusion, it states that the design was successfully implemented on an FPGA board and input and output values were similar, showing the neural network approach works for image compression.
IP spoofing involves falsifying the source IP address of packets sent over the Internet in order to gain an illegitimate advantage or perform malicious acts. There are several types of spoofing, but IP spoofing is used to impersonate another computer in order to access restricted networks or obtain sensitive information. Attackers use IP spoofing in denial of service attacks by flooding victims with spoofed packets to overwhelm their resources. Defenses against IP spoofing include filtering packets at routers to validate source addresses and using cryptographic network protocols to authenticate communications.
Brief description about the various E-Payment Systems :
E-Cash, E-Cheques,E-Wallets, Credit and Debit Cards transaction systems, Electronic Clearing Systems...
Their various drawbacks and advantages and disadvantages.
A SAN (Storage Area Network) is a network designed to transfer data from servers to storage targets as an alternative to directly attached storage. The document defines SAN architecture, which accesses storage at the block level and provides high performance, shared storage with good management tools. It discusses various SAN technologies like Fiber Channel and IP-based solutions. SANs connect storage subsystems, while NAS uses a general network to connect file-based storage. The document also covers SAN topologies, virtualization, protocols, advantages and disadvantages.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
This document discusses packet sniffing and methods for detecting packet sniffers. It defines packet sniffing as monitoring all network packets and describes common packet sniffer tools like tcpdump. It explains that packet sniffers can be used for both legitimate and malicious purposes, such as password theft or network mapping. The document outlines two key methods for detecting packet sniffers - MAC detection and DNS detection. MAC detection works by sending packets with invalid MAC addresses and checking if any hosts respond in promiscuous mode. DNS detection exploits the behavior of sniffers performing DNS lookups on spoofed source IP addresses. Both methods were found to accurately detect the presence of packet sniffers on a network.
This document summarizes artificial neural networks. It discusses how neural networks are composed of interconnected neurons that can learn complex behaviors through simple principles. Neural networks can be used for applications like pattern recognition, noise reduction, and prediction. The key components of neural networks are neurons, synapses, weights, thresholds, and activation functions. Neural networks offer advantages like adaptability and fault tolerance, though they are not exact and can be complex. Examples of neural network applications discussed include object trajectory learning, radiosity for virtual reality, speechreading, target detection and tracking, and robotics.
The document discusses hyper-threading (HT) technology, which enables a single processor to appear and function as multiple logical processors by duplicating the architectural state while sharing execution resources. HT allows two threads to run simultaneously, increasing processor efficiency. The main advantages are a 5% increase in die area size while avoiding performance loss with single threads and improving performance with multiple threads. Potential disadvantages include non-deterministic thread overhead and shared resource conflicts.
This document discusses 3D searching and 3D search engines. It begins by introducing 3D searching as a method to search for 3D objects in a database based on a query. It then discusses the need for 3D search engines, the methodology which involves query formulation, search process, and search results. Examples of specific 3D search systems from Purdue and Princeton are provided. The advantages, limitations, and future prospects of 3D searching are outlined before concluding that 3D search engines can help find 3D models online, but their use is currently limited.
This document discusses hyper-threading technology. It begins with an introduction and overview of hyper-threading and how it works. Specifically, it allows a single processor to act like multiple processors by enabling simultaneous multi-threading. It then discusses how hyper-threading is implemented on Intel Xeon processors and the performance improvements it provides for multimedia applications. In closing, it reiterates how hyper-threading offers more efficient use of processor resources through greater parallelism.
Google Wave 20/20: Product, Protocol, PlatformPamela Fox
These slides introduce the various facets of Google Wave. They were originally delivered as a talk in the 20/20 style (20 slides, 20 seconds each) at the Adobe Platform Users Group Sydney. The slides have been captioned with what was approximately said.
Google Wave is a real-time communication platform that combines aspects of email, instant messaging, wikis, and other collaboration tools. It allows users to work together on documents and have conversations in real-time. Key features include real-time editing, drag-and-drop file sharing, embedded applications, and playback functionality to see past conversations. Google Wave aimed to create a more elegant and integrated communication experience than separate tools, but Google ultimately shut down active development in 2010.
Waves of Innovation: Using Google Wave in the ESL ClassroomDavid Bartsch
This document provides an overview of using Google Wave in ESL classrooms. It begins with some assumptions about the audience and their interest in and comfort with technology. It then describes what Wave is and its key features, such as collaborative editing, playback, and gadgets. Various uses of Wave for language learning are proposed, both in and out of the classroom. The theoretical justification for using Wave and CALL is discussed based on social constructivism. Both strengths and weaknesses of Wave are presented. Predictions are made about Wave's potential to transform language learning.
The document provides an overview of common ERP modules like finance, plant maintenance, quality management, and materials management. It describes the objectives and key functions of each module. For example, it states that the finance module handles accounting, controlling costs, treasury management, and enterprise reporting. It also provides detailed descriptions of sub-modules and processes within each ERP module.
GSM is the most widely used mobile technology globally, with over 500 million users. However, it has limited data capabilities. GPRS provides a packet-switched way to access GSM networks for both interim and long-term packet data access. GPRS was defined in 1996 and began wide deployment in 2001, providing both voice and higher speed packet data access over GSM networks as an interim solution until 3G networks like UMTS are more widely available.
Neural networks are mathematical models inspired by biological neural networks. They are useful for pattern recognition and data classification through a learning process of adjusting synaptic connections between neurons. A neural network maps input nodes to output nodes through an arbitrary number of hidden nodes. It is trained by presenting examples to adjust weights using methods like backpropagation to minimize error between actual and predicted outputs. Neural networks have advantages like noise tolerance and not requiring assumptions about data distributions. They have applications in finance, marketing, and other fields, though designing optimal network topology can be challenging.
This document provides an overview of Google Wave terminology and features. It defines the key terms "wave", "wavelet", and "blip" which refer to different levels of threaded conversations. It also describes extensions like gadgets and robots that can be added to waves. Finally it demonstrates how to perform common tasks in waves like adding contacts, inserting pictures, videos, documents and more.
This document discusses Google Wave and provides an overview of its key features and capabilities. It describes Wave as a communications and collaboration platform that allows information to be shared in real-time waves. It outlines some of Wave's interface elements and how extensions can be built through gadgets and robots to enhance its functionality. Examples of potential enterprise uses through business process modeling and productivity improvements are also mentioned.
What is Intelligent agent, Abstract Intelligent Agents, Autonomous Intelligent Agents, Classes of intelligent agents, Application of an intelligent agent, Capabilities of an intelligent agent, Limitations of an intelligent agent.
This document discusses using artificial neural networks for image compression and decompression. It begins with an introduction explaining the need for image compression due to large file sizes. It then describes biologically inspired neurons and artificial neural networks. The document outlines the backpropagation algorithm, various compression techniques, and how neural networks were implemented in MATLAB and on an FPGA board for this project. It discusses the advantages of neural networks for this application, some disadvantages, and examples of applications. In conclusion, it states that the design was successfully implemented on an FPGA board and input and output values were similar, showing the neural network approach works for image compression.
IP spoofing involves falsifying the source IP address of packets sent over the Internet in order to gain an illegitimate advantage or perform malicious acts. There are several types of spoofing, but IP spoofing is used to impersonate another computer in order to access restricted networks or obtain sensitive information. Attackers use IP spoofing in denial of service attacks by flooding victims with spoofed packets to overwhelm their resources. Defenses against IP spoofing include filtering packets at routers to validate source addresses and using cryptographic network protocols to authenticate communications.
Brief description about the various E-Payment Systems :
E-Cash, E-Cheques,E-Wallets, Credit and Debit Cards transaction systems, Electronic Clearing Systems...
Their various drawbacks and advantages and disadvantages.
A SAN (Storage Area Network) is a network designed to transfer data from servers to storage targets as an alternative to directly attached storage. The document defines SAN architecture, which accesses storage at the block level and provides high performance, shared storage with good management tools. It discusses various SAN technologies like Fiber Channel and IP-based solutions. SANs connect storage subsystems, while NAS uses a general network to connect file-based storage. The document also covers SAN topologies, virtualization, protocols, advantages and disadvantages.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
This document discusses packet sniffing and methods for detecting packet sniffers. It defines packet sniffing as monitoring all network packets and describes common packet sniffer tools like tcpdump. It explains that packet sniffers can be used for both legitimate and malicious purposes, such as password theft or network mapping. The document outlines two key methods for detecting packet sniffers - MAC detection and DNS detection. MAC detection works by sending packets with invalid MAC addresses and checking if any hosts respond in promiscuous mode. DNS detection exploits the behavior of sniffers performing DNS lookups on spoofed source IP addresses. Both methods were found to accurately detect the presence of packet sniffers on a network.
This document summarizes artificial neural networks. It discusses how neural networks are composed of interconnected neurons that can learn complex behaviors through simple principles. Neural networks can be used for applications like pattern recognition, noise reduction, and prediction. The key components of neural networks are neurons, synapses, weights, thresholds, and activation functions. Neural networks offer advantages like adaptability and fault tolerance, though they are not exact and can be complex. Examples of neural network applications discussed include object trajectory learning, radiosity for virtual reality, speechreading, target detection and tracking, and robotics.
The document discusses hyper-threading (HT) technology, which enables a single processor to appear and function as multiple logical processors by duplicating the architectural state while sharing execution resources. HT allows two threads to run simultaneously, increasing processor efficiency. The main advantages are a 5% increase in die area size while avoiding performance loss with single threads and improving performance with multiple threads. Potential disadvantages include non-deterministic thread overhead and shared resource conflicts.
This document discusses 3D searching and 3D search engines. It begins by introducing 3D searching as a method to search for 3D objects in a database based on a query. It then discusses the need for 3D search engines, the methodology which involves query formulation, search process, and search results. Examples of specific 3D search systems from Purdue and Princeton are provided. The advantages, limitations, and future prospects of 3D searching are outlined before concluding that 3D search engines can help find 3D models online, but their use is currently limited.
This document discusses hyper-threading technology. It begins with an introduction and overview of hyper-threading and how it works. Specifically, it allows a single processor to act like multiple processors by enabling simultaneous multi-threading. It then discusses how hyper-threading is implemented on Intel Xeon processors and the performance improvements it provides for multimedia applications. In closing, it reiterates how hyper-threading offers more efficient use of processor resources through greater parallelism.
Google Wave 20/20: Product, Protocol, PlatformPamela Fox
These slides introduce the various facets of Google Wave. They were originally delivered as a talk in the 20/20 style (20 slides, 20 seconds each) at the Adobe Platform Users Group Sydney. The slides have been captioned with what was approximately said.
Google Wave is a real-time communication platform that combines aspects of email, instant messaging, wikis, and other collaboration tools. It allows users to work together on documents and have conversations in real-time. Key features include real-time editing, drag-and-drop file sharing, embedded applications, and playback functionality to see past conversations. Google Wave aimed to create a more elegant and integrated communication experience than separate tools, but Google ultimately shut down active development in 2010.
Google Wave is a new communication and collaboration tool that combines features of messaging, document editing, and web development platforms. It allows users to communicate in real-time through shared documents called "waves" that can include rich text, media, and gadgets. Waves also have an open API for developers to build extensions. Google Wave aims to bridge different communication methods into a single model and take advantage of modern computing abilities rather than imitating non-digital forms. An early prototype was developed by a small team at Google's Sydney office in 2004 and the product has expanded over two years of development.
Web development tools have gone through a series of major changes than how they used to be. For starters, we no longer need computers the size of refrigerators to make introductory web runners.
Thanks to the power of pall computing (and a bevy of great SaaS businesses), we frequently do not indeed need a necessary computer at all. From the most introductory web cyber-surfer, you can do everything from edit query to sluice the rearmost videotape games.
Idea of the project?
That is this Software for?
Why Open Source?
Why it’s online software?
Is Distants dublicating any other projects?
Who are potencial sponsors of the project?
Which technologies project is based on?
Information for newcomers
Google Wave is a real-time communication and collaboration tool that combines features of email, instant messaging, web chat, and social networking. It allows for live concurrent editing and conversation between users. Extensions called gadgets and robots can be added to waves to add additional functionality like polls, maps, stock prices, and translation. Google Wave has potential applications for businesses in areas like project management, processes, and collaboration.
Creating a Universal Design System for Web, Mobile, Wearables, and XRdamirkotoric
Creating a Universal Design System for Web, Mobile, Wearables, and XR
1. The authors created a design system to provide a cohesive experience across mobile, tablet, desktop, AR and VR platforms for their archaeological apps.
2. They drew from existing design systems like Material Design and customized components, colors, and typography to match their brand while ensuring consistency.
3. Their design system is implemented 30% from Material Design foundations and 70% from their own custom components to provide the needed features for their products across different devices and platforms.
Chrome and HTML5 are opening up new possibilities by moving the web away from desktop vendor lock-in and internet monopolies. Browsers empowered with HTML5 can now support rich media, offline storage, and multi-core processing, allowing web apps to become as powerful as desktop apps. HTML5 features like video, canvas, web sockets, and geolocation will be supported by all major browsers by the end of 2010, except Internet Explorer, which will only support some features. This will lead to new startups and initiatives developing innovative products using these open standards.
Jonathan Stark argues that the desktop browser is dying as mobile becomes the dominant computing platform. While general purpose browsers still exist on mobile, most popular mobile apps have specialized browsers optimized for specific uses and content. As the web expands into new devices, contexts and the physical world, web designers and developers will need to specialize their skills in areas like responsive design, user experience design, content management, and vertical markets like helping dentists or retailers. Specializing allows one to become a recognized expert rather than compete on price against large firms.
The Browser is Dead, Long Live the Web! (Jonathan Stark)Future Insights
Session slides from Future Insights Live, Vegas 2015 - https://futureinsightslive.com/las-vegas-2015/
For decades, it has been safe to assume that every networked computing device had a graphical Web browser installed by default. With the rise of mobile computing, wearable tech, and the internet of things, this is no longer a safe assumption. Join Jonathan for this inspiring opening keynote talk where he will he explore what web professionals can do to thrive in a world without web browsers.
This document summarizes a seminar on Google Wave that discusses its features for real-time communication and collaboration. Google Wave combines aspects of email, instant messaging, web chat and social networking. It allows for live concurrent editing using operational transformation and extensions can be added to waves for additional functionality. The document provides examples of existing gadgets and robots used in Google Wave and discusses how businesses can use Google Wave for project management.
Also, keep in mind, this is, of course, just my list and I deliberately wanted to keep it short because if I specified 20 trends here, I'm not sure if they're really all trends.
The document discusses Yahoo! Pipes and Google Mashup Editor. It provides an overview of what each tool is, how to create pipes and mashups, examples of functions and components available in each tool, and how outputs can be used and published. It also includes a sample pipe and mashup created by the author to combine job listings from multiple sources and display them on a map.
The Next Wave of AR: Mobile Social Interaction Right Here, Right Now!Tish Shute
I began by asking the question: Can we create an open framework for distributed augmented reality using "off the shelf" standards, e.g., the Google Wave Federation Protocol?
But the implications of this proposal go well beyond augmented reality and towards an open framework for in context mobile social communication.
Also see video here http://www.mobilemonday.nl/talks/tish-shute-the-next-wave-of-ar/
This document discusses the benefits of using real-time 3D interactive presentation software over traditional presentation methods like PowerPoint. It analyzes several 3D presentation software programs before focusing on Presentation3D, which allows users to easily create interactive 3D environments, objects, images and animations for impressive presentations. The document demonstrates some of Presentation3D's unique features, like its manipulator tool and image wall, and concludes this new generation of real-time 3D presentation software can help users make their products stand out to audiences.
The document describes a mobile app that allows anonymous chatting and partner finding. It includes implementations of chat/voting and partner finding features that store and sync event data in the cloud. The app aims to let users communicate and find partners anonymously without exposing their identities. It was developed using Google Mobile Backend Starter for the backend and includes features like anonymous group chats, event creation and browsing, and voting functionality. Future work includes adding further functionality to partner finding and improving security.
ViziCities - Lessons Learnt Visualising Real-world Cities in 3DRobin Hawkes
ViziCities is an open-source 3D city visualisation platform powered by JavaScript, WebGL and many other cutting-edge Web technologies. Think SimCity meets the real world!
In this talk, Robin Hawkes, ViziCities’ creator will highlight the development issues experienced along the way and show you how he overcame them – ranging from how you tackle the realtime processing of thousands of 3D buildings without locking up the browser, to how you visualise the entire world without needing a server or your own geographic data source.
The Next Wave of AR: Mobile Social Interaction, Right Here, Right Now!Tish Shute
The document discusses the potential for augmented reality and mobile social interaction using emerging technologies like Google Wave. It envisions an "outernet" enabled by ubiquitous computing, augmented reality, and real-time communication streams. Key ideas discussed include using Wave as an open framework to build distributed social augmented reality experiences and applications across devices through layers, channels, and attention streams. Concerns about control and standardization are also raised.
Semelhante a Collaborative Mapping with Google Wave (20)
This document discusses teaching programming online using Khan Academy's approach. It outlines how Khan Academy teaches programming through interactive tutorials called "talk-throughs" where students write code along with video instructions. Students are assessed through coding challenges that can be solved in multiple ways and are meant to be fun. Challenges are automatically graded by testing the student's code against example solutions. A community is built through a question and answer forum. The document also discusses potential programming languages and topics to teach as well as techniques for gathering student feedback.
The document discusses key aspects of engineering culture at companies. It notes that while college teaches technical skills, it does not teach important aspects of working at a company like code reviews, testing, documentation, and onboarding processes. A good culture values planning, writing consistent code, testing, code reviews, efficient release processes, monitoring code, and learning from mistakes through post-mortems. The document emphasizes that culture has a large impact on the work experience and success of engineering teams.
The document discusses Django Admin and ways to improve its functionality and interface. It describes how Django Admin works, including how it generates forms for models and restricts fields. It then outlines some limitations of Django Admin, such as its default widgets and save options. Solutions proposed include using custom widgets, forms, and templates to add features like preview buttons and number fields. The conclusion discusses potential replacements for Django Admin using technologies like Backbone.js and Tastypie to build a more flexible admin interface.
Pamela worked for Google on the Wave project but was heartbroken when it was cancelled. She then tried working remotely from home, in cafes, and in a co-working space but faced various challenges including distractions, limited wifi/outlets, and feeling alone among strangers. She realized she needs freedom but also wants to be around others driven by the same passions, so is considering rejoining a company to gain a community of colleagues.
Making JavaScript Libraries More ApproachablePamela Fox
A talk given at NotConf in Phoenix, Texas in 2012.
(Alternative title: Why nested ternary operators make me want to kick inanimate objects in the nuts.)
The document discusses the importance of developer experience (DX) and how to improve it. DX refers to the interactions and events between developers and tools/APIs, both positive and negative. Good DX matters because it leads to innovative usage and evangelism, while poor DX results in minimal usage and high turnover. The document provides tips for DX providers to consider users at each stage, from signing up and getting started to ongoing use and support. It emphasizes the importance of documentation, API design, and issue tracking/support to ensure developers enjoy and want to continue using a tool.
Talk given by Pamela Fox (me) at Ignite Melbourne, all about my favorite type of sleepwear. Remember to submit pics of you in your onesie to footedandfabulous.com!
Presented at Ignite Sydney 2010 as part of Global Ignite week, this talk introduces the ultra feminine Computer Engineer Barbie, and why it's a damn good thing.
Google Maps was originally created by a small team in Australia and later acquired by Google. It provides search and navigation features but also involves many challenges including accurately displaying map tiles across different countries and languages, aligning road and satellite imagery, interpreting complex address searches, calculating multi-modal directions, integrating real-time traffic data, addressing privacy and data ownership issues, and storing the massive volume of map and image data required. Developing and maintaining Google Maps requires a large interdisciplinary team across engineering, product management, legal, business and other functions all working towards Google's mission of organizing the world's information.
Mashups combine data from multiple sources to create new resources. They do this by using APIs to access and remix data. Common types of mashups include aggregators that combine information from different websites, visualizers that visualize related data in new ways, maps that plot geo-located data on maps, and games that engage users by having them guess or find more data. APIs allow access to data through standard interfaces and protocols like HTTP and REST. Popular sources of data for mashups include Google APIs which provide access to maps, documents, and other Google services.
Growing up Geek: My Dad, the Computer ScientistPamela Fox
An Ignite talk given at Google I/O, about my life with two geeky parents and how I got involved in web development and related areas.
I've pasted my pre-scripted lines on top of the slides so that it makes sense.
I'm entering this in the Tell a Story contest since it happens to be a story, and there's a checkbox for entering it. :)
Living in the Cloud: Hosting Data & Apps Using the Google InfrastructurePamela Fox
In the modern web, the user rules. Nearly every successful web app has to worry about scaling to an exponentially growing user base and giving those users multiple ways of interacting with their data. Pamela Fox, Maps API Support Engineer & Developer advocate, provides an overview of two technologies - Google App Engine and the Google Data APIs - that aim to make web development and data portability easier.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
1. Google Wave is a project that was born right here in our Google Sydney office, created by the engineers that made Google Maps. It's now in early preview stage, and everyone's wondering what it is and how they can use it to make their world a better place. The answer is different for everyone, but I want to share my ideas about how it can improve our geo world.
2. Email 2.0? Let's start with the basics. Google Wave is a communication and collaboration tool. It's been called "Email 2.0" or "what email would look like if invented today." If you just look at the main screen after you're logged in, it kinda even looks like a remixed Gmail.
3. Nested Trees of Blips But that first impression is deceptive - it's much more than that. Google Wave lets you create conversations with your contacts, and create a nested tree of replies in those conversations. Those conversations are called waves, and the messages inside them are called blips.
4. Playback Private Replies If you decide that you don't like the contents of a blip - no matter who created it- you can edit it yourself. If you want to fork the conversation, then you can create a private reply. At any point, you can play back the conversation and see when people and blips were added. It's revision history made easy, and fun.
5. Late CCs! Typos! Long Nested Threads! This doesn't seem that revolutionary, but it actually solves many of the problems that email poses. You don't have to worry about making stupid unretractable typos, trying to figure out who is replying to what where, or getting CCed onto a 40-message long thread and trying to interpret the flow of conversation.
6. So, yes, Google Wave can be thought of as Email 2.0. And just like anyone can set up an SMTP server and send messages across email servers, our goal is for anyone (well, any engineer) to be able to set up a Wave server, and share Waves across servers.
7. Operational Transforms* Data Model In order to federate Wave, we need to document our protocol and open-source the essential components. There's the operational transforms code, which is what we use to enable real-time collaboration of participants, and there's the data model, which defines the structure of the XML documents that we perform the operational transforms on.
8. Client/Server And to let people create their own Wave clients, we are open-sourcing the client/server protocol for retrieving and sending Wave operations, and rendering them on the client. Hopefully, we can open-source enough code that people can have a consistent user experience across Wave clients on different servers.
9. Developer Platform HTTP Plugin Visual REST | RPC Google data APIs Adwords API Geocoding API Google Maps API Google Visualization API Google Charts API Google Web Elements OpenSocial Gadgets Spreadsheets Gadgets Wave Gadgets/Robots But now, my favorite part, and the part most related to geo: the developer platform. At Google, we know the power of making extensible platforms, as we've seen how developers have added value to products like iGoogle and Maps in ways that we could have never imagined. That may be why we now have more than 60 APIs.
10. Embed API Robots Gadgets Extensions APIs And for the developers… Our Wave developer offerings include an Embed API, which lets you embed an interactive Wave on your own webpage, and an extensions API, which lets you create robot participants and collaborative gadgets that can be added to Waves. So, you can either take the content out of Wave, or you can put your own content into Wave.
11. Cluster Gadget Shared State A Wave gadget is basically a mini-webpage with a shared state that can be modified and retrieved by all the participants. It lets you extend Wave beyond textual communication onto visual communication... like maps! For example, the super-simple map cluster gadget visualizes the locations of all the participants.
12. Map Gadget View Edit This map gadget allows for more free-form map creation. When editing, you can add or modify markers and shapes, and set the shared viewport. When viewing, you can read infowindows and pan around the map without anyone seeing what you're doing. Privacy, and the distinction between edit and view, is fundamental to Wave.
13. Trip Planning The LonelyPlanet trip planner gadget adds the dimension of time. You can create a trip for a given location, and then add places like hotels and restaurants to that trip. You can schedule places for particular days, and everyone on the Wave can comment and rate each place.
14. Playback Gadgets+Gadgets Gadgets+Blips The cool thing about all these gadgets is that they are just a part of a larger collaborative document in Wave. So you can use map gadgets in conjunction with other gadgets, converse below the map gadgets about what you're making, and watch how the maps were created in playback.
15. Place Locator Bot A robot is basically an event listener on a Wave, reacting to events like the user typing by doing operations like adding blips, editing text, or inserting gadgets. A hypothetical place locator robot could search for places in a blip, and offer to insert a collaborative map gadget for all of the places it found.
16. Upcoming Events Historical Events That place locator robot could be even more useful by finding dates and times associated with all of the places. If it found a list of historical events, it could insert a collaborative timeline map. Alternatively, if it found a list of upcoming events, it could offer to add them as entries to your calendar.
17. Competitive Robots pamela meanmachine Robots can help you out - but they can also compete against you! A robot could insert a place-guessing game, and then try to beat you and your friends. A robot is better than human friends though, because it can be configured to any level of difficulty (like ridiculously easy), or track how well you're doing and adjust accordingly.
18. Analyst Pub-crawler History Teacher Wave is a powerful platform for a wide range of use cases, from the casual to the serious. The average person can use it when they're planning a pub crawl. The GIS analyst can use it to quickly visualize the places and data in their business conversations. The history teacher can use it to quiz their students on the curriculum.
19. Disaster Mapping Even more crucial in our recent time of crazy natural disasters, volunteers could use it to map an ongoing emergency, plotting casualties or rescue shelters, and discussing all the pieces of news as they are coming in.
20. Baby Wave New Wave Now… Future? Wave is still very new, and a baby in the web world, but I think it has great potential for geo. These are just my ideas after a few months playing - now I want to see what all of you come up with.