Write awesome personalized donor thank you emails using GlobalGiving and Face...Marc Maxson / GlobalGiving
The document provides tips for non-profits to build relationships with donors and raise funds through GlobalGiving challenges. It recommends identifying supporters within your network who know your organization and can advocate for it. It also suggests assigning contacts for staff to reach out to personally via email, phone or social media. The goal is to attract at least $4,000 from 50 donors within 30 days to be successful in the Open Challenges held every three months.
Illustrating how Obama used social media in 2008 in pecha kucha form (20 images, 20 seconds, minimal text). These are 12 key tips for non-profits trying to advocate for a cause.
This document summarizes a talk about using replicated databases with Rails applications. It discusses why replication is used, including for load balancing and redundancy. It covers some problems with replicated databases like conflicting primary keys and replication lag. It then discusses different solutions for handling reads and writes with replicated databases in Rails including MySQL Proxy, DBSlayer, and various Rails plugins. It provides examples of how several popular Rails plugins like masochism, data_fabric, and multi_db implement read/write splitting functionality.
Ushahidi is a platform that allows users to report incidents and issues via SMS, email or web and visualize them on interactive maps. The original Ushahidi platform launched in 2007 in Kenya and collected 900 progress reports and 4000 stories from citizens that were mapped. The platform can take existing reports and turn them into interactive maps, making it useful for monitoring issues like mobile network outages.
This is the first presentation I have made in my company, it is useful to the guys who know little about Watir. It provides a direction about the whole Watir flow, including details and frame, including theory and practice. Expect it can kind of help you guys on the way of Watir.
GlobalGiving :- an Agile approach to the Japan Earthquake Disaster, and inter...Marc Maxson / GlobalGiving
This document discusses using an agile approach and storytelling to effectively coordinate relief efforts after the 2011 Japan earthquake. It notes that in the first week over 250 new organizations mobilized to help, but coordinating funds and aid to those most in need remains a challenge. The document proposes mapping relief efforts and needs through collecting personal stories from affected communities. These stories would help relief organizations see patterns to better coordinate their work and ensure overlaps and gaps in aid are addressed. Story-based approaches are suggested to connect organizations working in the same areas.
GlobalGiving is an online marketplace that connects donors to charitable projects around the world. Donors can give money to support projects and receive updates on the projects' progress and impact. The document discusses how GlobalGiving users can browse projects, make donations, and use social media and other tools to promote projects and engage with donors. GlobalGiving aims to provide organizations with tools to help them succeed through community involvement and social media outreach.
This document discusses using stories collected from communities to provide feedback and insights. Over 24,400 stories were collected in 2011 from over 500 locations. The stories are analyzed using various tools like SenseMaker and network diagrams to identify patterns and relationships. This reveals insights about community needs, social issues, and who organizations are or should be working with to better address issues. The story analysis also aims to better align aid projects with community needs and provide feedback to donors and organizations.
The document discusses making core promises and keeping promises to earn trust from others. It emphasizes the importance of reminding people of your goals, connecting with and inspiring others, and taking responsibility to build trust within a network by listening and not taking people for granted.
The document discusses the term "varnish" and provides definitions. It defines varnish as having a deceptively attractive external appearance or outward show. It further defines varnished and varnishing as giving a smooth and glossy finish to something. The rest of the document is about configuring and using the Varnish caching system.
The Hilarious Saga of Ships Losing Their Voices: these gigantic vessels that rule the seas can't even keep track of themselves without our help. When their beloved AIS system fails, they're rendered blind, deaf and dumb - a cruel joke on their supposed maritime prowess.
This document, in its grand ambition, seeks to dissect the marvel that is maritime open-source intelligence (maritime OSINT). Real-world case studies will be presented with the gravitas of a Shakespearean tragedy, illustrating the practical applications and undeniable benefits of maritime OSINT in various security scenarios.
For the cybersecurity professionals and maritime law enforcement authorities, this document will be nothing short of a revelation, equipping them with the knowledge and tools to navigate the complexities of maritime OSINT operations while maintaining a veneer of ethical and legal propriety. Researchers, policymakers, and industry stakeholders will find this document to be an indispensable resource, shedding light on the potential and implications of maritime OSINT in safeguarding our seas and ensuring maritime security and safety.
-------------------------
This document aims to provide a comprehensive analysis of maritime open-source intelligence (maritime OSINT) and its various aspects: examining the ethical implications of employing maritime OSINT techniques, particularly in the context of maritime law enforcement authorities, identifying and addressing the operational challenges faced by maritime law enforcement authorities when utilizing maritime OSINT, such as data acquisition, analysis, and dissemination.
The analysis will offer a thorough and insightful examination of these aspects, providing a valuable resource for cybersecurity professionals, law enforcement agencies, maritime industry stakeholders, and researchers alike. Additionally, the document will serve as a valuable resource for researchers, policymakers, and industry stakeholders seeking to understand the potential and implications of maritime OSINT in ensuring maritime security and safety.
Maritime Open-Source Intelligence (OSINT) refers to the practice of gathering and analyzing publicly available information related to maritime activities, vessels, ports, and other maritime infrastructure for intelligence purposes. It involves leveraging various open-source data sources and tools to monitor, track, and gain insights into maritime operations, potential threats, and anomalies. Maritime Open-Source Intelligence (OSINT) is crucial for capturing information critical to business operations, especially when electronic systems like Automatic Identification Systems (AIS) fail. OSINT can provide valuable context and insights into vessel operations, including the identification of vessels, their positions, courses, and speeds
A. Data Sources
• Vessel tracking websites and services (e.g., MarineTraffic, VesselFinder) that provide real-time and historical data on ship movements, positions, and d
Webinar: Transforming Substation Automation with Open Source SolutionsDanBrown980551
This webinar will provide an overview of open source software and tooling for digital substation automation in energy systems. The speakers will provide a brief overview of how open source collaborative development works in general, then delve into how it is driving innovation and accelerating the pace of substation automation. Examples of specific open source solutions and real-world implementations by utilities will be discussed. Participants will walk away with a better understanding of the challenges of automating substations, the ecosystem of solutions available to help, and best practices for implementing them.
Welcome to our third live UiPath Community Day Amsterdam! Come join us for a half-day of networking and UiPath Platform deep-dives, for devs and non-devs alike, in the middle of summer ☀.
📕 Agenda:
12:30 Welcome Coffee/Light Lunch ☕
13:00 Event opening speech
Ebert Knol, Managing Partner, Tacstone Technology
Jonathan Smith, UiPath MVP, RPA Lead, Ciphix
Cristina Vidu, Senior Marketing Manager, UiPath Community EMEA
Dion Mes, Principal Sales Engineer, UiPath
13:15 ASML: RPA as Tactical Automation
Tactical robotic process automation for solving short-term challenges, while establishing standard and re-usable interfaces that fit IT's long-term goals and objectives.
Yannic Suurmeijer, System Architect, ASML
13:30 PostNL: an insight into RPA at PostNL
Showcasing the solutions our automations have provided, the challenges we’ve faced, and the best practices we’ve developed to support our logistics operations.
Leonard Renne, RPA Developer, PostNL
13:45 Break (30')
14:15 Breakout Sessions: Round 1
Modern Document Understanding in the cloud platform: AI-driven UiPath Document Understanding
Mike Bos, Senior Automation Developer, Tacstone Technology
Process Orchestration: scale up and have your Robots work in harmony
Jon Smith, UiPath MVP, RPA Lead, Ciphix
UiPath Integration Service: connect applications, leverage prebuilt connectors, and set up customer connectors
Johans Brink, CTO, MvR digital workforce
15:00 Breakout Sessions: Round 2
Automation, and GenAI: practical use cases for value generation
Thomas Janssen, UiPath MVP, Senior Automation Developer, Automation Heroes
Human in the Loop/Action Center
Dion Mes, Principal Sales Engineer @UiPath
Improving development with coded workflows
Idris Janszen, Technical Consultant, Ilionx
15:45 End remarks
16:00 Community fun games, sharing knowledge, drinks, and bites 🍻
Using ScyllaDB for Real-Time Write-Heavy WorkloadsScyllaDB
Keeping latencies low for highly concurrent, intensive data ingestion
ScyllaDB’s “sweet spot” is workloads over 50K operations per second that require predictably low (e.g., single-digit millisecond) latency. And its unique architecture makes it particularly valuable for the real-time write-heavy workloads such as those commonly found in IoT, logging systems, real-time analytics, and order processing.
Join ScyllaDB technical director Felipe Cardeneti Mendes and principal field engineer, Lubos Kosco to learn about:
- Common challenges that arise with real-time write-heavy workloads
- The tradeoffs teams face and tips for negotiating them
- ScyllaDB architectural elements that support real-time write-heavy workloads
- How your peers are using ScyllaDB with similar workloads
Planetek Italia is an Italian Benefit Company established in 1994, which employs 120+ women and men, passionate and skilled in Geoinformatics, Space solutions, and Earth science.
We provide solutions to exploit the value of geospatial data through all phases of data life cycle. We operate in many application areas ranging from environmental and land monitoring to open-government and smart cities, and including defence and security, as well as Space exploration and EO satellite missions.
Project Delivery Methodology on a page with activities, deliverablesCLIVE MINCHIN
I've not found a 1 pager like this anywhere so I created it based on my experiences. This 1 pager details a waterfall style project methodology with defined phases, activities, deliverables, assumptions. There's nothing in here that conflicts with commonsense.
Project management Course in Australia.pptxdeathreaper9
Project Management Course
Over the past few decades, organisations have discovered something incredible: the principles that lead to great success on large projects can be applied to projects of any size to achieve extraordinary success. As a result, many employees are expected to be familiar with project management techniques and how they apply them to projects.
https://projectmanagementcoursesonline.au/
Global Collaboration for Space Exploration.pdfSachin Chitre
Distinguished readers, leaders, esteemed colleagues, and fellow dreamers,
We stand at the precipice of a new era, an epoch where the boundaries of human potential are poised to be redefined. For centuries, humanity has gazed up at the celestial expanse, yearning to explore the cosmic mysteries that beckon us.
Today, I present a vision, a blueprint for a journey that transcends the limitations of conventional science and technology.
Imagine a world where the shackles of gravity are broken, where interstellar travel is no longer confined to the realms of science fiction. A world united not by petty differences, but by a shared purpose – to explore, to discover, and to elevate humanity.
This presentation outlines a comprehensive research project to construct and deploy Vimanas – ancient, aerial vehicles of wisdom and power. By harnessing the knowledge of our ancestors and the advancements of modern science, we can embark on a quest to not only conquer the skies but to conquer the cosmos.
Let us together ignite the spark of human ingenuity and propel our civilization towards a future where the stars are within our reach and where the bonds of humanity are strengthened through shared exploration.
The time for action is now. Let us embark on this extraordinary journey together."
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc
In a landmark year marked by significant AI advancements, it’s vital to prioritize transparency, accountability, and respect for privacy rights with your AI innovation.
Learn how to navigate the shifting AI landscape with our innovative solution TRUSTe Responsible AI Certification, the first AI certification designed for data protection and privacy. Crafted by a team with 10,000+ privacy certifications issued, this framework integrated industry standards and laws for responsible AI governance.
This webinar will review:
- How compliance can play a role in the development and deployment of AI systems
- How to model trust and transparency across products and services
- How to save time and work smarter in understanding regulatory obligations, including AI
- How to operationalize and deploy AI governance best practices in your organization
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
Why Copy-Paste is Bad for Your Code
1. Why Copy – Paste is Bad for Your
Code
A short intro to Design Patterns
Carlos C Tapang
May 26th, 2012
2. How many are developers?
How many have studied OO in college? Studied on your own?
How many are applying OO concepts at work? Hobby?
How many of you would say that OO concepts are hard?
I HAVE QUESTIONS
3. List of Requirements:
• Each type of Animal can have a different number of legs.
• Animal objects must be able to remember and retrieve this
information.
• Each type of animal can have a different type of movement.
• Animal objects must be able to return how long it will take to move
from one place to another given a specified type of terrain.
BUILDING A WILDLIFE GAME :
ANIMAL TAXONOMY
4. First-Cut Design Animal
enum Movement
Movement movement
{ Walking, Flying, Slithering }
class Animal
Movement movement
class Mammal : Animal
int numLegs Mammal
int numLegs
class Reptile : Animal
int numLegs
Reptile
int numLegs
5. Animal
First-Cut Design --------------------------------------
enum Movement
int numLegs
{ Walking, Flying, Slithering } Movement movement
class Animal
int numLegs
Movement movement
class Mammal : Animal
Mammal
class Reptile : Animal
Reptile
6. Animal
First-Cut Design --------------------------------------
enum Movement
int numLegs
{ Walking, Flying, Slithering } Movement movement
enum Terrain
{ Mountains, SandDunes, Sea }
class Animal
int numLegs Mammal
Movement movement decimal Speed(Terrain t)
decimal virtual Speed(Terrain t)
class Mammal : Animal
decimal override Speed(Terrain t)
class Reptile : Animal Reptile
decimal override Speed(Terrain t)
decimal Speed(Terrain t)
7. First-Cut
decimal Speed(Terrain t)
Mammal Bird
switch (movement) switch(movement)
{ {
case Walking: case Walking:
break; break;
case Flying: case Flying:
break; break;
case Slithering: case Slithering:
throw new Exception(); throw new Exception();
} }
8. First-Cut
decimal Speed(Terrain t)
Mammal Bird
switch (movement) switch(movement)
{ {
case Walking:
case Walking:
return WalkingSpeed(numLegs, t);
break; return WalkingSpeed(numLegs, t);
case Flying: break;
if (this is Bat) case Flying:
return BatFlyingSpeed(); return BirdFlyingSpeed();
else throw new Exception(); break;
break; case Slithering:
case Slithering:
throw new Exception();
throw new Exception();
} }
9. Second-Cut Design Animal
class Animal
int numLegs
int numLegs
class AnimalThatWalks : Animal
class AnimalThatFlies : Animal
AnimalThatFlies
AnimalThatWalks
10. Animal
Second-Cut Design int numLegs
enum Terrain
{ Mountains, SandDunes, Sea}
class Animal
int numLegs
decimal Speed(Terrain t) AnimalThatFlies AnimalThatWalks
class AnimalThatWalks : Animal
decimal override Speed(Terrain t)
class AnimalThatFlies : Animal
decimal override Speed(Terrain t)
Bird
class Bird : AnimalThatFlies
decimal override Speed(Terrain t)
Mammal
class Mammal : AnimalThatWalks
class Reptile : AnimalThatWalks
Reptile
11. Animal AnimalMovement
Third-cut design
class AnimalMovement
class Flying : AnimalMovement
class Walking : AnimalMovement Walking
Flying
class Animal
int numLegs
AnimalMovement movement
class Mammal : Animal
class Reptile : Animal Mammal Reptile
12. Animal
Third-cut design decimal Speed(Terrain t)
enum Terrain { Mountains, …}
class AnimalMovement
decimal Speed(Terrain t)
class Flying : AnimalMovement AnimalMovement
decimal Speed(Terrain t) decimal Speed(Terrain t)
class Walking : AnimalMovement
decimal Speed(Terrain t)
class Animal
int numLegs
AnimalMovement movement Walking Flying
decimal Speed(Terrain t)
decimal Speed(…) decimal Speed(…)
class Mammal : Animal
class Reptile : Animal
13. Third-Cut Design
Animal AnimalMovement
class Animal class AnimalMovement
int numLegs; Animal animal;
decimal speedFactor;
AnimalMovement movement; public AnimalMovement(Animal a)
{
public Animal() animal = a;
{ }
movement = new AnimalMovement(this);
} public decimal Speed(Terrain t)
{
public decimal Speed(Terrain t) return CalcSpeed(
{ animal.numLegs,
return movement.Speed(t); animal.speedFactor, t);
} }
14. If you find that you are doing a lot of copy-paste, it maybe time to step
back and review your design.
CONCLUSION
15. If I were to conduct a seminar on Design Patterns, would you attend?
How much is it worth to you? (full day seminar)
Yes, indeed I am conducting a seminar on June 23rd right here in Cebu.
If you need a copy of these slides and the sample, join me at Software
Design Patterns Philippines at LinkedIn.com or email me at
ctapang@hotmail.com
A SEMINAR FOR YOU
Editor's Notes
Self-Intro:Microsoft IT Division “We eat dogfood”Physics Instructor (Physics 101 for non-science majors)