CyberSecurity Training / Awareness (Updated)
📅 Best (FREE), October 10, 2023
# Update Insights on October 2023


"In the electrifying realm of technology, networking acts as the intricate web stitching our digital world together, where information flows like a vibrant stream connecting devices and minds."

Networks weave the fabric of our digital existence, and coding unlocks endless possibilities. In this thrilling digital universe, there exists a shadowy counterpart - ethical hackers, the guardians of our cyber realm. Armed with wit and code, they embark on exhilarating journeys into the depths of networks, seeking out vulnerabilities like modern-day digital detectives. Their mission? To fortify our digital fortresses, ensuring that the wonders of technology remain within our control. Coding, the language of innovation, provides the keys to unlock limitless possibilities, shaping our virtual reality through software, websites, and applications. Together, these fields form an exhilarating trifecta, where creativity, connectivity, and cunning combine to sculpt the future of our interconnected world. The significance of ethical hackers becomes pivotal in this dynamic environment, guaranteeing the security and integrity of our digital presence.

Understanding the digital world is an exhilarating journey teeming with opportunities and challenges. It involves constructing a cyber fortress to safeguard sensitive information, fostering innovation through software and technology, and refining critical thinking skills to navigate intricate complexities. Digital literacy serves as the gateway to empowerment, unlocking access to education, employment, and social connections. Furthermore, it requires adaptability, guaranteeing relevance in the face of constantly evolving technology. Embracing the digital world transcends mere learning; it embodies a thrilling adventure, depicting the portrait of a digital pioneer primed to explore the boundless possibilities within this dynamic, ever-expanding universe.

Embark on your cybersecurity journey, harness the power of knowledge, and become a sentinel in the digital realm. Stay secure, stay empowered! ✨🔒

Explore the curated list of free cyber security certifications below:

✅1. Introduction to Cybersecurity:

✅2. Cybersecurity Essentials:

✅3. Networking Essentials:

✅4. Intro to Information Security by Udacity:

✅5. Network Security by Udacity:

✅6. Fortinet FCF, FCA:✨✨

✅7. Information Security by OpenLearn:

✅8. Network Security by OpenLearn:

✅9. Risk Management by Open Learn:

✅10. Certified in Cybersecurity℠ - CC:

✅11. CCNA Security Courses:

✅12. Network Defense Essentials (NDE):

✅13. Ethical Hacking Essentials (EHE):

✅14. Digital Forensics Essentials (DFE):

✅15. Dark Web, Anonymity, and Cryptocurrency:

✅16. Digital Forensics by Open Learn:

✅17. WS Cloud Certifications (Cybersecurity) :

✅18. Microsoft Learn for Azure:

✅19. Google Cloud Training:

✅20. Android Bug Bounty Hunting: Hunt Like a Rat:

✅21. Vulnerability Management:

✅22. Software Security:

✅23. Developing Secure Software:

✅24. PortSwigger Web Hacking -

✅25. RedTeaming -

✅26. Splunk -

✅27. Secure Software Development -

✅28. Maryland Software Security -

✅29. Stanford Cyber Resiliency -

✅30. Cyber Threat Intelligience -✨

✅31. ITProTV - FREE preparation Exams IT -

✅32. 15 Free CISA Courses -

☀️☀️☀️☀️☀️☀️☀️☀️ ☀️ Penetration ethical hack

arcx

Training

ITMasters

Penetration Testing

TRAINING COURSES

Introduction to Internet of Things

CYBER TRAINING COURSES

TRAINING COURSES

FREE Cybersecurity Education Courses

Junior Incident Response Analyst

CYBER THREAT INTELLIGENCE 101

Penetration Testing

TCM SECURITY - Intro to Information Security

GT - Network Security

Ethical Hacking Essentials (EHE)

Responsible Red Teaming

Developing Secure Software (LFD121)

EC-Council MOON Certifications

CCNA SHEET SUMMARY PDF

EC-Council MOON Certifications

HR Fundamentals And Best Practices

GOOGLE GROUP LISBON

📅 Google event Lx, November 10, 2017
# Update Insights on August 2022

scroll me








" The best core knowledge which can’t be taught, comes from working on something of your own and share a network of collaborative ideas --> a side project from your main job to fuel your passion while learning something new. "

I proactively attend events to enhance high-tech soft skills , while collaborating with like-minded individuals towards community-oriented goals. Google Group Lx - a 3 days event - focused on understanding the latest technologies and industry trends - fostering innovation and growth opportunities among participants. I recognize the importance of keeping up-to-date with industry news and continuously learning to code, regardless of the profession. Despite very few “new" technologies are a rehashed old idea, You'll want a new challenge, something that could push you well out of the comfort zone. Therefore, training initiatives should emphasize the big picture rather than individual skills that have limited applicability.

    The Google Lisbon event covered a wide range of topics that impact technological development. Discussions included the role of ethics, security, resources, and budget in shaping development through Spatial Computing - evolving VR content and 360°video Ads ; Iris-finger Sensor Technology or voice recognition sdk techniques; Dynamic displays - computer vision, creative studio tools and automated vehicles ; Artificial Intelligence (AI), Machine Learning (ML), Business Intelligence (B.I), Data Science / Big Data, deep learning hardware ( NVIDIA GPU ) and software ; Additionally, the talks delved into AI-generated art using deep neural networks to replicate, forecast, prevent, and learn generative algorithms with adversarial networks (GANs), recreate or blend styles of artwork ( ex. Botto, AI-DA, Obvious ) ; Other topics included IoT for Consumer & Commercial vs. Industrial ; Google Ads & Commerce strategies to Rank Websites, search optimization & bringing in traffic --> Besides the breakthrough advances in science and technology, such as articulating tools through big data analysis or in combination with machine learning methods, automated cameras or sensors, the discussions also focused on the future of digital security. Topics such as Biometric identification , the potential risks of facial recognition technology and the need for stronger data protection laws. These measures not only enhance cybersecurity but also safeguard the user's digital identity tracker . After some point, everyone needs to be aware that all technology has security risks . It's difficult to decide which of them is more feasible and secure, since "+" security = "-" privacy; The talks also touched on Cybernetics & Network infrastructure - , which serve as the backbone for all wired or wireless communication, from Computer Code to Genetic Code including Bio-Engineering, Nanotechnology, IOT architectures ; machine intelligence, synthetic biology or transhumanism concepts - Flipping bits into molecules , shifting atoms - DNA data storage breakthroughs — From the tactile mirror to the virtual body : mapping territories on packages to people - through media forensics, privacy and security surveillance reform on trust, integrity, reliability-resiliency, authenticity, compliance. Finally, the event addressed integrating Business, IT , Virtual Infrastructure Software , Cloud Strategies , and Data structures / Algorithms . The talks emphasized implementing strong encryption and authentication protocols, such as cryptography and data structures encryption - to protect data and ensure that it is only accessible by authorized personnel.

READ MORE --->



"In Vain have you acquired knowledge if you have not imparted it to others." Deuteronomy Rabbah

# Update Insights on August 2023

Services transformed how companies do business even after 2017. Soon after Tim Berners-Lee invented Web 1.0, he suggested people could develop the Semantic Web . The Web 2.0 progressed rapidly since 1990s and was largely driven by three core layers of innovation: mobile, social and cloud - It became popular in the mid-2000s with the rise of CSS, JavaScript, HTML file applications along with meteoric social media growth and data centers located around the world. Today, Users rely on phones, laptops, PCs, tablets, headsets, and wearables to access information daily on both Web 2.0 and Web.3.0 . Web 1.0 first-generational capabilities merely provided information to users. Browsers could only read data on a static web page without any interactivity or searchability. Web 2.0 changed this by providing significant interactivity, where users could contribute to online knowledge without any technical understanding. Web 3.0 has four foundational pillars: semantic markup, blockchain and cryptocurrency , 3D visualisation, and artificial intelligence while using the same devices as Web 2.0 and continuing to make information resources available to the world with real-time data monitoring, tracking, and immersion. It could also perform new interactions like searches, filtering results, making data entries, and others. The process of social connectedness - triggered by social media / and mobile phones browser / app development - moved from “attract” to “extract” their users; consequently, Individuals or businesses began to suffer via higher fees or platform safety risk on Cloud types. Though as-a-service types are growing by the day, there are usually three models of cloud service to compare applications: Software as a Service (SaaS) vs (IaaS) Infrastructure as a Service vs (PaaS) Platform as a Service ---> but there are also other public or private services, such as Desktop as a service (DaaS) and Functions as a Service (Faas) or even XaaS (anything as a service — that are all integrated with the on-premises IT infrastructure to create a cohesive ecosystem called the hybrid cloud of embedded systems ;

In Practice, The Web 3.0, rather than just searching for content based on keywords or numbers, can use artificial intelligence (AI) and machine learning (ML) to understand the semantics of the content on the web- to enable users to find, share and combine information more easily - " How? " - with the use of techs like Neuro-symbolic machine learning architecture , Artificial Intelligence Neural Network , Blockchain technology , 3D hyper Graphics, Virtual and Augmented Reality network, that allows machines to understand and interpret information. - Many of the recent revolutions in computer networking-including peer-to-peer file sharing, and media streaming-have taken place at the application layer. Tokenization vs Encryption - are both used today as methods to secure/protect data stored in cloud services or applications, under different circumstances. The architecture of a blockchain system can be divided into six layers and work as independent systems : data layer, network layer ( virtualized nodes, that connect to the "net operating system"), consensus layer , incentive layer, contract layer, and application layer. The Web 3.0 was built on three new layers of spatial technological innovation: edge computing, decentralized data networks and artificial intelligence Furthermore, Web 3.0’s spatial internet properties rely on immersive worlds connected via the web. These potentially interoperable worlds will provide information and services across XR platforms. More importantly, users, including businesses, students, and professionals, can overlay digital content seamlessly on the real world. This creates a spatial relationship to data, allowing both a persistent and always-on connection to the internet. Users can now merge and interact with content in their daily lives, interacting between the physical and virtual worlds in real-time. Large data centres supplemented by a multitude of powerful computing resources spread across phones, computers, appliances, sensors and vehicles marks a move towards trusting all constituents of a network implicitly, rather than needing to trust each individual explicitly - submitted to compatible interconnectivity and powered-energized durability dependency ( system of objects network ) - More of it is associated to a world that is growing faster inequality, nationalism, mistrust in traditional government/banking institutions, global warming environment duo to faster trend consumption - such climate impacts of “proof-of-work” cryptocurrency mining, as currencies require miners to compete to validate transactions on their blockchains take power-hungry servers that create air pollution and carbon emissions. While some are more useful in certain circumstances than others, the configuration, or topology of a network is key to determining its performance , functionality, connectivity and security protection.

2022 || What Are Graph Neural Networks?

2022 || Blockchain Technology and the Metaverse

2022 || Ethical Hacking Lessons

2022 || Security Resources

2022 || CiberSegurança Resources

2022 || Security Resources: Data Security Posture Management (DSPM):What Is It And Why Does It Matter Now?

How does Information systems (IS) and information technology (IT)  thrive in this fast-changing environment and create systems that withstand time as much as possible? -- Before learning how to create secure software and supply chain that can include people, companies, natural or manufactured resources, information, licenses, or anything else required to make your end product, you need to understand several key security concepts such as confidentiality ( keeping data safe), integrity ( data is current, correct and accurate), and availability ( measuring device was unavailable due to malfunction, tampering, or dead batteries / resilience improves availability). There is no point in memorizing how to implement a concept if you don’t understand when or why you need it. Also, knowing the reason behind security rules and Learning these principles will ensure you make secure project decisions and are able to argue for better security when you face opposition. No matter what development methodology you use (Waterfall, Agile, DevOps), language or framework you write it in, or type of audience you serve; without a plan you cannot build something of substance. There are several ways to arrange a network topology - architectural, political and logical - attempt to experiment with new economic models based on distributed networks, that reflect different pros & cons: A centralized Single Point Of Failure ( SPOF - divided by 3 categories : Hardware failures, for example, server crashes, network failures, power failures, or disk drive crashes; Software failures, for example, Directory Server or Directory Proxy Server crashes; Database corruption; ) leads to a situation in which one malfunction of the server causes the whole system to shut down, leaving all clients lose their access to the app . The scalability maintainance of the system is limited to hardware: you can increase the resources of this node by adding more RAM or hard drives (vertical scaling), but you can't add more nodes (horizontal scaling).

On the other hand, the idea of Web3 Decentralization could enable a web system controlled by many entities ( local private Key ) without centralized corporation servers ( Hosted Keys ), where every client would contribute to the web (like a peer-to-peer network). The system is still vulnerable to failures and attacks (account takeover, digital identity theft; apps that contain an overly aggressive monetization library collect extensive details from users’ devices; money launderin and hacking) , but the impact is proportional to the number of master nodes impacted. The integrity of the data, to a large extent, depend on the data management capability and functionality of the repository : nodes with more computational resources than the rest of the network , dominates the verification approval of transactions and controls the content of a blockchain - it can outpace all other nodes, manipulate the blockchain, insert fraudulent transactions, double-spend funds, or even steal asset from others. It's also more scalable because you can add more nodes (scale horizontally and vertically ) that have the same control over the system ( BitTorrent as a peer-to-peer file sharing protocol). Historically, socially and politically have been powerful in sustaining an ideology of the network market as a non-coercive coordination mechanism withi Decentralized finance. Governments and corporations are increasingly pursuing a reconstruction of money as a system of control and surveillance machine. However, markets require significant legal and ideological enforcement to function in practice, often with substantial systemic coercion. A better understanding of the power and limitations of each network is necessary - it would allow for hybrid approaches and less on what it can achieve. Local vs Hosted Key aren't immune to malware, virus, worms and other attacks - There are Pros and Cons for scenarios where you need to upgrade - - nor distributed network / decentralisation dichotomy automatically yield an egalitarian, equitable or just social-economic-political resolution, in practice with ambitions for rearranging power dynamics. The increasing threats to our information, users, and systems from cyber criminals, urges several training solutions to help organizations educate staff as an essential part of running a healthy organization. Employees are the weakest link in the entire cybersecurity system. The safety training is a must-have in all companies. The slightest distraction may lead to a serious security breach . The security strategy and awareness of internal resources, with the Investment in training is crucial for the success of any security policy and should be carried out not only in theory, but also in practice, in the workplace. Observability and security are key to closing vulnerability gaps: Modern multiclouds help organizations innovate faster, but drive complexity and vulnerabilities ; Incomplete observability solutions are creating big gaps in capability. Observability powered by answers and intelligent automation is key to closing those gaps. Here too, IT Managers should know identify whether they have all the necessary skills needed to train their teams or resort to an external partner that ensures the consultancy in this area and make the assessment and audit, on the basis of which the following will be defined: technology platforms, technology processes, management and operation, mitigation and crisis management. Cyber risks are business risks. A network intrusion can cause lasting harm to your organization and its stakeholders. It can also affect your reputation, your people, and even your community.

THE INCREASINF THREATS - IDENTITY & SECURITY | 2022 :

With these three basic motions: more software, cloud technology, and DevOps practices, digitalization has become an intrinsic element of nearly all organizations. However, the requirement for extra software raises the security threshold, making it difficult to safeguard digital assets. Cloud computing entails the use of cutting-edge technology with varying hazards, as well as the elimination or reframing of the idea of a secure perimeter. When some IT and infrastructure risks are shifted to the cloud and others are specified on a software basis, the risks will be mitigated while reinforcing the need for permission and access. " In this regard, Kubernetes has emerged as the de-facto standard for cloud-native container orchestration. Since the launching of Google Cloud’s Google Kubernetes Engine (GKE) in 2014, a radical shift to the cloud-native system has occurred in the software environment."

___ As Google realized the potential of a new search engine platform for the growing Internet and transfered it's virtual knowledge into hardware devices, developing a network with it's own operating system - Alongside smartphones and web services - it became a place where people could search the repository of human knowledge, communicate, perform work, consume media, and maneuver the endlessly; Google also began working on experimental hardware - Reshaping the world by linking, sorting and filtering data into a number of nearly incomprehensible size ; Representing, the infinite amount of information that it provides through different services. Meanwhile, algorithms using artificial intelligence are discovering unexpected tricks to solve problems that astonish their developers, raising concerns about our ability to control them. Unlike traditional computer programs, AIs are designed to explore, make decisions and develop novel approaches to tasks (It wouldn’t be so, without DeepMind)
- So we began to Question : " How is it possible for an AI system to "outsmart" its human masters? "
---- Since information exchange is increasingly happening online and optimized through interconnected technologies , business prosper the trade-offs between the central principles and values - these were issues discussed at the GDG Devfest : It began focused on how Tech resources could be used for the benefit of society towards the improvement of collective sustainable ecosystems - able to create systems that enforce and guarantee the rights that are necessary to maintain a free and open society. Ecosystems can be symbiotic or parasitic : ecological relationship cocreate value, capable of shaping the market ; wherever economics serve the people and not otherwise - bridging the 'discursive gap' between policy text and practice, unleashes social innovation for societal benefit. "How can technology and innovation become more inclusive?" - On the one hand, there is a wide gap between the pace of law and technology - on the other, there are also different types of Democracy and interpretation views.
When the physicist Stephen Hawking told an audience in Portugal during a talk at the Web Summit technology conference in Lisbon, Portugal, in which he said, “computers can, in theory, emulate human intelligence, and exceed it.” he was alerting that AI’s impact could be cataclysmic unless its rapid development is strictly and ethically controlled: “Unless we learn how to prepare for, and avoid, the potential risks,” he explained, “AI could be the worst event in the history of our civilization.” Hawking explained that to avoid this potential reality, creators of AI need to “employ best practice and effective management.” - "Is Your AI Ethical? " - Responsible A.I. Has a Bias Problem, and Only Humans Can Make It a Thing of the Past: As more company’s adopt A.I., more issues will surely come to the forefront. Many business are already working toward making changes that will stop A.I. problems before they go any further. It relies on several key technologies, such as machine learning, natural language processing, rule-based expert systems, neural networks, deep learning, physical robots, and robotic process automation. Some AI applications have moved beyond task automation but still fall well short of context awareness. Responsible AI is defined as the integration of ethical and responsible use of AI into the strategic implementation and business planning process: transparent and accountable AI solutions that create better service provision. Such solutions harness, deploy, evaluate and monitor AI machines, thus helping to maintain individual trust and minimize privacy invasion. “As A.I. systems get more sophisticated and start to play a larger role in people’s lives, it’s imperative for business to develop and adopt clear principles that guide the people building, using and applying A.I.” ; “We need to ensure systems working in high-stakes areas such as autonomous driving and health care will behave safely and in a way that reflects human values.”

ARTICLE I : Breaking the Echo Chamber: How Clickbait, Algorithms, and Unethical Journalism Divide Us

ARTICLE II: The Current State and Future of AI: Benefits, Breakthroughs, and Safety

The event held the debate on major technological forces, currently driving to digital disruption on the medium cloud, social Movements on mobile, Big Data, while IoT are Transforming Physical Security in the Digital Age . It´s not just Netflix or Facebook’s that feed drives views, privileging the stimulus–response loop recommendation system / optimizing for engagement as a key interface for content consumption. Yet this same design has been criticized for leading users towards more extreme content, other online platforms like YouTube, shape users’ world views considering new rules for the artificial intelligence programs, spreading malicious content. ---------> "What Are The Alternatives to the Danger of engagement-focused algorithms - that are Hacking the Brain with deep psychology stimulation inside preferences (neuromodulation "tuned" to activate) through “emotional surveillance technology”? : In a world where Citizens are not products, clients or customers - rather reshape public human rights , and the Economy represents a tool we humans invented - like democracy and politics - to help govern our relationships to adapt between each other - ourselves with nature and the world we live in. If these tools aren't getting the outcomes that make us happy, safe, healthy, better educated and protecting / preparing our country for an increasingly uncertain future , as quality of life is stagnating; unfair , jobs and health education systems, regardless of how much money you have or where you live; while our environment is suffering, then it's time our economic tools and practices change to embrace transformative policies that allow the data analyze to improve future business decisions and reprioritise our investments. This is where the rights approach to ethical decision making comes in, although fairness can be subject to different definitions across divergent languages, cultures and political systems : “stipulates that the best ethical action is that which protects the ethical rights of those who are affected by the action. It emphasizes the belief that all humans have a right to dignity” (Bonde and Firenze, A Framework for Ethical Decision Making). Technologies appear to achieve the same goal: to make the city more efficient, connectivity, and social harmony from a “healthy body” into an “efficient machine - signaling technologies that transformed the city into a programmed and programmable entity, a machinery, whose behavior can be predicted, controlled and modulated according to the principles established by some well- intentioned technocrat . However, the use of AI within many industries - retail to supply chain - from banking to finance, manufacturing to operations - security predictive artificial intelligence (AI) threat detection ( Identifies and blocks deep-learning based malware detection ) or deep learning acceleration built directly into the chip, Intel® hardware (-architecture, accelerators, memory, storage, software, security -) have all changed the way industries operate. In social media environments - digital marketers, created a new way to connect and engage with the target audience or media marketing performance. In oposition, it raised ethical concerns and eventually carries the risk of attracting consumers’ distrust - extracting harmful marketing appeals, lack of transparency, information leakage and identity thef. Developing AI solutions should consider human rights, fairness inclusion, employment and equality that can lead to potential gains in credibility for products and brands - ensure brand safety and protect consumers from fraud and the dissemination of fake information, thus increasing customer trust towards brands. Recognizing the value of sensitive data and the harm that could be caused if certain data were to fall into the hands of the wrong parties, many governments and industries have established laws and compliance standards by which sensitive data must be Pseudonymized or Anonymized. Europe is putting pressure on internet companies like Facebook and Google to safeguard against hate speech, trolling, cyber-bullying, fake news, sex traffickers online and terrorist activities online. The GDPR (general data protection regulations act - on MAY 4 2020) passed by the parliament of the EU aims to safeguard the data privacy rights of its citizens. While the act combined with the EU court’s “Right to be forgotten” judgment has set precedence in the way companies handle the data of their consumers. Individuals now have the "right of data portability", the "right of data access" along with the "right to be forgotten" and can withdraw their consent whenever they want , as well as intrusive online brand presence.

" Social media marketing is in transition as AI and analytics have the potential to liberate the power of social media data and optimize the customer experience and journey. Widespread access to consumer - generated information on social media, along with appropriate use of AI, have brought positive impacts to individuals, organisations, industries and society " (Cohen, 2018).

-- Considering the conscious principles of compromise, chain potentially relevant questions about General Data Protection Regulations :: " How are organisations ensuring that the content posted by staff and consumers does not compromise the ethical principles of the brand - managing their social media presence in line with data protection, visual misinformation and privacy regulations ? ; What do you need to protect : on whatever occasion the adversary gains access to information that is sensitive to you? What are the risks of compromise and how to mitigate them ? What practices and mechanisms can enable firms to cultivate an ethical culture of AI use / How can digital marketing professionals ensure that they utilize AI to deliver value to the target customers with an ethical mindset? "

- --> The importance of getting interested in areas of privacy law, digital legislation and regulation of AI ethics, is recognizing digital literacy education that serves to take responsibility in civics and citizenship towards the environmental impacts of human-machine technology relationships, but also protect and question oneself values critically, bridging the discursive gap between policy text and practice into a re-formed conceptions of learning, creativity and identity in the new machine age. Examples of Seeking capital - information, social, and cultural Individuals - are applied whenever companies join uses of artificial intelligence for recruitment or machine-learning systems like In the process of seeking various types of capital through digital marketing platforms, consumers experience both positive (benefits) and negative (costs ) effects. Also, Filtering Perception and Awareness ( munitions of the mind) - starting with stone monuments, coins, broadsheets, paintings and pamphlets, posters, radio, film, television, computers and satellite communications - have been present throughout history, as propaganda has had access to ever more complex and versatile media. The velocity of information flow, volume of information shared, network clusters and cross-posts on different social media may be analyzed and compared for negative and positive electronic word-of-mouth. These intra-interaction consequences such as consumers’ cognitive, emotional, and behavioral engagement with the brand thus trigger extra-interaction consequences of brand trust and attitude thus developing brand equity through the DCM strategy. While it articulates and builds the digitally enabled capabilities required to transform their linear supply chains into connected, intelligent, scalable, customizable, and nimble digital supply networks through Synchronized planning, Intelligent supply Smart operations Dynamic fulfillment -- Digital development supply networks (Hyper-connectivity, Social networking, Cognitive computing where Matlab /excel and python can transform raw sound data into numeric data for machine learning - training accuracy for deep Learning Models - "This means that if your data contains categorical data, you must encode it to numbers before you can fit and evaluate a model. The two most popular techniques are an integer encoding and a one hot encoding, although a newer technique called learned embedding may provide a useful middle ground between these two methods." Cloud computing combined with software-as-a-service (SaaS) delivery models , 3D printing. The use of customer analytics to make smarter business decisions that generate more loyal customers. ensure how customers are having positive experiences with the company at all levels, including initial brand awareness and loyalty - crucial to the success of any business.

This often leads to confusion ( 'discursive gap' ) about when and how to deploy what information technology, to maximize value creation opportunities during stages of the customer journey - usually questioning : " What is the interplay between customer traits (e.g. innovativeness, brand involvement, technology readiness) and attributes of technological platforms in this process? What firm capabilities are required to capture, manage and exploit these innovation opportunities from customers to gain a deeper understanding of them?" ---- Since There are different Types of Data: Nominal, Ordinal, Discrete, Continuous, Interval and Ratio scale -- The Netflix’s dynamic optimizer example, attempts to improve the quality of compressed video, but gathers data - initially from human viewers - and uses it to train an algorithm to make future choices about video transmission, with the aim to deliver personalized and targeted experiences to multiscreen audiences to keep them coming back - . Netflix’s algorithm library is vast but much of the content is geographically restricted due to copyright agreements - - the movies and TV shows are limited by the country. Whenever traveling abroad you may need a VPN to securely access your usual home streaming services. Because not all Netflix shows are available worldwide, many of its subscribers turn to VPNs that disguise their location and fool the streaming service into offering them a content catalog for a different region but Netflix algorithms ban most of them. Not all VPNs work with Netflix. Due to rapid growth of the digital devices and their access to the Internet caused security threats to user data; while advance measures have been adapted by the attackers, security and privacy threats has become more and more sophisticated day by day, increasing the demand for an updated technical Skills and highly secure medium to secure entities and their valuable information into the Internet. "Netflix’s machine learning algorithms are driven by business needs."

Kang Logo

AI is progressing in Broadcast & Media, through some mainstream applications , to uncover patterns that aren’t always intuitive to human perception and able to change consumer behaviours - the two most viewer-centric applications would be on content discovery and content personalization : Netflix’s new AI tweaks each scene individually to make video look good even on slow internet - It also tracks the movies we watch, our searches, ratings, when we watch, where we watch, what devices we use, and more. In addition to machine data, Netflix algorithms churn through massive amounts of movie data that is derived from large groups of trained movie taggers ; Google Is Using Artificial Intelligence to Make Sure YouTube Content Safer for Brands . It uses Deep learning, to build artificial neural networks to mimic the way organic(living) brains sort or process information, applying AI in a number of areas.

Strategic information is essential to maintain competitiveness to build a proper aligned architecture with the business objectives that need to stay on top of utilization to determine whether there are wasted resources - a challenge, to figure out how to unify analytics across data science, engineering and the business ——— tapping into the benefits of machine learning and AI. Data science aims to use the different data sources -The Internet of Events (IoE) is based on the Internet of Content (IoC.Turning Data into Information), theInternet of People (IoP Understanding and Influencing Human Behavior), the Internet of Things (IoT Gathering the Data) , and the Internet of Locations(IoL Turning Data into Information) toanswer questions grouped into the following four categories: – Reporting: What happened? – Diagnosis: Why did it happen? – Prediction: What will happen? – Recommendation: What is the best that can happen? [ People who understand how to fish outanswers to important business questions from today’s tsunami of unstructuredinformation Identity the different stages : – Exploration: just like we need to find oil, we need to locate relevant data before we can extract it. – Extraction: after locating the data, we need to extract it. – Transform: clean, filter, and aggregate data. – Storage: the data needs to be stored and this may be challenging if it is huge. – Transport: getting the data to the right person, organization or software tool. – Usage: while driving a car one consumes oil. Similarly, providing analysisresults requires data. ] --- Many data analysis, big data, and machine learning projects require scraping websites to gather the data for further analyze : “A CDP is a technology that collects data in a governed way from sources like web, mobile, in store, call center, and IoT, unifies it to create accurate customer profiles in real time, then makes it accessible to and actionable for other tools and technology ---> How does “smart home” and its analysis data can improve our routine by automating tasks everyday ?” ---- The Python programming language is widely used in the data science community , and therefore has an ecosystem of modules and tools : Beautiful Soup module / Selenium / pandas - turn the unstructured data on the web into machine readable, structured data which is ready for analysis ---- While interactive and responsive chart types tools starting as xls / cvs Excel files , transfered to tableau software , range from simple bars and lines to arrow, range and scatter plots , help into creating data analysis, from locator maps to thematic choropleth & symbol maps. Some good examples of data scrapping / web scraping are: News articles; Sports scores ; Weather forecasts; Stock prices; and Online retailer prices - act of pulling data directly from a website by parsing the HTML from the web page itself, and how we tie together automation and user interaction with web scraping that would take hours to copy manually. "There are legal concerns regarding this, but most of the time, you just need to understand the terms and conditions of the website you’re scraping, and then you can use the data from the site." Apps in Google Maps  with AI-enable mapping search / scans road information, using algorithms to determine the optimal route to take on foot , a car, bike, bus or train. Google Maps — especially Google Earth are low-level graphics API like WebGL interact with 3D content on a website and mobile devices using JavaScript binding to access the GPU. The WebGL API — especially shader programming in the Graphics Library Shader Language (GLSL).

What Is a QPU? - QPU, aka a quantum processor

The participants introduced the Google App Engine as an alternative environment to deliver serverless platform for developing and hosting web applications at scale. Designed to host applications using programming languages such as Java, Python, PHP, and Go - and written to serve many simultaneous users without degrading performance. A suite of services for running scalable applications, performs large amounts of computational work, while it stores information and analyzes large amounts of data . - This way, Google Cloud Platform offers several kinds of data storage you can use with an AppEngine app, including a relational database (Google Cloud SQL). Most scalable apps use Google Cloud Datastore to host applications efficiently and effectively, at minimal cost.
With indexes and optimistic concurrency control, Cloud Datastore is designed for applications that need to read data quickly, ensure that the data it sees is in a consistent form, and scale the number of users and the size of the data automatically. App Engine’s specific role on the platform is to host web applications and scale them automatically. Using the other services of the platform as needed, especially for data storage. Each Google account can own or be a member of up to 25 Cloud projects. A Cloud project has exactly one App Engine “app,”. A project includes all of the Cloud resources for a major application . That said, having multiple projects for different purposes is often useful just to keep things organized. Each project has its own billing configuration and list of contributors. A single company that produces multiple web products might have one projectper product. If 25 projects per account is a burden in your case, Google offers more apps with their paid support programs. You can create an app by using the free limits without setting up a billing account. Free apps never incur charges, but are constrained by the free quotas. --- Understand data store models : Generally, it's wiser to start by considering which storage model is best suited for the project requirements: to choose from among SQL and NoSQL databases. Then consider a particular data store within that category, based on factors such as feature set, cost, and ease of management. Polyglot persistence is used to describe solutions that use a mix of data store technologies. A datastore is the storage repository for virtual machines and their data. A datastore can be either a NetworkFile System (NFS) or Virtual Machine File System (VMFS). Cisco UCS Director provides a task library tocreate datastores from physical storage. You can add, delete, and scale clusters. Therefore, it's important to understand the main storage models and their tradeoffs.

Both connection strength andconnection trust are sometimes referred to as connection fairness quality, relevance and user orientation , solving problems in a timely manner . Even a small site with a few pages needs a logical Architecture / Clean and structured interface "code injections" will ensure it will work on all devices : Link Research Tools like Meta titles and descriptions that make them relevant and associate with great content; Implement third-party tracking software or plugin library - Google recognizes the problem with spam traffic and provides a webmastertool option in Google Analytics that allows you to block hits from known trafficbots / block a spam transfer ; Google Trueview advertises on YouTube ; Using custom audiences with intent and affinity , reselling to customers who have recently made a purchase so that they willkeep coming back for more; Custom URLs and alt text - The most common cause of duplicate content issues is that multiple versionsof the same URL deliver the same content to search engine bots, Using the NoIndex tag , in order together optimize the crawling results, follows a code used on the page's head tag:: || Meta Name = "Robots" Content = "noindex, follow" || ) or funnel keyword suggestions that improve ranking / Remarketing target markets and optimize site; as much as social networkingintegration links or backlink / Discovering the common backlinks of competitors ( Brand Search Terms) - will likely find that they have somebacklinks in common that you don't already have ; Site Booster displays the site on Google Maps, as it shows what it is worth browsing; Search engines penalize slow-loading pages web designs and love sitemaps, so Pingdom; YSlow and WebPageTest tools, measure the speedperformance of the website . Sitemaps help searchengines understand the structure of your site and identify the links to crawl.The integration of Google Analytics and Search Console is as easy asentering a tracking code. Likewise, direct products can show up in a specific Google search, such as:4k LED TV search ; YouTube, Gmail and thousands of partner sites ; If you search for local businesses on Google or even directly on Google Maps, you may also see ads.
Kang Logo

There are dozens of reporting features and metrics to review web services. With Search Console you can monitor, maintain, and troubleshoot your presence in Google’s Search results and be aware of any warnings or issues that come directly from Google. On a technical level, Google Analytics works through JavaScript tags that run in your website’s source code and is usually operated with Google Tag Manager - – these JavaScript tags running Google Analytics set cookies on their browsers that harvest personal and sometimes sensitive data from them in return. The question arises : " Is Google Analytics GDPR compliant to use? How do you balance Google Analytics, cookies and end-user consent on your website?" Google Tag Manager is a hugely popular tool for websites of any size and shape. It organizes all third-party tags on your website (like Google Analytics or Facebook pixels), and it also controls when these are triggered. Important for website owners to know, is that almost all of such “third party tags” will set cookies that, according to EU law (the GDPR), fall into categories that require the explicit prior consent of your users. In other words, tags are what happens, while triggers are when what happens. Inceptionv3 is a convolutional neural network for assisting in image analysis and object detection, and got its start as a module for Googlenet — especially shader programming in the Graphics Library Shader Language (GLSL). RESEARCH COLLECTION | 2020 : Connect Google Analytics to Google Data Studio

Besides the platform alternatives such as Supabase ; Heroku ; Netlify ; Pythonanywhere ; AWS Amplify ; Back4app ; Parse ; Kinvey ; Backendless - Google’s looking to play a bigger role in fueling the burgeoning creator economy with a new platform designed to help creators maximize their efforts. - Some Key Features of Firebase as a platform - Backend-as-a-Service (Baas) provided by Google integrates open-source tools in real-time that enable the developers to test Machine Learning components, launch, analyze and distribute apps or database storage for various platforms such as IoT, iOS, web, and Android without hassle-free scalability - They accelerate app development and scale them easily without investing in infrastructure : offering some perspectives on Baas ( backend as a service) . It takes care of cloud infrastructure and all the backend needs that lets you develop and deploy faster products, such as Realtime Database, Cloud Firestore, and Authentication. It also allows hosting and offers API's for machine learning tasks like text recognition, image labelling and so much more. Using a cloud-based system enables access on any device anywhere, avoids wasting resources on creating materials that already exist , accelerates progress and prevents reoccurring problems : reliable base search function with improved experience , reduces time searching to combat information gaps; easy to manage, it allows effective storage, and simplifies distribution in less time sorting and sifting through information, can improve the usability of your resources increases productivity as employees can focus on the task at hand.When files are stored on different systems, you may not notice when they are out-of-date. (Google HTML service and submit data sheets) Nowadays, there are tools like PlugXR - A Cloud-based Augmented Reality platform without the need of code , that allows developers to create their own face filters, for example the Firebase ML Kit. With Firebase - an app dev platform built on the Google Cloud Platform providing services and cross-platform SDKs - it is possible to detect the positions of eyes, mouth, nose, and contours. Such data can then be used to place a 3D mesh with proper graphics over the camera image. AR can be useful for training, collaboration, and visualization - updates to the device’s operating system and SDK , but haven't appealled consumers, due to the high price and relative infancy of the still-bulky technology. 

IoT and M2M ( Machine-to-Machine ) Data Analysis , feature extraction, stratified sampling, data integration, normalization , web scraping, pattern recognition - through open source software environments, such as SQLite and R - are system service system that concurrently satisfy three requirements: massive data analysis, real-time data analysis, and deep data analysis for extract challenges of the future. As well as they Impulse tools to interact with emerging Tecnologies , including SceneKit, Firebase ML Kit, ARCore, RTDB . Python Libraries are a collection of features that remove any need for codes to be written from scratch - essential in creating machine learning, data science, data visualization, image and data processing applications and more ; deep learning algorithms and techniques for performing smart web automation; Integrate neural network architectures to create powerful full-stack web applications . Additionally, some technologies aren’t compatible with each other, so it's important to check the existing systems. In response to predictive analitics - including big data, data mining, statistical modeling, machine learning and assorted mathematical processes. Organizations use predictive analytics to sift through current and historical data to detect trends and forecast events and conditions that should occur at a specific time, based on supplied parameters - to find and exploit patterns contained within data in order to detect risks and opportunities - - new tools have emerged, such as # Anonymized data # can provide you with useful insights - into user behavior. GDPR restrictions on the collection and use of personal data mean that many analytics users are asking themselves: " Can I do useful analytics without personal data? - Analytics without personal data – a long history and a promising future - "

There are a great set of tools that integrate artificial intelligence into industrial applications. A good example is TensorFlow,a framework for developing applications based on neural networks deep, which allows equipping systems with the ability to recognize objects and sounds and to predict the occurrence of events in the environment. In 2015, the open sourced TensorFlow machine learning and deep learning-focused programming platform , allowed anyone to develop neural network-based solutions using the same technology they use - were the servers can be segmented and analyzed for content and context and Finding new ways to reduce the latency ( Google Video Intelligence Analyzes Images in Video ) ; AI disruption in TV and Broadcasting revolutionized the Cloud opening up video analytics to new audiences, such as IBM Research Takes Watson to Hollywood with the First “Cognitive Movie Trailer” ; Content Discovery and Personalization content , based on user information, preferences, watch history, and context - viewing recommendations based on previously viewed or searched videos; Ad Targeting / Filtering - uses AI to ensure if content is "safe" and not offensive / filters ads and protect the brands of advertisers / sorts ad priorities or themes / Geo-targeting is used as a way to restrict ad audience to a certain geographic area or regionally direct message to maximize ad efficacy by location ( zipcode / city or country).  ; Content Clustering and Metadata Building - recognizes images from live or recorded videos can lead to metadata tags or descriptive information of a movie or a program beyond its usual essential attributes (genre, idioms, credit ) : building Datasets from image recognition , cluster content by context that result from advances in learning algorithms (such as deep learning), computer hardware, and less-intuitively, the availability of high-quality training datasets ; Voice-assisted Content Search & Playback - personal assistants like Siri and Alexa ; Content Curation through Audience or Scene Recognition / computer vision - through the use of the camera , determine content according to pre-built assumptions or carefully analyzed audience data ; Cognitive analysis - that looks deeply into individual viewer consumption habits or even emotions, and then predict intent, tailor content selection, or even produce unique real-time content ; Network Optimization - analyzes available bandwidth and delivering the best balance between video quality and streaming bandwidth ; Time optimization of codecs, network paths and data transfers, all to minimize the amount of data and time to reach a viewer while ensuring optimum video quality .  So has The “internet of things” (IoT) , connected cars  and wearable computing (Fitbit, Samsung Gear , Garmin) increased the level of interest and the volume / variety of data - about what is happening across vast and complex human and machine/device networks - such as wearables ( internet-connected fabrics) , eyewear and smartwatch projects ; pair of sunglasses that projects holographic icons; smartwatch that has a digital screen but analog hands; temporary tattoo that, when applied to your skin, transforms your body into a living touchpad (concept is similar to braille); virtual reality controller that lets you pick up objects in digital worlds and feel their weight as you swing them . In the long run, Wearable Computing - technology products ranging home automation , such as smart watches, machinery-gadget sensors, smart shirts, belts, contact lenses, and more - is the paradigm that entails lightweight, miniature computers that are worn much like clothing such that the user and the computer can interact at any time, as needed. — There has been a surge of interest in self-driving cars due to breakthroughs of deep learning - deep neural networks that are trained to perform tasks that typically require human intervention. CNN’s apply models to identify patterns and features in images, making them useful in the field of Computer Vision - such as image classification or image captioning by a simulated car in order to drive the car autonomously where CNN learns features from the images and generates steering predictions allowing the car to drive without a human . Cars can be connected as well it provides some communication interface and a browser that can access other resources. The same principle can be applied to smart watches and other interactive devices that adhere to the same model - connectivity protocol - an interface that allow to interact / communicate with the other devices in the same environment, as they share storage available for storing and retrieving information. ----> Once computers understand space, spatial computing is the shift of computing from 2 dimensions to 3 dimensions - placing digital objects and information in it view through a transparent digital screen - augmented by 5G data speeds, open data formats (open-source software) with the expansion of artificial intelligence (AI), “smart” Web integrated around peer-to-peer (P2P) technologies and the shift to Web 3.0 socioeconomic operating system — enables a visually dynamic Web for ecommerce and a virtual economy.

___Programs are expressed in languages which can be understood by people easily. At the same time, the language will be common to different computer architectures, translated to machine code. Generally speaking: Computer technology and programming languages are different things : ( " cyber system hardware" ≠ “algorithms + data structures = programs”) __ :

The industry does not move that fast, trends make it appear that way by wrapping illusions over perceptions , but generally, not much in programming changed - From that perspective, alongside compilers, libraries, specifications, languages, and state machines - in analgorithmic lens - it shapes the way in which we might inquire into contemporary digital culture. There might be awfull lot of languages, though the concepts are pretty similar : # Windows 10 Universal? It's C# and XAML, which has been around for ages. # Cloud services? It's just another name for SOA (Service Oriented Architecture) or SaaS (Software as a Service) and been around for literally decades. # Android? It's Linux and Java, Linux is a copy of something decades old, and Java has been around forever too. There are fundamental differences between software engineering (lifecycle from code development to testing to deprecation) and programming or “computer science” to Effectively manage your codebase and efficiently respond to change and make optimal software decisions by keeping time and scale in mind. The actual art of programming revolves around understanding computer architectures and operating systems, writing algorithms managing different data structures, optimizing for performance and stability - Many experienced programmers try to bend a language to fit patterns they learned from other languages, and never discover features outside of their experience. As long as you’ve spent enough time building production code, in at least a couple different programming languages, switching to a new one becomes very common. All the top software companies, Microsoft, Google, Facebook, etc., have mature codebases measured in millions of lines of code A new employee, no matter how experienced, will take a while to get familiar enough with the codebase to be productive. They will take even longer to become an expert - a significant pressure to learn the right stuff and identify what that is.

FACEBOOK New Technologies, | 2021 : Investing in European Talent to Help Build the Metaverse
p>

NVIDIA Unveil New Technologies, | 2021 : "GTC is a great opportunity for developers and business leaders to learn the latest advances in AI, accelerated computing and computer graphics from the world’s top innovators, scientists and researchers,” said Greg Estes, vice president of Developer Programs at NVIDIA."

RESEARCH COLLECTION | 2020 : What it’s like to be an Apple WWDC student scholar and why you should apply this year.

REPOSITORY OF SCIENTIFIC RESEARCH PAPERS | 2020: Google Colaboratory.

ACADEMIA | 2020: Microsoft Academic knows journal titles, conference names, and many research topics.

ACADEMIA | 2020: Cursos e certificações Microsoft Academiy .

CYBERSECURITY | 2021: What Cyber Security Certifications Should You Train For?

This means that new players have inserted themselves into the value chain, while hundred billion lines of new software code are added to the existing digital infrastructure of our world. So, I also personally think that a hybrid solution is an optimal answer in many software-related cases as the web development industry is currently going into a hybrid phase as well, with Server-Side Rendering (SSR) and Incremental Static Generation (ISG) data fetching options ---" They solve the problem with pre-rendering the most critical software parts on the server and everything that needs to be asynchronous will be put together in the browser ”( Szczeciński, B. (2018) 'What's Server Facet Rendering and do I would like it? ) --- .

There is abundance of data in the new digital age, and can be harnessed to gather insights through application of data analytics. In order to provide oversight and governance over the collection, usage and management of data, it's also necessary to understand where the data is coming from and whether it was properly permissioned. Systems aren't always identical because clients present different demands over time —whether it's storage, CPU, or database—and these demands change over the lifecycle of the customer’s needs. So systems that can't evolve and scale don't keep up to the speed of technology changes and get stuck to technical difficulties quite often. More than ever, we are an interconnected world where the actions of one person or device in a social or physical network can have a “butterfly effect”on all of the people and devices across that Network and On Languages of Interaction ( Physical manipulation; Input using code; Mouse manipulation; Presence, location, and image; Haptic interfaces and multitouch; Gesture; Voice and speech recognition ).

Alongside a higher cost technology or cryptographic schemes even in face of quantum computing - data infrastructure issues on How lattice-based cryptographic algorithms can be scaled to protect more types of electronic information - ; also, the process of creating games, environments / ads were considered to be essential scalable, captivating and engaged into clean design , to avoid user experience damage and VR security brand . Currently, the high-end tools that exist for XR creation are complicated and difficult to learn; those without a coding background have more difficult in implementation - the reason why this has added market pressure towards 360 video interactive content, when the only way to disengage with the ad is to remove the headset. “AR” was coined by Boeing researcher, Tim Caudell in 1990 and comes here in advantage to VR while XR becomes the solution in between - new value in terms of functionality, reliability, convenience or price ; Imagining ways of New and exciting medium to create unique 3D apps and experiences - shaping the future of art , it enables new applications on Smartphones, Smart Glasses, City-wide Outdoor localization and tracking : like accurate AR way-finding, visualizing urban points-of-interest, social AR, architecture pre-visualization and historical restoration. The design and analysis of geometric algorithms has seen remarkable growth in recent years, due to their application in, for example, computer vision, graphics, virtual reality, medical imaging and CAD. 

Onwards — The next era of spatial computing and how Google allows us to experience 3D & augmented reality in Search : the user experience is still a primary obstacle for AR mass adoption and the biggest obstacle for VR mass adoption too ; as it is gradually gaining influence on automobile industry - In the future , people will have access to information via glasses, lenses or other mobile devices ; autonomous vehicles, drones and robots move freely environments - understanding where they are; where they are going and what is around them -. By solving the problem of inaccurate positioning from GPS to camera-enabled  Scape’s VPS long term vision, many of the applications once imagined by AR developers, are now a reality and It's expected to AR revenues surpass VR revenues by 2020 - Knowadays , almost everyone owns a cellphone. Plus, mobile phones have upgraded to the required hardware for AR technology including CPU, sensors, and GPU - enabling infrastructure for a vast array of new spatial computing services , accelerated by the imminent arrival of widespread 5G networking and edge compute, delivering massive bandwidth at extremely low latency .

RESEARCH COLLECTION | 2020 - Web VR Experiments with Google

LEARNED LESSONS | 2020: Estruturas WebXR

TOOLKIT AR | 2020: New Spark AR Studio Integrations Arrive in Blender/ Creators can now build 3D assets and AR experiences more efficiently.

"Customer experience with Digital Content refers to a customer’s perception of their interactive and integrative participation with a brand’s content in any digital media. " - (Judy & Bather, 2019) -

In addition to adding Augmented Reality to the product value, Microsoft has been offering MSOffice applications for its HoloLens device and showing what future offices can look like without screens and hardware. This could also point to new virtual competitors. AR apps can serve as a further direct-to-consumer channel. Some unanswered questions that are both theoretically and managerially relevant are: "How does it impact consumer-brand relationships, for instance, if consumers 3D-scan branded products and replicate them as holograms? How do consumers interact with virtual products in their perceived real world, compared to real products - what advantages and disadvantages do consumers see ? Which dynamic capabilities drive the success of Augmented Reality Marketing? Which competencies do Augmented Reality marketers need? How should these requirements be integrated into digital marketing curricula to lead for better decisions and lower return rates? How should Augmented Reality Marketing be organized and implemented - How does good content marketing or good storytelling - inspirational user experiences - are organized? What drives the adoption of Augmented Reality? What advantages and disadvantages do consumers see in virtual versus real products ? How can the success of Augmented Reality Marketing be measured?"



_______________ At the End of the Event I suggested Filipe Barroso ( responsible for organizing the Lisbon Google Developer Groups Event ) that it would be invaluable to get in touch with programming schools like ETIC that we all could engage into future educational workshops together - intersecting areas and interact with the events. For a person who is learning it was important to interconnect: students expressed opened to initiatives that included group and teamwork contexts - sharing knowledge and opportunities to grow - .



When I spoke to Filipe Barroso, I felt it would be a good initiative for all - to generate revenue and bridging the gap between knowledge seeking and sharing an opportunity for self-discovery and personal development. Eventually, other initiatives starting with this GOOGLE event spread on the same direction , so web development / media-programming colleagues, brought up a bridge together event # Code in the Dark - merging different courses in a workshop google event. I felt willing, because it taught me more than programming skills that any good proggeammer strives, such as coding(20%) ; algorithmic thinking (30%) ; computer science and software engineering concepts (25%) ; languages and software technologies (25%) : The importance of these Soft skills and proactive initiatives also from others, which I learnt from during this process, was for me more about "Sharing" in "Effective Interpersonal Relationships": aware that all social movements, are about others, how to learn with each other as a team; co-working towards mutual success and not towards an individual behaviour. This is what I understand to be the qualities of teamwork and #the road to create value. When studying programming, soft skills come at use in a practical way - job collective satisfaction beyond a collective co-working perspective range.




Intersecting Personal Experiences - I got to the conclusion that Technology itself continues to evolve creating performance and productivity opportunities for business and even reshape the way we imagine social network as it interacts with the future. Tech and IT Organizations
suffer from constant changes due to hardware evolution - this pushes competition between industry sectors - What elements are needed in the Digital supply network transformation methodology: • What does digital supply chain look like ( vision )? • What is the implementation roadmap - what are the value drivers and dependencies ? • What is the project plan for piloting a digital thread and cost ( ROI opportunities ) ? • How long will it take to scale up, reconfigure the existing supply chain processes , Prioritization that mitigate risks?~ That's why I understand the importance of educational skill upgrades inside tech associations and organizations [ Professional development , through courses or training ]. Skill upgrade should not be ignored if it really wants to make business-market differences. That is also the main fact why I have pursued knowledge in different Educational systems. In a world of constant transformation, it is important to stay up to date and try different approaches. You get to a point realizing solution's that disable our ability to grow and innovate will not work to survive.

Even Though, I witnessed a kind of resistance to CPD - Continuing Professional Development (CPD) – Continuing Education – Some companies feel threatened or create resistence ( encounter reluctance) - having hard time in understanding on how corrosive This attitude could turn out to be for every coworkers productivity and creativity: it only retrogrades growth and creates miss understandings or internal conflicts that could be easily solved with Education and shared perspectives. Training can also become a means of altering behavior, not in a punitive way but so that gaps inorganizational performance can be closed. Redifining the value is not just about profit maximization issues, but sustainable growth towards the measure of value ( Value Creation vs. Revenue Extraction) . The concept of training has many more aspects than just learning a skill: : Productivity; Quality; Empowerment of intellectual property; Alignment & Teamwork; Liability; Risk reduction; Professional development that supports employees in gaining a wider perspective in theirjobs and in their personal lives ; evaluates what level of performance will be required to assist the organization inachieving its goals; Establishes a strategy to meet current and future needs; Determines where gaps currently exist between the existing performance andthe required performance - Preparing for Change through Knowledge Sharing; Business Conduct and Social Responsibility. The Reduced cost comes with improve quality , for example, reducing the amount of rework and returns. Similarly, we reduce cost when we raise productivity or decrease lost time due to accidents.



Just like The best stories have interesting characters that have been put into a difficult situation, I learned with past projects that the path to ensure growth and create value in a business ecosystem is a process that integrates consistent elements - such as , resilient; security / compliance; interoperabile ; flexible scaling : combining with the right tools for the team to grow from a human and professional point of view. Important tools, that allow development teams to deliver software or other projects at an ever-increasing pace without compromising quality , because sometimes it can be easy to lose oneself in overwhelming routine . Cultivating a Knowledge-Sharing Culture- properly documenting failures also makes it easier for other people (present and future) to know what happened and avoid repeating history - To avoid erasing tracks instead, light them up! Informed individuals are less likely to panic as they understand what’s going on and how to respond appropriately. They’re more likely to prepare and prevent disasters when they understand the real risks that they might face — to improve your security wisely, to maximize the impact, and the metrics you’ll need to make decisions, set goals and track progress. Software designers, developers, and architects are constantly confronted with the same confounding problem: how to design software that is both flexible and resilient amid change. The more connected, proactive or knowledge sharing, higher the quality exchange between employees and more productive / healthy workplaces - . Why is it so important being organized and have a balanced legal / liable business plan ? Those who own "brick-and-mortar " operations, must understand liability and how it affects them. Unfortunately, accidents happen all the time. Understanding liability, conducting trainings, getting proper coverage, and other steps can act as a shield against financial claims. As you work to make your business safe and prevent accidents. If a client is unhappy with deliverables, timelines, or even the outcome of the project, he could file a lawsuit based on your management service agreement / contract . Upgrade, migrating knowledge ecosystems will deliver reliable, legal, faster performance to all staff. It's also important to put inside the clients skin: Consistency determines rather they decide to stay with contract or walk away towards other services.



"If you're facing error, call it version 1.0 and keep trying! "



When I look back to this event, even though I wasn't totally prepared to understand some concepts, it did make sense later. This is the process of knowledge: to realize that even if something does not make sense back then , it will eventually connect in the Future. There are alternative ways to connect - You don’t have to follow traditional advice or go to events to successfully build and maintain a valuable network. Most are mixing bowls for professionals who are there for different reasons. While attending , I realized how Millennium Professionals don't like the idea of meetings, but contradictorily waste amounts of time on more expensive events without a good return on their investment of time and money. An activity should be meant to increase the value of your network and/or the value you contribute to it. Proper networking is about building new relationships and deepening your existing ones.

LEARNED LESSONS | 2020: Build useful apps, internal tools, simplified workflows, or brilliant bots for just your team or Slack's millions of users.

Communication in teams is equivalent to the neural network of the human body. Technology that supports collective interaction include online discussion boards and mailing list. So even after the google event, I opened a channel online - on our Computer Science SLACK called "eventos_tech" - the virtual space, where I shared all that I learnt in group, as an incentive to my colleagues sensibilize towards the importance of exchanging knowledge and being there to help the other - the notion of shared workshops and events on tech , creates or motivates towards other bigger challenges. It was also important to understand how Thee lack of an adequate project scope to contextualize the project so that it does not become dispersed or mispercept by teamwork members and even future clients; underestimating the time and effort required to deliver a task can turn a challenging project into a hellish project. Without clarity and vision we’re unfocused, going nowhere fast.

Another thing to consider is that the way people learn and digest information is much different from what it was in the past: Every person will have his/her own way to learn - their own learning process : a time to absorb information and a time to be able to learn how to decode , inter-connect and re-create ideas - respecting this is understanding oneself - to be aligned with your consciousness . Change is about alowing transformation of ideas. Reenforce knowledge , comes with consistently learning - Go back to the start - relearn and try it out - implement data , sharing experiences ; teaching others after learning it, in a clearer way. What lacks proper hierarchical structure needed for learning a subject matter thoroughly, because this could lead to your being stuck quite frequently. In short, you will not have the know-how—the comprehensive knowledge—you need to use that language as a tool—. Workshops and interactive educational programs help people understand themselves ; be in contact with the market; sharing and gripping the right knowledge : It’s these type of events that lead to opportunity. My advice is to Get involved in new activities; lead with curiosity ; Talk to new people ; Explore new subjects that you’ve wanted to knowmore about; Think about small experiments thatyou can run in order to learn and create opportunities to thrive both personally and professionally. In the end , It is up to you to make the world a better place - rediscover views from an intersectional lens. It takes a proactive plan to bring your views to light. Surround yourself with people who value the perspectives and insights you have to offer as a multicultural professional. All too often, we ignore or actively change who we are in order to feel accepted into a group, a team or organization and we lose ourselves in the process; who truly see yourpotential and whose opinion you value to form a success team. The best way to move from a state of powerlessness to empowerment isto have a clear understanding of what you want personally and professionally, how it impacts your life, and what you need to do to attain it. Plans don't have to be elaborate or complicated. "What is one thing you want to change in your life? What do you need to do to get there?" - Once you get clear on what you want to transform,you find the psychological ease that comes with feeling aligned with your goals and ideals ; personal growth and development is an automatic key to making a difference in life : you can make conscious decisions to either continue along or use these current to move in a different direction. Without the conversion of putting theory into practice, time is lost, resources are wasted, and lessons are not learned. It's becoming harder to retain knowledge without it being applied regularly.

Developers need "soft skills" like the ability to learn new technologies, communicate clearly with management and consulting clients, negotiate a fair hourly rate, and unite teammates and coworkers - nurturing gratitude - in working toward a common goal. Throughout the years, I learned not to fear my own opinion, even if others do not understand / disagree decision making. I don't fear Failure and rather prefer to start from the beginning or unveil "key" strategies, because I believe in the capacity to overcome obstacles. There's nothing wrong in finding a better version of oneself . Acknowledging your strengths and weaknesses rather apply the learnings from each experiment in future efforts. Error can teach us more about a problem that we might not have seen before and prepare to identify risks : by identifying / understanding where the project fails upgrades the impact of effective risk management and compliance (Key To Innovation) on project success. This doesn't mean I keep repeating the same failures all over again, but instead, commit myself to encounter knew challenging ones , so I can learn more throughout the process of measuring / tracking sequences of keystrokes, that reconfigure awareness networks.



  • NASA DATABASE MATHMAGICIAN #R VS #PYTHON
    #R-Ladies #R-LadiesMadrid #DataScience #DataVisualization #NASADatanauts http://hadley.nz/ R VS PYTHON : Choosing R or Python for Data Analysis? :https://www.datacamp.com/community/tutorials/r-or-python-for-data-analysis; Tidiverse: https://www.tidyverse.org/learn/ https://www.todojs.com/javascript-data-scientist-bea-hernandez/.
  • Web framework for building virtual reality experiences

    https://aframe.io/; https://sketchfab.com/
  • TensorFlow for Poets:

    https://codelabs.developers.google.com/codelabs/tensorflow-for-poets/#0; Deep Reinforcement Learning: Playing a Racing Game : :https://lopespm.github.io/machine_learning/2016/10/06/deep-reinforcement-learning-racing-game.html https://www.theverge.com/2016/1/22/10813984/google-deep-learning-udacity.
  • Polymer-Project

    https://www.polymer-project.org/ https://nodejs.org/en/ https://samcarecho.github.io/polyvr/
  • WEB COMPONENTS

    http://reactivex.io/
  • CODE

    -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

------> Google Developer Groups (GDGs) are for developers who are interested in Google's developer technology; everything from the Android, Chrome, Drive, and Google Cloud platforms, to product APIs like the Cast API, Maps API, and YouTube API.



💻🔒 CYBERSECURITY AND SUSTAINABILITY 📚 - THE DYNAMIC DUO -

📅 TYPES OF ATTACKS - THREATS LAUNCHED AGAINST CLOUD SERVICES - |  Lx Feb, 2023

# Updated on April - 2023

100%

      Securing cloud environments is complex; one misconfiguration can lead to major data breaches. Misconfigurations cause 80% of data breaches, and human errors could account for up to 99% of cloud failures by 2025. These attacks apply to all cloud service types (SaaS, IaaS, PaaS). Organizations must implement strong security measures. Cybersecurity, sustainability, and AI combine to create a potent synergy. Robust cybersecurity safeguards critical infrastructure, ensures data privacy, and uses AI for threat detection and sustainable development. This synergy aims for a tech-driven future with reduced environmental impact and secure digital systems. How cybersecurity and sustainability are interconnected and how artificial intelligence (AI) can contribute to this dynamic duo?

1.Protecting Sustainable Infrastructure: Cybersecurity is vital for safeguarding critical infrastructures like smart grids and transportation networks, ensuring uninterrupted essential services and minimizing environmental harm.

2.Data Privacy and Green Computing: AI enhances data privacy through advanced encryption and optimizes energy use via intelligent resource allocation, supporting eco-friendly computing.

3.Sustainable AI Development: AI optimizes energy consumption in sectors like transportation but must maintain security to prevent vulnerabilities. Robust cybersecurity across the AI lifecycle is critical.

4.AI-Enabled Threat Detection: AI and machine learning analyze real-time data to identify cyber threats efficiently. AI-driven threat detection enhances cybersecurity against evolving risks.

5.Ethical Considerations: As AI advances, ethics gain importance. Fair, transparent, accountable AI systems are crucial, especially in cybersecurity. Bias-free algorithms with explainable, auditable decision-making promote responsible, sustainable cybersecurity.

100%

      IaaS (Infrastructure as a Service) offers virtualized computing resources on a pay-per-use basis, saving costs on hardware and enabling scalable app deployment. AIaaS (Artificial Intelligence as a Service) builds upon IaaS, making AI integration accessible without AI expertise. Major cloud providers like AWS, Google Cloud, Azure, and IBM serve as the IaaS foundation, providing essential computing resources for AI tasks. By using these platforms, organizations gain access to high-performance computing, scalable storage, and networking for AI. Cloud providers also offer AI-specific services like pre-trained models and APIs for easier AI integration. AIaaS democratizes AI by making advanced artificial intelligence capabilities accessible and usable by a broader range of users, regardless of their technical expertise. Enterprises should consider AIaaS when looking to integrate AI without AI specialization. AIaaS monetization involves offering AI capabilities as a service, raising revenue through AI functionality. It offers accessibility, affordability, scalability, and faster time-to-market, enabling organizations to leverage AI effectively without extensive investments or technical know-how.

Enterprises should consider adopting AIaaS under the following circumstances:

1.Limited AI expertise: If an enterprise lacks in-house AI expertise or resources, AIaaS provides an opportunity to leverage AI capabilities without the need for extensive hiring or training. It allows organizations to benefit from AI technologies quickly and efficiently.

2.Cost considerations: AI development and deployment can be costly, involving investments in hardware, software, and skilled personnel. AIaaS offers a cost-effective alternative by shifting the expenses to a pay-as-you-go model, reducing upfront capital expenditures.

3.Scalability requirements: If an enterprise needs to scale AI initiatives rapidly or handle fluctuating workloads, AIaaS platforms provide the necessary infrastructure and flexibility to meet these demands. It enables organizations to align their AI capabilities with business needs efficiently.

4.Maintenance and Experimental Projects: Provide ongoing maintenance for AI models and offer custom development work for specific customer needs, charging separately for these services.

AIaaS providers employ various monetization strategies, including pricing models and customized packages.



Additionally, some offer MLOps (Machine Learning Operations) as a separate service, encompassing best practices for managing machine learning models. MLOps costs can be part of the subscription fee or charged separately, depending on support and resource needs. Keep in mind that pricing strategies may vary among providers and industries. IaaS provides virtualized computing resources, while AIaaS leverages this infrastructure for easy AI integration. Leading cloud providers like AWS, Google Cloud, Azure, and IBM Cloud offer IaaS platforms, enabling seamless AI integration for various use cases. Other cloud service models include: PaaS: Complete application development and deployment platform, freeing developers from infrastructure concerns. SaaS: Subscription-based software applications delivered over the internet, eliminating local installation and maintenance. FaaS: On-demand code execution platform, abstracting infrastructure and scaling worries. DBaaS: Cloud-based database management for scalable, secure data storage. BaaS: Cloud-based data backup and recovery, eliminating on-premises backup infrastructure. DRaaS: Cloud-based disaster recovery, replicating critical systems and data for easy recovery during disasters. Organizations can select the service type that best suits their needs.

     
There are several types of attacks that can be launched against cloud services, including:

DDoS Attacks: Distributed Denial of Service (DDoS) attacks are a common type of attack on cloud services. In this type of attack, the attacker tries to overwhelm a cloud service with traffic from multiple sources, making it unavailable for legitimate users. Data Breaches: Cloud services are often used to store sensitive data such as personal information, financial data, and intellectual property. Data breaches occur when unauthorized users gain access to this data, either by exploiting vulnerabilities in the cloud service or by stealing login credentials. Man-in-the-Middle Attacks: In a man-in-the-middle (MitM) attack, the attacker intercepts and alters communication between two parties. This can allow the attacker to steal sensitive data, inject malware into the communication, or impersonate one of the parties. Malware Infections: Malware can be introduced into cloud services through several means, including infected software updates, malicious email attachments, and phishing attacks. Once installed, the malware can be used to steal data, control the cloud service, or launch additional attacks.Insider Threats: Insider threats occur when someone with authorized access to a cloud service misuses that access to steal data, cause damage, or launch attacks. This can include employees, contractors, and other authorized users.Cryptomining Attacks: Cryptomining attacks use a cloud service’s computing resources to mine cryptocurrency without the owner’s knowledge or consent. These attacks can slow down the cloud service and increase its costs. API Attacks: Cloud services often provide APIs (Application Programming Interfaces) to allow other software to interact with them. API attacks occur when an attacker exploits vulnerabilities in the API to gain unauthorized access to the cloud service or its data.

           Cloud services confront a myriad of security threats, spanning DDoS attacks, data breaches, man-in-the-middle attacks, malware infections, insider threats, cryptomining assaults, and API vulnerabilities, all of which imperil data integrity and system availability. Effective mitigation strategies involve implementing external network monitoring, conducting penetration testing, and enforcing robust internal security protocols. Particularly for Software as a Service (SaaS) providers, given the multi-tenant nature of their platforms, safeguarding against potential breaches compromising customer data is imperative. Addressing common vulnerabilities like misconfigurations and software flaws necessitates routine security assessments to ensure mitigation. As SaaS companies expand their operations, prioritizing cybersecurity becomes indispensable. Amidst the challenges of digital transformation in the 21st century, there's a pronounced tendency to prioritize technology adoption over strategic planning, often resulting in suboptimal alignment with long-term business objectives. Moreover, an undue emphasis on data quantity over quality can lead to decision-making based on incomplete or inaccurate information, exacerbating risks. Neglecting employee training and change management when automating processes risks workforce resistance and impedes technology adoption. Additionally, the absence of adequate cybersecurity infrastructure looms as a significant concern, underscoring the need for manufacturers to allocate sufficient resources to address cybersecurity risks effectively. By employing automated vulnerability scanners and conducting regular penetration testing, organizations can fortify their web applications, detecting and mitigating vulnerabilities throughout the development cycle, thereby ensuring robust protection against potential threats.

Hack-Cyber QuiZ -- CLICK TO PLAY --

















scroll me







THE BACKBONE GUIDELINE BUSINESS PLAN

PART I - Working with Teams | Accountability & Responsibilities.
📅 BLENDS OF INSIGHTS - NEW GOALS REQUIRE NEW STRATEGIES - |  Lx Feb, 2020

# Update on August - 2022

"One cannot appreciate a sense of mission without Purpose, Vision and Value Alignment - binding standards of a business plan ."

      As the world evolves, businesses struggle to stay up-to-date with new technologies, market trends, and consumer behavior to remain competitive. This can be challenging, as businesses must continually invest in research and development, training, and innovation to keep up with the changing landscape. An adaptive mindset is essential for confronting these challenges directly. Acknowledging opportunities and managing risks are essential for sustaining long-term success, influencing both individuals and entrenched paradigms, which can be resistant to change. Change management, applicable across diverse organizational contexts, demands a structured approach akin to project management, minimizing errors and facilitating seamless transitions. The intricacies of decision-making and strategy formulation are amplified during transitional phases, highlighting the significance of comprehensive analysis. In the contemporary landscape, organizations must prioritize continuous learning, foster collaborative teamwork, and enhance communication strategies to adeptly respond to societal shifts. Achieving results hinges on engaging stakeholders and fostering a culture of collaboration, rather than succumbing to self-interest or competitive isolation. Common catalysts for change encompass technological advancements, process enhancements, crises, evolving consumer preferences, and external pressures such as market entrants, acquisitions, mergers, and organizational restructuring. These catalysts invariably impact individuals, challenging established norms and displacing comfort zones. Proficiency in Organizational Change Management is indispensable across various professional domains, spanning leaders, team members, project managers, IT specialists, HR professionals, and beyond. Integrating change management with project management is pivotal for seamless execution and optimal outcomes. Treating change initiatives as social endeavors rather than top-down mandates enhances their effectiveness and acceptance. Leveraging data to identify patterns of high performance aids in pinpointing communication barriers, inefficiencies in team structure, and spatial configurations conducive to knowledge sharing. The integration of risk management and compliance cultivates a culture of ongoing enhancement, reducing deviations from standards while optimizing resource utilization. Organizational Change or Transformation Management entails crafting robust strategies and predictive models informed by data analytics to avert false starts and optimize outcomes. With an adaptive mindset and a structured change management framework, businesses can navigate transitions successfully, realizing their envisioned objectives.

Organizations want IT methodologies that operate at multiple speeds, that knows how to balance speed and agility with stability and reliability. Professionals with agile support face the challenge of continuously generating value for customers and businesses through small changes. With the increasing influence of digital transformation, frameworks such as DevOps, Agile, and Lean have been updated to better integrate with operationalized processes and deliver measurable results. To achieve desired output objectives, a workflow is important, and sketching materials and tools like logbooks and diagrams, including all types of UML diagrams are necessary to facilitate the interplay of ideas. Creating a teamwork structure with a strong outline plan and a continuous improvement process can eliminate constant problems and deliver profitable results without feeling overwhelmed. Additionally, professionals can benefit from becoming software literate and considering social sustainable-responsible strategies.
--> It works best when it's a two-way street.

In my personal journey, I have taken a deliberate approach to growth by learning from diverse school models and connecting with their outcomes while questioning them, as it has allowed me to gain comparative insights and deepen my understanding. Advantageous within the visual arts learn how to distance critically, as they rebuild tools to become software literate, considering social sustainable-responsible strategies . We often hear of projects that ended with some unmet expectation in terms of deadline, cost, or quality. Programming has taught me how team visions and individual attitude towards different tasks determine performance and clarity as a network -. More than just making code result into one particular solution, I look for different approaches / comparing results on documented data - Understanding test automation. Attemptive to what experts do, enough times to change my own way of doing things.
The process of mastering a skill involves dedicating time to organizing data and practicing through hands-on projects. With enough repetition, this process becomes automatic and helps build problem-solving habits while promoting critical thinking skills. This leads to a self-reflective and knowledgeable attitude that goes beyond conscious awareness and enables you to connect valuable insights about various industries, products, services, and customer needs. Similarly, when applying data to a business, it's crucial to understand the organization's approach to data and create a structured value proposition and business model that aligns with customer needs, generates scalable revenues, and establishes a proper product-market fit. Neglecting external threats and resources that don't align with critical elements of the model or failing to reinvent the model proactively can lead to failure.

Everyone fails in the absence of structure, but can we all learn from it without taking it personal ? Often in our lives, we are so busy jumping from one task to another that we cannot prioritize or audit our communication channels. This can create a false sense of team culture that normalizes chaos in the workplace, leading to contradictions and flaws in the focus on value. Regardless of the quality of work produced, this attitude creates a culture of overwhelmed and overworked employees instead of promoting personal and professional growth. Toxic work environments can also emerge, leading to submission to a more powerful or authoritative entity and a sense of distrust or injustice. Do we wish to work in freedom or fear? - Defying the crowd can be difficult because nobody wants to admit they’ve made a costly mistake. - So, What is made of the personal contribution protection, the genuineness and the integrity of the creations / of works?- The protection of personal contribution, genuineness, and integrity of work becomes threatened when we do not recognize where it is originally directed. This can result in a culture of thinking hijacked by those who have no idea what they are talking about. Agile has split into various camps and methodologies - A growth percentage - from what base?  - Acting kind is not the same as being human; otherwise, you're essentially a machine governed by opaque rules. Effective communication involves not only speaking clearly, but also listening actively to fully understand what's being said and taking personal responsibility. One of the most frustrating scenarios in communication is when two parties think they're on the same page, only to realize they're not. Too often, misinterpretation leads to misunderstandings and conflicts.

The value chain requires exchangeable knowledge that aligns sustainably. Sacrificing quality to accelerate delivery tends to backfire more quickly than expected, as it affects our ability to continue, maintain, and adapt. Our attitude towards ecosystems and business models matters. In a world where everything is instant and on-demand, we rarely have the chance to think through recovery, even though the rewards of training and discovering new strengths and weaknesses about ourselves are immeasurable . To succeed, we need to understand business intentions, build scalable tools, manage time, and recover during projects. A project plan needs more consideration than we think. Measuring cooperation and competition reveals motivation and provides insight to either cooperate or compete. If people only work for themselves rather than a group, society becomes less functional, while untapped potential remains if individuals are irrationally pitted against each other rather than united towards progress. Collectivist cultures are better at realizing situations, while low-trusting and high-trusting people react differently. Committing to a goal correlation without skipping progress takes time to align with the learning curve of scaling teamwork performance. Overall, businesses that embrace change management and continuously learn and generate new knowledge and practices will have a competitive advantage in the marketplace.








Business Benefits is the value of lessons learned - We have to learn from our mistakes - align incentives with outcomes that improve efficiency, but not in a punitive way.

    Businesses should embrace lessons learned and use them to improve processes and best practices, enabling organizations to apply knowledge from previous projects to new initiatives. This approach allows organizations to leverage their previous experience and improve their processes over time. Any business challenge, whether it's simple or complex, big or small, mission-critical or optional, cannot be solved unless we have a clear understanding of the functional requirements that identify the core features of an application. Poor knowledge-sharing practices consist of lost productivity, duplicating work, and people leaving. Accessible knowledge management is a priority for decision-makers and gives your team a competitive edge by promoting collaboration capable of efficient optimization, boosting engagement, enhancing customer experience, and improving retention rates. Many factors come into play in a plan, including the type and size of the project, team knowledge bases, time to market, scalability, maintainability, and overall cost. In the process of integrating business applications, including the operating system, programming language, network management protocols, or database architecture filters/structures, the business model is effectively filtered. The hierarchy of procedures helps to ask the right questions and understand methodologies. Teamwork performance management and hardware systems are the primary goals to automate, increase productivity, and improve cooperation scalability. I chose to learn from divergent school models to gain comparative insights, connecting and questioning the outcomes. I concluded that the combination of strategies/tools is what drives experiences. I think it's a humble effort to upgrade skills as perfection is an illusion. Whenever a person is willing to make mistakes or test a variety of different ideas, there is a risk of incoherence. This can lead to confusion or lack of understanding among those who are not familiar with the necessary elements, foresight, and database tools/hardware skills required to build and design the project's main architecture. Such an attitude can cause serious damage to the business's integrity in the long run, as well as waste resources, time, and money on fixing and maintaining the project. Once the project gains questionable traction and momentum, - What could possibly go wrong?"
___Production environment is different from research : There are personalized approaches I usually make while collecting and gathering data into the process model / Pipelines - Deploy and monetarizing results through Efficiency test, require questioning attitudes : " How do you collaborate and distribuit work results within a team ? " ; " How can you ensure reliability and Performance on data? "; " Is my model results changing or acting throughout the project as expected - are they having different performances ?" - Adaptive Performance, improve optimization code for performance analysis. -- As Workspace frameworks gradually change, evolving and adapting according to the needs of each marketplace, in collaboration with other individuals - How can you adopt different business models in the same market and create a strong network? ----- Hybrid business models can be created by combining different models, but many value capture mechanisms fail to reach their full potential. Conflicts often arise due to differences in measurement, such as excessive pride leading to an unwillingness to see or listen, unrealistic team management resulting in rushed content creation and a lack of investment in quality testing and IT scalability, which can cause misleading projections and misdirected anger. To align a collaborative network, interdependence and integration must be managed to achieve desired economies of scale, skill, or risk. In fast-moving ecosystems with different market velocities, mistakes and errors in judgment can happen due to unconscious biases, lack of knowledge, or errors in coherence, correspondence, or decidability. However, if you form an opinion based on limited information that turns out to be wrong, it is not intentional misdirection unless you retain a knowingly false or hurtful opinion. It is wise to recognize mistakes, take responsibility, forgive yourself, and avoid repeating them to achieve profitability. A business model blueprint or profit structural model should reflect strategic tradeoffs and create a culture of contribution to the organization's sustainability plan. Through planning, sales and marketing, and revenue management, a company can define its mission statement, which outlines its line of business and purpose. The mission statement sets goals related to manufacturing, operations, and finances, and helps to determine the appropriate strategy for the business, such as investing in new real property and equipment and allocating resources of capital and people with updated knowledge. The purpose of the mission statement is to excite and motivate people to become part of the company, effectively manage risks, hedge against market disruptions, and develop a reliable competitive edge. To achieve these goals, a teamwork structure is necessary to bridge people and hardware/software tools with the appropriate mix of skills and knowledge. By encouraging the exchange of ideas, creativity, motivation, and job satisfaction, a teamwork structure can improve productivity, quality, and customer focus, and increase flexibility and the organization's ability to respond to fast-changing environments. In general, when addressing complex tasks with high uncertainty, it is important to work in a group to represent the different perspectives of the stakeholders involved. Whenever avoiding documentation - whether of failures or successes - represents a lack of commitment from both management and team members. The profitability of future projects and organizations may suffer if they fail to learn from past events and retrieve archived lessons for future use. Embracing lessons learned promotes a healthy culture of knowledge sharing within the team, resulting in considerable savings of time and costs, while improving future performance and project upgrades. Lessons learned are an essential source of information that can help improve processes and best practices and enable organizations to apply knowledge from previous projects to new initiatives. By analyzing these variances, organizations can implement corrective and preventive actions, such as obtaining the necessary resources to complete the job, ensuring that new IT systems meet business needs, managing risks and issues, clarifying roles and responsibilities, and establishing realistic and achievable benefits. --- Business Benefits is the value of lessons learned - We have to learn from our mistakes - align incentives with outcomes, but not in a punitive way : instead of control rather than flow; denying versus accepting; destroying versus building - we should be focused on creating a culture of accountability. Effective teams look for clear - shared understanding of objectives / equipment, , mutual respect , trust or appreciation of individual strengths and weaknesses - Creating an atmosphere of shared knowledge, turn into distinctive contributions.



------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

In high-uncertainty environments - cracks and faults begin to show, and your performance and health will suffer . It's not a win-win game ! Instead, results in a lack of foresight.

Even though great things take time, the backlash created by cancel culture is making some businesses unbearable. They bury overstatements of revenue and profits, shift attention away from legacy regulations, and struggle to raise money from third-party investors. Optimism often masks overpriced risky assets, leading to quick actions in the hope of speeding up products that are not fully understood, and that have no intention of retaining qualified workers for a long time. Burdensome trust conditions from bigger markets, changing labor market security, and labeling lobbies add to the hype-culture in desperation for adrenaline that employs a "magical thinking" strategy in the name of "innovation" and a vision beyond a set of risk factors packed with stories that celebrate success. They also rule out short-term independent contractors (made-for-the-occasion team) who are told to flout traditions, break rules, and glorify revenue with emotional branding without the need for a retrospective strategy or special competence. Appearance is empowered and placed on a pedestal over substance (bureaucracy vs. thoughtlessness). In other words, it "reinvents" by inversion, flipping mirrored concepts of "The invisible Hand" - Adam Smith's economic guiding force of the free market. This experimentation is taken to the extreme, inducing control over the exercise of authority and the capacity for influence, and that influence questions the limits of obedience, especially where other normative considerations are concerned, as seen in the banality of evil by Hannah Arendt.

-- In an economic equilibrium, businesses strive to maximize profits by exploiting every opportunity, even if it means taking risks that may not align with their investment objectives, risk tolerance, or time horizon. This approach, however, differs significantly from gambling. Living in a business culture that disregards flexible team dynamics and promotes an unbalanced, agile, decentralized work environment can have serious consequences. This transcodes the concept of "slavery" into precarious work, which affects society and its members, inducing them to conform to a market-driven social contract that sacrifices their dignity for a paycheck or validation from the business cult. While it may seem noble to create something one believes in, the reality is that it takes much more than a sense of freedom. A well-functioning infrastructure and an efficient manufacturing-distribution system are crucial for long-term profitability, despite the product's superiority. Organizational structures play a critical role in projects and project management. A teamwork structure with joint intentions, shared plans, and behavior improves operational efficiency by providing clarity to employees at all levels of the company. It creates a roadmap for creating solid advancement tracks for entry-level workers and supports team effort towards a common high-level goal. Without a formal structure, it becomes challenging for team members to know who they report to in different situations, and it may become unclear who has the final responsibility for what. In high-uncertainty environments, chaos reigns, and cracks and faults begin to show, resulting in a negative impact on performance and health. While some businesses may prioritize individual wins over collectiveness, not everyone is willing to participate in that kind of business model. It's essential to reflect on the type of organizational structure you work in and how it affects projects and project management. It's also critical to anticipate risks and opportunities to ensure that the project fully satisfies the client's exact needs, "defect-free" requisites, and expectations.

To assign responsible goals, the audit prioritizes specific areas of work. When operating in high-risk environments, it is crucial to comprehend the intricacies and mechanics of the work as it lowers the chances of strategic errors, enables the acquisition of crucial skills, and ensures the delivery of quality outcomes.. It is pointless to start something without a clear vision or valuable knowledge of how a sector works, including the network of contacts and potential customers or suppliers. A plan serves to provide the best approach for a specific task, giving you options if the unexpected occurs. People are free to choose to participate or leave at any time. The work path should bring out a natural, positive, and productive side of oneself, allowing for skill exploration and growth even in failure. One must recognize different ways of doing things as circumstances change. Everyone has different visions, but no career is worth risking ethical or mental health. A job that drains motivation or inspiration is a wrong decision. Passion and purpose differ in that passion is about emotion and can be fleeting, while purpose focuses on why we exist and aligning life choices with our authentic selves. Finding purpose will likely lead to passion. Sometimes a career change or introspection is necessary to ensure that responsibilities, tasks, and skills are suitable. No context should be seen as a personal judgment but as a professional perspective and an opportunity for reflection. It is crucial to slow down and look at the big picture, especially when something is being normalized through delegation of authority, rules, reward and punishment solutionism, and lack of accountability.

The absence of accountability erodes not only the culture but the vision, the strategy, the structure, the results, eventually the entire purpose or integrity of a Project .

Potential growth output should be grasped with both hands to create a continuous learning culture, providing a space to develop personal and professional values where everyone can cooperate and participate equally to survive and thrive amidst exhaustion and cancel culture. Millennials, Gen X, Y, Z, and future Gen A are more brand-focused and often motivated by unrealistic expectations, leading to burnout from overwork and the discarding of "short-term" workers pushed to their physical and mental limits to justify productivity and manipulate outcomes: " we’re wired to complete the easiest task on the vine, and rewarded professionally for our near-constant availability". This is why "fake it until you make it!" is the worst advise ever - Techies have often been counseled to do whatever it takes -The ugly, unethical underside : Growth hacking routinely employ a variety of tricks/strategies to boost their overstated revenue metric- and ROI-driven: Increasing users and revenue rather than profit and in dispair do stupid things never done, like forget who they are - an identity crisis ; lead the masses to buy shares based on revenue growth to take advantage of their lack of business education ( ): convince the world that rapid growth without profits is a good thing, promote their companies that show that result, get rich at IPOs, and leave post-IPO investors holding the bankrupt bag. Suddenly, we created a repeatable business model: "Grow fast, lose money (even if not yours), go public". We’ve turned into a generation of time-poor, financially struggling, anxious workaholics - obsessively rework apparent to-do-lists - That's why any "sense of conflict" rather reflects-represents a business plan culture problem. When a person is too exhausted to see or think as a result of unrealistically high standards of tasks, eliminating false perceptions todo-lists to avoid the real problem is pointless - the ignorance of cause-effect may cost a lack of integrity, frustration - withdrawal of missconceptions. The very broad contours of what integrity means (professional conduct). Failure is inevitable. However, teams can identify IT weaknesses before they expand system wide: identify issues to recover faster and automate controls that minimize impact. Whenever too many responsibilities are delegated to only a few people, expecting everyone else to keep up on highly-adaptive trait can actually impede resiliency, It takes responsible choices - missconfused to profit- and team cooperation - an understanding of internal plan-control to help individuals act as problem-solvers instead of victims of circumstance. You’ll likely experience setbacks along the way . Build resilience by improving coping skills, realistic planning and adaptability. The lack of work-life balance, fast-paced nature of today’s work environment means a greater risk than ever of becoming de-energized and emotionally drained.  My "burnout experiences" on "fail fast" business models taught me more than expected: due to the consequences of exhaustion, absorbed by the fast-forward network - you only get time to process everything after the experience filtered bubble - an exponential leap of awareness - "Hyper reality-experiences " wont result on long-term wealth . Instead, represent a deep dive into the psychology simulacra - glitchy narrative - of effective “surprise”: "alter sense ratios or patterns of perception" ( McLuhan ) . In practice, the obsession in moving fast is so high, that they ignore legacy regulations or anything standing in the way - It's so mainstream to break things anyway, that if you're lucky you survive the journey without getting sick or stuck in between tasks. Choosing between getting sucked into a simulated world - I'd prefer working at a proactive ecosystem - remain aware of environmental practices helps you grow realistically & learn progressively. "Self-awareness" is what sparks creativity in the first place - Everything else, are trends you experience - that unexpectedly redirect the flow of a game; The consequence of "speed-culture" - asssumes you engage into some kind of "cult" model - " sold to us as a better way of life, supported by myths, and ultimately allowed to develop into a self-sustaining reality. It is a map that has replaced the territory." ( Douglas Rushkoff ) - - a prophetic belief system , embedded in the technologies and shared business plans - . Media/show business do this with unconventional news feeds. Although Im familiar to fast business models mirror Silicon Valley startups in their extreme bias. It suggests that you act first and ask questions later, assuming that a few failures will ultimately get you to the right answer more quickly than more measured action - like blind faith as if "magic of success" is accomplished in a shorter period of time -- but then again, entrepreneurs are often enthusiastic about most things . Rather than throwing initiatives at the proverbial wall to see what sticks the best solutions, evolve progress through testing or learning Prototypes - It's not just an event experiment admonishing staff, but rather test-product that opens the team towards upgrades on enhancement perspectives - . A company that designs a complex airplane product, will build a smaller model to test before building a full-scale version. This allows for valuable information to be gathered that informs the design of the final product, at a lower cost and faster timeframe - So, rather than bumbling between failures in search of success, you'll become adept at breaking problems into small chunks that can be tested, with each test making your organization smarter, more adept, and able to move more quickly toward successful outcomes. In practice , a solid innovation in a quick ecosystem delivers no time to test and grow. Evgeny Morozov describes in his book: "To Save Everything,Click Here "- why the world's complex problems will not be solved by technology alone ( Tech Solutionism), if you intend to be a better or healthier version of yourself .  A majority solve a portion, and a few might cause new ones - warning on how becoming proactive, not reactive - helps to avoid super-hero culture; suggesting the development of resilient quality that views crisis as a learning opportunity for change. 
With the emergence of web sites, apps, and artificial intelligence (AI) , the rapid rise in AI might instill a false sense of confidence - given enough data and machine learning, it might appear that our solutions are able to Masking Root Causes; Potentially biased data; Costly Security issues.  The absence of accountability erodes not only the culture but the vision, strategy, structure, results, eventually the entire integrity purpose of a Project. To reduce misunderstanding of tasks, it's wiser to build good business case that can tie together the situation - its root causes; feasibility alternatives, and a cost-benefit analysis. Strengthening a culture of trust-based relationships increases job satisfaction, leading to greater engagement, higher productivity, longer employee retention & even decrease health care costs. - Design a Routine of self-disciplined attitude, in order to communicate with intent; Set Priorities - expect others to also respect and incorporate breaks to maximize focus, or prevent “decision fatigue”; It's important to restore motivation, especially for long-term goals. — Time, organization and management are important keys for a synchronous project : If everyone stays true to its personal goals and the company values, things eventually work out less overwhelming or anxiety saturation. Life becomes a cleared road to create value.

Common sense isn't always common practice - Its changing and likely to contradict someone else's idea / path : sometimes progressing or sometimes regressing.

Once written by Voltaire, in times when society was also changing rapidly and based on experienced perceptions, "It is sometimes said, common sense is very rare" - Changes due to rupture of values usually leave gaps in knowledge/wisdom in the upcoming generation. This can lead to occurrences of “common sense” failure. Reality works like mirrors: looking into it is like meeting yourself for the first time and not everything that looks alike is : -- “ Not everything is as it seems, and not everything that seems is. Between being and seeming there is always a point of agreement, as if being and seeming were two inclined planes that converge and become one. There is a slope and the possibility of sliding down that slope, and when that happens, one reaches a point at which being and seeming meet. ” ( J.S ) -- Whether we’re in sales, programming, management, ownership, marketing, research, or consulting , People cannot function to their optimal level if they are unclear about what is expected of them — including tasks, attitude and standards - as for creating an environment where change is possible, supervision and feedback are integral components of the workday can be a problem . Millennials may want to create an innovative workplace culture into "free people" concept:"try new risks;make mistakes". It's all very nice modern talking/thinking outside the box, but If a team member is chastised or enforced to act in a certain way / conduct , what kind of culture is really being created ? - one of fear , blind obligation, castration and manipulation to achieve certain results ? What is "common sense" to you might not be so to others : no one set of rules will fit all people in all situations ; -- Culture exists and influences behavior in organizations , so getting it defined correctly matters to achieve real results that deeply held beliefs and assumptions and drives behavior within groups of people. It will require emotional-intellectual integrity models to recognize that we all are individuals living under our own experience. You have the right to refuse to participate or even question some values : "On what do you consider proper and how does it differ from other co-workers or people around ?; On what is your set of rules based ? - Do you racionalize behaviour or pretend it is not happening, convince other's that it's not important or remove doubt about the issue - creating a false sense of culture ? Do your rules stay within the common practice, or do they hold yourself to a different standard - into the consideration dimension of absolute otherness pedestal and so for that reason everyone must obey or be captured into your vision or else will be punished ? Do you allow others to have their own ethics or must your ethics rule them all - unnecessary adverse impact ?" Eventually, we all experience once in a lifetime dysfunctional work teams behaviours in unhealthy organizations. Like learning a new musical instrument or sport, It requires setting aside time and making an effort to practice, to achieve better cope with such stressors. - The difference between living a life of peace and productivity versus a life of stress and resentment could lie in one simple skill: Learning how to say no. More than persuading team to accept their point of view in all situations, the modern manager should open up to different views on products, strategies or even internal administrative issues of the company, otherwise it will be more difficult to learn something, live together as a team and even improve their own performance.
Today’s society is obsessed with success and achievement , mainly due to the social media impositions - facilitating people to express and share ideas, thoughts, and opinions with others - , that failure ( a lot of ups and downs ) is replaced from the equation. A lot of success are in fact failures: the ugly parts are so hard to digest ! In contradiction, between being in control of your social media business and calling it disruptive, the truth is that It’s impossible to isolate business to what we fully own and control only . Even if you run your business entirely through your own website and email list, you rely on things you don’t own, such as hardware web hosting to keep your website up, or even software running effectively. You also depend on the CRM to function when messaging customers, that depend on electricity, phones/WiFi - otherwise, you are the product business- being the disrupted one instead, opposed to what is sold as an "ideology of democratic Freedom". It looks more like denying an extreme reliance on others (carelessness social-political movement). I actually believe on a balanced way of growth in a responsible way without beeing affected or affecting negatively the market ( social responsibility). Those who eventually manipulate results through individual oprression or ownership of property, actually mirror their own faults throughout actions . Cooperation is more important than Competition and Failure is not a step backward; it's an excellent stepping stone to amplify vision and perspective on the project. In fact, failure is essential to achieve success. Like planning a road trip: You need to know where you start, where to go, and how you will get there. Creativity doesn't have to be messy or perfect, but it does have a context and depends on the interpretation and transfer communication between different types of people / specialist - understating this factor, is neglecting team purpose / motivation - Mission, vision, and values: What do they say? - Something might look awesome on the outside - as a creator perspective - while it eventually induces a sense of "Good-Looking" products, if it lacks the consistency - suitability of the documentation that incentives workers and clients to grow as an individual with the organization - nor forget to consider ethical concerns - all the business project value proposition / wasted team energy effort remains volatile ; ambiguous short plan drawbacks ; even in face of modern " recycled ecosystems" - This is quite different from sustainable ecosystems , where the misconceptions of "eco" business plan idyllically " thinking outside the box " concept begins - . Even though you may have a sense on how the architectural micro-system levels work or interconnect - vital in terms of comprehending system scalability and functionality / Potential system bottlenecks  -, it doesn't mean you have to memorize or know everything about your project . It's actually not a bad thing to update knowledge, due to the extensive digital information (obsolete over time). A sense of insights rediscovering, brings memory forward with a new purpose / perspective. There is no shame in rediscovering like an amature - keeping the spark passion on. Documentation logbooks is a huge tool to maintain organized. It improves business practices & foster collaboration with interconnected Data-to-Insights Strategy, able to collect, prepare, and analyze relevant digital data, forecast gain advantages. Considering growth-value transfer, One shouldn't push too much to master something quickly because you're most likely going to fail to accomplish or pay for the shorcuts/false steps - Down the road it can speed up results in short terms, but it creates larger problems in the future -- It shouldn't be about owning trophies, but on how it is possible to create a culture of problem solving (CPS) or identifying opportunities when conventional thinking has failed - to understand something one must build on strong base . "Knowing and being able to do something, are two different things" Learning happens when you try and implement it by breaking things down.

📅 Bridging the Gap Between Training and Digital Transformation









CHOOSE TECHNOLGY WISELY : Digital Optimization

PART II - Invention vs Innovation || Quality vs Value | Lx, May , 2020

📅 Blends of Data to Gain Better Insight - For data travelers , knowledge explorers and hungry network-loving life-forms - Who's Encountering, Experiencing and Exploring Nature - like to get to the bottom of things .

# Update Insights on September 2021

“Digital transformation is not just the IT department’s job; it requires having a team come together to redefine how to access and use data for business results,” says Dave Ulrich, Rensis Likert professor at the University of Michigan’s Ross School of Business.




       As technology advances, it's important to consider not only its potential benefits but also its ethical implications, security risks, and privacy concerns. The hybridization of technology creates challenges and opportunities for digital content and services - particularly in the areas of mobile, IIOT / IoT, and wearable devices:

Challenges :
Fragmentation: the wide variety of devices and platforms available can lead to fragmentation issues, where content and services may not work correctly or consistently across all of them.
Security: the interconnected nature of internet-enabled devices increases the likelihood of security breaches, underscoring the importance of implementing measures to safeguard against such threats.
Compatibility: It's a challenge to ensure that content and services are compatible with a wide range of hardware and software configurations, which can vary greatly among different devices and platforms.
Complexity: developing applications for hybrid technologies, which combine multiple platforms or devices, can be more complex than creating software for a single platform or device due to the need to consider and integrate various different technologies.
Inequalities: certain groups may not have access to the latest devices or may not be able to afford the cost of upgrading their devices, which could limit their access to digital content and services.
Opportunities :
Reach : the proliferation of mobile, IIoT/IoT, and wearable devices offer new opportunities for creating personalized experiences for users, tailoring content and services to their specific needs and preferences.
Personalization: devices offer new opportunities for creating personalized experiences for users, tailoring content and services to their specific needs and preferences.
Innovation / New business models : combination of different technologies and devices can inspire new ideas and approaches to content and service development such as subscription services, microtransactions, and pay-per-use models, that can generate revenue streams and increase profitabilit.
Accessibility: Companies can expand their reach to new audiences and improve accessibility by offering their content and services on multiple platforms and devices.


      Digital content requires compatible data mediums for different hardware upgrades. High-end 3D software requires high-performance hardware, including faster processors, large memory capacities, and high-speed networks. Developers must optimize and secure this hardware, despite physical constraints in chip manufacturing and battery life. Integrating new software or replatforming existing software can be difficult due to scalability, connectivity, interoperability, and limited third-party library support. However, these changes can offer benefits such as shorter development time, exposure to more users, backups, synchronization, and performance updates. Developers must carefully consider all factors when integrating new technology or replatforming existing software to ensure success. This includes balancing technical challenges, compatibility with existing systems, and implementing cybersecurity measures. In an environment of thin margins, the wrong technology investments can have long-lasting strategic and financial implications. Therefore, it is essential to conduct thorough project scoping, accurately estimate the required resources and avoid underestimating the resources required. Additionally, embracing digital transformation and self-organization can foster adaptation and drive innovation, leading to valuable insights from unexpected sources.

The question is, what is the right technology stack for your project? --- Choosing in between Development Tools that can be Hybrid or Cross-platform vs Native Mobile App .
In times of disruption, a well-balanced approach to Business Agility involves embracing digital transformation. Self-organization can spur adaptation and drive innovation, resulting in valuable insights from unexpected sources. As with professional athletes, a solid game plan is essential. While exaggerated media content may capture attention, it can also cause confusion and spread misinformation. Inadequate project scoping and underestimation of effort can turn a challenging project into a nightmare. From Magic Leap to Meta, plenty of projects ran out of money before realizing a particular vision of a world in which layers of information exist on top of physical reality. While pieces of many early AR efforts continue, lots of creators already moved on from the earliest AR companies , even at smaller companies or on their own. ----- My major concern is designing robust and adaptable systems capable of processing high frame rate videos in real-time, even on basic equipment like a single GPU machine. These systems must be responsive to unpredictable collective behavior, and poor technology choices can drain time, resources, and mental energy with long-term financial and strategic implications. The market offers numerous technology assets, including robotics, wearables, sensors, and business intelligence tools, driving the growth of the ambient computer sector. System-agnostic users, IT teams that support any system from any location, and developers who can operate on any system are crucial for successful applications that run on various systems. - Good software design is a never ending learning process but the wrong technology can eat up valuable time, resources, and mental bandwidth, or worse, operating in an environment of thin margins, the wrong tech investments today can have strategy and financial implications that ripple for years.

      Again, the result is - Gearing up for the next big ecosystem battle : The race for rendering power and stable, low-latency connections has intensified with the emergence of 5G technology, which has the potential to connect various smart devices and power smart cities. Smart interurban shared mobility systems could use machine learning and AI algorithms to reduce perceived latency, such as those based on dead reckoning, Kalman predictors, and alpha-beta-gamma (ABG) predictors. However, latency can arise from multiple sources, including sensor delays, processing delays, transmission delays, and rendering delays. The challenge is that consumers must have 5G-enabled devices to benefit from this network, leading to security, political, cultural, and economic concerns. The debate over the conflicts between democracy and dystopia has become increasingly important.

Eventually, we’ll be connected to a metaverse - an open ecosystem, explorable across different platforms, devices, and engines - extending our senses of sight, sound, and touch; blending digital items into the physical world, or popping into fully immersive 3D environments. It isn’t simply a space you inhabit, but more like a digital parallel universe, where VR is one of its many access points - both Facebook and Nvidia have big plans for the omniverse: Nvidia launched its Nvidia Omniverse platform as a cloud-based platform ( running since 2019) to help 3D production workflows adopted from Pixar. --- "The balance—between positive and negative—depends on whether human can use the metaverse as a tool." ;"We need the skills and mindset to analyse whether something is fair, logical or even true, lest we condemn ourselves to bring out the worst in our nature". In fact, Metahumans make up another piece of the puzzle for the upcoming Unreal Engine 5 specifically for VR interaction (Unreal Engine VR Editor) --- To live in an optimized world, it is essential to identify the predictive questions that need answering and, more importantly, determine what actions to take based on that information. This shift in approach requires education and awareness.

RESOURCES COLLECTION | 2020 : RETHINKING DIGITAL TRANSFORMATION / Putting digital transformation into practice in 2020 : culture , process and technology

ANA PHI

SANCHO

SANCHO

ANA PHI

ANA PHI

SANCHO

SANCHO

ANA PHI

ANA PHI

SANCHO

SANCHO

ANA PHI







Invention vs Innovation - Part I

Invention vs Innovation - Part I



"Innovation means nothing if it does not solve problems or offer improvement "

As our society becomes more complex, it searches for even more specialized individuals who may be rendered unaware of how systems fit together. Entrepreneurs encourage their employees to "fail fast," prioritizing fast development and rapid revenue increases over product stability. Mistakening quests for scientific answers to unscientific questions offers pretended technological solutions to what are, at bottom, moral and political problems. This creates a contradictable loop, where instead of innovating business models imposed by modern society, false values/culture are fostered, which prioritize discardable products/people, moving fast, and ignoring consequences. Ultimately, people become the eventual product. However, understanding very specific domains requires abstracting away details. Otherwise, we don't have the mental bandwidth to grasp anything at all and inevitably gloss over important details, especially those that would help connect one set of questions to another.

Todays social media and hashtags enjoys a phenomenal success - From graphics, blog post images, Instagram Stories, and Reporting Tools , influencers Engagement Rate = ((Likes + Comments) / Total Followers) x 100 ) - Brand identity and Streamline Workflows include the results of campaigns, such as engagement rate, link clicks with media kit stats updating automatically to generating cross-platform reporting, or even items sold that actively promotes life for the sake of pleasure that should be gotten mainly from consuming - through imitation of other social groups’ style of living / TV stars and businessmen personal trainers focused on “behaviour change” - social acceleration - : on purchasing new gadgets, trendy perfumes, or non-stick frying pans. At the same time, they impose a sense of model on people's behavior, faking reality with the use of double bind dilemmas in communication arguments. They realize that most people now live to get a new "toy" right here and right now. Although quality boosts (supercharges) business, and quantity (vagueness/emptiness) can't match it, some reasonable but uncomfortable questions about social marketing re-examine the balance between the "wants" of individuals and the "needs" of society, which can be quite disappointing. Today's social indifference doesn't care that once you purchase the latest iPhone, you'll have to starve or eat instant noodles for 12 months, and that an expensive car will mostly sit in a garage because its owner won't have enough money for its service or even other competitors. The opposite of an open network, it closes into itself, becoming financially unattractive to established companies, fending off competitors and taking all the resources a company has.

Questions arise: " How do organisations articulate and realize their social media marketing objectives? What are their objectives, e.g. brand building, attracting advocates, increasing sales, enhancing visibility, cultivating community communication? Are objective short-term or long-term? "; How can client firms work effectively with their portfolio of marketing agencies to integrate SMM into the wider marketing communications? How is campaign success measured? Can different styles of communication be characterized, and if so, are some more successful for marketing than others? How can it contribute to the authenticity and trust that consumers place in the brand? What factors affect the success and impact of endorsement?



The Tech Hybridism brought new challenges -
generating massive creative graphic media and content web services . Videos and social media demand compatible data medium with hardware upgrade (mobile/IOT/wearable). A growing number of tools and computable platforms advances create a high-end 3D software that can only run on high-end hardware with faster processors, high-speed networks, and large memory capacities. Consequently, the change in hardware design due to physical constrains in chip manufacturing and battery life has had an impact on software development : GPU performance and the instructions of ordinary CPU processors - the add; move data and branch changed from a single-core to a multi-core design, increasing overall speed for programs that support multithreading or other parallel computing techniques — likely WebGPU vs Pixel Streaming Virtual Offices (render streaming or remote rendering) - the successor to WebGL - - Computer scientists navigate a spiral of complex choices as they grapple with the overload of information and the blurred boundaries between public goods and private investments in industries such as open source software versus proprietary software. A thorough understanding of memory allocation can give programmers greater control over their workspace and help them solve everyday problems more effectively. To comprehend how programming languages interact with the operating system and execute applications, it's crucial to grasp the underlying mechanics. While digital cameras have made photography accessible to all, collective intelligence data scrapbooking poses challenges in appropriating returns in industries where ownership can be ambiguous. Open source software licenses allow users to modify, use, and redistribute software under the same licensed terms, a collective intelligence phenomenon maintained by developers and users who share their work freely. However, open source may not be effective for large development tasks. In the business market, network externalities and first-mover advantages compensate for the inefficiency of traditional intellectual property rights such as patents.

Developing for wearables requires careful consideration of a range of factors, from battery life and thermal safety to cross-platform compatibility and performance optimization. By leveraging tools and techniques that are tailored to the unique needs of wearables, developers can create compelling and effective apps and watch faces that work seamlessly across a range of devices. The SmartWatch is one of the most popular wearable devices nowadays, mainly due to its interconnectivity with TVs, cameras, and other smart home electronic devices. Along with battery life and security, thermal safety for balanced performance of higher power consumption is the most common concern. Cross-platform compatibility programming also creates problems where data may enter an information system in various ways, and some might drain the battery or affect hardware components to their physical limits, making the cost not justified. App performance can vary between different Android or smartwatch devices because they use different chipsets and GPUs based on different Mali architectures. Whenever developers talk about different watch faces built with "Tizen Studio," "the IDE" (Integrated Development Environment), "GWD" (Galaxy Watch Studio), or even "Gear Watch Designer," a "web app," a "programmed face," or maybe only a "dev face," what this actually means is that the way a watch face was developed affects its functionality or update capabilities. Samsung's different APIs (application programming interfaces) enable taking control over the watch's hardware and software capabilities. Your app may render at 60fps on a Galaxy, but how will it perform on another brand? Similarly, you may need to optimize an app to run at lower frame rates on different Galaxy models, often found in emerging markets, with tools capable of monitoring/advising, analyzing, tuning rendering, and improving optimization code for performance analysis. Though 99% of the watch faces you'll find in stores are built with GWD, and only 1% are programmed in Tizen Studio, there are two "major approaches" to create a watch face, based on different software tools: 1. "Native" watch faces built with Samsung's Gear Watch Designer (or just GWD); 2. "Web-app" watch faces programmed with Samsung's Tizen Studio (or just "the IDE"). The same way that Adaptive Performance API tracks the average GPU and overall frame times through properties, the API also determines the current performance bottleneck so that you can adjust the game content at runtime in a more targeted way. For example, in a GPU-bound application, lowering the rendering resolution often improves the framerate significantly, while the same change may not make a big difference in a purely CPU-bound application. ---- "Developers should pay close attention to their game’s performance on players’ devices, especially when building more complex mobile games. After all, performance issues can affect gameplay and drain the device’s battery. An excessive amount of heat generated by mobile phones, more specifically, can also cause thermal throttling, which leads to dropped frame rates – an issue that is tough to recover from. So why does thermal throttling affect your mobile games performance?"

Disruptive technologies in emerging markets look at the world quite differently, though recognizing the pattern and figuring out how to break it are two different things . Each time a disruptive technology emerged, between one-half and two-thirds of the established manufacturers failed to introduce models employing the new architecture — in contrast to sustaining technologies . " The innovator’s dilemma ” is a tough choice that any company faces when it has to choose between holding onto an existing market by doing the same, yet slightly better (sustaining innovation), or capturing new markets by embracing new technologies and adopting new business models (disruptive innovation). Being selfish is not always a bad thing - sometimes, it brings out the best in you which in turn allows you to bring out the best in others, but in this context, everyone looses something with a broken disruptive system - it's not a win-win game. Managers must also beware of ignoring new technologies that don’t initially meet the needs of their mainstream customers. In order to achieve cutting-edge innovation within a company while creating a long-lasting business advantage, the latter should aspire to achieve both revolution ( Disruptive) and evolution (Sustaining Innovation ) . In a world that is increasingly mobile interconnected , multitude diverse or intercultural - the relation of all the kinesthetic system processing due to the accelerated times , forces the deconstruction of movement and action from an outside angle - critical thinking skills - replace a more passive form of intersecting points of view.

Everyday, I continuously spare time training myself on questions about High-scale Web Apps such as Software Architecture, System Design, Distributed Systems, Design Patterns algorithm and data structures, Scalability, Security, Data Stores, Containers, APIs, SDKs, and also read recent topics of Full Stack Platform for software engineering such as generative art , Iots , Proxies and Other Network Intermediaries, artificial intelligence and machine learning. I register it on my journey diary as documentation for my future interactive journal app, retouching subjects - making new connections, until it reaches maturity as I share some experiences. Modern web applications require more interactivity than ever before for client/server communications which requires constant research and coding reformulations on modern tools and techniques - understanding the capabilities of today’s web communication technologies ; deciding what to choose for the next web API design - web frameworks and environments.

The shift from the "client-server Web" to the "decentralized Web" will happen gradually rather than suddenly. As the web landscape changes and browsers improve, new features and APIs are continually being released. These modern APIs allow access to hardware and sensor APIs (PWAs), enable background synchronization (BackgroundSync Web API - RFB protocol over WebSocket), and enable the creation of dynamic web pages for interactive web applications. Various teams are working on different components of the emergent Web, while protocols are still being developed. Some applications, such as stock applications, require real-time data updates. Decentralized applications like "Tor," "BitTorrent," and "Popcorn Time" operate on a P2P network rather than a blockchain network. " Tokens are for the web3 what websites were for the WWW in the 1990s " Shermin Voshmgir, Token Economy -. Blockchain network is the processor fordecentralized applications that operate on top of the Web3 distributed computing to blockchain technologies -
that created Coinbase Commerce such as ethereum --- pnce.js is a JavaScript interface to the Ethereum blockchain or MetaMask - the easiest way to interact with dapps in a browser ( Crypto & NFTs: Network Effects in Web) . --- ---- Minecraft or Second Life, Decentraland launched by Streamium and Bitcore from the creators Ari Meilich and Esteban Ordano, are examples of a 3D space powered by cryptocurrency - blockchain-based virtual reality platform hosted on Ethereum’s decentralized servers was held in December 2017, and its second LAND auction occurred December 2018. The world is rendered using BitTorrent and Kademlia DHT networks too, making it a combination of blockchain and torrent P2P technology, native ERC-20 cryptocurrency token. - where you can build virtual worlds in a standard web browser, play games, explore museums , attend live concerts or events, etc. You can buy and sell properties, create and sell virtual art for the art galleries, or build worlds. Several business have invested in virtual land , and are willing to pay skilled builders to develop it.

The shift towards streaming began with music, and now consumers have more digital media options than ever before. However, many are frustrated with the complexity of piecing together their entertainment experience, and new design criteria such as APIs and the cloud are enabling the media supply chains of the future. The emergence of blockchain technology as a useful tool for applications that require transaction accountability is having a significant impact on video streaming technology. *´Blockchain is a subclass of DLT containing a particular type of data structure that allows storing and transmitting data in the form of blocks that are linked to each other in a digital chain. A key component of blockchain is the use of cryptographic and algorithmic methods to record and synchronise data across all participating nodes in the network in an immutable manner´. OpenstreetVR is a Blockchain based 360 Image View for Virtual Reality (VR) - an eco-power friendly, highly scalable, decentralized, merit based consensus engine for content identification, tracking and transfer of 360 panorama stills, videos and soon live streams XR media (Virtual, Augmented and Mixed Reality).OVR is built using Babylon.js (a high performance, GPU enabled, open source WebVR gaming engine) allowing display of animated virtual objects integrated with 360 content directly in the Windows Edge browser without the need for a custom app. It Rewards users with geoStreet tokens for capturing and uploading street level 360 views of the world’s 39 million kilometres of roadways and paths - implementing a blockchain, to lock down and track all content transactions on the site and a cryptocurrency to incentivize users for creating the immersive 360 street level content. Miners are rewarded OSXR coin for maintaining the ledger of uploaded content and token transactions. A geoMarket token powers the e-commerce side of the site.

Overall, predictive analytics algorithms can be separated into two groups: machine learning and deep learning - estimating numeric value for new data based on learnings from historical data to identify risks and opportunities. It answers this question: “What is most likely to happen based on my current data, and what can I do to change that outcome?” . While Predictive analytics works by learning the patterns that exist in your historical data, then using those patterns to predict future outcomes it finds even more paths of options to consider , Predictive tracking is the algorithmic process of predicting the future orientation and/or position of an object or body part , refers to the time between movement and when that movement is reflected on the display , that will be as useful and commonly-used technique for reducing latency : The object might be recognized with a camera, but it takes time for the camera to capture the frame, for a processor to determine where the object is in the frame and for a graphics chip to render the new location of the overlay. By using predictive tracking, you can potentially reduce the movement of the overlay compared to the real world . Both give insight, and even probabilistic foresight to support decision-making - decision analysis , optimization, transactional profiling, and predictive modeling. It offers implementations, that require some thought and analysis, but is essential to achieving a low latency tracking in today’s VR and AR systems. EXtended Reality (XR) hardware such as glasses, haptics and omni treadmills now use NVIDIA’s Omniverse , in order to combine open file formats like Pixar’s Universal Scene Description with network services , that you can connect or download with the software tools , to create media for VR and adapt / simulate other technologies; share data or computation that extends bandwidth range . The result is that anyone can collaborate across a variety of apps, in realtime, all editing and viewing the same assets - internet wired . It’s basically like collaborating in Google Docs for 3D worlds. This requires open programming language standards such as HTML, JavaScript, WebAssembly, WebXR, WebGPU Shader Language, etc.

- Collaborative applications need real-time data sharing, such as a game of chess or a Ping-Pong game , therefore WebSockets are majorly utilized in real-time web applications protocol , allowing to establish a full-duplex bidirectional TCP connection, where data can be exchanged in both directions - Understanding how different density servers with different configurations of hardware can benefit an organisation based on the applications they are running is crucial to delivering a highly performant and efficient infrastructure.

Using WebSocket client-initiated and server-initiated pings and pongs keeps the connection active open and ready for data flow : supports pings and pongs both to perform health checks on the connection and to keep the connection open. Now the question is : What are you actually transmitting through this connection, and how will the server know which type of data the content is? - Do you really need WebSockets API ,Server-Sent Events, and Cross-Document Messaging or are you searching for alternatives such as JMS ( Java  Message  Service) or AMQP ( Advanced  Queuing  Protocol) over WebSocket API in the same way as SMTP, HTTP, FTP, have created interoperable systems, that enables the creation, receiving queuing, routing (including point-to-point and publish-and-subscribe), reliability , security and reading of messages ? - ;

Polling vs SSE vs WebSocket — " How to choose the right one ?"; "How to choose among SSE, WebSocket and Polling? - Where we need to consider how we are going to send our data from the server to the client." - Whenever design a web application utilizing real-time data, needs to consider how you are going to deliver individual data from the server to the client. The default answer usually is “WebSockets.” But is there a better way? - Both HTTP and WebSockets are located at the application layer from the OSI model and as such depend on TCP at layer 4. Application / Presentation / Session / Transport / Network / Data link / Physical. ;

///////////////////////// Bluetooth ; Containers and serverless technologies - digital products such as, cloud infrastructure , mobile apps, big data pipelines, and social media—are influencing application development API allows web apps to enter the IOT-era by utilising a lightweight wireless protocol that many smart devices are equipped - with the rise of Virtual Reality / OpenGL , and so much more. It’s an exciting time to be a web developer and content creator if you willing to find a way to make technologies talk to each other. So, even if you build an extremely beautiful and fast website, it will still have to fetch resources over a network that can be prone to failure. That’s why it’s so important to build sites that are fast, engaging, and most of all reliable.

When it comes to choosing the right technology for a project, it's important to consider factors beyond just the latest trends. While new technologies may seem enticing, it's important to ensure that they can be implemented effectively and affordably while still maintaining the required level of security and integrity. Performance and connectivity are also crucial, as slow or unreliable connections can quickly impact an organization's ability to function. No connection or a slow connection will quickly impact the organization’s ability to function ; The potentially Cost sometimes goes beyond what many agencies can afford - afecting the identity workflow - starting with a technology focus can quickly turn your big data initiative into a science experiment. In my opinion It’s wiser to investigate the latest tech, and invest on areas that make sense for media brand. I do consider that the more media services learn about tech, the more they can experiment with it, try it out or refurbish.

 Technology has a direct impact on the company’s ability to keep production moving efficiently. Even the best architecture, the most perfectly suited for the job, will be essentially useless if the people who need to use it do not know what it is; cannot understand it well enough to use, build, or modify it; or (worst of all) misunderstand and apply it incorrectly. And all of the effort, analysis, hard work, and insightful design on the part of the architecture team will have been wasted. Creating an architecture isn’t enough. It has to be communicated in a way to let its stakeholders use it properly to do their jobs. If you go to the trouble of creating a strong architecture, one that you expect to stand the test of time, then you must go to the trouble of describing it in enough detail, without ambiguity, and organizing it so that others can quickly find and update needed information. Documentation speaks for the software architect : it is very difficult to determine the architectural characteristics of the application without fully understanding the iner-working of every component and module in the system. Basic questions about deployment and maintenance are hard to answer: Does the architecture scale? What are the performance characteristics of the application? How easily does the application respond to change? What are the deployment characteristics of the application? How responsive is the architecture? - When choosing technologies, budget should be considered in terms of both cost and potential return on investment, including scalability, profitability, and efficiency. Scalability is particularly important, as critical applications must be able to handle increasing traffic and data demands without compromising availability. In addition to selecting the right technology, it's important to ensure that stakeholders understand it well enough to use, build, and modify it effectively. This requires clear documentation and communication to avoid misunderstandings and ensure that the architecture can stand the test of time. Choosing the right programming language and resources to develop a program depends on several factors such as the nature of the program, the skillset of the developers, the scalability and efficiency requirements, and the budget. It's important to consider the long-term impact of the technology choice and its potential to yield a positive return on investment. When it comes to scaling critical applications, it's important to design the architecture and infrastructure with scalability and availability in mind. This involves using technologies and practices such as load balancing, caching, clustering, and fault tolerance. The architecture should be designed to handle increasing traffic and data demands without compromising the quality of the user experience. Another important factor is ensuring that the human resources involved in the development and maintenance of the application have the necessary skills and knowledge to handle the technology stack. This may require training, hiring new talent, or outsourcing certain aspects of the development process. Overall, the choice of technology and resources should be made with a focus on maximizing efficiency, scalability, and profitability, while also ensuring the quality and reliability of the application.

While small business owners understand the value of new technologies, I see how they still struggle with choosing the right products, as well as the right time to adopt them to have the greatest impact on their business. How do you choose the language with which to write your program or choose resources ( human and technological) ? Budget should consider two key things: cost of the technology and implementation, yield in a concrete return on investment. ( scalability / profitability and efficiency). Companies struggle to scale critical applications. As traffic volume and data demands increase, these applications become more complicated , exposing risks and compromising availability : applications that can handle huge quantities of traffic, data, and demand without affecting the quality the customers expect ; In order to prevent an application from becoming slow, inconsistent, or downright unavailable as it grows, scaling isn’t just about handling more users; it’s also about managing risk and ensuring availability.

Different software packages offer diverse approaches to graphic design as well as some of them being free and some of them being paid for, Most of the programming languages are open enough to allow to do things multiple ways , for a similar outcome. For instance, the implementation of XR Hardware requirements may vary according to network latency, speed of CPU colors, use of proxies, among other factors. The Problem of PC, Mac, and Linux headsets - is related to Technical Specifications : It's well known that PC type headsets will perform based on how well your PC performs. This is where a Mac has a bit of a disadvantage; you need a fast video card, and Mac's typically are fast enough for graphics and some game play, but not for VR. Apple PCs are just adding the capability to add an external video card for VR, as most of them simply do not have the video processing capability to render VR at the resolutions used by the Vive and Rift headsets. However, Apple has introduced VR ready PCs that are most likely to be performance stable with mixed-reality or 360°video . PC hardware does give a better VR experience. To avoid VR sickness, you need a fast frame rate - This is how fast your computer can generate the images on the screen. A lot depends on the complexity of the scene. Mobile controllers are only 3 Degrees of Freedom ( DOF ). This means they track tilt, yaw, and roll, but not position; if you move the controller flat to your left, on the game your controller hasn't moved at all. This is why you can't grab things with a mobile controller. The Vive and Rift Oculus both have 6 DOF controllers, so you can move them around and grab things.

If you wonder what is the optimal resolution that yields the highest clarity in VR360: The final clarity in VR360 is up to a number of factors, from the quality of source video resolution, fps frame rate , Mbps bit rate, dynamic range, compression ,rendering pipeline; Latency , screen picture resolution and structure. The reason why its so important to document on the Integration testing with a chart benchmarking toolkit - and why you need 8K 360 videos for VR headset like Oculus Go, Vive Focus and Samsung Gear with S8 or S9 with Snapdragon chips on a 3k screen ; Understand when to use simple sampling or multiple sampling, and how it will affect your video quality.

OPINION: Six Things Brands And Agencies Need To Know Before Making Augmented Reality Campaigns .

OPINION | 2020: : Is virtual reality the next channel for digital marketers?.

RESEARCH | 2020: Novel math could bring machine learning to the next level

RESOURCES : | 2020: Where Potential Becomes Reality- 2020 Realities360 Conference & Expo: The Premier AR/VR Event for Learning

Users dislike slow applications, but broken applications, due to transient networkerrors, are the worst experience of all: Your mobile application must be robust in face of common networking failures; unreachable hosts, sudden drops in throughput or increases in latency, or outright loss of connectivity.

Althought, High-quality Images can make a website stand out, unfortunately it comes with a price: Due to large file sizes they’re bulky to download and result in slow page load times. If you’ve ever been on a device with a poor network connection, you’ll know how frustrating this experience can be. The image format WebP - developed by the Google team - is a solution , with 26% smaller than PNG images and around 25–34% smallerthan JPEG images - A decent savings, where the image quality isn’t noticeably affected . Another image format that will become usefull in future browsers is Scalable Vector Graphics (SVG) - It's not yet an universally supported format , but it is very powerful. Unlike the other image formats, SVG is vector based, which means it is totally scalable without quality loss. You can reduce JPEG, GIF, or PNG in size, but when you artificially make them bigger they lose quality and appear pixelated.

Over time, 3D game development languages have evolved to meet the demands of VR, which emphasizes physical immersion and requires a high frame rate and resolution. To achieve this, VR programming is typically done in high-speed, low-level languages like C++ (for Unreal and CryEngine) or C# (for Unity Engine), which can generate 90 frames per second. Modern engines handle tasks such as rendering, physics, terrain, lighting, and AI to create realistic and sophisticated virtual environments, as well as networking to build multi-user experiences that can run on mobile platforms.

To ensure smooth VR experiences, it's crucial to have up-to-date hardware since low frame rates and stuttering can cause cybersickness. As developers continually push the limits of acceleration, FOV, refresh rates, and FPS, investing in expensive VR PCs becomes necessary. Even factors such as user height can contribute to a nauseating VR experience. To explore the latest VR games without experiencing cybersickness, it's recommended to have the latest CPUs, GPUs, and RAM. Nvidia GPU users can use the GeForce Experience app to optimize their PC for each game, while AMD GPU users can use the AMD Gaming Evolved app for the same purpose. Additionally, not everyone can afford to invest in expensive VR hardware, and it is important to make VR accessible to as many people as possible.

What Makes VR Interesting? - It offers a level of immersion and interactivity that is unparalleled by any other medium. VR can transport users to virtual worlds, allowing them to explore, interact with objects, and even engage with other people in ways that feel almost as real as the physical world. VR also has the potential to be used in a variety of fields, including entertainment, education, healthcare, and more. It can provide new ways of experiencing and understanding complex data, simulating real-world scenarios, and training individuals for high-risk or complex jobs. Additionally, as technology continues to advance, VR is becoming more accessible and affordable, making it an increasingly popular and exciting area of innovation. “A medium composed of interactive computer simulations that sense the participant’s position and actions, vand replace or augment the feedback to one or more senses, giving the feeling of being mentally immersed or being “present” in the simulation” [Sherman and Craig, 2018]. - virtual reality is a medium, which means it is a means of conveying ideas from person to person, or people to people: from creators to recipients. Furthermore, the medium itself is a filter on concepts as they are conveyed, and thus has a higher, over-arching influence on consumers of the medium — “the medium is the message” as McLuhan has proclaimed [McLuhan, 1964].

Image collage from  cyberpunk 2020 and VR Sickness: What it is and How to Stop It

ARTICLE | 2020 : WHAT IS VIRTUAL REALITY SICKNESS?

Simulator sickness, also known as VR sickness or cyber sickness, can produce a variety of symptoms including sweating, nausea, headaches, and drowsiness, which are similar to the symptoms experienced by motion sickness sufferers in cars, boats, or planes. The prevailing theory on the cause of VR sickness suggests that it results from a mismatch between a viewer's actual experience and what their brain perceives. According to Kolansinski's (1995) Conflict theory, the brain perceives that the input (such as sight or sound) is not genuine or accurate. Normally, the mind detects when something is wrong with the body and attempts to correct it by performing safety checks to ensure that the body is in a healthy state. The detection system searches for cues or hints of abnormalities, such as linking movement and sight to compile a body of information that can verify the accuracy of the experience. When the cues do not align, the brain goes into a defensive mode that is typically triggered when the body is under attack. A rejection system is activated, as the brain attempts to remove any perceived poisons or threats from the body.

Stable frame rate is essential for VR content - as it’s rendered twice - it needs to run at 90 frames per second instead of 60: you may need to double the amount of objects to render and choose 150% faster than traditional PC games ; even the smallest hiccup can cause an uncomfortable feeling for the player :

* Before optimizing your Unity projects, it is crucial to identify the areas where optimization is required. Unity provides built-in analysis tools like the profiler and frame debugger, which can help you understand why your game or experience is taxing the CPU, GPU, and RAM.

* To improve performance or quality, adjust the render scale during runtime by following these steps: First, select Play Area under [VRTK_SDK_MANAGER] and [VRTK_SETUP]. Then, add a VRTK_Adaptive Quality component and set the Scale Render Viewport's minimum to 0.5 and maximum to 4. This component automatically adjusts the viewport's resolution based on the performance level, decreasing it when necessary and increasing it when the machine has sufficient processing power.

* * To reduce the number of draw calls, utilize the single pass stereo rendering technique which improves upon regular single pass rendering. By using GPU Instancing, it can cut down on the number of draw calls needed. This technique is currently only available on Windows 10. To enable it, go to Player Settings by selecting Edit ▸ Project Settings ▸ Player from the top menu and access the XR Settings. From there, select Single Pass Instanced (Preview) in the Stereo Rendering Method drop-down to switch rendering techniques.

* Unity uses a method called multi-pass rendering to display VR content, which means rendering the full view twice for each eye, resulting in a significant performance impact as it doubles the number of vertices processed. However, since version 5.6, Unity has introduced more efficient techniques such as double-wide rendering. This method allows Unity to render both left and right eye images simultaneously into one texture, reducing the workload on the GPU and saving on CPU and GPU time. As a result, using this technique can improve performance by around 20% less CPU time and 10% less GPU time.

* To achieve a smooth framerate in VR, it is crucial to optimize the geometry, textures, and materials. Quality textures are more important than the number of polygons displayed. Lossless formats such as PNG or BMP are recommended since Unity handles compression for the output platform. Mesh Baker automates this process. For efficient culling, small, static level geometry should be separated into different GameObjects. To optimize culling, open the Occlusion window by selecting Window ▸ Rendering ▸ Occlusion Culling from the top menu and adjust the Smallest Occluder value to 2 in the Bake tab. Enabling GPU Instancing on materials can significantly improve performance by allowing Unity to render multiple copies of the same mesh at once, which can save thousands of draw calls.

* To avoid VR sickness, use these technical options: (1) Limit movement speed or use teleportation instead of fast movement. (2) Fade to black and teleport players to the ground instead of showing free falls. (3) Opt for natural methods of locomotion, like hand swinging or teleportation, instead of direct movement controlled by a joystick. (4) Fix performance issues and use automatic resolution and effect adjustments. To make players feel comfortable, optimize performance - attending the CPU and GPU cycles, use fade or cut to black when teleporting, add a vignette around the view's corners when moving fast, put players in a vehicle cockpit, and allow for direct movement because of the way human brains work, it’s natural to move and rotate quickly when you’re inside a vehicle, and you can allow direct movement.



T. S. Eliot: “Where is the wisdom we have lost in knowledge? Where is the knowledge we have lost in information?”

While I created projects I learnt to consider some aspects before choosing framework and programming languages such as - Client-side a.k.a front-end (HTML, CSS, JavaScript) / Server-side a.k.a. back-end (OS, web server, programming language, web framework, databases - focused on the internal hardware that the makes product run, while front-end is focused on the components that allow the user to interact with the software ) :      • You may use a certain language, particularly in a business environment, based on the need to interface with other programs; if two programs are to work together, it is easiest if they are written in the same language. You may choose a language based on its suitability for the task : For example, a business program that handles large files may be best written in the business language COBOL (althought, Old Coding Language can cause other problems ) . SQL - used in programming and designed for managing data held in a relational database management system, or for stream processing in a relational data stream management system. ; Java, Python, Lisp, Prolog, and C++ are major AI programming language used for artificial intelligence capable of satisfying different needs in development and design of different software. Languages For Test Automation In 2020: Python ( Selenium and Appium libraries for Python ease the job of automation testing and cross browser testing on desktop and mobile devices. PyUnit and Pytest are the most popular ); Java ; JavaScript (Some of the top JavaScript test automation frameworks are: Jest; Mocha; Jasmine ; Nightwatch ) C# ( automation frameworks in C#: NUnit; MSTest ; xUnit.Net) Ruby (most popular testing frameworks in Ruby: Capybara, RSpec, Test::Unit) PHP ( test automation frameworks like: Laravel Dusk, Codeception, PHPUnit, BeHat)   • If a program is to be run on different computers, it must be written in a language that is portable-suitable on each type of computer-so that the program need be written only once.   • Before learning the intricacies of HTML (Hypertext Markup Language), CSS (Cascading Style Sheets), and JavaScript, it is important that you gain a solid understanding of the technologies that help transform these plain-text files to the rich multimedia displays you see on your computer or handheld device when browsing the World Wide Web .   • You may be limited by the availability of the language. Not all languages are available in all installations or on all computers - Data Skills sets for Programming such as : R, Python, Scala, JavaScript, Java, Ruby, C++, C#. Statistics and Econometrics: probability theory, ANOVA, MLE, regressions, time series, spatial statistics, Bayesian Statistics (MCMC, Gibbs sampling, MH Algorithm, Hidden Markov Model), Simulations (Monte Carlo, agent-based modeling, etc.) Scientific approach: experimental design, A/B testing, technical writing skills, Randomized Controlled Trial Machine Learning: supervised and unsupervised learning, CART, algorithms (Support vector Machine, PCA, GMM, K-means, Deep Learning, Neural Networks), machine learning packages (Pandas, NumPy, SciPy, etc.) and artificial intelligence packages (Tensorflow, H2O, etc.) Big Data Platforms: Hadoop, Map/Reduce, Hive, Pig, Spark, Storm, Cassandra Text mining: Natural Language Processing, LDA, LSA, Part-of-speech tagging, Parsing, Machine Translation Visualization: graph analysis, social networks analysis, Tableau, ggplot, D3, Gephi, Neo4j, Alteryx Systems Architecture and Administration: DBA, SAN, cloud, Apache, RDBMS Dataset Management • Structured Dataset: SQL, JSON, BigTable • Unstructured Dataset: text, audio, video, BSON, noSQL, MongoDB, CouchDB • Multi-structured Dataset: IoT, M2M Data Analysis: feature extraction, stratified sampling, data integration, normalization, web scraping, pattern recognition.

Choosing the Right Stack for your Project - Introducing Mern Technology Stack / The Main Benefit | 2021: ""If you’re not completely new to the development game, you know that most modern applications are created with the help of a “stack” of various technological solutions. A “stack” refers to any combination of coding languages, tools, and frameworks developers use to create software products for their clients. Many factors come into play here, like: Type and size of the project / Team expertise and knowledge bases / Time to market / Scalability / Maintainability / Cost of the overall development You need to have a foolproof plan in mind if you don’t want to make the wrong choice because selecting the “stack” can have a negative impact across multiple verticals of the client’s business, like human resource, finance, marketing, and management.

Additionally, some technologies aren’t compatible with each other, so it's important to check the existing systems before making new purchases .

Virtual and Augmented Reality have existed for a long time , but were stuck to the research world or to some large manufacturing companies - developing Immersive Experiences and Applications for Desktop, Web, and Mobile .

Thinking about a Cross-Platform Problem : As leading mobile platforms like Apple and Google are continuing delivering new and improved AR toolkits for developers: Google offered ARCore for Android developers, while the iOS platform also offered ARKit loaded with enhanced AR-based features for building immersive AR applications. These are example of platform-specific that blocked scaling compatibility between different models and don’t allow cross-platform rendering.

Thinking about a A Cross-Platform Solution : Computer-mediated reality Cross-Platform Library [ ViroReact ] , - npm install -g react-vr-cli - the Cross-Platform Library for React sollution - Is a free and open-source for an immersive experience, that offers effective documentation on Native AR Apps, that can utilize a single code base for developing and deploying AR/VR features on both iOS and Android versions of the app. React gives support for both front-end and server-side ( high efficiency, reusability,higher speed, agility and responsiveness of web app, friendly user experience to hybrid space ).

React VR apps are written in JSX (JavaScript eXtension ) - a syntax that allows HTML-like tags to be mixed into JavaScript code. React VR is based on React and React Native. A-Frame apps use HTML, with custom HTML tags - a powerful framework, providing a declarative, composable, reusable entity-component structure for three.js. A-Frame can be used from HTML, although developers still have access to JavaScript, DOM APIs, three.js, WebVR, and WebGL. Both of them allow for custom JavaScript code and interfacing directly to three.js and WebGL.

Machine learning has revolutionized cybersecurity, enabling novel attacks to be detected and blocked. All of these technologies, if not secured properly, could absolutely lead to the theft of sensitive information ( Integration and Security ). The influx of online traffic underscore the need for organizations to address IT resilience — a company’s ability to handle a technical disruption.  Resilience is the ability to withstand adversity and bounce back and grow despite life’s downturns; empowers people to accept and adapt to situations and move forward; Quantum machine learning, quantum simulation, and quantum-inspired computation are generating a lot of interest and now have industrial applications.

Between hype and revolution - On the potential applications of quantum computing in vaccine discovery , it has helped in the management of COVID-19 in terms of spread and the development of therapeutics. Realizing the power of quantum computing, we are more likely to witness its application in many industries in 2021 and beyond. Qiskit [kiss-kit] is a software that sits between quantum algorithms and the physical quantum device . It translates common programming languages like Python into quantum machine language. - an open source SDK for working with quantum computers at the level of pulses, circuits and application modules. - There’s still a large gap between the computational resources available on current hardware versus the resources required for some of the oft-promised applications of quantum computers, such as integer factoring and molecule simulation. An important aspect of software optimizations for extracting the best performance from a given application-device pair is “qubit mapping”. Software architects need to write programs that take into consideration the hardware, connectivity, and available gates to “map” program-level qubits to on-chip qubits as quickly and efficiently as possible.

To see where quantum technology plays a role it is important to spot where classical computing falls short : " Classical and quantum computers are the computers we already know and use. Formally known as binary digital electronic computers, they operate by representing information as sequences of zeroes and ones ("binary digits" or "bits") and processing them with devices based on the physics of electrons ("electronic computers"). Each bit can hold one of two values: "0" or "1"; there are no intermediate values. Electronic computers execute algorithms on these bits using simple logic operations (AND, OR, NOT, etc.) to form useful results. A new class of computing devices was proposed at early 1980s, involving quantum bits ("qubits") instead of bits. Unlike bits, qubits can be in a combination of states, and so hold a superposition of "0" and "1" states at any one time. As the number of qubits increases, so too does the number of states simultaneously held by the set of qubits. Qubits are processed using quantum computers. These execute algorithms using quantum gates, which are logical building-blocks that operate on all possible states of a set of qubits simultaneously. Once a quantum computation is complete, the output is measured, which causes the multiple entangled superposition of states to collapse to a single classical state. Quantum computers with many qubits are theoretically capable of operating much quicker than any classical computer. Quantum computers are not a replacement for classical computers -- both have their strengths and weaknesses. However, quantum computers are fantastic for solving particular mathematical problems where classical computers struggle, so a problem that may take a classical computer quadrillions of years to solve will take a sufficiently powerful quantum computer just a few days. Several types of encryption rely on these kinds of mathematical problems, and so "cracking" many types of encryption will be possible with quantum computers."

Explainer: What is post-quantum cryptography ? How Quantum Computing Will Transform Cybersecurity ?

view

Invention vs Innovation - Part I I

The last decade has seen an exponential growth in the number of Internet users, while networks rely on high performance storage devices for server and database applications. Depending on the storage you use, datastores can be of different types. When dealing with technological choices , what is needed is a comprehensive and overarching framework that handles the processing and workflow requirements of Virtual Enterprises, maps them to a collection of service- oriented tasks, dynamically configures these tasks from available services, and manages the choreography and execution of these services: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. New Vulnerabilities appear in everyday computing scenarios.

Over time, developers are considering blockchain based systems for the future - alternative systems, allowing information storage; their advantages and disadvantages, as well as determine where it is better to use and where alternatives may offer a better solution. It will play a central role by capturing user activities at the conclusion of a track play - analyzing the play for legitimacy or fraud detection, then applying a series of network and individual influenced coefficients. This will derive a reward value using the credit system within Current's platform. The question remains: "why would a developer want to build on EOS and blockchain in general vs the cloud or some other centralized alternative?" The main objective of the Current protocol is to facilitate transfers of value between media services by partnering with media networks. Due to the increased Video traffic that will account for 82% of all Internet traffic by 2022 , the 4k / 8k and 360 video format require more transcoding space for processing power in a better , cheaper, faster and more optimized way, throughout a strategic transformation of technology . To enable content owners to deliver ultra-low latency, high quality video content – and reduce their reliance on complex and costly transcoding services, cloud storage providers, and aggregators, Eluvio has Launched Content Fabric for Internet Video Distribution.

While creating Audiovisual Projects I found software knowledge indispensable to deploy certain parts of my applications .Module, extensions and Plugin extends the capabilities of a larger application. There is a difference between a framework vs library - already written by other developers , created for the rapid prototyping and development of their works . A library is a collection of subroutines or classes used to develop software. I think any component that instantiates its own database falls outside the scope of a library. A Plugin is a ready to use software component that can be added to an existing one to change adds features. There are libraries for various functionalities: such as computer vision, as well as motion detection devices like Microsoft Kinect camera / Leap Motion. Toolkits that are used (and often created by) creative coders are: Cinder GNU Octave ; Max MSP ; openFrameworks ; Processing ; Pure Data ; Vvvv.

----> It´s important that a professional has the ability to diagnose and solve problems that happen or could happen in the infrastructure of companies: " How to combine the objects of MIBs (, ) SNMP ( ,) so that they offer interesting information about the network? What are the thresholds for each interesting performance index? How to get to the problem that is occurring on the network? What are the suggestions to solve the problem? How to prevent this problem from happening again? "--- all these are questions asked by network management teams - so I updated my knowledge in helpdesk to understand the responsibilities towards user complaints about technology features of information, fix problems, passing on to other technicians. As a technical support team I encountered ultimately responsiblility for the network maintenance and configuration. As a network operator I practiced responsibilities for receiving the alarms generated by the management station. There is also the team manager skills, who directs and monitors the performance of team members. Over time, you'll find that it's easier to test some problems when others have already been tested. For example, some board diagnostic tests network tests involve testing communication with the remote equipment. And therefore, It is more interesting that the network cable connected to this card is tested before the card. In work environments, It's possible that one or two people just form the team and accumulate for yourself all the papers.

Throughout professional practice - I encounterd new challenges while editing, transcoding, decoding, rendering, and delivering tv broadcast video content - Assuming the importance of Containers as it hold metadata on media in the file. That metadata can be as simple as the frame rate of the video ; to showing what camera and lens were used to record the footage; what settings were applied; where it was shot and information about the specifications of shot and the production. The metadata within a container can sometimes also tell what standards the footage was produced in and complement the camera shot list / shot designer : storyboard - planning documentation.

Tracking and sorting the RAW and Log video format is the alignment made before Rough Cut and processing the color correction . These are necessary steps to neutralize the image profile, even before it actually begins editing the colors with color grading. It will deliver much more time in the grading steps. The important thing is to identify the file information and the type of compression and codec you use. So you can know in advance the decision making between: if you will be able to work enough grading or if it will be limited by technical specifications. The question about “ What people look for in video editors ?” usually resumes in: - Lift-Gamma Gain; Shadows - Midtones - Highlights ; Blacks - Mids - Whites. By adjusting the blacks first you set your baseline to adjust the rest of your image, you will notice that adjusting the black's and whites will affect your waveform as a whole, so it will be a matter of balance finding the right point between the two. Midtones don't affect blacks and whites, so you leave them last. If you climb the midtones will lose saturation in general in the image, then to compensate, increase the saturation a little to keep the colors pulsating. A well exposed skin usually gets your IRE between 60 and 70 in the waveform, be careful to "pull" the midtones a lot, because they usually bring a lot of noise to the image, but as in every variable in the cinema, the more knowledge and experience you have towards photography, the easier it will be to opt for a slightly higher or lower IRE depending on what search or even the camera and format in which it is Recording. This area covers several others, interspersed in post-production, and talking directly to the narrative desires of the director and director of photography. The colorist is a technical artist of the film and the marriage between his knowledge of formats, displays and scopes intersperses with his artistic ability to accentuate the tone of the scene.

Color correction - is the technical and mechanical process. The use of scopes is essential (Waveform, Vectorscope, Parade). Even if you don't have a calibrated monitor, which can be very expensive, if you trust your scopes, and work right with them, you can guarantee a great technical result. Waverform gives you all the information about the luminance in the scene, Vectorscope gives you the information about chrominance and Parade shows you the red, green and blue values separately. The entire video clip receives manual adjustments to get good exposure and balance of lights, each clip is adjusted to a certain color temperature set previously for the scene. Also monitors or even your eyes - end up adjusting to the light and color of the environment. The steps of color correction can directly affect the maintenance of information in the image, the ideal would be to follow the following order of operation: ---> Remove artifacts and use de-noise; Balance your plans by black/mid/white, saturation and white balance; Re-illuminate within a plane using power windows or masks; Add gradients, diffusers, and other lens filters; Add vignettes; Grading the images; Simulate any film you want; Resize and add detail. <------ You don't have to perform all of these steps in each plan, but if you're going to perform them, that would be the ideal order.

Color Grading is the creative process where decisions are made to establish or create the desired climate for scenes through software, such as: accentuating certain colors, emulate styles, among other choices. Being something purely creative there is no right or wrong way of doing things - just what the director of photography, colorist and director want for the scene. The challenge of making the right choice, the tools available are several and powerful, the question is how to use them accurately for what the film asks. Nowadays it is possible to create or download LUTs files for cameras like BlackMagic and RED for free on the internet so you can practice your colorist skills in DaVinci Resolve (also free) or even in video editors.

Working as an editor, taught me the importance of security: exporting files into the right format - the container format of a video file, an audio file & metadata -, and how it affects the video broadcast or Video Streaming Protocols “container” or “package” that’s used for video transmission - storage and playback -: understanding the need of an MXF metadata wrapper - primarily exchanges pictures, sound (synthesized audio or MIDI), and generally static elements (still graphics or text) as well as data items (teletext or closed-caption files) - along with a small amount of metadata to take advantage of the benefits of converting video formats. I Questioned on how to support multiple protocols simultaneously - "What protocol to use when sending video to multiple devices simultaneously?" -, transcoding and transrating; also on how to produce different resolution and quality streams to deal with different bitrates and decoder/players justify multi-channel encoding -adaptive bitrate encoders which produce multiple profiles for compatible destinations to choose from, and transcoding media servers–which are software and services that let you manipulate and multiply your source video streams to suit your application. Different protocols are designed for different applications - Streaming protocols allow video that has been encoded to subsequently be transported, either in real-time or at a later time. Protocols affects rather how a user/viewer might interact with the video, the reliability of delivery of that video stream, or which devices/software players can access it. Some protocols can only be used by specific vendor hardware, significantly reducing the interoperability and potential reach of that content; Latency will be a key component as protocols that are used across cloud or public internet may be different than protocols used for facilities AV infrastructure over IP. There are five common streaming protocols that professional broadcasters should be familiar with, including HLS, RTMP, SRT, MSS, and MPEG-DASH. Assume an organization has added new equipment capable of generating very high resolution, such as 4K, using codecs that produce a small-enough bandwidth might be enticing. But the codec and/or encoding profile used directly from the source to mitigate its bandwidth use may not match what is the optimal codec or encoding profile for content distribution at large. Transcoding can be expensive - Archiving the highest resolution content  to avoid storage costs doesnt resolve technical issues. Distribution always requires well-established technologies for maximum compatibility and reach.

Streaming Protocol vs. Codec vs. Container Format: Logically, different streaming codecs are used for different purposes. MXF is a container format that the stand-alone Adobe Media Encoder can encode and export movies. Premiere Pro can export MXF files containing the MPEG-2 essence items that comply with the XDCAM HD format or other broadcast media. All Apple ProRes codecs support all frame sizes (including SD, HD, 2K, 4K, and 5K) at full resolution as the data rates vary based on codec type, image content, frame size, and frame rate - applying the least compression for the best imagery and resulting in the largest files can be expensive overtime. So the question before choosing the protocol or format should be "Why transcode when it increases file size significantly?" It Only makes sense when you need to convert to an editing codec or deliver in a specific codec (e.g.; iPhone, Vimeo, WMV, etc); The editor is forced to convert highly compressed and not deigned for editing memory cards content to an edit friendly codec, which is usually much less compressed and that means larger file sizes on compatable hardware that actually supports it - updated disks and pc. Today, adaptive bitrate streaming technology automatically detects users’ bandwidth and computer processing availability in real time and provides a media stream that fits within these constraints. In enterprise and media and entertainment encoding, means that video sources are often sent at their maximum quality and resolution profile, but the local encoder and/or streaming server also create additional stream copies of the source in reduced settings. A 4K source, for example, can be kept in 4K and decoded at an appropriately powered viewing node. But the same 4K source can comfortably supply the same source content onto tablets and smartphones that often have a lower resolution screen anyway and the corresponding reduced resolution stream is served to match what the wireless network and processing power of these wireless devices can handle ( “scaling” of video sources). In fact when a video is encoded into a certain format, its data is compressed in order to be stored while consuming less space. For example the newer HEVC codec can dramatically reduce the file size of H.264 videos – by up to 50%. The M2T file extension - respondes to the technology standards between the studios / broadcast, for faster transfer between media servers - as it was mostly used for broadcasts that were integrated with ATSC (Advanced Television Systems Committee) standards - Developed for satellite broadcasts as well as terrestrial broadcasting applications where bad signal issues are common, the stream synchronization technology and error correcting features that are embedded into these .m2t files help improve the overall quality of .m2t streams. These m2T files usually contain digital motion graphics or animations, audio data, sound clips and effects, 2D and 3D graphics as well as text content for sub titles and so on. The video content stored in these .m2t files has a maximum resolution of 1080i. This understanding makes the exported video file compatible with a wide range of playback systems that rely on the M2T or MXF standard for broadcast and archiving ( Digital Cinema Package (DCP). Ideally it should have hardware support, which can sometimes be a problem as it takes time before newer codecs are supported at a hardware level.

Video Encoding: The Definitive Guide [Updated for 2021] - What Are the Benefits of Different Video Formats?

Video compression became an important area of research in the late 1980’s and 1990’s and enabled a variety of applications including video storage on DVD’s and Video-CD’s, video broadcast over digital cable, satellite and terrestrial (over-the-air) digital television (DTV), and video conferencing and videophone over circuit-switched networks. Nowadays, despite what has just been referred to - when dealing with camera raw images , Apple ProRes 422 LT is the most used norm intended for offline workflows - because it requires low data rates but full-resolution video. Even though, it solves some offline production issues - on the other hand, this is a real problem for the cloud or online video streaming , specially when there are more than one person accessing the same data ( server overload): An average 90 minute Apple ProRes 422 HQ is around 150GB ; This means it's going to take several days to upload, with the computer processing the upload uninterrupted all the time (running day and night). Real networks are heterogeneous in rate : streaming video from home (56 kbps) using modem vs. corporate LAN (10-100 mbps) ONLINE LIBRARY 2020 | Next‐Generation Video Coding and Streaming

Image footage : Block diagram of video coding simulation.

The reason you can't edit the colors as you want in a file made on your DSLR is because the image has already undergone a high compression to be recorded on the SD card, making the number of exposure stops (- unit of measure of light during the exposure of a scene -) is far from ideal for color editing. F-Stop is basically a mathematical measure to calculate the amount of light that passes through the lens based on your design. The T-Stop is the measure of light passing through the lens according to the light transmission rate it reaches, basically it would be the F-Stop divided by the amount of light passing through the lens. DSLR's don't handle overexposures well (when there's too much light in the scene), it was very easy to lose information in high-light areas. All these small features of each camera, lens and recording format end up becoming noticeable to professionals over time. This makes them able to identify nuances between different cameras, sensors and even lenses just by checking an image. A file with a lot of compression ends up drastically limiting the possibilities of editing in its light and color levels, it is important to say this so that you do not feel frustrated when trying to learn these steps with files that have already gone through several compressions. What raw recording, and some Log variations, brought was exactly the possibility of achieving a higher dynamic range, but this was occurring step by step, according to the evolution of sensors, processors and recording cards. Usually companies provide ready profiles with a contrasted look and that is even beautiful on camera, but when checking on your monitor you will notice blacks without any information and white bursts. As professionals the ideal is always not to appeal to these ready-made solutions and work the image according to what we need, capturing it flatly to define your look at the time of grading.

Esthetic Results with the camera and post production, need to be precision making decisions : To make smoother footage (photorealistic) do not add footage in the timeline editor where the raw footage time frame rate is higher than the own footage. For example, if you have a timeline that is 30 frame rate / per second , do not add a 23.976 fps because you’re going to deal with the editor in creating magically out of thin air, more phantom 6 frames that might damage the raw footage. You can combine clips with different frame rates in sequences (mixed frame rate footage) - first Open a clip in the Source Monitor to view the original frame rate and frame size : -- How to deal with different frame rate clips on the same timeline - whenever you import a clip that was shot in slow-motion ( 60 or 10fps ) . "

Scenario #1 ---- What will happen if you decide to transcode into ProRes? 50 hours of ProRes 1080 HQ equals to 3.78 TB. So, if you want to keep your original H.264 files and you decide to transcode them into ProRes HQ file and want to have at least 2 back up copies of all of the material you will need: 1TB (H.264 raw files) + 3.78TB (the ProRess transcodes) x 3 ( for the back up)= 14.34 TB of hard disk space total. In this case, if you shoot with a single camera you’ll need 7.17 TB total.

Scenario #2 ---- Shooting in 4K is a whole new thing. A single minute of ProRes UHD file (3840 x 2160) is around 5.3 GB (880 Mbits/s). You would need to expand your storage definitely if you are shooting at such high data rates. A single hour of 4K footage is a whopping 318 GB. 25 hours of 4K ProRes equals roughly 7.76 TB. ---- 7.76TB (the ProRes UHD files from a single BMPC 4K camera) x 3 ( for the back up)= 23.28 TB of hard disk space in total required. ---

However, the real problem is the download…that will also take more than a day on the download side (running day and night) and I have yet to ever come across an event or audiovisual production even close to sophisticated enough to handle this. The lower the latency, the less read-ahead buffer the video player will have , also it doesn't support 4K resolution. "The amount of read-ahead buffer is important because it's the main source of stream latency. With a lower latency, viewers are more likely to feel the issues between the encoder and the player. Network congestion and other factors may also cause live streaming issues, which can delay your stream. Delays can happen even when you have a great network that can sustain your average streaming bitrate."

RESEARCH | 2020: How to achieve low latency audio/video streaming over IP network? This whitepaper will first define the latency for audio/video transport. It will highlight the usual architecture challenges of an AV over IP transmitter/receiver. A deeper analysis is provided regarding the video compression which is often mistakenly considered as adding too much latency. Eventually, actual latency measurements of the Viper 4K HDMI to IP transmitter/receiver will be presented.

VIDEO YOUTUBE - EDITSHARE | 2020: adapt media servers for FHD or transitioning to 4K and 8K content creation Integration and teamwork Management collaboration. - XStream EFS is designed to manage large volumes of media, ultra-high data rates and the complexities of intense media environments. EditShare enables media professionals to collaborate on projects - all designed to improve production and unleash creativity.



Image Footnote - Networking & Virtualization Overview : on What is Scalability / Performance / Security / Infrastructure Customization / Cost should question upon "How much hosting firepower do you require? And how much are you willing to spend?" For servers dedicated to applications with high demands on processing power, virtualization isn't a good choice. That's because virtualization essentially divides the server's processing power up among the virtual servers. When the server's processing power can't meet application demands, everything slows down.  Take a close look at CPU and GPU usage before dividing a physical server into multiple virtual machines. Otherwise, Tasks that shouldn't take very long to complete might last hours. Worse, it's possible that the system could crash if the server can't meet processing demands.

Therefore, companies should evaluate the architectures of various technologies that can help ensure their product's performance. Partnerships between telecommunications companies (Internet providers), who have both broadband capacity (available for sale) and Internet customers, and owners of short film sets, who understand the issues associated with content production, quality and marketing, are ideal for the Internet movie market. In this way a company, whose incremental costs due to excess bandwidth is practically zero, can subsidize the most significant costs of providing the product. In exchange, Internet provider customers would gain access to the highly desirable streaming film content, differentiating the service provided by the Internet provider. Those Internet movie companies with the ability to partner with telecommunications companies are best positioned to succeed in the coming years.

Virtual infrastructure : cloud infrastructure and virtualization solutions and services.

Network Virtualization is Different from Server Virtualization ( this, plays a significant role in cloud technology / Cloud computing) : at the physical level, network operation depends on specialized, shared programmable hardware - packet forwarding hardware - and associated real-time software . The flexibility of using the cloud endeared corporate consumers, for the following reasons : On-Demand Service – use it when needed. This provides some degree of freedom for the customers. Network Access – utilizes the internet and can be accessed using laptops, workstations, and smart phones. Pooling of Resources – resources are pooled to provide customers customizable variable costs based on business size. Scalability – scale up or down based on your current needs. Cloud Computing Service providers offer different service models according to the customer’s needs. The service models are called SaaS, PaaS, and IaaS. - models that are often depicted in a pyramid-like structure

Example of SaaS models – Banking applications, Social media apps, Slack, App-based games Example of PaaS models – SAP, AWS Elastic Beanstalk, Google App Engine, Apache Stratos (Hou, n.d.) Example of IaaS models – these are more for system administrators and include Rackspace, Google Compute Engine (GCE)

"As cloud computing adoption has grown, Cloud Networking has emerged adjacently." - Cloud computing is best to access from outside the office network ( data mobility) - good for selling your service/software to external users and works on IaaS (Infrastructure as a Service) - but the # Disadvantages / risks and benefits of Cloud Computing should be considered: #1. Risk of data confidentiality. There is always a risk that user data can be accessed by other people; #2. Depends on internet connection - the weakness of public cloud is where everyone accesses the same server and server and will increase the risk of attack, and down the server; #3. The level of security ( secrecy / data privacy and confidential matter ) / Technical problem. - When you experience a problem, you cannot sue the server for errors in the data. When you experience a problem, you cannot sue the server for errors in the data; #4. Compliance - While many websites offer an API, they are often expensive or have very strict rate limits, even if you’re working on an open-source and/or non-commercial project or product ; #5. Vulnerable in the event of an attack - exposed to wide open opportunity for attacks on data or activities stored on the server. #6. Low Connection - connection can get slow - harmed because of poor server quality; ; while Virtualization meant to access from office only - is best for setting up Data Center within the company network/infrastructure based upon Service Type SaaS (Software as a Service) . Server virtualization in contrast is a local issue - the interface between a software work load and a virtual machine. With virtualization, company’s can take advantage of the efficiencies and agility of software-based compute , data migrations ( migrate to the different hardware platform ) , Encapsulation of data and storage resources. A virtual network is distributed software and hardware with a more moving File systems - distributed storage in abstracted ways already, not as raw hardware. Virtualization allows businesses to simulate hardware - Increase efficiency for development & test environment - such as servers, storage devices, or network resources. The virtualized components function exactly the same way that traditional hardware would function—with added benefits to the user and the business streamline or data collection Flexibility to access it from anywhere .

ARTICLES | 2020:  Serverless Architectures - The “Big Three” cloud vendors—Amazon, Google, and Microsoft—are heavily invested in Serverless, and we’ve seen plenty of books, open-source projects, conferences, and software vendors dedicated to the subject. But what is Serverless, and why is (or isn’t) it worth considering? Serverless architectures are application designs that incorporate third-party “Backend as a Service” (BaaS) services, and/or that include custom code run in managed, ephemeral containers on a “Functions as a Service” (FaaS) platform. By using these ideas, and related ones like single-page applications, such architectures remove much of the need for a traditional always-on server component."

ARTICLES | 2020:  On Project scalability and Prophit : Serverless is not right for every project . The enterprise is left with the responsibility to secure the application layer: managing and monitoring access to the application(s) and the data, enforcing legitimate application behavior, monitoring for errors and security incidents, and so on. Serverless applications are accessed infrequently and may need extra time before enough instances of virtual containers and databases are able to respond in a timely fashion.

"The codec story is always the same: everyone always wants to get better-quality video in a more efficient state, but the challenge is getting people to adopt it. " - commented Ben Wood, at the CCS Insight consultancy | July 2020 | while "The codec - which is called both H.266 and Versatile Video Coding (VVC) - - was announced by Germany's Fraunhofer Heinrich Hertz Institute . Although 8K televisions are becoming more common, there is currently little content available in that resolution : "Apple, Microsoft, Qualcomm, Ericsson, Intel and Huawei were among those that had worked on its development. H.266 is designed to require half the bitrate - the amount of data transmitted per second - as today's standard H.265. H.265 requires about 10 gigabytes of data to transmit a 90-minute ultra-high definition [4K] video," explains a press release. "With this new technology, only 5GB are required to achieve the same quality."; Imagine how much bandwidth does VR need: "Some experts believe VR headsets will only be able to match reality when they can display 16K or higher resolutions; Meanwhile, Google has previously opted to use a format it developed itself - VP9 - instead of H.265 to encode YouTube videos. And a consortium - which includes Amazon, Apple, Facebook, Google and Samsung - has already developed a successor, AV1. The video-game streaming platform Twitch has already said it intends to switch "100%" to the format by 2024."

Codecs and containers are frequently confused and mistakenly used interchangeably - especially when transfering content data in terms of scability to the cloud or web. It's really important to understand the requirements and technologic requisites of the production - It's something that you figure out by yourself the hard way, after testing on different hardware and software, because they don't actually teach this at school due to it's depht complexity . Reading and sharing knowledge with other technician helps you understand it better .

INSTAGRAM AND FACEBOOK DOESN’T SUPPORT 4K VIDEOS TO ALL USERS , EVEN IF IT READS THE EDITED FOOTAGE AND UPLOADS IT , WHAT IT DOES IS AUTOMATE DATA ALGORITHM COMPRESSION - UNDERSTANDING THE BIG PICTURE IN TERMS OF SOLUTION - Perhaps some day when we have increasing-light-speed internet connections, we won't have to worry about these 'implementation details' - Besides reducing power consumption of video encoders becomes a prime design requirement, there's a need to have a structure that allows frame synchronization to be performed independently from the technology inherent delays, resorting to a parallel data pattern detector and a bit alignment shifter. Frame synchronization is becoming more and more problematic as communication systems increase their transmission rate .

The recent example of Netflix and other services such as Facebook, who agreed to reduce the quality of its streaming service in order to help internet infrastructure cope with the increased traffic caused by the Covid-19 coronavirus - reveal how this issue will be more problematic over the years, as it obviously anticipated the increase in remote work, this will likely have broad implications on Internet speed ( lower upload Mbps - Megabits per second) and economy — particularly consumer spending. -- However, until then, quality-to-filesize ratios will always be important, particularly in the age of 4K and ever-increasing screen resolutions. If someone tries to upload lossless on a less-than-amazing internet connection, they'll get frustrated and quit.  As displays increase in size, compression techniques become more efficient, playback devices become more sophisticated, and internet connections improve, so will the quality  4K videos . The fact they have a larger file size, means they’ll require more bandwidth and storage space to upload - so it’s not available to all users.

ARTICLES | 2020: Sony Introduces Alpha 7R IV Camera - It supports FTP data transfer with background transfer capability, allowing photographers to send images to a specified FTP remote server while they are still shooting or reviewing images. To support an efficient, connected professional workflow, Sony has announced version 2.0 of its Imaging Edge desktop applications (Remote/Viewer/Edit). The Remote application allows users to control cameras and monitor live shooting on their PC screen; the Viewer application is used to quickly preview, rate and select photos from large libraries; and the Edit application can develop raw data into high-quality photos for delivery. When utilizing the latest version of Sony’s Imaging Edge Mobile application, the camera can now transfer images to a connected smartphone even if the camera’s power is off.  

Have you ever questioned : why software editing programs or web app - simmilar to instagram or facebook - take so long to upload / read a video and why it crashes so much or even overheats- mobile phones and pc çomponents? - as you work with Higher resolution ?
Equivalent incompatible issues, also happen to disks that don't support 4k ( ex : 5400 rpm or even 7500rpm ), when pushed to performe more than they can handle, overheats the hardware - crushes - damages data components or gets you stuck into a viral loop. The truth is that Higher resolution, requires more space and larger profit margin to maintain it and not every hardware can truly support it's scalability : you will need more drive and server's space - this can be a huge issue when creating online web sites ( quality time and product vs profit /upload quality versus upload speed : ) - It's also a time consuming experience. Actually downscale 4k to HD will increase image detail without loosing quality - after considering a set of resolutions, bitrates and settings used for high-quality video encoding, and the reasoning behind those choices. - high-resolution HD images can carry more detail than their lower-resolution SD counterparts. 10-bit images can carry finer gradations of color, thereby avoiding the banding artifacts that can occur in 8-bit images. The 3 key properties of digital images that contribute to image quality—frame size: chroma sampling, and sample bit depth— while offering industry leading performance and quality at each supported data rate. The role of a codec is to preserve image quality as much as possible at a particular reduced data rate, while delivering the fastest encoding and decoding speed. At the end of the day, you will always have your raw image metadata backup data protected and valuable - Intellectual property, patents and licensing play an increasingly important part in the development of video coding technology and applications.

BOOKS & ARTICLES | 2020: GPU VS CPU For Video Editing

VIDEO NETWORK | 2020: Editing in 4K: Minimum System Requirements / To start editing video, you’ll first need to ask yourself some questions about your projects. What type of footage will you be editing: R3D, CinemaDNG, ProRes, XAVC S, mp4? How complex are your projects: single shot, single camera, multi-camera, animation, VFX? What are your output formats? How long do you have to deliver your edits? Finally, are you editing online or offline?

With all the constant fast technological upgrades on digital media, even the most experienced editor have hard time in understanding well the difference between Format and Film Rate or other technical definition of a set of standard characteristics regarding image capture on photographic film. Most will spontaneously assume that higher data values is wiser - without really question the veracity of this information and only looking at sales prophit blindly. Digital video is frequently compressed and coded for easier storage and transmission. Video compression systems change in broadcast TV, IPTV, telecommunication and many other video applications. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms ( Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis ) .

60 fps

30 fps

10 fps

Framerate Independent Physics

Hardware & software influence the quality and integrity of data value in long terms, specially when technicians haven't found the time to stop and think on how fast technology has changed - not only on speed, affecting every single component that they interact. Instead of loosing time unconsciously, overload on unproductive hours in front of computer, delaying projects deadlines you could learn other things that reenforces trust and performance efficiency between production time and crew .

I learnt while exploring different applications and camera models - by manipulating the camera level of FPS ( frames per second) and then play with the levels of sequence on the editor software : spreading out the number of bits that it records per second over more frames; When each frame gets less bits, means it avoids artifacts in the frame. While raising the frame rate whitout changing the bitrate , will result in quality loss: increasing the frame rate because more pixels are displayed per second; If you double the frame rate, the quality of each individual frame will go down, but you will see twice as many of them and the impact of things like noise can average out amongst the frames. Bitrate is also highly dependent on your internet connection speed: how well your streaming computer can encode video (which is primarily reliant on your CPU).

Image Footnote | Frame Rate (FPS) vs Refresh Rate (Hz) : HZ is used to measure what the hardware is capable of - how many FPS the Display can output; FPS is used to measure the current speed of the software - when your game can do 200+ FPS because you have a powerful GPU and/or CPU but you only have a 60hz monitor, you wont be able to benefit from what the PC is capable of.

"Why this is relevant?" Not only will compression allow your video to upload faster but it will make it look better when played back: though different codecs do have an affect on the outcome. The best solution is the upload a video using a codec which has the best quality-to-size ratio, at this point in time ( doesn't have to be the same you are used to work ) - upload the highest quality they can, not a necessarily a streamable format. Be aware that if this is not considered, it can turn out to be a bigger disaster, even if you haven't realized it yet.

Digital video takes up a very large amount of storage space or bandwidth in its original, uncompressed form. A video is a collection of frames, and each frame is an image. So if we pull out all the frames from a video, we can use methods to store and extract our data ( this is also how Steganography or audio encryption works using vision library such as OpenCv for image and FFmpeg for audio ). A digital color image will have red, green, and blue channels and eight bits to represent each channel, so every channel can take a value from 0-255, and this value represents the intensity of the pixel. (R, G, B)=(0,0,0) is the representation of the color black and (255,255,255) represents the color white. - While a black and white image is an easy thing to conceptualize, where a black pixel has a value of 1 and a white pixel as a value of 0 ; The Pixel array (R, G, B)= (11101010 11101001 11001010),(10111001,11001011,11101000),(11001001 00100100 11101001) .
A solution to this problem are "proxy" presets and exporting with the right conversion method . Video compression makes it possible to send or store digital video in a smaller, compressed form. Source video is compressed or encoded before transmission or storage. Compressed video is decompressed or decoded before displaying it to the end user. Video compression or video coding is the process of compressing (encoding) and decompressing (decoding) video. It refers to the technology behind moving digital images: essential to video on phones, cameras, laptops and TV. In fact, anything you can watch on a screen uses video compression. Instagram supported video format is limited to H.264/AAC MP4. If the 4K videos that you try to post to Instagram are in other formats/codecs, like AVI, WMV, MOV, MKV, FLV, TS, XAVC, MXF, MTS, H.265 MP4, reformatting the file format is required. Choosing the right format is a science , specially when digital media market and branding is considered .

Take in consideration that clients have different hardware and internet conditions ( this may change also acording to country and Global Web Protocol). So when dealing with high resolution video, If anyone has had media crashes (errors) I would recomend you understand your camera hardware first - including the speed of the SD card , when shooting high frame rates ( video 24 fps is ideal for a cinematic look and feel; capturing more motion for great slow motion and smoother video requires higher frame rates ); also, choose the frame rate acording to the subject your shooting ; Then analise the properties of the raw footage and all the hardware and applications that will interconect with that footage, to avoid incompatibilities and delays and misunderstanding between teamworks - . Understand Efficient video compression and improve quality of video in communication for computer endcoding applications and monitor refresh rate first , way before using Utilities tools like Dropbox ( FTP alternative file transfer ) - use it for larger media files to avoid compression problems on big files; Avoid Google drive for heavy raw footage - it will damage some data Properties when it automaticly compresses for you and it will be Extremely Slow ‎ -; Besides that Google Drive and Google Cloud Storage are not the same . There is a difference between Consumer vs. Professional Cloud Storage. Rather use it for already edited movies, to avoid crashes and media compression errors - They're not the most secure platforms to use as a server ( only for risky shifting alternatives), althought it's tempting cheapest - rather , consider other Fiable Technology, in order to deliver the best to safe-guard your privacy and media data because it's very easily hacked .

RESEARCH | 2020: Why Formats Matter

RESEARCH | 2020: The Importance of Codecs, and Containers



"People consider writing codes and debugging is a developer’s job. But as a tester, it is necessary to have a knowledge about all the languages too. As a tester, automation testing is one of the biggest tool in your tool shed, and it is all about coding." in Automating tests for your user interfaces has always been the holy grail of programming.

In programming ( Computer Science), an #adapter works as a special object that converts the interface of one object so that another object can understand it. There is an important difference between a program and the underlying algorithm that the program is representing. An adapter wraps one of the objects to hide the complexity of conversion happening behind the scenes. Adapters can not only convert data into various formats but can also help objects with different interfaces collaborate. Any application or system depends on the architecture pattern used - not only guides designers and developers on how to design components, but also determine the ways in which those components should interact  in a systematic, predictable, repeatable, and cost-effective way. Here’s how it works on a stock market app ( example from the book Dive into Design Patterns by Alexander Shvets - To solve the dilemma of incompatible formats : it was created " a XML-to-JSON adaptersfor every class of the analytics library that your code workswith directly. Then you adjust your code to communicate withthe library only via these adapters. When an adapter receives acall, it translates the incoming XML data into a JSON structureand passes the call to the appropriate methods of a wrapped analytics object." - .

ARTICLE | 2020: The Difference Between An Adapter And A Wrapper

RESEARCH COLLECTION | 2020 : When to Use SVG vs. When to Use Canvas

The same is true with Web APIs and on the new-old problem of Cross-browser support : when there's an update to the JavaScript language for instance, browsers will also need to be updated to support the new language features. Babel solved a JavaScript compatibility issue. It's a free and open-source compiler that transforms JavaScript code into different JavaScript code . Specifically, it transforms JavaScript code written using the latest version of JavaScript into the equivalent code written using an older version JavaScript that’s supported on far more browser. Though it doesn't include Web APIs : So you’ll need a separate solution for polyfilling Web APIs. For that reason There is still a need to [Re]think polyfilling story : "The createPolyfillProvider function will take a polyfll plugin factory, and wrap it to create a proper Babel plugin. The factory function takes the same arguments as any other plugin: an instance of an API object and the polyfill options".

When you want to define an API architecture; establish a platform for APIs or simply want to build APIs your consumers love It's wiser to Implement application programming interface (API) usability, security, availability, reliability, and scalability to extend your company’s market and potentially generate revenue.

RESEARCH COLLECTION | 2020 : WebHook vs API: Both webhooks and APIs facilitate syncing and relaying data between two applications. However, both have different means of doing so, and thus serve slightly different purposes (Real-Life Webhook Examples such as a stripe chargeable event integration, are implemented on a djamgo or flask python or a java project; Many services, such as SendGrid, Stripe, Slack, and GitHub use events to send webhooks as part of their API.) . To test webhooks locally without deploying, we need to open up a connection from our development machine to the outside world. One option is to use ngrok. This service allows you to provide outside access to a specific port on your local machine.There are countless capabilities your webhook can have depending on what kind of information the API provider sends.

RESEARCH COLLECTION | 2020 : WebSocket vs Socket.io - WebSocket is technology protocol which is established over the TCP connection , while Socket.io is a library for WebSockets - A connection can be established in the presence of proxies and load balancers.supports broadcasting to multiple sockets at a time and handles the connection transparently and fallback options such as intranet besides internet.

In the current ecosystem of JavaScript frontend frameworks and libraries tends to alienate newcomers and also experienced developers that feel lost in the ocean of possibilities and choices : React JSX, AngularJS, jQuery, TypeScript, Vue.js - The official state management library, Vuex, follows the Flux architecture and is somewhat similar to Redux in its concepts / Compared to React and Angular , Vue is an is not backed by corporation like Facebook or Google. Instead, it depends on donations by the community -. Nevertheless, JavaScript is not just limited to web applications as features are added - Real-World Performance Improvements ; Async Iterators and Generators ; # WeakRef. # the new proposal solves the problem of memory leaks by creating a weak reference to an image and storing that in the cache instead of storing the image itself -, so it's also being widely used in building command-line tools and server-side stuff using Node.js, desktop applications using Electron, cross-platform mobile applications using React Native and low-cost IOT devices.

view

Quality vs Value (3)



"A smart man makes a mistake, learns from it, and never makes that mistake again. A learning opportunity is not the same as an excuse for careless behavior."– Roy H. Williams (1958-), U.S. author and marketing expert.

One of the most valuable lesson you learn whenever you start a project or product test, is to build a minimum quantity product, to ensure if it's viable ; understand potential customers to see if they identify with the problem the same way you do. Adopting an experimentation mindset, you'll be more willing to make mistakes and test a variety of different ideas and unlock more long-term value, as you'll give more ideas a chance to come to fruition.

- The main question comes down to : "What is the right design path between "quality vs value" of a project ? Does a wrong action bring you back on the road afterwards, by any chance create new ramifications ? " The future represents an uncertain non-place that already inflicts a sense of choice or dynamic risk management efficiency handling - where the critical path evaluation represents the longest path through the project. Predicting the total duration of the project, the critical risk path identifies individual tasks that will require a greater level of monitoring and control to Avoid, mitigate, transfer or accept. Designed to eliminate or minimize the impact - The high-risk tasks— take the longest amount of time and can undermine project success. No one is immune to making mistakes – we are human, after all! You may have to reframe or try out several ways to put your learning into practice before you find one that successfully prevents you from repeating past errors. The reason why I usually Identify the skills, knowledge, resources, or tools that will keep you from repeating the error in the first place.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++

"Quality and value are attributes of a product or a service that ultimately decide higher or lower sales and also help in creating an image of the company. There is quite a gap between what organizations think about quality and how customers perceive presence or absence of quality in a product or service. It is a fact that consumers buy a product or service not because quality is present but they will not buy a product if quality is absent. Quality creates valuable product in the eyes of the consumers. Thus , quality vs value are two distinct attributes , their differences need to be highlighted to enable companies come up with better and improved products that have both quality and value. If we were to differentiate between quality and value, we would be surprised to find that it is customer who defines value of a product by making an analysis of the performance of the product relative to it's cost. On the other hand, quality of a product is always in the hands of the organization and it depends upon the ability of a company to provide a product that gives a performance that customer is seeking. If organizations pay attention to the complex equation of performance vs. cost, they would find that they are able to create value for the product. Company’s need to ensure that customer value is their primary objective and in this endeavor, honest feedbacks from end consumers play a great role in enabling company’s know what consumers really want. If a company is unaware of what constitutes as value to consumers, it will unnecessarily engage in exercises that may have nothing to do with customer satisfaction and increase the cost of the product." - Data Vs. Information : Defining Data Quality and Value / What is Data Value and Should it be Viewed as a Corporate Asset?

At the end of the day, quality reinforcement - collaboration improvement and cultural usability that maintain and measure the quality quotient of products - , depends on the ability of workers to produce products. Most of the time, you will adapt the recommendations in the way that works best for the dimension of the project ( flexibility vs adaptibility). More than just building "elite brands" and emotional design - that increase levels of satisfaction and loyalty on a group of customers , It involves having a dedicated space where everyone feels comfortable to learn and share knowledge - keeping your work updated , organized or synchronized, accessible or invulnerable and backed up . A workplace where your product eventually appears if you put in a large percentage of your time and energy.

Things started accelerating when Apple and Google created an ecosystem of mobile developers. That’s when mobile apps appeared - Now Microsoft, Facebook and other tech companies claim a virtual reality universe is the future of the Internet. ex: Facebook the largest social network - suggests that individuals are creating a virtual-network consisting of both bonding and bridging social capital. Facebook has previously funded academic research into the social impact of AR wearables and solicited VR hardware proposals. Facebook’s announcement blog calls the metaverse the “next computing platform” and says that the company will be working with policymakers, researchers, and industry partners while building the successor of the mobile internet. ; in addition, important services like Airbnb, Instagram, uber, WhatsApp, Amazon , are also collecting data — . As a result, our relationship to our devices is changing. They are becoming avatars—extensions of us. Millennials want mobile products in their image:confident, connected, and open to change. Only users decide what works for them.

As a consumer and researcher I realised that In order to keep customers interested in a product or service, requires a good posting strategy / business plan, because It will mainly reflect on the product you're selling and call upon the target public - nurturing symptomatic cause and effect. Providing regular content might sell an image of a great marketing strategy as it helps your customers stay updated, plus it shows interest for ways to improve and provide even more value. However, as important as regular content provides a great marketing strategy and helps customers stay updated and product improved, it will be pretty useless if there is no consistent approach - whenever planners are more concerned with how it will look to visitors, than quality engagement can create a misleading culture. - "What does that mean?" - You might choose to simply paste massive posts in hope someone eventually will spot the work and follow compulsively , but that doesn't mean quantity justifies quality. Why? Because different platforms usually means different audience. Many of Instagram followers will not be LinkedIn users and vice versa. It's important to question everything that every business is mostly concerned with: - What product/services do people want to buy and why? ; - What kind of websites do people mostly visit? - What are the biggest hobbies nowadays and how can my product/service help? ; - What types of posts do people share the most?

Hitting the Market with the Right Products at the Right Time : In practice, creating new product and service development is complex daunting task for engineers, design engineering managers, and those involved in other functions in the project. Product design and engineering processes and their management to sources of innovation, needs collaboration with suppliers, and knowledge providers (for example, creators ), and users. The managerial aspects get ample attention as well as the socioeconomic aspects in the context of product design and engineering. ......  The five key strategic stages: * Where are we now? - Strategic and marketing analysis * Where do we want to be? - Strategic direction and strategy formulation * How might we get there? - Strategic choice * Which way is best? - Strategic evaluation * How can we ensure arrival? - Strategic implementation and control ......

Photo Footnote From the Double.org site :  Growth loops and the 6 pillars of growth / The More You Learn, the Cheaper It Becomes: www.interaction-design.org

The disruption caused by the Covid-19 pandemic has accelerated business dependence on tecnology across the world - that become reliant on the cloud and have a deeper need to interact different business sectors , to work in a simbiotic networking way and not as a parasite ( isolated relationship ) . Exponential growth in digital infrastructure and connected devices will upgrade the need for 5G and even 6G tecnology, but the high cost of infrastructure does have a price : some countries will have more difficulty in hardware and software implementation , promoting inequalities between developed and underdeveloped countries / societies . As businesses adapt their culture to embrace the cloud, they must also adapt their approach to developing the talent. Each country will feel obligated in adapting to different cloud services to asure it's integrity / quality to create value. The web tends to be built on terrotories that delivers inequality that will eventually push product's and the market. Another shift is tying security into your cloud. Driven by advances in deep learning - started around 2015 and provides an edge for enterprises that wield it smartly with cybersecurity.

The dramatically faster 5G connectivity could unlock an array of technologies, from autonomous cars that share traffic data to immersive virtual reality games. It's not just a phone technology: It could replace wired broadband in the home and allow for billions of other connected devices. Uses internet of things (IoT) sensors and technology to connect components across a city: sensors and connected devices allow cities to manage and monitor infrastructure, transport and financial systems, postal services and more. Traffic could run more efficiently, payment transactions made more secure and remote emergency surgery (think advanced drones replacing paramedics) could become common place.

Smart cities usually occupy six dimensions: people, technology, infrastructure, management, economy and government. Chris Lane, a telecom analyst at Sanford C. Bernstein, thinks it will turn cities "smart" in much the same way electricity illuminated them. "Everything will be connected," he says,"and the central nervous system of these smart cities will be your 5G network." - this means better visibility, efficiency and performance, but also exposes the population to more risks as the entire system is connected. If one node is attacked, many more may be affected. Presenting Vulnerabilities , from protocol weaknesses to DDoS attacks -botnet, made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic . It can slow down the victim's computer to the point where it becomes impossible to work on it. For example, 5G will increase the risk and potential damage of large-scale distributed denial-of-service (DDoS) attacks. This is when a hacker overloads a machine or network with traffic to render it useless. DDoS attacks are used to disable the online services of banks and e-commerce platforms, but the city’s critical infrastructure is a significant weak spot. 5G also presents some protocol weaknesses, for example in the authentication and key agreement (AKA) – the method of encrypting communication between devices and cellular networks, which has been previously utilized in 3G and 4G networks and is known to be vulnerable to international mobile subscriber identity (IMSI) catchers, interception of traffic and sensitive information. With both of these threats on the horizon, regular security practices such as supply chain security, access control, patch management, threat hunting and configuration management should be carried out to secure against 5G threats - we should ask ourselves : "How do we ensure 5G safety?" because there’s more to do to keep our cities and societies safe.

Examples where AI are being used to improve the current approach to cybersecurity - based on Intrusion Detection Machine learning that helps detect and defend against intrusions without the need for any human intervention ; Malware Detection; Machine Learning Algorithms Detection of code vulnerabilities - such as Linear regression; Logistic regression ; Classification and Regression Trees;K-Nearest Neighbors –; K-Means Clustering; Neural Network - are being used to scan vast amounts of code and automate the process of identifying any potential vulnerabilities (before the hackers do); Fraudulent transactions and activity Detection can be flagged and prevented in real-time by detecting patterns and identifying deviations from the expected baseline behavior with machine learning . Such risks can become even more heightened in a “work from home” and remote working scenarios where the workforce is much more likely to be distributed and outside the organizational security perimeter - THE AI CANVAS - A Simple Tool to Start Making Decisions with the Help of AI , to guide organizations through sustainable AI deployment.

Writing software is like making commercial products—quality is absolutely fundamental. So, " How can you guarantee software purpose ?"; "Why some digital innovations and experiences engage us deeply and spread widely, and why others do not ?" - Each individual company swears by its own specific game plan the ins and outs of process management and business scenarios analyses - but in practice , all goes back to understanding the consumer engagement between internal and external human factores. For many consumers, old habits are hard to break , which is probably why it’s so difficult to get consumers to try new products in the first place — not to mention make them loyal buyers. Clients are no longer looking for a social status brand, they tend to offer price for the experience.

In addition, the challenge between growth and agility, compliance and transparency pressures increasingly bring data quality issues to the fore — while the infrastructure can’t keep up, Marketing is facing the same problem. Too much data with not enough structure in place to manage the data and not enough meaningful application. A enterprise will always need to tackle information in effective ways, just as most of them still need industrial techniques to make their products cheaply and efficiently. So what are the consequences of a business world with “too much information”?

RESEARCH | 2020: How to ensure your organisation is safe from the cyber threats , visibility and awareness.

Nothing resists a false ground in any project building.

Only through a efficient structured project , can we conscienceless deliver flexibility and agile freedom ( reveal value ). It becomes, even more crucial to upgrade and work as neural network ~ Bringing Computation, Connectivity, and Data Together in the Cloud : requires rapid acceleration of computational power, data creation, and connectivity, as well as the impact of these three trends. ~ Most of us have encountered some organizations that hide behind successful achievements a true chaotic workspace and it might even look clean or elegant / successful choices. Eventually, Time reveals that weakness and even expose inconsistency that will determine and increase the risk of success . To avoid cause&effect conflict it’s crucial "Understanding the Problem, and react to creative solutions before any action" - IS THE KEY -.

Design Thinking is an iterative process in which knowledge is constantly being questioned and acquired so it can help redefine a problem - in an attempt to identify alternative strategies and solutions that might not be instantly apparent with our initial level of understanding. An attempt to develop new ways of thinking that do not abide by the dominant or more common problem-solving methods – just like artists do. The intention is to improve products by analyzing how users interact and investigating the conditions in which they operate: uncovering ways of improving user experiences with empathy (research/understand customers' needs. define (state your customers' problems and needs), ideate (brainstorm unique solutions to their problems), prototype (create the solutions) and most importantly, test (try them out yourself).

To assure quality , the design of an interaction determines a complex process that involves a lot of modeling on how a system will work; how a user will approach the goal they're trying to accomplish, and how the interface needs to be configured to allow for all of these different operations. All of these taken together create the context of the interaction that you’re making. The Conception phase : maps out in detail on what you would like the applicationto do; how the interaction should feel to the user, and the goals of the application. In The Research you ask yourself questions on what componentsyou might need and what libraries or existing code might be available that canhelp you create your project. The Design phase : it's essentially to create diagrams of different parts of thesystem and show how those will appear to the user ; understand what the user might want to do with them, and how they relate to the interaction overall. It defines all the parts of the application clearly, to have a clear vision of howthey will appear to all; how they will respond in the interaction, and understandexactly how a user’s action should correlate to an action by the system. It may helpto create diagrams that show the flow of actions and responses from the user tothe system and back. The Build process is actually putting together hardware and writing code. This is where you’ll debug, probably research some more, and ultimately assemblethe application. The Test phase: creates situations for users to use the application and the executable files, observing on how they use the hardware / software. It can be as simple as using the application or hardware and ensuring that everything works as intended before sending a project delivery. Having a good testingphase is important.

The first step to avoid disproportional problems of a high level of risk caused by chaotic structured plans, is to be prepared for honesty and trust in delegation of project planning - not being afraid of error , but opened to changed conventions of each technology, library, and module needed for both development-related setup and feature implementations Understanding which tools and technology are essential for the team to Success highlights situations and reduces the danger of Sabotage or misperception on strategic business models (corporate strategy); It's essential that everyone in the team have the same tools at the same level of knowledge. Competence consist in coordinating skills with knowledge and attitudes: having the right tools at hand to combine with work conditions in order to resolve the problems of each task. - Project Management - exists to respond to each problem at the right time. Nevertheless, it's important for every team element to understand the life circle of the business plan so it doesn't contradict it's true values of the project . One must question constantly: "Is it a short, medium or long plan" ;" What are the true intentions behind concepts? ". I believe Team members should be informed of the true values so that their work adjust to the company values - equilibrium of knowledge -. If everyone works towards that , it's an easier process and the risk percentage will decrease . - 

When I participate in a project I try to adapt my business model plan to the dimension of the project, so I can understand the value of accountability and identify the project methodology for reliable software systems; My concern is to adapt technology wisely , to deliver applicability and reliable systems, through hardware and software. Quality of decision-making can set the performance standard others want to emulate. In the process of client onboarding, I consider to figure out : what the client needs me to achieve; how they want to communicate, and so on. I consider myself a good listener, intuitive and hard-worker with valuable conditions to create something with technical and creative quality. That's why I keep up to date on technology and find the need to upgrade equipment and learn more with more demanding hardware / software projects. In that perspective money is always welcomed and buys better instrument "to play" the mission: useful for my constant technical update - I see value as a consequence of growth to produce more valuable products. Charging for your work delivers you wealthy dignity to create valuable quality — and why you shouldn't work for free.

A team that looks for "quality vs value" should be transferring anger into accountability, inspiring creativity, cooperation and compliance instead of disruptive competition if it's really seeking good results. Choosing "conflict resolve" instead of triggering internal competitive wars - some people might take a chalange too personally. There has to be distancing between personal and professional attitudes, capable of measuring the balance between both parties. If this is happening for some unexplained reason, I can only assume it reflects a lack of foresight - misleading information, energy or perception - into the development of ideas and individual team performance automation will be affected ( dismotivating focus ) without really acknowledging skills. Conflicts at work are as inevitable as they are frustrating -  first and foremost , it depends on our capacity to read and understand a conflict situation , after moments to pause and reflect / situations are then matched by a mindset that is most appropriate tackled. Often times, agents involved in a situation are unaware of how they are blinded by the emotions - misreading or using the wrong strategy could trigger things worse. Whenever a team share a project, it's inevitable to stir up different ways of doing the same thing. The hard part is to manage the risk shortest path to accomplish it without denigrating team members to their full potencial. Conflicts and the capacity to overcome frustrations on communication skills are actually a very healthy and efficient tool for trust and bond creation . If you detect them early, admit them, confront them, openly talk about them, and learn from them : What was I trying to do? What went wrong? ; When did it go wrong? ; Why did it go wrong? ; Sometimes there is confusion between healthy conflicts with a poisonous environment. Some people just like to create conflicts out of nothing just to be the center of attention / to rip-off .

Since the breakthrough advances in science, technology, and philosophy—including cybernetics, bio-engineering, nanotechnology, machine intelligence, synthetic biology or transhumanism — We have created Dystopian Cityscapes - vulnerabilities , not only the conditions that allow animal viruses to cross over into human populations, but also mind game-changes to everything you have ever known about spiritual warfare and disrupted ecossystems - From the tactile mirror to the virtual body, It's scalability and territoriality origins are being monopolized on money and measured by uneven interests of power - through the appropriation of privacy and vigilance - mapping territories from packages to people : the medium cloud, social movements on mobile, Big Data and IoT are Transforming Physical Security in the Digital Age , explore the major technological forces currently driving to digital disruption. Citizens are not clients or customers , rather have human rights (democratic citizenship) . Besides the Economic / financial market, Social, Health, Environmental framing, The COVID-19 crisis is a chance to do capitalism differently .



- This is a problem. If you don't know how something works, how can you begin to fix it? -

Today data science / data storytelling determines the ads we see online, the books and movies that are recommended to us , which emails are filtered into our spam folders, and even how much we pay for health insurance. Wherever Data should make progress against the world’s largest problems :
As long as Organizations gather, store, and process data - they use it to improve decision making through the analysis of data / information design patterns and filters. In the future The fundamental issues involving the re-engineer value of data will become persistently questioned , not only in terms of security : “Who owns the data and has intellectual property rights on it” ? " What is economic value and who creates it ? " - Data is a set of values of qualitative or quantitative variables about one or more persons or objects. Related to validity, data consistency - The value of data uses can be analysed in different perspectives: that of an individual, corporations and government [ such as Business Agility; Customer Satisfaction; Employee Morale ]. "Individuals trade their private data in the digital economy for more tailored choices - goods and services, free applications and software, but don’t reap any monetary benefits from this exercise. Company’s Platform and data-aggregators capitalize on individual data by selling to advertisement networks and marketers looking to target specific segments, influence buyer behaviour and make dynamic pricing decisions. Governments are increasingly becoming data savvy and leveraging open data for improving quality of life of its citizens by better design and targeting of welfare schemes, data driven policies, and improving participative governance".

Good-quality data has several beneficial impacts on organizations: Decision making; Compliance; Productivity; Decision making; Marketing

Negative impacts of poor-quality data can include: Consequences - Undermining confidence; Missed opportunities; Lost revenue; Reputational damage. Causes: Bottlenecks in decision making ; Lack of accountability and ownership ; Unresponsive planning and budgeting ; Information hoarding and secrecy ; Meeting and email overload ; Siloed functions and teams ; Obsession with short-term results ; Inability to attract and retain top talent;

LEARNED LESSON | 2020: INTO THE PROBLEM: DECODING BROKEN CODE in the TV drama Mr. Robot that speaks to this journey, when Rami Malek’s character Elliot Alderson, a cybersecurity engineer, says, “Most coders think debugging software is about fixing a mistake, but that’s bullshit. Debugging is actually all about finding the bug, about understanding why the bug was there to begin with, about knowing that its existence was no accident.”

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Photo Footnote: Rami Malek as Elliot Alderson in Mr. Robot. Gif via noluyo.tv.



RESEARCH | 2020: Good decisions on bad data are just bad decisions that the business hasn’t made yet

Everyone is talking about value whether you recognize or not, and no one seems to understand it - especially in a world of constant change due to economic/ cultural / social transitions. The Internet is dirrectioning to a new Architecture level that aims to put users first, while it begins to consider a policy approach whichever fosters the necessary innovation and investment, that allows flexibility or experimentation. Even so high-tech architectural transition takes time to scale up globally, I can't be sure if value is subjective according to the business model that no one wants to be known and everyone is repeating - selling concepts and actually believing in it blindly. I see Value as a consequence of continuity flow, not a short-scale projects plan state of art that requires close cooperation between the platform owner and key developers. Priorities change depending on a customer’s context. Taking this context into account before you think of a value proposition for that customer is crucial. .Value propositions and business models are always designed in a context. Whereas the idea of the internet as a democratic source of information that brought people together, the web algorithms has filtered what someone searches, exposing along their interests, creating an echo chamber bubble of one’s own held opinions and increase aggressive sense of superiority within bully attitudes that trigger misleading meanings, reproducing cancel culture with no space to listen - therefore reducing communicative competency to engage in human dialogue in real life. Besides freedom of speech restrictions and constrains within privacy and security issues, it obviously effects in building human connections : forecasting a false sense of effective communication ; reflecting direct health implications, misconception perception and discursive gap - that in turn , works against isolation, antagonism and stress. So being aware of this inconsistency can bring to light the nature of problems / conflict . Whenever someone is hiding the bad parts with quick solutions, I presume it can only cause a bigger structured problem - essential due to the fact that a responsible worker likes to be part of a project that brings prosper competence - to be taken serious. Oppositely, the qualms Quality and vitality of Value are not the same. There's no doubt that this will determine and reveal the real life cycle of the project - Above all , put any doubtful percentage of risk and strategy apart from the forward trust towards other active competitors.

view
Invention vs Innovation - Part II
Quality vs Value
References & Learn More

References & Where to Learn More (4)



Hacknowledgments : “I invented nothing new. I simply assembled the discoveries of other men behind whom were centuries of work. Had I worked fifty or ten or even five years before, I would have failed. So it is with every new thing. Progress happens when all the factors that make for it are ready, and then it is inevitable. To teach that a comparatively few men are responsible for the greatest forward steps of mankind is the worst sort of nonsense.” ― Henry Ford

Future Perspectives

CISCO | 2021

By getting the best out of quantity and quality of the professionals available – from the company itself and from external sources – internal audit can generate more value, offer new solutions and ideas, provide greater security and modernize its traditional rules. Data is valuable, but it may not live up to what you expect – lost, polluted, duplicated or in breach of data protection laws. Often these issues go unnoticed, ruining months of data and no way to retroactively clean it. Data is an important asset for companies, which must make efforts to ensure their quality, allowing them to acquire insights to understand consumers and better tailor their products and services. | 2022

SAFe principles:

#1 – Take an economic view

#2 – Apply systems thinking

>#3 – Assume variability; preserve options

#4 – Build incrementally with fast, integrated learning cycles

#5 – Base milestones on objective evaluation of working systems

#6 – Visualize and limit WIP, reduce batch sizes, and manage queue lengths

#7 – Apply cadence, synchronize with cross-domain planning

#8 – Unlock the intrinsic motivation of knowledge worker

#9 – Decentralize decision-making

#10– – Organize around value

ITCYBER_PENTEST__What is a white hat hacker? | 2022

DevOps | 2022

ITExams | 2021

|| METASPLOIT - How to Use Metasploit | Meterpreter | Reverse shell | Metasploit Tutorial ||

|| A Complete Penetration Testing Guide With Sample Test Cases ||

|| Most Important Python Tools for Ethical Hackers & Penetration Testers 2022 ||

|| How to run Flask App on Google Colab ||

|| The Open Web Application Security Project (OWASP) - Application security tools , incidence rate and standards : An Open-Space where all materials are available for free and easily accessible on your website, making it possible for anyone to improve the security of their own web applications. The materials OWASP offer include documentation, tools, videos, and forums. Perhaps his best known project is the OWASP Top 10 ||

Scan and extract text from an image using Python libraries || 2022 ||

The fastest way to learn OpenCV, Object Detection, and Deep Learning. || 2022 ||

WEB TOOLS - Is this website Safe | 2022: How to Check Website Safety to Avoid Cyber Threats Online

ARTICLE | 2020 : Apple is rumored have a secret team of hundreds of employees working on virtual and augmented reality projects.

FOOTNOTE: STREAMING SHAKEOUT REPORT | 2020: A massive media shakeout is on the horizon — The war for streaming video has officially begun.

ARTICLE | 2020 : Apple TV+ to offer augmented reality content as bonus. Some new iPhones will include Lidar 3-D scanners used in the latest iPad Pro, making AR apps quicker to load and giving them a better sense of their environment.

ARTICLE | 2021: Meet ALGO the alternative non-commercial VPN and Why Would I Need One ? - Algo automatically deploys an on-demand VPN service in the cloud that is not shared with other users for FREE, relies on only modern protocols and ciphers. The ‘VP of all Networks’ is strong, secure , tidy and includes only the minimal software you need. virtual private network, is a secure tunnel between your device and the internet for torrenting or bypassing geographic restrictions to watch content in a different country. VPNs protect you from online snooping, interference, and censorship. It makes web browsing more secure and stymies any malicious actors who might be on the same local Wi-Fi network. Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. Companies all over the world sell VPN services to secure your online activity, but can you really trust a VPN provider? If you want, you can create your own virtual private network with the open-source

ARTICLE | VPNs aren't perfect, here are some alternatives

VIRTUAL MACHINE RESOURCES | 2021: A VM simulates a CPU along with a few other hardware components, allowing it to perform arithmetic, read and write to memory, and interact with I/O devices, just like a physical computer. Requires a moderately powerful laptop that supports hardware virtualization - SharePoint solutions, to work on multiple programming languages, libraries and operating system features to support multiple projects. Most importantly, it can understand a machine language which you can use to program it.

PENTEST TOOLS | 2022

RESEARCH COLLECTION | 2020 - How to explain in plain English - Machine learning vs. AI vs. deep learning

///////////////////////// PROGRAMMING | LEARNED LESSON 2020 : How to use service workers in progressive web apps

///////////////////////// SECURITY RESOURCES 2022 | Report and analyse breaking cybersecurity and privacy stories; information incidente tools; Observium - network monitoring platform supporting a wide range of device types, platforms and operating systems including Cisco, Windows, Linux, HP, Juniper, Dell, FreeBSD, Brocade, Netscaler, NetApp and many more.

HARDWARE RESOURCES | 2021 :Apple reportedly working on a 32-core processor for high-end Macs 

Resources on WebGPU vs Pixel Streaming | 2021 : " Two completely new technologies to develop modern graphics-focused software are on the rise. " WebGPU is the successor to WebGL and offers remarkable performance improvements. However, pixel streaming  (or render streaming or remote rendering) makes it possible to stream the audio-visual output of a hosted cloud software to the client. The client does not need expensive hardware — only a good internet connection - so it goes in a completely different direction and is actively used by the gaming industry."

CULTURESPORT | 2021: is an animated science fiction web series set inside a sprawling fictional universe—the result of intensive and ongoing collaboration between artists, designers, musicians, actors, dancers, brands, and CULTURESPORT’s in-house creative team.

STREAMING | 2020: Streaming Wars - A Tale Of Creative Destruction . In the battles over consumer attention and subscription dollars, content, and talent, each new-to-market service has its own strengths and weaknesses.

OPINION | 2020: Choose technology and Adapt Business Transformation Wisely 

RESEARCH | UPDATE 2020 : The 10 most innovative virtual and augmented reality companies of 2020

ARTICLE | 2020: How does photogrammetry work? 3D content creation made easy.

RESEARCH | 2020 : UPDATE of Feb 21, 2020: Is virtual reality the next channel for digital marketers?

ARTICLE | 2020: Is Augmented Reality the future of contact-free shopping?

RESEARCH UPDATE | Feb 19, 2020 : What AI still can’t do: Artificial intelligence won’t be very smart if computers don’t grasp cause and effect. That’s something even humans have trouble with.

AR/VR CONFERENCE EXPO | 2020: RESOURCES AWE covers Augmented Reality (AR), Virtual Reality (VR), Mixed Reality (MR) and all enabling emerging technologies (ex. Artificial Intelligence (AI), haptics, 5G

LEARN COLLECTION | 2020 - In this episode of AI Adventures, Yufeng Guo uses AutoML Vision to build and employ a machine learning model that recognizes different types of….chairs

LEARN COLLECTION | 2020 - The 7 Steps of Machine Learning / TensorFlow Playground

Tools

Apagar metadados em todos os ficheiros de imagem

API TOOLS | 2021: Google Maps JavaScript API Tutorial - BEST EXPLAINED WITH ATOM PLATFORM -

|| METASPLOIT - How to Use Metasploit | Meterpreter | Reverse shell | Metasploit Tutorial ||

|| A Complete Penetration Testing Guide With Sample Test Cases ||

|| Most Important Python Tools for Ethical Hackers & Penetration Testers 2022 ||

|| How to run Flask App on Google Colab ||

|| The Open Web Application Security Project (OWASP) - Application security tools , incidence rate and standards : An Open-Space where all materials are available for free and easily accessible on your website, making it possible for anyone to improve the security of their own web applications. The materials OWASP offer include documentation, tools, videos, and forums. Perhaps his best known project is the OWASP Top 10 ||

Scan and extract text from an image using Python libraries || 2022 ||

The fastest way to learn OpenCV, Object Detection, and Deep Learning. || 2022 ||

WEB TOOLS - Is this website Safe | 2022: How to Check Website Safety to Avoid Cyber Threats Online

COLOR TOOLS | 2021: Color Palettes for Designers and Artists

IOS APP TOOLS | 2021: iOS Course Resources List

RESEARCH | 2020: What Is the React.js Framework? When and Why Should I Use React.js in My Project?

TOOLKIT | 2020: Face detection using HTML5, javascript, webrtc, websockets, Jetty and OpenCV

TOOLKIT | 2020: Object Detection with HTML5 getUserMedia

TOOLKIT | 2020: FLARToolKit

TOOLKIT | 2020: JSARToolKit

RESEARCH | 2020: Build a React Universal Blog with Next.js and ButterCMS You can think of ButterCMS as similar to WordPress except that you build your website in the language of your choice and then plug in the dynamic content using an API.

SOLIDIFY RESOURCES 2020 | How do you get Ethereum account’s address, create a new Etherem address and how to send /receive cryptocurrency?

TOOLKIT : Tools for Working with Excel and Python

TOOLKIT | 2020: Excel Automation Tools (Best of List)

TOOLKIT 1

TOOLKIT 2 - AR / WebRTC, GWT & in browser computation -

TOOLKIT 3 - Tutorials

Teamwork Skills & Project Management:

“Most people spend more time and energy going around problems than in trying to solve them.”

“The thing that is really hard, and really amazing, is giving up on being perfect and beginning the work of becoming yourself.” ~Anna Quindlen

RESEARCH | 2020: Information Overload in a Digital World

Book | 2020: Influencer Marketing for Brands: What YouTube and Instagram Can Teach You - Por Aron Levin -. We live in a world where everything is getting more complex, where it’s impossible to keep up with all the information that is available. What we really need is synthesized wisdom, not additional information overload: How can we create this effectively?

"So people are handed giant piles of money ( corporation loans) and told to flout traditions, break rules, glorify revenue with emotional branding - without the need of a strategy, or a special competence within the made for the occasion team or even any customers, living up to the hype culture in desperation for unknown adrenaline and employ magical thinking : flip everything you know and call it innovation / a vision beyond a set of risk factors packed with stories that celebrate success.

"Trouble is an interesting word. It derives from a thirteenth-century French verb meaning “to stir up,” “to make cloudy,” “to disturb.” We—all of us on Terra—live in disturbing times, mixed-up times, troubling and turbid times. The task is to become capable, with each other in all of our bumptious kinds, of response. Mixed-up times are overflowing with both pain and joy—with vastly unjust patterns of pain and joy, with unnecessary killing of ongoingness but also with necessary resurgence. The task is to make kin in lines of inventive connection as a practice of learning to live and die well with each other in a thick present. Our task is to make trouble, to stir up potent response to devastating events, as well as to settle troubled waters and rebuild quiet places. In urgent times, many of us are tempted to address trouble in terms of making an imagined future safe, of stopping something from happening that looms in the future, of clearing away the present and the past in order to make futures for coming generations. Staying with the trouble does not require such a relationship to times called the future. In fact, staying with the trouble requires learning to be truly present, not as a vanishing pivot between awful or edenic pasts and apocalyptic or salvific futures, but as mortal critters entwined in myriad unfinished configurations of places, times, matters, meanings." ~ Donna Haraway "Introduction" to "Staying with the Trouble" (2016)

RESEARCH | 2020: Ethical complexities rule in the age of big data - examining the data – provide insights that help to proactively identify issues.

This is why I believe it's a bad choice to underestimate a worker point of view , while it could bring the project onto another level of success and understanding, on how it could fill the gaps - to make it better resistant throughout time . Time is an element of success in a world where technology knowledge and artificial intelligence accelerates everything connected in between and around. Everyone should have the right and freedom to speak without putting their position at risk if their opinion helps for the project why not listen and try to understand? Nevertheless, it's important for every team element to understand the life circle of the business plan so it doesn't contradict it's true values of the project . One must question constantly: "Is it a short, medium or long plan" ;" What are the true intentions behind concepts? ". I believe Team members should be informed of the true values so that their work adjust to the company values - equilibrium of knowledge -. If everyone works towards that , it's an easier process and the risk percentage will decrease . - Ethic and professional attitudes count and turn it into a win-win game. It identifies and gives true perspective to projects.

RESEARCH | 2020:: Communication in organizations is equivalent to the neural network in the human body. If there is a misfire, the organism becomes inefficient or even dysfunctional.

BOOKS | 2020: Symbiotic vs. Parasitic Innovation ‘Ecosystems’: in The entrepreneur state & The value of everything : making and taking of economy by Mariana Mazzucato.

AUDIOVISUAL | ARTICLE 2020: HBO Max Is a Mess - muddled mix of confusing brand identities
ARTICLE | 2020: The Efficiency and Costs: License Fees vs. the Total Cost of Ownership

Readings | 2020 : Ethical complexities rule in the age of big data - examining the data – provide insights that help to proactively identify issues.

OPINION | 2020: Where Are We in 'The Cycle'? - viewed through a business-cycle -

######

" High personal accountability:

1. Drive for Results. Sometimes in organizations, it is really hard to focus. When we are sending multiple messages about what is critical and what others are accountable for, accountability dissipates. If you want people to be responsible, then you must clearly define the results that you want them to deliver, and let them have a fair amount of control on how they deliver those results.

2. Honesty and Integrity. When your boss asks in a company meeting, “how’s that project coming?” do you honestly reply, “we are really behind” or “pretty good?” Those who are accountable have the courage to tell the truth. This courage is often reinforced because people see their managers being open and direct with them.

3. Trust. We did some research on a set of leaders who were not trusted and found their employees had the following issues: I am not confident that my efforts will be rewarded PROMOTED I suspect the leader may take advantage of me I constantly question the leader’s motives I am sure they will take credit for my accomplishments These are not factors that will build accountability. In contrast, the three pillars that build trust are positive relationships, knowledge, and consistency of leaders.

4. Clear Vision and Direction. There is an old Chinese proverb that explains this issue well: “The hunter that chases two rabbits catches neither one.” In organizations, people are often chasing multiple rabbits and they don’t catch any of them. How can you expect people to be accountable if they aren’t absolutely clear about the organization’s vision for where they’re going and what needs to be accomplished? Clearly, you can’t.

5. Problem Solving and Technical Expertise. It is impossible to feel accountable when a person is confused and doesn’t know how things work. Teach your people the skills and give them the training they need, and make absolutely sure they know how to do the job you expect.

6. Communication. When a leader can effectively communicate, others can understand what they are accountable for. This requires being able to tell, ask, and listen to others.

7. Ability to Change. We found that people who are really good at creating change in an organization had employees who are operating at higher levels of accountability. Leaders who are good at instituting change are effective at the following behaviors: accepting feedback, taking on challenges, innovating, spreading optimism, showing concern, and setting clear goals.

8. Collaboration and Resolving Conflict. Collaboration is a difficult skill to achieve in an organization. Are you cooperating or competing with others in your group? Peter Blow at Columbia University did a series of studies on this issue that showed that teams who collaborate and are cooperative are far more successful than those who compete. Cooperation breeds accountability. On the long personal and organizational “to do” list, accountability should be at the top of the list. If you see a fatal flaw in yourself or your current leaders on any of these eight points, you should address it immediately. In fact, the single greatest way to leverage accountability is to pick a few of these key behaviors to work on yourself. Why? The research is clear on this issue: great accountability in the organization begins with you."



Lean-Thinking via Business-Intelligence Technologies and Innovation Process

# HIGHLIGHTS PAPERS:

AUDIOVISUAL TOOLS

PNG IMAGE TOOLS : Best FREE IMAGE FOR Editing

AUDIO | 2020 : Over 280 Free Sound Effects for Videos, Apps, Films, and Games

AUDIO | 2020 : How Virtual Surround Sound Works

AUDIO NETWORK | 2020:



TOOLS | 2020: Iconik – Hybrid Cloud Media Management allow video editors and content broadcasters to work together in harmony, bringing a level of congruent files and assets within the company and with partners all around the world. Iconik integrates with Adobe Premiere Pro, Adobe Photoshop and soon, Final Cut Pro X. Use AI to auto-tag and transcribe your media. Save time and add data to your library ( search for objects, themes or spoken phrases ) with a single click .

TOOLS | 2020: Customers are archiving media assets in Backblaze B2, from long-running television productions, media distributors, AR/VR video creators, corporate video producers, houses of worship emptying their closets of USB hard drives clearing off RAID arrays, and migrating LTO tapes to cloud storage. 

RESOURCES : Community for the Post Production and Production Industries: Latest Workstations (Lenovo Perspective)

POWER SUPPLY TOOLS : 12 Best Power Supply For Gaming PC And 4K Video Editing

⭐️ Resources Software needed - by building a Hackintosh with PC parts :

🔗 OpenCore: https://github.com/acidanthera/opencorepkg/releases

🔗 ProperTree: https://github.com/corpnewt/ProperTree

🔗 MountEFI: https://github.com/corpnewt/MountEFI

🔗 OC-Gen-X: https://github.com/Pavo-IM/OC-Gen-X/releases

💻 Command to make bootable installer for macOS Big Sur:

sudo /Applications/Install\ macOS\ Big\ Sur.app/Contents/Resources/createinstallmedia --volume /Volumes/MyVolume

🔗 Find the commands for other versions of macOS -----> HERE <----

🔗 Links for SSDTs (make sure to select the correct processor type): https://dortania.github.io/Getting-Started-With-ACPI/ssdt-methods/ssdt-prebuilt.html#intel-desktop-ssdts

💻 Device Properties for Coffee Lake: PciRoot(0x0)/Pci(0x2,0x0) AAPL,ig-platform-id 07009B3E framebuffer-patch-enable 01000000 framebuffer-stolenmem 00003001 💻 Boot-args: -v keepsyms=1 debug=0x100 alcid=1 prev-lang:kbd en-US:0



TOOLS | 2020: OuterVision® Power Supply Calculator

VIDEO NETWORK | 2020: Minimum System Requirements To start editing video : What type of footage will you be editing: R3D, CinemaDNG, ProRes, XAVC S, mp4? ; How complex are your projects: single shot, single camera, multi-camera, animation, VFX? ; What are your output formats? ; How long do you have to deliver your edits? ; Finally, are you editing online or offline?

BOOKS | 2020: The History Of Gaming: An Vr Community



PROGRAMMING

KUBERNETES | 2022 : Learning Kubernetes is essential for any DevOps professional. DevOps engineers are always in demand. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. It was originally designed by Google and is now maintained by the Cloud Native Computing Foundation. Kubernetes is at the cutting-edge of application deployment. The best way to kick-start your DevOps career is by learning how to effectively deploy Kubernetes.

RESOURCES FREELANCER : Find freelancer services, projects for your business

Tools Cloud | 2020 : High-performance GPUs on Google Cloud for machine learning, scientific computing, and 3D visualization.

GPU processors exceed the data processing speed of conventional CPUs by 100-200 times. Example of Servers with a GPU for deep machine learning : Kubernetes based GPU cloud More cost effective Nvidia RTX 2080 Ti.

PROGRAMMING TOOLKIT

Motion Tricks

Handy Tools to examine WebSocket traffic : • Google Chrome Developer Tools: a set of HTML5 applications that ships with Chrome and allows you to inspect, debug, and optimize Web applications • Google Chrome Network Internals (or “net-internals”): a set of tools that allows you to inspect network behavior including DNS lookups, SPDY, HTTP caching, as well as WebSocket • Wireshark: enables you to analyze network protocol traffic.

Insights on Encryption and Why we need Cybersecurity?

There are also various privacy and anonymity technologies you might be interested to protect your data and online identify - it may not be as popular , but are viable alternatives if you want to lower your risk of exposure to surveillance: • DuckDuckGo : search engine whose business model does not revolve around tracking its users. ProtonMail is an email service whose business model does not depend on mining users’ data; rather it uses client-side encryption to protect email content and user data. Ello - an ad-free alternative to existing social networks. There are browser plugins that you can install to monitor and block sites that track you as you browse the Internet : TrackMeNot, Disconnect, Privacy Badger, Ghostery, and others. The best tool available today to protect your anonymity when browsing the internet is the Tor browser. In fact, when combined with a reliable VPN service (Tor over VPN), it offers a double dose of anonymity and privacy.

TOOLKIT | 2020: DATA STORY TELLING | 2020 : Research and data to make progress against the world’s largest problems / data storytelling

The RedMonk Programming Language Rankings | June 2020

BOOKS | 2020: Download Programming Books

Update FREE LABS TO TEST YOUR REDTEAM/BLUETEAM and CTF SKILLS :

Share with your network and friends.

· Attack-Defense - https://attackdefense.com

· Alert to win - https://alf.nu/alert1

· Bancocn - https://bancocn.com

· CTF Komodo Security - https://ctf.komodosec.com

· CryptoHack - https://cryptohack.org/

· CMD Challenge - https://cmdchallenge.com

· Cyberdefenders - https://lnkd.in/dVcmjEw8

· Ctftime- https://ctftime.org

· Dfirmadness - https://lnkd.in/dNkzQvXH

· Explotation Education - https://exploit.education

· Google CTF - https://lnkd.in/e46drbz8

· HackTheBox - https://www.hackthebox.com

· Hackthis - https://www.hackthis.co.uk

· Hacksplaining - https://lnkd.in/eAB5CSTA

· Hacker101 - https://ctf.hacker101.com

· Hacker Security - https://lnkd.in/ex7R-C-e

· Hacking-Lab - https://hacking-lab.com/

· HSTRIKE - https://hstrike.com

· ImmersiveLabs - https://immersivelabs.com

· LetsDefend- https://letsdefend.io/

· NewbieContest - https://lnkd.in/ewBk6fU5

· OverTheWire - http://overthewire.org

· Practical Pentest Labs - https://lnkd.in/esq9Yuv5

· Pentestlab - https://pentesterlab.com

· Hackaflag BR - https://hackaflag.com.br/

· Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd

· PentestIT LAB - https://lab.pentestit.ru

· PicoCTF - https://picoctf.com

· PWNABLE - https://lnkd.in/eMEwBJzn

· Pwn college- https://dojo.pwn.college

· Portswigger Labs - https://lnkd.in/dF8nFyEN

· Root-Me - https://www.root-me.org

· Root in Jail - http://rootinjail.com

· Rangeforce- https://www.rangeforce.com

· SANS Challenger - https://lnkd.in/e5TAMawK

· SmashTheStack - https://lnkd.in/eVn9rP9p

· SnapLabs - https://lnkd.in/d-yGATs7

· The Cryptopals Crypto Challenges - https://cryptopals.com

· Try Hack Me - https://tryhackme.com

· Vulnhub - https://www.vulnhub.com

· Vulnmachines- https://vulnmachines.com

· W3Challs - https://w3challs.com

· WeChall - http://www.wechall.net

· Zenk-Security - https://lnkd.in/ewJ5rNx2

#ctf #pentest #redteam #blueteam #hacking #informationsecurity #cybersecurity

view

# INSIGHTS ON DATA Vs. INFORMATION | May 2020 : Defining Data Quality and Value / What is Data Value ? - Insight on Ethical and societal implications of algorithms, data, and artificial intelligence: a roadmap.

# INSIGHTS ON THE ROAD TO CREATE VALUE | March 2020 : "What I cannot create I do not Understand ."

"Where to begin? Why am I doing this? What's my end goal?" - Begin - Learn - Improve - Persist - . People who like to learn, share, and challenge themselves normally seek knowledge even through bad experiences and errors, and embrace failures as an opportunity to { [re]structure and [re]think } . Your attention determines the experiences you have, and the experiences you have determine the life you live. When the Nobel physicist Richard Feynman wrote on his blackboard, he was reminding himself and his students that unless they could take apart a concept or theory and understand each individual step, they did not truly understand it. Every step to get to the solution is valid, even errors. Through failure and deconstruction, one can understand how a concept behaves and discover a solid framework and a set of techniques to accomplish it. The process reveals a new path and enables the improvement of understanding. Many errors have led creators to new solutions! The way one thinks of a problem, the language chosen to talk about it, and the benefits of sharing models with users all determine the object life-cycle management and logical and physical application structuring. Most of the time, we are incapable of comprehending certain knowledge until we have experienced it firsthand. To avoid blindly following behind, always question. Knowing what one needs to know in order to make honest decisions for the good of all, rather than decisions for the good of a few, is crucial. Redifining value , is not just about profit maximization issues - both tangible and intangible investments -, but sustainable growth ( the measure of Value Creation vs. Revenue Extraction);

# INSIGHTS | 2020 :
THE BACKBONE GUIDELINE BUSINESS PLAN :

📅 Image: Beyond Creative Team in Business Plan / Marketing Workshop 2016

Workflow Tools for Pipeline Systems: Everyone is a reflection of their own journey, story, and struggles - personal choices or differences, culture, and learning pathways. In the process of creating, there's always a road to ensure that the elements of your team can grow from a human and professional point of view. // --- 📅 PART I -- Working with Teams: Accountability and Responsibilities in Multitasking Coordination Projects Having a good cross-section of team skills and communication in teams is equivalent to the neural network in the human body - it works best when it's a two-way street. People tend to confuse task management with process management, but these serve different business problems. If there is a misfire, the organism becomes inefficient, chaotic, or even dysfunctional. More than persuading the team to accept their point of view in all situations, the modern manager should be open to different views on products, strategies, or even internal administrative issues of the company. Otherwise, it will be more difficult to learn, live together as a team, and even improve their own performance. // --📅 PART II - Choose Technology Wisely: Invention vs Innovation and Quality vs Value Designing interactions and digital technologies presents both opportunities and challenges for systems to improve performance and security, capable of protecting against vulnerabilities or the threat of malicious actors (cyber threats). Flexibility inherently implies scale as well, adapting to the size and scope of the business (Scoping Guidance / Automation and Control Systems Security Life Cycle). I believe that considering task context and design thinking can improve programmer productivity by creating a structured architecture for the software and hardware to respond efficiently. Sharing resources with employees for the development of the project ecosystem can also minimize risk using SMART criteria: Specific, Measurable, Achievable, Relevant, and Time-Bound. Learning from others and measuring your goals can help redefine questions to create solutions such as "How can you guarantee software quality?", "How can my product/service help?", and "Why do some digital innovations and experiences engage us deeply and spread widely, while others do not?". Overall, choosing technology wisely requires balancing invention and innovation with quality and value to create effective and secure systems that adapt to the needs of the business.

By getting the best out of quantity and quality of the available professionals , from the company itself and external sources – internal audit can generate more value, offer new solutions and ideas, provide greater security and modernize its traditional rules. Data is valuable, but it may not live up to what you expect – lost, polluted, duplicated or in breach of data protection laws. Often these issues go unnoticed, ruining months of data and no way to retroactively clean it. Data is an important asset for companies, which must make efforts to ensure their quality, allowing them to acquire insights to understand consumers and better tailor their products and services. || 2022

Lean Budgeting:

# GITERS |*UPDATE - where people build software



scroll me





READINGS UPDATES

RESEARCH CRYPTOGRAPHY | 2022 : A modern practical book about cryptography for developers.

RESEARCH CODE GOES IN, ART COMES OUT | 2021 : TURNING ALGORITHMS INTO ARTWORK.

https://nextbigideaclub.com/magazine/smart-vulnerable-bookbite/36101/





RESEARCH AR/VR JOURNEY| 2020: “Designing for VR should not mean transferring 2D practices to 3D, but finding a new paradigm.”

In the early 1980s, home computing was booming around the world as millions of people bought their very first machine from Commodore, Sinclair, Oric, Acorn, or Atari. The curiosity about merging digital arts with technology has been a part of my life since then. I refocused my interest in programming - integrating science and arts - because I saw how traditional creative media companies' business strategies have been struggling to stay competitive in today's media. They have been unable to invest in new models due to their resistance to change and incapable of talent retention due to the lack of income investment requirements. The consequences are more than visible now. Consumers have been canceling their pay-TV subscriptions in favor of internet-delivered alternatives since 2011. I recommend you to read the following book: The Netfix Effect" <----click to see video --- New forms of production, distribution, and exhibition imply different ways of thinking, doing, and experimenting.




FOOTNOTE - Privileging algorithms on its agenda, computer science distances itself both from its arts and crafts origins and from its less prestigious cousins in engineering : “New media calls for a new stage in media theory.…To understand the logic of new media, we need to turn to computer science. It is there that we may expect to find the new terms, categories, and operations that characterize media that became programmable. From media studies, we move to something that can be called ‘software studies’—from media theory to software theory. (....) In new media lingo, to ‘transcode’  something is to translate it into another format.That is, cultural categories and concepts are substituted, on the level of meaning and/or language, by new ones that derive from the computer’s ontology, epistemology, and pragmatics.… When Software Looks Like MathDespite the fact that algorithms are modeled as mathematical functions (with inputs and outputs), mathematical functions (as developed from Leibniz on) are inadequate for representing the operations of software. Operations are not all functions, so software is not mathematics. Alternatively, more precisely, only some software can be rendered as mathematics—the software that implements algorithms!”- Critical Code Studies by Mark C. Marino The E/E architecture and the future of automotive innovation | 2022

DOCUMENTATION | 2021 Collect data in AR

PerceptiLabs v0.13x | 2022 - Pre-process data, build, train and evaluate models with machine learning. Created by Data scientists and developers who envisioned a faster way to build machine learning models in a visual way ( Image Processing and Computer Vision) in order to understand and predict what the model was doing and to share that insight with others.

|| TOOLS ||

|| STORYset | Awesome free customizable illustrations for your next project ||

|| REBNDERMAN Tutorials | RenderMan Fundamentals ||

|| Linux Open source video editor. Free and easy to use for any purpose, forever ||

|| Top 10 Best Cyber Attack Simulation Tools to Improve Your Organization Security – 2022||

|| Penetration Test Reports ||

# INSIGHTS ON LIVE CODING | Feb 2021 *UPDATE : Programming languages used to simulate spatial computing - visual surround sound HRTF , using software/hardware tools

RESOURCES 2021 | AI and the future of the mind: Is it possible that we'll merge with AI?

FOOTNOTE: The PDCA model is a simple way to initiate change within an organization or start a project. Similar to OODA, PDCA is an acronym consisting of four steps: plan, do, check, and act. Although the PDCA method is easier to comprehend, some critics argue that it is too linear and may not align with the rapidly-evolving realities of the corporate world. The process involves creating a plan for the project, putting it into action, assessing the results, and making adjustments to rectify errors. Ideally, one would utilize the insights gained to create a new plan, restarting the cycle from the beginning. The PDCA approach is a deliberate and cautious method, differing from the OODA loop, and may not be suitable for situations where quick reactions are necessary.

Web development
Web design
Programming
API's