Poken is a physical device that allows users to exchange contact information by touching devices together. It serves as a "social business card" to view a friend's social media profiles and contact them directly. The device has no software or drivers and easily syncs contacts to social networks and other websites. Poken is targeting multiple markets and demographics and has launched retail sales and affiliate programs. It aims to bridge offline and online interactions by providing analytics on user behavior from its peer-to-peer platform.
A summary of highlights from the CHI2011 conference (Computer Human Interaction) in Vancouver, Canada. This recap focuses on explorations in tangible interaction. The presentation was given internally at Smart Design on 5/30/2011. Enjoy!
The first presentation in the "Mediamatic Night Lab" series. This presentation is about the Open-CI network and its use of open web standards to create a network of sites which are connected and feature content sharing, transparent actions and inter-site login using OpenID and OAuth.
A summary of highlights from the CHI2011 conference (Computer Human Interaction) in Vancouver, Canada. This recap focuses on explorations in tangible interaction. The presentation was given internally at Smart Design on 5/30/2011. Enjoy!
The first presentation in the "Mediamatic Night Lab" series. This presentation is about the Open-CI network and its use of open web standards to create a network of sites which are connected and feature content sharing, transparent actions and inter-site login using OpenID and OAuth.
QR (Quick Response) codes are the latest silver bullet in Transpromo and transaction document multi-channel marketing in the US and Western Europe. But the word on the street is very mixed; some companies swear they’ve boosted response rates; other say nothing happened. To successfully use a QR code in a marketing campaign requires close attention to three critical issues. We’ll discuss those three secrets and the hidden dangers in QR codes, dangers that if misused can not only sabotage a campaign but turn potential customers off your product and your brand.
set-up your iPad with the most useful business and personal apps. Learn the tips and techniques you need to maximize your iPad’s capabilities to ensure that you are getting the most out of this workhorse. Begin to use the iPad to watch movies, listen to music, read books, play video games, use FaceTime with distant friends and browse the internet. Unlock the device’s full potential.
In this webinar, marketing attribution platform, Rockerbox, and our experts dove into client examples of streaming advertising and analyze why they worked -- from the creative to the strategy behind them.
LocalSocial is a proximity platform that makes it easy to add in-store engagement features to a Retailer's mobile apps and services. Using in-store beacons powered by Low Energy Bluetooth, WiFi and NFC, it makes it easy for Retailers to offer Loyalty Points for Walk-ins, trigger offers and specials just for being in-store, and create apps that can be smart about where the customer is located. LocalSocial provides Retailers with greater insight about their store visitors, deepens engagement with customers, and helps drive the customer conversation.
Beacon Explorers: Beacon Week San FranciscoDoug Thompson
BLE beacons have come a long way since Apple announced iBeacon support. At Beacon Week San Francisco, sponsored by Kontakt.io, we review some tips, insights and idea-starters for the new world of beacons.
Have a read of our creds. If you are interested to hear more about our new approach to digital advertising please get in contact with us. Nick@nextdoorthinking.co.uk
Lessons from Saturday Night Live's Digital Word of Mouth Strategies360i
360i's Sarah Hofstetter, Vice President of Emerging Media & Client Strategy, and NBC's Matt Allen, Senior Executive Director of Marketing, spoke at WOMM-U on May 13.
QR (Quick Response) codes are the latest silver bullet in Transpromo and transaction document multi-channel marketing in the US and Western Europe. But the word on the street is very mixed; some companies swear they’ve boosted response rates; other say nothing happened. To successfully use a QR code in a marketing campaign requires close attention to three critical issues. We’ll discuss those three secrets and the hidden dangers in QR codes, dangers that if misused can not only sabotage a campaign but turn potential customers off your product and your brand.
set-up your iPad with the most useful business and personal apps. Learn the tips and techniques you need to maximize your iPad’s capabilities to ensure that you are getting the most out of this workhorse. Begin to use the iPad to watch movies, listen to music, read books, play video games, use FaceTime with distant friends and browse the internet. Unlock the device’s full potential.
In this webinar, marketing attribution platform, Rockerbox, and our experts dove into client examples of streaming advertising and analyze why they worked -- from the creative to the strategy behind them.
LocalSocial is a proximity platform that makes it easy to add in-store engagement features to a Retailer's mobile apps and services. Using in-store beacons powered by Low Energy Bluetooth, WiFi and NFC, it makes it easy for Retailers to offer Loyalty Points for Walk-ins, trigger offers and specials just for being in-store, and create apps that can be smart about where the customer is located. LocalSocial provides Retailers with greater insight about their store visitors, deepens engagement with customers, and helps drive the customer conversation.
Beacon Explorers: Beacon Week San FranciscoDoug Thompson
BLE beacons have come a long way since Apple announced iBeacon support. At Beacon Week San Francisco, sponsored by Kontakt.io, we review some tips, insights and idea-starters for the new world of beacons.
Have a read of our creds. If you are interested to hear more about our new approach to digital advertising please get in contact with us. Nick@nextdoorthinking.co.uk
Lessons from Saturday Night Live's Digital Word of Mouth Strategies360i
360i's Sarah Hofstetter, Vice President of Emerging Media & Client Strategy, and NBC's Matt Allen, Senior Executive Director of Marketing, spoke at WOMM-U on May 13.
Il Collegio sindacale deve applicare una modalità di selezione dei controlli basata su un’identificazione e valutazione dei rischi. Questo ed altri interessanti concetti sono riportati nelle nuove Norme di comportamento del Collegio sindacale, elaborate dalla Commissione di studio presieduta da Marcellino Bortolomiol nell’ambito del Consiglio nazionale dei dottori commercialisti ed esperti contabili. Il documento assume una notevole importanza per gli addetti ai lavori in quanto ha il pregio di analizzare a tuttotondo le problematiche correlate all’ufficio di sindaco nell’ambito delle società non quotate, fornendo direttive precise ed esemplificazioni concrete, utili a delimitare gli ambiti di rischio e di incertezza.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
5. Poken is compatible with over 30 networks
A friend’s social networks appear as icons
on her Poken Card. Click on any icon to
view their page. With AIM or Skype,
clicking on the icon contact them directly
.
.
. 5
6. The interface is intentionally simple
•USB – Any Operating System
•No software installation
•No drivers
•No pre-registration
12. Poken also works within any other website: Web developers can
use our API
• Network connector: Integrate your network into DoYouPoken.com
• Poken API: Integrate Poken functionality into your network
• Poken App: Plug a Poken widget into your network
12
13. Poken also works within any other website: Web developers can
use our API to integrate the Poken Widget
Poken API lets any website easily add
services that enhance the relationship
that website or network has with its users.
13
14. Poken is developing a set of Research and Analytics tools for partners
to fully leverage the value of its Peer to Peer Viral Marketing Platform
•The Poken API lets any marketer easily add services that
enhance the relationships they have with their consumers
offline and online.
•Poken’s platform will provide marketers a unique opportunity
to bridge offline and online marketing, with clear, precise
metrics.
•Metrics will include specific target audience behavioral data
that will help marketers refine targeted marketing efforts across
their marketing mix via one or more Poken delivery/connection
mechanisms.
14
15. Poken has just launched but is already strongly
resonating in multiple markets and demographics
Web links of interest:
Springwise: http://springwise.com/lifestyle_leisure/poken_high-five_the_panda_to_c/
Poken is quot;the word of 2009quot;: http://www.youtube.com/watch?v=HRb0aVLHWes
http://www.youtube.com/watch?v=_rG-q4ATiAo
Poken CEO’s TechTalk at Google in January 2009 http://www.youtube.com/watch?v=61jYzrR5MN4
Poken explained on Tuburon-TV http://www.tiburon-tv.com/2009/03/03/stephane-doutriaux-%E2%80%93-poken-the-word-of-2009-startupcamp-switzerland/
TSR about the Poken Badges: http://www.tsr.ch/tsr/index.html?siteSect=500000&channel=info&tab=info_1930#tab=info_1930;program=15;vid=10383931
16. Many partners (media, blogs, e-commerce websites,etc)
are starting to promote Poken…
Buy individual pokens in Retail, or through web shops
Buy 12-packs at a discount on doyoupoken.com
Become an Affiliate or Promoter, and make money!
16
17. Poken as a partner for now and the future
Poken created the “Poken Domes” for special events, the domes
are placed throughout the venue, and users can poken the dome
and randomly be selected as a winner in a lottery or it’s used to
collect data for future mailing opportunities.
19. Poken : your “Social Business Card”
Why
?
Easy
Fun
Cute
Simple
Touch & connect in the real world
A place to manage your identities
View friends in a timeline
21. Let’s Poken!
Ayman van Bregt
Head of Business Development & International Sales
Ayman@DoYouPoken.com
Poken S.A.
Rue du Pont 22,
Lausanne CH-1003
Switzerland
www.DoYouPoken.com
Prizes
Winner, VentureKick
IMD Startup Competition
Swiss Venture Leaders
Hong Kong University Business Plan Competition Top 3
Winner, Asia Venture Trip
Winner, Multimedia Prize of the Swiss Television and Radio