This document summarizes common mistakes and issues seen in bad presentations through a series of mock slides. Some examples highlighted include distracting slide designs that are hard to read, overuse of bullet points and sounds, lack of consistency in slide formatting, lack of preparation leading to unclear information, going over time limits, assuming too much prior knowledge from the audience, failure to engage the audience, reading slides word-for-word, prioritizing getting through the presentation over answering questions, using meaningless or overly promotional titles, and promising follow-up that never occurs. The document uses humor and exaggeration to illustrate problems often found in ineffective presentations.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
油
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether theyre using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating and in many cases, surprising.
This 際際滷Share explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology and how attitudes change with age, location and seniority level. If youre marketing a tech brand or planning to use VR and wearables to reach a professional audience then these are insights you wont want to miss.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Heres what AI learnings your business should keep in mind for 2017.
If you are like many people, even the thought of delivering a speech in front of an audience will get your palms sweating. The fear of public speaking ranks high among the most common phobias, and for good reason: most of us approach the situation with the wrong mindset, which in turn makes us live out our worst fears in a public forum.
As Michael Parker notes in ITS NOT WHAT YOU SAY: How to Sell Your Message When It Matters Most (A TarcherPerigee paperback; on sale January 2016), our fixation on the content of our words and not the presentation of ourselves is what brings us down. Once the Vice-Chairman of Londons Saatchi & Saatchi, and one of the worlds most experienced advertising pitch men, having made more than 1,000 pitches in his successful career, Parker has learned first-hand that an effective presentation, a job interview, or even a speech at a wedding hinges on our ability to portray ourselves as passionate, relatable, and collected. But, if we are focused on what we say, and not how we act, we will fail to persuade our audience.
Applied in the boardroom, at the pulpit, or even in conversation, these tenets will help you present better in any situation.
The document lists the names of various hotels, restaurants, bars, event spaces, and other HORECA businesses located in the Netherlands and other places like Amsterdam, Den Bosch, Eindhoven, Nieuwegein, and Antwerp. Many of the listings are for Hilton hotels in Den Haag and Amsterdam, as well as the Grand Hotel Amsterdam.
This document discusses risk-driven development and risk analysis methods for software systems. It describes conducting a risk analysis at each design step to evaluate risks and ensure the design mitigates risks. Failure mode and effects analysis and fault tree analysis are introduced as structured approaches to identify risks from component failures and their effects. The importance of testing is discussed based on the impact of failures. Design options are compared using risk analysis methods to evaluate and select the optimal design.
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...Jaap van Ekris
油
When a project delivers the expected product on
time and on budget, Delivery Quality is an essential part for turning a merely satisfied customer into a returning one. However, many projects fail to meet customers expectations, posing the question if Delivery Quality is still relevant and the underlying decomposition is still valid. The case study shows that Delivery Quality is still relevant to the project when product quality clearly is lacking: Delivery Quality might be a requirement for being able to rescue the project. The case also shows that the decomposition of
Delivery Quality into underlying factors has issues: the factor Transparency is clearly missed, and the factors Responsiveness and Partnership are too narrowly defined. Especially the lack of the factor Transparency is considered critical, since in this case the lack of Transparency led to a quite abrupt abortion of the project.
2015 05-07 - vu amsterdam - testing safety critical systemsJaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers...
What the hack happened to digi notar (28-10-2011)Jaap van Ekris
油
Presentation for risk managers about the impact of the DigiNotar hack, in layman terms, explaining the basics of Public Key Infrastructures (PKI) and why CA's are important to be able to be trusted.
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Jaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers...
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical reJaap van Ekris
油
Presentation about maintaining privacy of patients, while harvesting aggregated data for improvement of patient treatment and scientiffic medical research.
2016-04-28 - VU Amsterdam - testing safety critical systemsJaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers.
Native-, web- en hybride apps voor op mobiele toestellen
Apps zijn applicaties die op tablets en smartphones draaien. Er bestaan native apps, web apps en hybride apps. Ook html 5 en css komen ter sprake om een 'responsive design' te maken. In Nederlands.
The document lists the names of various hotels, restaurants, bars, event spaces, and other HORECA businesses located in the Netherlands and other places like Amsterdam, Den Bosch, Eindhoven, Nieuwegein, and Antwerp. Many of the listings are for Hilton hotels in Den Haag and Amsterdam, as well as the Grand Hotel Amsterdam.
This document discusses risk-driven development and risk analysis methods for software systems. It describes conducting a risk analysis at each design step to evaluate risks and ensure the design mitigates risks. Failure mode and effects analysis and fault tree analysis are introduced as structured approaches to identify risks from component failures and their effects. The importance of testing is discussed based on the impact of failures. Design options are compared using risk analysis methods to evaluate and select the optimal design.
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...Jaap van Ekris
油
When a project delivers the expected product on
time and on budget, Delivery Quality is an essential part for turning a merely satisfied customer into a returning one. However, many projects fail to meet customers expectations, posing the question if Delivery Quality is still relevant and the underlying decomposition is still valid. The case study shows that Delivery Quality is still relevant to the project when product quality clearly is lacking: Delivery Quality might be a requirement for being able to rescue the project. The case also shows that the decomposition of
Delivery Quality into underlying factors has issues: the factor Transparency is clearly missed, and the factors Responsiveness and Partnership are too narrowly defined. Especially the lack of the factor Transparency is considered critical, since in this case the lack of Transparency led to a quite abrupt abortion of the project.
2015 05-07 - vu amsterdam - testing safety critical systemsJaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers...
What the hack happened to digi notar (28-10-2011)Jaap van Ekris
油
Presentation for risk managers about the impact of the DigiNotar hack, in layman terms, explaining the basics of Public Key Infrastructures (PKI) and why CA's are important to be able to be trusted.
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Jaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers...
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical reJaap van Ekris
油
Presentation about maintaining privacy of patients, while harvesting aggregated data for improvement of patient treatment and scientiffic medical research.
2016-04-28 - VU Amsterdam - testing safety critical systemsJaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers.
Native-, web- en hybride apps voor op mobiele toestellen
Apps zijn applicaties die op tablets en smartphones draaien. Er bestaan native apps, web apps en hybride apps. Ook html 5 en css komen ter sprake om een 'responsive design' te maken. In Nederlands.
MobiCloud Transport Webinar series June 2013 - DutchAppear
油
In dit webinar worden gedetailleerde case studies behandeld zoals die van spoorbedrijf T奪gkompaniet AB in Zweden en de KVV, het stadsvervoer van Karlsruhe in Duitsland. Deze organisaties maken gebruik van de cloud-gebaseerde mobiele applicaties van het MobiCloud project met effici谷ntieverhoging, operationele besparing en met verhoogde klanttevredenheid als resultaat.
Presentatie over de Tophima driver (hierin "IRIS") en constructor - het designer programma van tophima om de driver to configureren en om programma's rond te schrijven zonder verdere kennis van programmeren.
2024-04-10 VU Amsterdam - Testing Safety Critical Systems.pdfJaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers.
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giantsJaap van Ekris
油
Many safety systems are designed to be never used: they are safety nets, waiting to avert the disaster that hopefully never will happen. For example the Dutch Storm surge barriers, dormant giants waiting to be used, but only really active every year or even once every ten years. How do you know that such a system is there when you need it. Is the giant safely asleep, or did he die without us noticing it? How do you design and optimise its maintenance, where its biggest problem is dormant failure? In this talk I adress the approach used for these systems.
2017 03-10 - vu amsterdam - testing safety critical systemsJaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers.
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Jaap van Ekris
油
The focus of many information security methods are on office automation: protecting vulnerable data. When working in embedded software environments, the focus changes significantly to availability, and also the counter-measures against threats change dramatically. A major issue is that security will become an IT problem that industrial automation continues to ignore. In this presentation, the problem will be presented, as well as directions to embed security measures into the organisation.
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Jaap van Ekris
油
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers..
2011-05-02 - VU Amsterdam - Testing safety critical systemsJaap van Ekris
油
Presentation about the steps required for Verifying and Vlaidating safety critical systems, as well as the test approach used. Contains examples of real-life IEC 61508 SIL 4 systems.
2010-03-31 - VU Amsterdam - Experiences testing safety critical systemsJaap van Ekris
油
1) Testing safety critical systems is challenging because software often contains errors and failures can have catastrophic consequences, so systems must be designed and tested to extremely high standards of reliability.
2) The document discusses standards like IEC 61508 that provide requirements for safety integrity levels and risk management in developing safety critical systems.
3) Rigorous verification techniques are needed including reviews, static analysis, unit testing with high code coverage, integration testing of components, system testing of full environments, and acceptance testing of real systems.
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...Jaap van Ekris
油
The document discusses factors that influence a software company's ability to retain customers and win repeat business. It analyzes a case study of a technically successful project where the customer was still not fully satisfied. The case study identified issues in areas like involvement with the customer and responsiveness to feedback. It evaluates the SERVQUAL model of delivery quality and concludes that while useful, it is not complete for software projects and needs an additional factor of "partnership" to account for fully meeting customer needs and priorities. Retaining customers requires both product success and exceeding expectations through strong project delivery and relationships.
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...Jaap van Ekris
油
Customer retention is vital for the survival of software development organizations, especially under current economic trend of global outsourcing. We show that the traditional definition of project success has a blind spot to aspects are extremely relevant for customer retention and show what softer factors are also important to consider when defining project succes in the organization.
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patternsJaap van Ekris
油
In the past, embedded software was intended to automate simple isolated tasks for dedicated purposes. However, there is a trend towards integrating embedded components into large networks which can perform complex tasks. Customers expect systems to be open and extensible, to prepare for future challenges. This introduces new challenges for embedded software engineers: the integration of components into larger integrated networks poses new demands upon component quality (how to prepare a component for all possible future assemblies) as well as an integrated system architecture viewpoint (how to construct a flexible but secure and reliable network).
In this presentation we show, based on practical examples, what the value of systematic thinking of software quality and systems architecture is in developing complex integrated embedded systems.
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order tJaap van Ekris
油
The document discusses strategies for managing mobile devices in corporate environments. It notes that personal mobile device usage is increasing in workplaces. It then analyzes the security risks of centralized, decentralized, and open decentralized management architectures. The document advocates for an open decentralized approach that allows users to access corporate systems from any device but also implements security policies and education to balance user needs with risk management.
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...Jaap van Ekris
油
Customer retention is vital for the survival of software development organizations, especially under current economic trend of global outsourcing. We show that the traditional definition of project success has a blind spot to aspects are extremely relevant for customer retention.
10. S T O F SERVICEDOMEIN Waardepropositie TECHNOLOGIE DOMEIN Functionaliteit FINANCIEEL DOMEIN Kosten en opbrengsten ORGANISATIE DOMEIN Inrichting waardeketen WAARDE VOOR DIENSTAANBIEDERS BUSINESSMODEL KLANTWAARDE
11. Welke STOF bekijken we? SERVICEDOMEIN Waardepropositie TECHNOLOGIE DOMEIN Functionaliteit FINANCIEEL DOMEIN Kosten en opbrengsten ORGANISATIE DOMEIN Inrichting waardeketen WAARDE VOOR DIENSTAANBIEDERS BUSINESSMODEL KLANTWAARDE
12. Vergeet ketenpartners niet... Hoe gaat het met de belangen van partners? Wie moet er het meeste werk verzetten? Hoe wordt er in de keten aan verdiend? Voer voor juristen...
13. Waarde voor klanten Uniekheid content Integratie met bestaande applicaties Gemak Ondersteuning dagelijkse taken Prijsstelling / besparingen FUN
15. Waarde nu (2010)... Unieke content, niet actueel Bevat veel reclame Prijs: Web is gratis Iphone: 0,79 per krant Papier: 1,45 per krant Ipad: 1,59 per krant
21. Noodzaak tot cloud... Windows Phone kent geen desktop synchronisatie voor applicaties en PIM Het filesysteem is voor een gebruiker onbenaderbaar Elke applicatie kent zijn eigen data-container Is dus een drama bij (onvrijwillig) wisselen van toestel!
26. Gebruik van de cloud App moet toegevoegde waarde hebben boven andere kanalen Web toegevoegde waarde hebben Actualiseren data Verrijken data Datagebruik is schadelijk voor Performance Battery life
#25: Ik en nog een paar MVPs hebben gklaagd over enkele devs die de New sectie domineerden met honderden gelijke apps. Kern was dat mensen belachelijk veel apps dumpten voor specifieke regios.
#29: Identieke content, geen filtering op client, geen locatie based info, niets.... Geen advertenties, dus kost alleen maar geld....
#30: Briljant: webbased invoer boodschappenlijstje, op locatie sorteren op looproute
#31: Enige toegevoegde waarde van de website is eigenljik dat de eigenaar een abbo kan afdwingen.... GPS wordt zwaar belast, terwijl aan het eind van het verhaal de kortste weg wordt berekend, niet de werkelijke...
#33: Landkaart werkt niet in het buitenland, geen caching mogelijk Kaarten in gebouwen zijn wel cool.
#34: Web slurpt e-mail accounts leeg en laat snelle planning toe, alsmede hub voor de rest. Client is een manier om de data slim mee te nemen (gestructureerd). Heeft caching in zich.
#37: Slimme caching op toestel zorgt voor bewaren data, Biedt persoonlijke informatie Werkt dat scherm ook echt.....
#46: Encrypted backup bij Dropbox en Google. Helaas geen lekker synchronisatie scenario bedacht....