Comprehensive software reviews to make better IT decisions
Virtual Conferences and COVID-19: Early Lessons Learned
Regulations surrounding COVID-19 have left conference conveners with essentially three options: cancel, reschedule, or go online. Now that the first wave of these online conferences has occurred, some organizers have begun to share their strategies, lessons learned, and best practices, such as those from ICLR2020 (April 27-30), CHI Nordic (April 27-28), and Photonics Online Meetup (held January 13, 2020, prior to the declaration of pandemic; however, in their post-event review, the organizers note the applicability of their experience to mid-pandemic online conferences).
Champions of online conferences point to the increased accessibility of these events: online conferences lower the barrier to entry by eliminating the burden and cost of travel. However, increasing the pool of potential attendees also increases the likelihood that the audience will be participating across multiple time zones.
- ICLR presented each poster session twice at different times so participants had more opportunities to attend.
- POM used Slack to facilitate asynchronous collaboration across time zones between geographically distributed organizers.
- Some organizers pointed out not all tools are available in all regions: care must therefore be taken when selecting platforms.
- In general, recorded talks (pre-recorded or recorded live sessions also made available afterward) allow attendees to view content at will.
Networking and Interaction
One of the major challenges of moving any conference online is how to retain the crucial networking and contact-building component, without which the event becomes more akin to a webinar. Additionally, all organizers noted another impact of the lack of physical presence: it is harder for presenters to perceive the audience’s reception of the talk, and audience members may feel less inclined to participate.
- ICLR attached chats to every event in the conference to enable communication between participants. They also used Online Town, which facilitates virtual mingling, to host a social event. They pre-recorded some talks and shifted the live component to Q&A sessions with the speakers to emphasize interactivity between speaker and audience. ICLR also created different ways to browse the conference’s content by visualizing the papers as clusters and recommending papers based on similarity.
- POM held poster sessions over Twitter, increasing the visibility of the content. Since the POM event occurred prior to the declaration of pandemic, their participants were able to physically gather in “POM-hubs”: smaller, localized groups of attendees. These hubs allowed participants to view sessions through web conferencing software, to socialize, and to network. A conference built out of smaller distributed groups has also been proposed by others as a way forward for pandemic-affected conferences in areas where smaller gatherings are permitted.
- CHI Nordic devoted fully half of its 20-minute talks to discussion with the audience. The organizer noted the importance of session chairs setting expectations and delivering instructions to the audience about how best to participate in the chat. They also used Zoom’s breakout rooms function to create smaller discussion groups out of the larger one.
Platform and Tools
All three conferences combined a variety of tools to build the events.
- Talks/poster sessions: WebEx Events, Twitter
- Chat: Slack
- Conference website and registration: WordPress, Qualtrics, Google Forms
- Talks/sessions/chat: Zoom, SlidesLive, Rocket.Chat
- Social event: Online Town by Siempre
- Sponsor hall: 6Connex
- Conference website: developed in-house
- Talks/sessions: Zoom, YouTube Live
- Conference program: Google Docs
- Reduce the considerable amount of time involved in planning online conferences.
- Assure attendees’ security and privacy.
Both conferences that used Zoom experienced “Zoom-bombing,” with CHI Nordic in particular detailing the challenges these disruptions posed.
A number of virtual event platforms are positioning themselves as all-in-one solutions that make transitioning to online conferences easy and that include native or integrated webinar capabilities, registration processes, exhibitor/sponsor spaces, and networking environments. Their success will depend on presenting a compelling argument for their ability to:Offer innovative ways to replicate the social connections and networking that conferences rely on and that webinars lack.
Q headlines a bevy of announcements at AWS re:Invent 2023 in Las Vegas that shed more light on the cloud service provider’s AI strategy and where its differentiation from other vendors lies.
This note outlines some tips and tricks that you should be aware of when embarking on the installation and configuration of a Kubernetes cluster. Such an endeavor should only be attempted if the need for an enterprise-grade container orchestration solution is required.
It’s simply not enough today to pit your traditional application security toolkit against today’s advanced threats, especially those attacks that target APIs or mobile platforms. Bolstering your CI/CD pipeline by introducing more advanced and accurate SAST, SCA, IAST, and DAST will most certainly improve your security posture, but the journey does not end there. There are attacks and use cases that need careful consideration for how you approach security. Appdome believes it has those unknown challenges addressed and can significantly improve your application security program with very little effort from your development and security team, a welcome change from solutions that required a good bit of work to introduce problem-free into your code base four years ago.
This post provides a review of Zoom’s 2023 conference, Zoomtopia 2023. Core aspects covered include what major product releases and upgrades Zoom announced at Zoomtopia 2023, and what these announcements mean for Zoom’s market positioning in 2024.
Contact center as a service (CCaaS) enterprise providers are steamrollering ahead with embedding generative AI functionality in their platforms – whether organizations are prepared for it or not. In this post, I explore a positive outlook for how generative AI can be used to enhance organizations' customer experience capabilities while generating ROI. This includes: 1. Listing the major use cases for generative AI in the contact center. 2. Discussing how we might calculate ROI from utilizing generative AI in the contact center. 3. Considering what organizations can do to prepare for CCaaS vendors’ release of generative AI functionality.
In June 2023, I decided to remove the password on my primary email account as well as the one used to log-in to all of my devices. Did I wait too long? Am I too optimistic this will work without issue? Are there kinks that still need to be worked out? I recently attended Identiverse 2023 and got a FIDO2 hardware token intending at some point in the future to go passwordless. Why wait though? I was pumped up with all the passkey and passwordless sessions I attended and was eager to try this out and share my experience.
If you’re in the market for a password manager or are interested in secrets management, Bitwarden has a powerful platform for you. This unified platform is delivered via a thoughtful and intuitive UI, which Bitwarden Password Manager users will recognize. Bitwarden ranks as top of the Leader Quadrant in SoftwareReviews under the Password Management category, and the company believes its optimized, wide-range passwordless solution set will address most organizations’ needs.
Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are more complex, however, with a 742% increase in software supply chain attacks over the past three years. Sonatype Nexus Firewall has been paying attention and claims its firewall product is smarter about these attacks.
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.