Category: Technology



In most organizations, senior developers who perform well are eventually asked to lead a team and deliver results through that team. Developers often assume new leadership roles because of their deep technical expertise that enabled them to perform well in their technical roles. However, after they become managers, a lot of them fail to become effective leaders. But why is that? What many do not realize is that leading requires an entirely new set of traits. If you want to become a great tech lead one day, stay tuned as I explore the top 10 traits of the great technical leaders. https://www.youtube.com/watch?v=3AZi49wyvds



We are witnessing a fundamental shift in AI driven by self-supervision and by the ability to create foundation models that power generative AI. Join Darío Gil, SVP and Director of IBM Research as he demystifies the technology and shares a set of principles to guide your generative AI business strategy. Experience watsonx, IBM’s new data and AI platform for generative AI and learn about the breakthroughs that IBM Research is bringing to this platform and to the world of computing. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=FrDnPTPgEmk https://www.youtube.com/watch?v=WeIJeU4zoX0



Watch this video to delve into the eerie realm of Internet hate forums and discover the chilling, real-life tale of an unassuming man who is mercilessly pursued by a novel breed of cyber aggressor. The innovative research of our Keynote Speaker, grounded in firsthand interactions with these perpetrators, reveals the terrain of the Socially Motivated Threat Actor. These networked adversaries distinctively manipulate both digital infrastructures and human procedures, operating en masse and through specific engagements, to exert influence and inflict damage upon their selected targets. For security professionals, grasping this evolving dimension is essential for reducing uncertainty and crafting an efficient defensive approach in the face of a cyberattack. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=_Ov_jBhsQZk https://www.youtube.com/watch?v=qg5BwWGCDF0