Submit Search
Upload
Securing Your Wireless Network
•
1 like
•
184 views
Ben Rothke
Follow
Securing Your Wireless Network - Certification Magazine May 2008
Read less
Read more
Technology
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
1 5 Job Interviews
1 5 Job Interviews
Fauquier Horticulture
Petit tutorial de com podem emprar el Nearpod a les aules.
Nearpod activitat curs apps
Nearpod activitat curs apps
Estibaliz Camacho
tralaaaqaqaa
Diga draft session plan module 2
Diga draft session plan module 2
Dragan Danilovski
O presente trabalho é um recorte de uma pesquisa desenvolvida no curso de especialização em Docência do Ensino Superior. A investigação surgiu da seguinte questão norteadora: Como os professores em início de carreira docente no Ensino Superior no curso de Pedagogia da Universidade Estadual do Piauí, campus de Parnaíba adquirem e mobilizam seus saberes docentes? Buscando responder à pergunta, elencamos como objetivo geral: Investigar, por meio de narrativas, como os professores em início de carreira docente no Ensino Superior no Curso de Pedagogia da Universidade Estadual do Piauí, campus de Parnaíba, adquirem e mobilizam seus saberes docentes. Com isso, constituímos os seguintes objetivos específicos: Conhecer os fatores que contribuíram para que os professores adentrassem a profissão no Ensino Superior, Identificar as dificuldades dos professores em início de carreira no Ensino Superior e Analisar a contribuição da formação pedagógica inicial para a prática docente no Ensino Superior. Devido ao objeto de estudo, optamos pela pesquisa empírica do tipo narrativa com abordagem qualitativa, e para produção de dados utilizamos a técnica da entrevista semiestruturada. Os sujeitos da pesquisa foram dois professores no exercício efetivo da docência superior na Universidade Estadual do Piauí. Para fundamentar o estudo, utilizamos como referências de apoio: Tardif & Raymond (2000), Pimenta e Anastasiou (2002), Imbernón (2004) entre outros. O resultado das narrativas, permitiu compreender que para construção dos saberes na atuação universitária, o profissional deve estar constantemente na busca de novos conhecimentos científicos, na interação com a comunidade acadêmica, o estudo também revelou, a importância dos conhecimentos pedagógicos da formação inicial e a experiência na atuação do professor
NARRATIVAS DE PROFESSORES EM INÍCIO DE CARREIRA NO ENSINO SUPERIOR DA UNIVERS...
NARRATIVAS DE PROFESSORES EM INÍCIO DE CARREIRA NO ENSINO SUPERIOR DA UNIVERS...
ProfessorPrincipiante
งานวิชา เทคโนโลยีสารสนเทศและการสื่อสาร
การเขียนโปรแกรมภาษา
การเขียนโปรแกรมภาษา
กานต์นิธิ แซ่ลิ้่ม
this slide is all about android os
Android os
Android os
kunwer brijendra shanker
photoshop_workshop_01
photoshop_workshop_01
tutorialsruby
D I A B E T E S D I S C U S S I O N D R
D I A B E T E S D I S C U S S I O N D R
banothkishan
Recommended
1 5 Job Interviews
1 5 Job Interviews
Fauquier Horticulture
Petit tutorial de com podem emprar el Nearpod a les aules.
Nearpod activitat curs apps
Nearpod activitat curs apps
Estibaliz Camacho
tralaaaqaqaa
Diga draft session plan module 2
Diga draft session plan module 2
Dragan Danilovski
O presente trabalho é um recorte de uma pesquisa desenvolvida no curso de especialização em Docência do Ensino Superior. A investigação surgiu da seguinte questão norteadora: Como os professores em início de carreira docente no Ensino Superior no curso de Pedagogia da Universidade Estadual do Piauí, campus de Parnaíba adquirem e mobilizam seus saberes docentes? Buscando responder à pergunta, elencamos como objetivo geral: Investigar, por meio de narrativas, como os professores em início de carreira docente no Ensino Superior no Curso de Pedagogia da Universidade Estadual do Piauí, campus de Parnaíba, adquirem e mobilizam seus saberes docentes. Com isso, constituímos os seguintes objetivos específicos: Conhecer os fatores que contribuíram para que os professores adentrassem a profissão no Ensino Superior, Identificar as dificuldades dos professores em início de carreira no Ensino Superior e Analisar a contribuição da formação pedagógica inicial para a prática docente no Ensino Superior. Devido ao objeto de estudo, optamos pela pesquisa empírica do tipo narrativa com abordagem qualitativa, e para produção de dados utilizamos a técnica da entrevista semiestruturada. Os sujeitos da pesquisa foram dois professores no exercício efetivo da docência superior na Universidade Estadual do Piauí. Para fundamentar o estudo, utilizamos como referências de apoio: Tardif & Raymond (2000), Pimenta e Anastasiou (2002), Imbernón (2004) entre outros. O resultado das narrativas, permitiu compreender que para construção dos saberes na atuação universitária, o profissional deve estar constantemente na busca de novos conhecimentos científicos, na interação com a comunidade acadêmica, o estudo também revelou, a importância dos conhecimentos pedagógicos da formação inicial e a experiência na atuação do professor
NARRATIVAS DE PROFESSORES EM INÍCIO DE CARREIRA NO ENSINO SUPERIOR DA UNIVERS...
NARRATIVAS DE PROFESSORES EM INÍCIO DE CARREIRA NO ENSINO SUPERIOR DA UNIVERS...
ProfessorPrincipiante
งานวิชา เทคโนโลยีสารสนเทศและการสื่อสาร
การเขียนโปรแกรมภาษา
การเขียนโปรแกรมภาษา
กานต์นิธิ แซ่ลิ้่ม
this slide is all about android os
Android os
Android os
kunwer brijendra shanker
photoshop_workshop_01
photoshop_workshop_01
tutorialsruby
D I A B E T E S D I S C U S S I O N D R
D I A B E T E S D I S C U S S I O N D R
banothkishan
Первая KAMBLOG конференция. Москва, 20 декабря, 2009 года.
1 Ya Kamblog Konferentsiya
1 Ya Kamblog Konferentsiya
kamblog
UAV-1989_UAV-TI-1992_VBo
UAV-1989_UAV-TI-1992_VBo
Vincent Bosma
John Witchell, FMS. Opening Keynote Presentation. Sing Up National Gathering. Concorde Centre. Manchester Airport. Friday 22nd January 2010
Sing Up Gathering Presentation
Sing Up Gathering Presentation
eventwithme
Case Solution & Analysis for Gonchar Investment Bank by Paul W. Beamish, Jonathan Royce
Case Solution for Gonchar Investment Bank
Case Solution for Gonchar Investment Bank
casesolutions12
2009 DEADLY VACCINE DEVELOPMENT
2009 DEADLY VACCINE DEVELOPMENT
Prayer Warriors Institute
C O M P L E M E N T A R I T Y & E Q U A L I T Y D R S H R I N I W A S K...
C O M P L E M E N T A R I T Y & E Q U A L I T Y D R S H R I N I W A S K...
banothkishan
Webinar: How PCI and PA DSS Will Change Enterprise Applications, given by Ben Rothke CISSP PCI QSA and Sushila Nair, CISSP PCI QSA of BT PS.
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
MS PROJECT Alejandro Fachini
MS PROJECT Alejandro Fachini
Alejandro Fachini Colombo
New Study Of Gita Nov 13 Dr. Shriniwas Kashalikar
New Study Of Gita Nov 13 Dr. Shriniwas Kashalikar
banothkishan
prod75_019870
prod75_019870
tutorialsruby
Firewalls and border routers are still the cornerstone for perimeter security Always will be a place for VPNs Attacks occur at the application layer So ensure app security
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Building a Security Operations Center (SOC) RSA Conference 2012
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
WHAT HAPPENS IN VEGAS GOES ON YOUTUBE: USING SOCIAL NETWORKS SECURELY RSA Conference 2012
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
The Five Habits of Highly Secure Organizations RSA Conference 2013
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
Deployment Strategies for Effective Encryption RSA conference 2013
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
Deployment Strategies for Effective Encryption InfoSec World conference 2012
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
Presentation: Locking down server and workstation operating systems Given by: Ben Rothke
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
Presentation: Mobile security blunders and what you can do about them. Given by: Ben Rothke
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
Presentation: Securing your presence at the perimeter. Given by: Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
This is a copy of my article ‘Lessons from LIGATT’ which was illegally copied and posted on the LIGATT-run nationalcybersecurity site.
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
Article ‘Lessons from LIGATT’ describes lessons learned from writing a review of a heavily plagiarized book
Lessons from ligatt
Lessons from ligatt
Ben Rothke
My presentation from Interop 2011 on: Social networks and security – can you have both?
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
More Related Content
Viewers also liked
Первая KAMBLOG конференция. Москва, 20 декабря, 2009 года.
1 Ya Kamblog Konferentsiya
1 Ya Kamblog Konferentsiya
kamblog
UAV-1989_UAV-TI-1992_VBo
UAV-1989_UAV-TI-1992_VBo
Vincent Bosma
John Witchell, FMS. Opening Keynote Presentation. Sing Up National Gathering. Concorde Centre. Manchester Airport. Friday 22nd January 2010
Sing Up Gathering Presentation
Sing Up Gathering Presentation
eventwithme
Case Solution & Analysis for Gonchar Investment Bank by Paul W. Beamish, Jonathan Royce
Case Solution for Gonchar Investment Bank
Case Solution for Gonchar Investment Bank
casesolutions12
2009 DEADLY VACCINE DEVELOPMENT
2009 DEADLY VACCINE DEVELOPMENT
Prayer Warriors Institute
C O M P L E M E N T A R I T Y & E Q U A L I T Y D R S H R I N I W A S K...
C O M P L E M E N T A R I T Y & E Q U A L I T Y D R S H R I N I W A S K...
banothkishan
Webinar: How PCI and PA DSS Will Change Enterprise Applications, given by Ben Rothke CISSP PCI QSA and Sushila Nair, CISSP PCI QSA of BT PS.
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
MS PROJECT Alejandro Fachini
MS PROJECT Alejandro Fachini
Alejandro Fachini Colombo
New Study Of Gita Nov 13 Dr. Shriniwas Kashalikar
New Study Of Gita Nov 13 Dr. Shriniwas Kashalikar
banothkishan
prod75_019870
prod75_019870
tutorialsruby
Viewers also liked
(10)
1 Ya Kamblog Konferentsiya
1 Ya Kamblog Konferentsiya
UAV-1989_UAV-TI-1992_VBo
UAV-1989_UAV-TI-1992_VBo
Sing Up Gathering Presentation
Sing Up Gathering Presentation
Case Solution for Gonchar Investment Bank
Case Solution for Gonchar Investment Bank
2009 DEADLY VACCINE DEVELOPMENT
2009 DEADLY VACCINE DEVELOPMENT
C O M P L E M E N T A R I T Y & E Q U A L I T Y D R S H R I N I W A S K...
C O M P L E M E N T A R I T Y & E Q U A L I T Y D R S H R I N I W A S K...
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
MS PROJECT Alejandro Fachini
MS PROJECT Alejandro Fachini
New Study Of Gita Nov 13 Dr. Shriniwas Kashalikar
New Study Of Gita Nov 13 Dr. Shriniwas Kashalikar
prod75_019870
prod75_019870
More from Ben Rothke
Firewalls and border routers are still the cornerstone for perimeter security Always will be a place for VPNs Attacks occur at the application layer So ensure app security
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Building a Security Operations Center (SOC) RSA Conference 2012
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
WHAT HAPPENS IN VEGAS GOES ON YOUTUBE: USING SOCIAL NETWORKS SECURELY RSA Conference 2012
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
The Five Habits of Highly Secure Organizations RSA Conference 2013
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
Deployment Strategies for Effective Encryption RSA conference 2013
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
Deployment Strategies for Effective Encryption InfoSec World conference 2012
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
Presentation: Locking down server and workstation operating systems Given by: Ben Rothke
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
Presentation: Mobile security blunders and what you can do about them. Given by: Ben Rothke
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
Presentation: Securing your presence at the perimeter. Given by: Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
This is a copy of my article ‘Lessons from LIGATT’ which was illegally copied and posted on the LIGATT-run nationalcybersecurity site.
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
Article ‘Lessons from LIGATT’ describes lessons learned from writing a review of a heavily plagiarized book
Lessons from ligatt
Lessons from ligatt
Ben Rothke
My presentation from Interop 2011 on: Social networks and security – can you have both?
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
Article from March 2011 issue of Information Security magazine - Infosecurity Needs Its T.J. Hooper by Ben Rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Ben Rothke
Rothke effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
Deployment Strategies for Effective Encryption presentation from the 2010 Computer Forensics show, by Ben Rothke, April 2010.
Rothke computer forensics show 2010
Rothke computer forensics show 2010
Ben Rothke
The Cloud is in the details webinar - Policy & Requirements in the era of cloud computing, by Ben Rothke. March 2011
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Ben Rothke
The Need for DLP now - A Clearswift White Paper by Ben Rothke – French version La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Ben Rothke
The Need for DLP now - A Clearswift White Paper by Ben Rothke
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Presentation from Ben Rothke at Secure360 2010 - Building a Security Operations Center (SOC)
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
More from Ben Rothke
(20)
Securing your presence at the perimeter
Securing your presence at the perimeter
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Securing your presence at the perimeter
Securing your presence at the perimeter
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt
Lessons from ligatt
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Rothke effective data destruction practices
Rothke effective data destruction practices
Rothke computer forensics show 2010
Rothke computer forensics show 2010
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Recently uploaded
Angeliki Cooney has spent over twenty years at the forefront of the life sciences industry, working out of Wynantskill, NY. She is highly regarded for her dedication to advancing the development and accessibility of innovative treatments for chronic diseases, rare disorders, and cancer. Her professional journey has centered on strategic consulting for biopharmaceutical companies, facilitating digital transformation, enhancing omnichannel engagement, and refining strategic commercial practices. Angeliki's innovative contributions include pioneering several software-as-a-service (SaaS) products for the life sciences sector, earning her three patents. As the Senior Vice President of Life Sciences at Avenga, Angeliki orchestrated the firm's strategic entry into the U.S. market. Avenga, a renowned digital engineering and consulting firm, partners with significant entities in the pharmaceutical and biotechnology fields. Her leadership was instrumental in expanding Avenga's client base and establishing its presence in the competitive U.S. market.
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
DBX 1Q24 Investor Presentation
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Explore how multimodal embeddings work with Milvus. We will see how you can explore a popular multimodal model - CLIP - on a popular dataset - CIFAR 10. You use CLIP to create the embeddings of the input data, Milvus to store the embeddings of the multimodal data (sometimes termed “multimodal embeddings”), and we will then explore the embeddings.
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Uncertainty, Acting under uncertainty, Basic probability notation, Bayes’ Rule,
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
ICT role in 21 century education. How to ICT help in education
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
💥 You’re lucky! We’ve found two different (lead) developers that are willing to share their valuable lessons learned about using UiPath Document Understanding! Based on recent implementations in appealing use cases at Partou and SPIE. Don’t expect fancy videos or slide decks, but real and practical experiences that will help you with your own implementations. 📕 Topics that will be addressed: • Training the ML-model by humans: do or don't? • Rule-based versus AI extractors • Tips for finding use cases • How to start 👨🏫👨💻 Speakers: o Dion Morskieft, RPA Product Owner @Partou o Jack Klein-Schiphorst, Automation Developer @Tacstone Technology
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Passkeys: Developing APIs to enable passwordless authentication Cody Salas, Sr Developer Advocate | Solutions Architect - Yubico Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows. We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases. This video focuses on the deployment of external web forms using Jotform for Bonterra Impact Management. This solution can be customized to your organization’s needs and deployed to support the common use cases below: - Intake and consent - Assessments - Surveys - Applications - Program registration Interested in deploying web form automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Accelerating FinTech Innovation: Unleashing API Economy and GenAI Vasa Krishnan, Chief Technology Officer - FinResults Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
ICT role in education and it's challenges. In which we learn about ICT, it's impact, benefits and challenges.
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Workshop Build With AI - Google Developers Group Rio Verde
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
The CNIC Information System is a comprehensive database managed by the National Database and Registration Authority (NADRA) of Pakistan. It serves as the primary source of identification for Pakistani citizens and residents, containing vital information such as name, date of birth, address, and biometric data.
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
We present an architecture of embedding models, vector databases, LLMs, and narrow ML for tracking global news narratives across a variety of countries/languages/news sources. As an example, we explore the real-time application of this architecture for tracking the news narrative surrounding the death of Russian opposition leader Alexei Navalny coming from Russian, French, and English sources.
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
This reviewer is for the second quarter of Empowerment Technology / ICT in Grade 11
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Tracing the root cause of a performance issue requires a lot of patience, experience, and focus. It’s so hard that we sometimes attempt to guess by trying out tentative fixes, but that usually results in frustration, messy code, and a considerable waste of time and money. This talk explains how to correctly zoom in on a performance bottleneck using three levels of profiling: distributed tracing, metrics, and method profiling. After we learn to read the JVM profiler output as a flame graph, we explore a series of bottlenecks typical for backend systems, like connection/thread pool starvation, invisible aspects, blocking code, hot CPU methods, lock contention, and Virtual Thread pinning, and we learn to trace them even if they occur in library code you are not familiar with. Attend this talk and prepare for the performance issues that will eventually hit any successful system. About authorWith two decades of experience, Victor is a Java Champion working as a trainer for top companies in Europe. Five thousands developers in 120 companies attended his workshops, so he gets to debate every week the challenges that various projects struggle with. In return, Victor summarizes key points from these workshops in conference talks and online meetups for the European Software Crafters, the world’s largest developer community around architecture, refactoring, and testing. Discover how Victor can help you on victorrentea.ro : company training catalog, consultancy and YouTube playlists.
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
In the thrilling conclusion to 2023, ransomware groups had a banner year, really outdoing themselves in the "make everyone's life miserable" department. LockBit 3.0 took gold in the hacking olympics, followed by the plucky upstarts Clop and ALPHV/BlackCat. Apparently, 48% of organizations were feeling left out and decided to get in on the cyber attack action. Business services won the "most likely to get digitally mugged" award, with education and retail nipping at their heels. Hackers expanded their repertoire beyond boring old encryption to the much more exciting world of extortion. The US, UK and Canada took top honors in the "countries most likely to pay up" category. Bitcoins were the currency of choice for discerning hackers, because who doesn't love untraceable money?
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
The Good, the Bad and the Governed - Why is governance a dirty word? David O'Neill, Chief Operating Officer - APIContext Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
JAM, the future of Polkadot.
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Recently uploaded
(20)
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Architecting Cloud Native Applications
Architecting Cloud Native Applications
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Download now