The document discusses the different types of products in Magento including simple, configurable, grouped, virtual, bundle, and downloadable products. It explains the key characteristics and differences between each product type such as whether they are composite, virtual, or can be configured. The document also covers related topics like product attributes, options, links, categories, websites, and stores.
This document is the HTML code for the upload page on the SlideShare website. It includes metadata, scripts, and styling to display the page content which encourages users to discover, share and present presentations, infographics and videos on the largest professional content sharing community. The page code provides options for users to upload, login or sign up for an account.
jQuery Mobile Introduction ( demo on EZoapp )EZoApp
This is a Presentation about jQueryMobile.
http://www.slideshare.net/EZoApp/jquery-mobile-introduction-demo-on-ezoapp
Sample description of each element has a corresponding, you can tap or drag structural elements observed in the sample code inside, and learning on WYSIWYG~ ^ _ ^
( Demo on EZoApp, click the preview button and enjoy it~ )
OpenSocial Gadgets offer a range of integration options in IBM Connections; the Share Box, the Activity Stream, the Home Page, and Connections Mail can all be extended with OpenSocial Gadgets. During the webinar we will walk through various demonstrations of all the integration options and show you how to get started building your own OpenSocial Gadgets to integrate your app into IBM Connections.
Speaker:
Ryan Baxter, @ryanjbaxter
IBM, Software Engineer – OpenSocial / Embedded Experiences
IBM Social Business Toolkit webinars: https://www.ibmdw.net/social/events
Creating the interfaces of the future with the APIs of todaygerbille
The document discusses creating futuristic interfaces using web technologies like WebSockets, WebGL, and device APIs. It provides examples of syncing device orientation over WebSockets between clients, accessing the device camera with getUserMedia, and using head tracking with headtrackr.js to control the camera in a 3D scene rendered with three.js. Links are included for related projects on Wiimote control, head tracking examples, and touch tracking demos.
Cross-Platform Authentication with Google+ Sign-InPeter Friese
The document discusses cross-platform authentication using Google+ Sign-In. It covers how Google+ Sign-In provides a trusted authentication solution that works across devices and platforms. It also outlines the key features of Google+ Sign-In including secure authentication, learning about users with consent, and single sign-on across devices. The document then details how Google+ Sign-In can be implemented on web, Android, and iOS platforms including setting up projects, integrating authentication libraries, and handling the sign-in process. It concludes with best practices, common pitfalls to avoid, and resources for learning more.
Google+ for Mobile Apps on iOS and AndroidPeter Friese
Create a more engaging and personalized experience for your users by incorporating aspects of Google+ into your mobile app. Learn how your users can share pictures, links, and more into Google+ from your app, and how doing so can raise visibility and discoverability of your application.
The document discusses the different types of products in Magento including simple, configurable, grouped, virtual, bundle, and downloadable products. It explains the key characteristics and differences between each product type such as whether they are composite, virtual, or can be configured. The document also covers related topics like product attributes, options, links, categories, websites, and stores.
This document is the HTML code for the upload page on the SlideShare website. It includes metadata, scripts, and styling to display the page content which encourages users to discover, share and present presentations, infographics and videos on the largest professional content sharing community. The page code provides options for users to upload, login or sign up for an account.
jQuery Mobile Introduction ( demo on EZoapp )EZoApp
This is a Presentation about jQueryMobile.
http://www.slideshare.net/EZoApp/jquery-mobile-introduction-demo-on-ezoapp
Sample description of each element has a corresponding, you can tap or drag structural elements observed in the sample code inside, and learning on WYSIWYG~ ^ _ ^
( Demo on EZoApp, click the preview button and enjoy it~ )
OpenSocial Gadgets offer a range of integration options in IBM Connections; the Share Box, the Activity Stream, the Home Page, and Connections Mail can all be extended with OpenSocial Gadgets. During the webinar we will walk through various demonstrations of all the integration options and show you how to get started building your own OpenSocial Gadgets to integrate your app into IBM Connections.
Speaker:
Ryan Baxter, @ryanjbaxter
IBM, Software Engineer – OpenSocial / Embedded Experiences
IBM Social Business Toolkit webinars: https://www.ibmdw.net/social/events
Creating the interfaces of the future with the APIs of todaygerbille
The document discusses creating futuristic interfaces using web technologies like WebSockets, WebGL, and device APIs. It provides examples of syncing device orientation over WebSockets between clients, accessing the device camera with getUserMedia, and using head tracking with headtrackr.js to control the camera in a 3D scene rendered with three.js. Links are included for related projects on Wiimote control, head tracking examples, and touch tracking demos.
Cross-Platform Authentication with Google+ Sign-InPeter Friese
The document discusses cross-platform authentication using Google+ Sign-In. It covers how Google+ Sign-In provides a trusted authentication solution that works across devices and platforms. It also outlines the key features of Google+ Sign-In including secure authentication, learning about users with consent, and single sign-on across devices. The document then details how Google+ Sign-In can be implemented on web, Android, and iOS platforms including setting up projects, integrating authentication libraries, and handling the sign-in process. It concludes with best practices, common pitfalls to avoid, and resources for learning more.
Google+ for Mobile Apps on iOS and AndroidPeter Friese
Create a more engaging and personalized experience for your users by incorporating aspects of Google+ into your mobile app. Learn how your users can share pictures, links, and more into Google+ from your app, and how doing so can raise visibility and discoverability of your application.
The document discusses dynamic widgets in CMS building. Dynamic widgets allow efficient customization of websites by integrating with Odoo apps like allowing users to subscribe to discussion groups or create leads from a contact form. The document outlines how to create a contact widget with a contact form that can create leads from submitted questions by defining the widget content, adding it to the CMS editor, allowing dynamic configuration of sales teams, and linking it to backend controllers and routes to interface with Odoo apps.
The document provides an introduction to Vue.js through examples and cases for building applications. It begins with quick start examples demonstrating basic Vue.js functionality like data binding, looping through arrays, and methods. It then covers two cases for building full applications with Vue.js, including fetching and manipulating data, and integrating with external APIs. References for further learning about Vue.js are also provided.
Slides of the Magento Fireside Chat March 20th, 2014 with
Fabrizio Branca (@fbrnc)
Bastian Ike (@b_ike)
Daniel Fahlke (@flyingmana)
Rolando Granadino (@beeplogic)
Ben Marks (@benmarks)
Getting touchy - an introduction to touch events / Web Standards Days / Mosco...Patrick Lauke
This document discusses touch events and how to handle touch interactions in web applications. It begins by explaining how touch events are simulated using mouse events and the limitations of this approach. It then introduces the native touch events of touchstart, touchmove, and touchend. The document covers handling both single and multiple touch points, touch gestures, and implementing touch-friendly interfaces. It also discusses touch event support across browsers and future pointer event standards.
The document discusses various web application security issues like SQL injection, input validation, cross-site scripting and provides recommendations to prevent these vulnerabilities when developing PHP applications. It emphasizes the importance of validating all user inputs, using prepared statements and output encoding to prevent code injection attacks and ensuring session security. The document also covers other attacks like cross-site request forgery and provides mitigation techniques.
The document summarizes the author's experience using Backbone and Marionette frameworks on several projects at SoftServe. It describes the technology stacks used, including versions of Backbone, Marionette, and other libraries. It then reviews three projects (SCM, DMG, EWQ) and discusses how Backbone and Marionette were implemented in each, including use of models, views, controllers, and modules. The outcomes section notes best practices and strengths of MV* patterns and modularization with Marionette.
This document discusses building mobile applications using HTML5 and CSS. It recommends tools like PhoneGap and Xcode and mentions that applications developed in this way can be ported to Android. It provides guidelines for using standards-compliant code, separating HTML and CSS files, and using security features like SSL. It also discusses best practices for mobile design and some PhoneGap-specific features like conditional stylesheets and viewport settings.
The presentation slide for Vue.js meetup
http://abeja-innovation-meetup.connpass.com/event/38214/
That contains mainly about SSR (Server side rendering) + SPA with isomorphic fetch and client hydration
Handys und Tablets - Webentwicklung jenseits des Desktops - WebTech Mainz 12....Patrick Lauke
This document discusses approaches to web development for mobile devices. It begins by noting the increasing importance of the mobile web. It then examines three approaches: 1) Doing nothing and hoping modern mobile browsers can handle desktop sites, 2) Creating a separate mobile site, and 3) Having a single adaptive site that refactors content for different screens using fluid layouts, progressive enhancement and media queries. The document dives into techniques for adaptive design like viewport meta tags, touch events, and responsive images. It also notes remaining challenges like viewport interpretation and high-DPI screens lying about resolution.
This document provides tips and best practices for securing a Drupal site, including hardening servers, locking down access, using HTTPS, keeping software updated, encrypting sensitive data, reviewing logs, and questions from the presenter. Some key recommendations are to redirect all traffic to HTTPS, secure Drupal user 1, remove clues about Drupal from headers and files, use strong and unique passwords, and store backups and credentials securely offline. The presenter provides many module and tool recommendations for implementing security measures in Drupal.
This document provides an introduction to web security and the browser security model. It discusses goals of web security including safely browsing the web and supporting secure web applications. It outlines common web threat models and covers topics like HTTP, rendering content, isolation using frames and same-origin policy, communication between frames, frame navigation policies, client state using cookies, and clickjacking. The document aims to provide background knowledge on how the web and browsers work from a security perspective.
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertChetan Soni
This document provides tips for securing a WordPress website. It lists 27 steps including disabling custom HTML, removing default posts and comments, deleting installation files, hiding indexes, blocking directories, securing the admin page, limiting login attempts, scanning for malware, creating custom secret keys, changing the database prefix, protecting configuration files, monitoring the site, hiding the login page, checking for content copying, scanning for exploits, using email as the login key, keeping logs of errors, activating the Akismet plugin, using maintenance mode, restricting admin access by IP, banning users, preventing access to folders, protecting individual files, disabling hotlinking, stopping spam, and optimizing the database. The document recommends using various WordPress security plugins and provides
This document discusses adaptive images in responsive web design. It begins by explaining why the browser should be asked about screen resolution and bandwidth instead of sniffing the browser. It then demonstrates using feature testing to determine browser width and screen resolution. Next, it covers issues with higher resolution retina displays like larger file sizes. The document proposes solutions like using .htaccess files, srcset, and JavaScript libraries to serve the appropriate image based on screen details without browser sniffing. It emphasizes that CSS media queries are still important for responsive design.
The document discusses adaptive images in responsive web design. It begins by explaining why the browser should be asked for information like screen resolution and bandwidth instead of doing speed tests. It then covers different techniques for adaptive images like using the browser width, screen resolution, bandwidth tests, feature testing vs browser sniffing, and CSS media queries. It also discusses workarounds like using the .htaccess file, <picture> element, and HiSRC plugin to serve responsive images. The document advocates for newer approaches that provide a simple user experience while allowing the browser and server to communicate information.
Mobile, web and cloud - the triple crown of modern applicationsIdo Green
This document discusses building modern mobile/web applications using a "triple crown" approach of mobile, web and cloud technologies. It promotes using Google Cloud Endpoints to build RESTful APIs, deploying applications to Google App Engine, and using AngularJS for client-side development. The document provides an example of building a photo sharing application with CRUD operations using these techniques. It demonstrates enhancing the application with features like offline support, authentication and updating the API based on client needs.
This document discusses the benefits of using the CodeIgniter PHP framework, which include it being small, fast, and simple. It explains the MVC architecture and how to install and use CodeIgniter, loading models, libraries and helpers. CodeIgniter provides a clean code structure and many online resources to help developers build websites.
This document contains notes from a meeting on web application security. It discusses several common vulnerabilities like SQL injection, cross-site scripting (XSS), and clickjacking. It provides examples of how these vulnerabilities can occur and ways to prevent them, such as sanitizing user input, enabling CSRF protection middleware, and using the X-Frame-Options header. Keywords discussed include MySQL, Docker, Kubernetes, Ansible, and various attack vectors like CSRF, XSS, SQL injection, and clickjacking. The document aims to educate on security best practices for Python and Django web applications.
HTML5 introduces many new features for web pages and applications, including semantic HTML tags, media elements, canvas drawing, geolocation, offline storage, and forms validation. The HTML5 specification from the W3C is over 900 pages and introduces these new features to enhance the capabilities of web technologies going forward.
The document discusses CodeIgniter, an open source PHP MVC framework, and provides information about CodeIgniter features such as controllers, models, views, helpers, libraries, and working with databases using CodeIgniter's active record functions. It also covers topics like installing CodeIgniter, creating controllers and models, and loading views, helpers, and libraries.
Integrating Security Roles into Microsoft Silverlight ApplicationsDan Wahlin
This document discusses options for integrating security roles into Microsoft Silverlight applications. It begins by outlining Silverlight authentication and authorization options like Windows authentication and forms roles. It then discusses techniques for accessing user identity information and roles in Silverlight, such as passing data via initParams, using a security service, or the WebContext class in WCF RIA Services. The document recommends creating a SecurityManager class to simplify working with user credentials by handling asynchronous calls to retrieve data and integrating with MVVM patterns.
The document discusses dynamic widgets in CMS building. Dynamic widgets allow efficient customization of websites by integrating with Odoo apps like allowing users to subscribe to discussion groups or create leads from a contact form. The document outlines how to create a contact widget with a contact form that can create leads from submitted questions by defining the widget content, adding it to the CMS editor, allowing dynamic configuration of sales teams, and linking it to backend controllers and routes to interface with Odoo apps.
The document provides an introduction to Vue.js through examples and cases for building applications. It begins with quick start examples demonstrating basic Vue.js functionality like data binding, looping through arrays, and methods. It then covers two cases for building full applications with Vue.js, including fetching and manipulating data, and integrating with external APIs. References for further learning about Vue.js are also provided.
Slides of the Magento Fireside Chat March 20th, 2014 with
Fabrizio Branca (@fbrnc)
Bastian Ike (@b_ike)
Daniel Fahlke (@flyingmana)
Rolando Granadino (@beeplogic)
Ben Marks (@benmarks)
Getting touchy - an introduction to touch events / Web Standards Days / Mosco...Patrick Lauke
This document discusses touch events and how to handle touch interactions in web applications. It begins by explaining how touch events are simulated using mouse events and the limitations of this approach. It then introduces the native touch events of touchstart, touchmove, and touchend. The document covers handling both single and multiple touch points, touch gestures, and implementing touch-friendly interfaces. It also discusses touch event support across browsers and future pointer event standards.
The document discusses various web application security issues like SQL injection, input validation, cross-site scripting and provides recommendations to prevent these vulnerabilities when developing PHP applications. It emphasizes the importance of validating all user inputs, using prepared statements and output encoding to prevent code injection attacks and ensuring session security. The document also covers other attacks like cross-site request forgery and provides mitigation techniques.
The document summarizes the author's experience using Backbone and Marionette frameworks on several projects at SoftServe. It describes the technology stacks used, including versions of Backbone, Marionette, and other libraries. It then reviews three projects (SCM, DMG, EWQ) and discusses how Backbone and Marionette were implemented in each, including use of models, views, controllers, and modules. The outcomes section notes best practices and strengths of MV* patterns and modularization with Marionette.
This document discusses building mobile applications using HTML5 and CSS. It recommends tools like PhoneGap and Xcode and mentions that applications developed in this way can be ported to Android. It provides guidelines for using standards-compliant code, separating HTML and CSS files, and using security features like SSL. It also discusses best practices for mobile design and some PhoneGap-specific features like conditional stylesheets and viewport settings.
The presentation slide for Vue.js meetup
http://abeja-innovation-meetup.connpass.com/event/38214/
That contains mainly about SSR (Server side rendering) + SPA with isomorphic fetch and client hydration
Handys und Tablets - Webentwicklung jenseits des Desktops - WebTech Mainz 12....Patrick Lauke
This document discusses approaches to web development for mobile devices. It begins by noting the increasing importance of the mobile web. It then examines three approaches: 1) Doing nothing and hoping modern mobile browsers can handle desktop sites, 2) Creating a separate mobile site, and 3) Having a single adaptive site that refactors content for different screens using fluid layouts, progressive enhancement and media queries. The document dives into techniques for adaptive design like viewport meta tags, touch events, and responsive images. It also notes remaining challenges like viewport interpretation and high-DPI screens lying about resolution.
This document provides tips and best practices for securing a Drupal site, including hardening servers, locking down access, using HTTPS, keeping software updated, encrypting sensitive data, reviewing logs, and questions from the presenter. Some key recommendations are to redirect all traffic to HTTPS, secure Drupal user 1, remove clues about Drupal from headers and files, use strong and unique passwords, and store backups and credentials securely offline. The presenter provides many module and tool recommendations for implementing security measures in Drupal.
This document provides an introduction to web security and the browser security model. It discusses goals of web security including safely browsing the web and supporting secure web applications. It outlines common web threat models and covers topics like HTTP, rendering content, isolation using frames and same-origin policy, communication between frames, frame navigation policies, client state using cookies, and clickjacking. The document aims to provide background knowledge on how the web and browsers work from a security perspective.
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertChetan Soni
This document provides tips for securing a WordPress website. It lists 27 steps including disabling custom HTML, removing default posts and comments, deleting installation files, hiding indexes, blocking directories, securing the admin page, limiting login attempts, scanning for malware, creating custom secret keys, changing the database prefix, protecting configuration files, monitoring the site, hiding the login page, checking for content copying, scanning for exploits, using email as the login key, keeping logs of errors, activating the Akismet plugin, using maintenance mode, restricting admin access by IP, banning users, preventing access to folders, protecting individual files, disabling hotlinking, stopping spam, and optimizing the database. The document recommends using various WordPress security plugins and provides
This document discusses adaptive images in responsive web design. It begins by explaining why the browser should be asked about screen resolution and bandwidth instead of sniffing the browser. It then demonstrates using feature testing to determine browser width and screen resolution. Next, it covers issues with higher resolution retina displays like larger file sizes. The document proposes solutions like using .htaccess files, srcset, and JavaScript libraries to serve the appropriate image based on screen details without browser sniffing. It emphasizes that CSS media queries are still important for responsive design.
The document discusses adaptive images in responsive web design. It begins by explaining why the browser should be asked for information like screen resolution and bandwidth instead of doing speed tests. It then covers different techniques for adaptive images like using the browser width, screen resolution, bandwidth tests, feature testing vs browser sniffing, and CSS media queries. It also discusses workarounds like using the .htaccess file, <picture> element, and HiSRC plugin to serve responsive images. The document advocates for newer approaches that provide a simple user experience while allowing the browser and server to communicate information.
Mobile, web and cloud - the triple crown of modern applicationsIdo Green
This document discusses building modern mobile/web applications using a "triple crown" approach of mobile, web and cloud technologies. It promotes using Google Cloud Endpoints to build RESTful APIs, deploying applications to Google App Engine, and using AngularJS for client-side development. The document provides an example of building a photo sharing application with CRUD operations using these techniques. It demonstrates enhancing the application with features like offline support, authentication and updating the API based on client needs.
This document discusses the benefits of using the CodeIgniter PHP framework, which include it being small, fast, and simple. It explains the MVC architecture and how to install and use CodeIgniter, loading models, libraries and helpers. CodeIgniter provides a clean code structure and many online resources to help developers build websites.
This document contains notes from a meeting on web application security. It discusses several common vulnerabilities like SQL injection, cross-site scripting (XSS), and clickjacking. It provides examples of how these vulnerabilities can occur and ways to prevent them, such as sanitizing user input, enabling CSRF protection middleware, and using the X-Frame-Options header. Keywords discussed include MySQL, Docker, Kubernetes, Ansible, and various attack vectors like CSRF, XSS, SQL injection, and clickjacking. The document aims to educate on security best practices for Python and Django web applications.
HTML5 introduces many new features for web pages and applications, including semantic HTML tags, media elements, canvas drawing, geolocation, offline storage, and forms validation. The HTML5 specification from the W3C is over 900 pages and introduces these new features to enhance the capabilities of web technologies going forward.
The document discusses CodeIgniter, an open source PHP MVC framework, and provides information about CodeIgniter features such as controllers, models, views, helpers, libraries, and working with databases using CodeIgniter's active record functions. It also covers topics like installing CodeIgniter, creating controllers and models, and loading views, helpers, and libraries.
Integrating Security Roles into Microsoft Silverlight ApplicationsDan Wahlin
This document discusses options for integrating security roles into Microsoft Silverlight applications. It begins by outlining Silverlight authentication and authorization options like Windows authentication and forms roles. It then discusses techniques for accessing user identity information and roles in Silverlight, such as passing data via initParams, using a security service, or the WebContext class in WCF RIA Services. The document recommends creating a SecurityManager class to simplify working with user credentials by handling asynchronous calls to retrieve data and integrating with MVVM patterns.
The document provides an introduction to Meteor and Meteoric frameworks. It discusses key principles of Meteor such as using one language across client and server, database access from anywhere, and automatic reactivity. It also covers how to install Meteor, create an app, define templates with helpers and events. Finally, it introduces Meteoric which integrates Meteor with Ionic for building mobile apps, including using Ionic directives and icons.
A two hour workshop that provides a practical introduction to secure coding. This was part of the {DECIPHER} Hackathon (https://www.eventbrite.sg/e/decipher-hackathon-tickets-57968120208).
[CB16] Esoteric Web Application Vulnerabilities by Andrés RianchoCODE BLUE
This talk will show esoteric web application vulnerabilities in detail, these vulnerabilities would be missed in a quick review by most security consultants, but could lead to remote code execution, authentication bypass and purchasing items in merchants using Paypal as their payment gateway without actually paying. SQL injections are dead, and I don’t care: let's explore the world of null, nil and NULL; noSQL injections; host header injections that lead to phone call audio interception; paypal’s double spent and Rails’ MessageVerifier remote code execution.
--- Andres Riancho
Andrés Riancho is an application security expert that currently leads the community driven, Open Source, w3af project and provides in-depth Web Application Penetration Testing services to companies around the world.
In the research field, he discovered critical vulnerabilities in IPS appliances from 3com and ISS, contributed with SAP research performed at one of his former employers and reported vulnerabilities in hundreds of web applications.
His main focus has always been the Web Application Security field, in which he developed w3af, a Web Application Attack and Audit Framework used extensively by penetration testers and security consultants.
Andrés has spoken and hold trainings at many security conferences around the globe, like BlackHat (USA and Europe), SEC-T (Sweden),DeepSec (Austria), PHDays (Moscow), SecTor (Toronto), OWASP (Poland),CONFidence (Poland), OWASP World C0n (USA), CanSecWest (Canada),PacSecWest (Japan), T2 (Finland) and Ekoparty (Buenos Aires).
Andrés founded Bonsai Information Security, a web security focused consultancy firm, in 2009 in order to further research into automated Web Application Vulnerability detection and exploitation.
This document provides instructions for a hands-on lab to modify a single page application (SPA) to display registered players for a game from a REST API. It describes the required software, overview of the lab objectives, and steps to update the game client to call the new API endpoint and display the results. These include adding an API method, updating the JavaScript to call it, and modifying the view model to change screens and bind the results. Testing steps are also outlined.
This document discusses various techniques for responsive images in web design, including browser sniffing versus feature testing, image sizes for different screen resolutions and bandwidths, and different implementation methods like .htaccess files, the <picture> element, and JavaScript libraries. It covers topics like using the browser width to determine layouts, screen resolution detection, and bandwidth testing. Workarounds discussed include using background images, SVGs, icon fonts, and compressed JPEGs. The document advocates a mobile-first approach and using CSS media queries to adapt designs based on screen size.
This document provides instructions for setting up user authentication for a Rails application using Devise and OAuth with Facebook. It includes steps for installing Devise, generating a User model, configuring routes and callbacks, setting up the Facebook application, and connecting a user's Facebook account to authenticate and sign in.
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)cgmonroe
This is an updated version of this talk given at DrupalCamp Atlanta (DCA)
This presentation is an overview / case study of things learned by experiencing GDPR Security audits, DoS attacks, brute force login attacks, annoying robot crawlers, and hackers doing security probes.
The session will cover the following main topics with tips on how to protected against each of these.
An overview of security threats
Server Level Attacks
Code Level Attacks
User Access Attacks
Internal Attacks
Some suggestions on developing a security plan
People attending should come away with useful knowledge (modules, best practices, sites that help, front end tools and the like) that will help secure their sites.
Similar to T3CON13: Web application development using Behaviour Driven Development (20)
InspiringCon15: Bringing TYPO3 Legacy Applications into the Flowmhelmich
The document discusses options for migrating legacy TYPO3 CMS applications to TYPO3 Flow. It presents rewriting from scratch vs migrating existing code. It then compares TYPO3 CMS and TYPO3 Flow in terms of namespaces, annotations, and dependencies. The document recommends using the Flow Metamorphosis tool to automate the migration process rather than doing it manually.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
75. criteria
„
In the menu, there is a „register“ item.
On the register page the user can enter the
following information:
user name
real name
email address
After registration, the user should receive a
confirmation email.
138. Scenario: User login
Given I am on login.mittwald.de
When I fill in 123456 for username
And fill in supersecret for password
And press log in
Then I should see Welcome to the customer center
Acceptance
143. Scenario: User login
Given I am on login.mittwald.de
When I fill in 123456 for username
And fill in supersecret for password
And press log in
Then I should see Welcome to the customer center
I
153. ?php
Scenario: User login
class MyTest extends PHPUnit_Extensions_Selenium2TestCase
Given I am on login.mittwald.de
{
When I fill in 123456 for username
protected function setUp()
And fill in supersecret for password
{
And press log in
$this-setBrowser('*firefox');
Then I should see Welcome to the customer center
$this-setBrowserUrl('http://login.mittwald.de/');
}
public function testLoginWithCorrectCredentialsWorksCorrectly()
{
$this-url('login.html');
$this-byXPath('//input[@id=login_username]')-value('123456');
$this-byXPath('//input[@id=login_password]')-value('supersecret');
$this
-byXPath('//input[@type=submit and @name=login_password]')
-clickAndWait();
$this-frame(0);
$this-assertContains(
'Welcome to the customer center',
$this-byXPath('//body')-text()
);
}
}
?
24
6
Lines
185. Scenario: Registration form
Given I am on index.php?id=512
When I follow register now!
And I fill in user_name with Max Mustermann
And I fill in user_email with m.mustermann@example.com
And I attach the file /Users/mmustermann/max.jpeg
to user_image
And I press submit registration
Then I should be on index.php?id=514
And the response should contain Thank you ...
And the mailbox m15273 should contain an email with
subject Your registration
186. Scenario: Registration form
Given I am on index.php?id=512
When I follow register now!
And I fill in user_name with Max Mustermann
And I fill in user_email with m.mustermann@example.com
And I attach the file /Users/mmustermann/max.jpeg
to user_image
And I press submit registration
Then I should be on index.php?id=514
And the response should contain Thank you ...
And the mailbox m15273 should contain an email with
subject Your registration
This
191. Feature: Online registration
In order to use the site's personalized features
As an anonymous user
I want to register to the page.
Scenario: Registration is confirmed
Given I am on the registration page
And I fill in the following:
| Full name
| Max Mustermann
|
| Email address | m.mustermann@example.com |
And I upload an image of myself
And submit the registration
Then I should see a confirmation message
And I should receive a confirmation email
Better!
192. Feature: Online registration
In order to use the site's personalized features
As an anonymous user
I want to register to the page.
Scenario: Registration is confirmed
Given I am on the registration page
And I fill in the following:
| Full name
| Max Mustermann
|
| Email address | m.mustermann@example.com |
And I upload an image of myself
And submit the registration
Then I should see a confirmation message
And I should receive a confirmation email
Who
196. class FeatureContext extends Context
{
/**
* @Then /^(?:|I )should receive a confirmation e?mail$/
*/
public function assertRegistrationMailWasReceived()
{
// Connect to mailbox and see if mail is actually there.
// Throw exception otherwise.
}
}
Then /^(?:I| ) should receive a confirmation e?mail$/ do
# Connect to mailbox and see if mail is actually there.
# Throw exception otherwise.
end