Plagiarism involves stealing and claiming another's ideas or words as your own. Intentional plagiarism occurs when one purposefully passes off another's work as their own. The document advises avoiding intentional plagiarism by understanding intellectual property rights, knowing the consequences of plagiarism, and properly managing research sources.
O documento discute os benefícios do uso de computadores por crianças pré-escolares como uma atividade lúdica de descoberta. No entanto, alerta que os computadores chegaram às escolas sem um plano pedagógico adequado, com projetos desenvolvidos por grupos externos que colocam professores como meros receptores de conhecimento alheio às necessidades da comunidade escolar. Além disso, a maioria dos professores permanece à margem do processo de inclusão digital por não saber como usar a tecnologia em sala de aula
De la puissance à l'influence dans la sphère des relations internationales : ...Bruno Racouchot
L'ouvrage La puissance au XXIe siècle
– Les nouvelles définitions du monde,
(CNRS Editions, préfacé par Hubert
Védrine), a récemment reçu le Prix du
Festival de géopolitique de Grenoble.
Son auteur, Pierre Buhler, présente un
parcours en parfaite adéquation avec la
complexité du sujet. Diplômé d'HEC, de
Sciences Po Paris et de l'INALCO (Institut
National des Langues et Civilisations
Orientales - polonais), ancien élève de
l'ENA, ancien ambassadeur de France
à Singapour, professeur de relations
internationales à Sciences Po, il vient
d'être nommé ambassadeur de France
en Pologne.
Dans l'entretien qu'il a accordé à
Bruno Racouchot, directeur de Comes
Communication - où il s'exprime à
titre purement personnel, n'engageant
en rien son ministère - Pierre Buhler
invite les Français à faire preuve de
réalisme sur la scène internationale :
"Ne nous laissons pas inhiber par un
langage moralisateur sur la puissance
et l'influence, car c'est bien là le jeu
qui se déroule aujourd'hui sous nos
yeux à la surface du globe."
La sonrisa de la Gioconda y el viejito de la caja de avena Quaker son enigmáticas. La avena Quaker es un producto común que la gente come con frecuencia. Algunos se han preguntado por qué el hombre de la caja se está riendo.
The document discusses the concept of Web 2.0 and how libraries can embrace new technologies and social media to better engage with their communities. It emphasizes encouraging conversation, collaboration, creativity and empowering customers. It encourages libraries to let go of control and empower patrons to learn. It also stresses the importance of librarians continuously learning about new tools and becoming "knowledge players" who spend 15 minutes per day exploring blogs and playing with new technologies.
Entre 1980 y 1992, más de 50,000 campesinos quechuahablantes fueron asesinados por Sendero Luminoso en departamentos como Ayacucho, Apurímac, Puno y Huánuco. La mayoría de las víctimas tenían bajos niveles educativos o eran analfabetas, y su tragedia no fue reconocida por el resto del país. El informe de la Comisión de la Verdad y Reconciliación reveló la extrema violencia vivida, incluyendo la discriminación y exclusión social que facilitó el conflicto.
Plagiarism involves stealing and claiming another's ideas or words as your own. Intentional plagiarism occurs when one purposefully passes off another's work as their own. The document advises avoiding intentional plagiarism by understanding intellectual property rights, knowing the consequences of plagiarism, and properly managing research sources.
O documento discute os benefícios do uso de computadores por crianças pré-escolares como uma atividade lúdica de descoberta. No entanto, alerta que os computadores chegaram às escolas sem um plano pedagógico adequado, com projetos desenvolvidos por grupos externos que colocam professores como meros receptores de conhecimento alheio às necessidades da comunidade escolar. Além disso, a maioria dos professores permanece à margem do processo de inclusão digital por não saber como usar a tecnologia em sala de aula
De la puissance à l'influence dans la sphère des relations internationales : ...Bruno Racouchot
L'ouvrage La puissance au XXIe siècle
– Les nouvelles définitions du monde,
(CNRS Editions, préfacé par Hubert
Védrine), a récemment reçu le Prix du
Festival de géopolitique de Grenoble.
Son auteur, Pierre Buhler, présente un
parcours en parfaite adéquation avec la
complexité du sujet. Diplômé d'HEC, de
Sciences Po Paris et de l'INALCO (Institut
National des Langues et Civilisations
Orientales - polonais), ancien élève de
l'ENA, ancien ambassadeur de France
à Singapour, professeur de relations
internationales à Sciences Po, il vient
d'être nommé ambassadeur de France
en Pologne.
Dans l'entretien qu'il a accordé à
Bruno Racouchot, directeur de Comes
Communication - où il s'exprime à
titre purement personnel, n'engageant
en rien son ministère - Pierre Buhler
invite les Français à faire preuve de
réalisme sur la scène internationale :
"Ne nous laissons pas inhiber par un
langage moralisateur sur la puissance
et l'influence, car c'est bien là le jeu
qui se déroule aujourd'hui sous nos
yeux à la surface du globe."
La sonrisa de la Gioconda y el viejito de la caja de avena Quaker son enigmáticas. La avena Quaker es un producto común que la gente come con frecuencia. Algunos se han preguntado por qué el hombre de la caja se está riendo.
The document discusses the concept of Web 2.0 and how libraries can embrace new technologies and social media to better engage with their communities. It emphasizes encouraging conversation, collaboration, creativity and empowering customers. It encourages libraries to let go of control and empower patrons to learn. It also stresses the importance of librarians continuously learning about new tools and becoming "knowledge players" who spend 15 minutes per day exploring blogs and playing with new technologies.
Entre 1980 y 1992, más de 50,000 campesinos quechuahablantes fueron asesinados por Sendero Luminoso en departamentos como Ayacucho, Apurímac, Puno y Huánuco. La mayoría de las víctimas tenían bajos niveles educativos o eran analfabetas, y su tragedia no fue reconocida por el resto del país. El informe de la Comisión de la Verdad y Reconciliación reveló la extrema violencia vivida, incluyendo la discriminación y exclusión social que facilitó el conflicto.
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?SWING Software
For companies using SharePoint or Microsoft 365, the idea of uploading all types of previously created documents to SharePoint document libraries is an obvious choice. Let’s see what you should think of when uploading Lotus Notes content. Learn more: https://bit.ly/2JnoIYr
IBM Notes application archiving 101: Introduction to Seascape for NotesSWING Software
Content archiving from IBM Domino and IBM Notes (Lotus Notes) applications is a good data governance practice, regardless of what the future bodes for Notes and Domino. Learn more about how to export and archive content from IBM Notes. http://bit.ly/2GgKAWe
IBM Notes/Domino Applications Report: SummarySWING Software
For most organizations, it’s no longer a question of whether to move from classic IBM Notes and Domino applications, but rather how to do it. 93% of our respondents have an action plan for Notes applications and data.
http://bit.ly/1Tzgibu
Four Methods of IBM Lotus Notes/Domino Application ArchivingSWING Software
If you are responsible for IBM Notes and Domino databases, you’ve at some point probably found yourself thinking about the future of the data in this way: What if I’m asked to restore specific Notes documents that were created ten years ago? If the only archive I have access to is a backup from ten years ago, it will take me hours to dig the documents up.
We all know that creating backups and archiving are two different processes. Besides the regular backup, you still need to preserve Notes and Domino data (or more precisely, both content and data) for long-term retention, and this requires a different approach.
Key Reasons to Extract Inactive Data from Lotus NotesSWING Software
There are a number of reasons why off-loading and archiving of inactive data from Notes/Domino is a good practice for all organizations, regardless of what the future bodes for IBM Notes and Domino.
According to our recent survey, 43% of organizations are looking to preserve Lotus Notes data outside of IBM Domino, whether they are migrating away from Notes or not. Of the larger 1000+ employee organizations surveyed, 55% are especially interested in platform-independent retention of Notes data due to compliance and legal requirements. Such organizations aim to preserve historical records properly before it becomes too difficult or too expensive to do so.
IBM Notes and Domino: Active vs. Inactive DataSWING Software
The majority of accumulated data in Notes/Domino databases is inactive. This data is not frequently used, but still needs to be preserved for business or compliance reasons.
Is it time to retire your legacy Notes applications? If your applications are kept alive only for historical data, it's time for exporting the data to an open standard repository.
When it comes to IBM Notes and Domino application retirement, there are basically two ways to go. You can either choose to keep decommissioned databases on your Domino servers or decide to export the application data to an open standard repository.
3 Keys to IBM Notes/Domino Data Export and ArchivingSWING Software
If you are looking to export data out of IBM Notes/Domino applications to an open standard repository, these are the key requirements to be considered.
http://bit.ly/1onMR3E
This tutorial shows how to create Excel reports and charts from Lotus Notes data using SWING Integrator. It requires Lotus Notes, Excel, and SWING Integrator. The tutorial walks through copying design elements from an Integrator database, adding an action button, and creating an Excel template to map fields and transfer data. This allows users to generate Excel-based reports and analyze dynamic data from Lotus Notes without additional training. The tutorial notes additional capabilities like saving reports to Notes, exporting to PDF, and extending the application by adding new Office templates.
This document provides a 3-step tutorial for creating PDFs from Lotus Notes data using SWING Integrator:
1) Copy SWING Integrator design elements to the target database using the Setup Wizard.
2) Add an action button to a Notes form or view and copy code from the Integrator sample library.
3) Create an Office template in Word, Excel, or OpenOffice to design document layouts and select Notes forms and fields for data transfer.
This document demonstrates how to perform a mail merge from Lotus Notes using SWING Integrator. It outlines requirements including Lotus Notes, MS Word or OpenOffice, and SWING Integrator. It provides steps to copy SWING Integrator design elements, add an action button in Domino Designer, and create a mail merge template by setting up field mapping between Notes data and the template. The result is a simple "select-and-click" mail merge capability using Office templates.
This tutorial shows how to collect signoffs from readers on published documents. It explains how to select signoff readers when editing a document, how readers are notified of required signoffs, and how readers can view and signoff on pending documents. Readers signoff by confirming they have read the document. Administrators can track pending and completed signoffs.
SWING DocPublisher is a document publishing solution that allows organizations to easily manage and publish internal documentation online. It supports various types of documentation and can be deployed either on-premises or as a hosted/SaaS solution. Users play different roles like author, owner, or reader and documents go through a customizable workflow involving review and approval. Customers praise how it has improved access to information and made documentation user-friendly across various devices.
This document provides instructions on customizing the look and feel, localization, and workflows of a document management software. It describes how to customize the frameset header, topic headers and footers, colors, and localization. Additional topics covered include adding new document draft stages and properties to comply with organizational workflows.
The document describes how to administer the DocPublisher software. It explains that administrators can access the Administration mode to modify settings and customize the software. It outlines the various sections in the Administration area, including Library Settings to change basic options, Users/Databases/Licensing to manage user accounts and licensing, Templates to manage Word templates, Email Notification to set up notifications, and Customization to change the interface and metadata.
SWING DocPublisher is a document publishing solution that allows organizations to easily manage and publish internal documentation online for employees to access. It integrates with Microsoft Word to allow authors to create and edit documents. Documents go through a review/approval process before being published. Published documents can then be navigated and viewed by employees through a web browser. Customers praise how DocPublisher allows easy access to critical information and helps ensure compliance.
03 How To Create a Document - DocPublisherSWING Software
1) The document describes how to create a new document in the DocPublisher system using MS Word or an HTML editor.
2) It involves selecting a folder, clicking "New" and choosing a document type, entering metadata, setting permissions, and saving as a draft.
3) Additional steps include editing the content, specifying properties, setting access permissions, and saving the draft.
The document provides instructions for installing the DocPublisher software. It involves unzipping the downloaded file, adding yourself as an administrator to the database access control list in Notes Client, copying the database to the server and signing it with the server ID, and then opening it in a web browser where you can add new users and manage documents.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
SharePoint Migration Mistakes - What could go wrong with Lotus Notes data?SWING Software
For companies using SharePoint or Microsoft 365, the idea of uploading all types of previously created documents to SharePoint document libraries is an obvious choice. Let’s see what you should think of when uploading Lotus Notes content. Learn more: https://bit.ly/2JnoIYr
IBM Notes application archiving 101: Introduction to Seascape for NotesSWING Software
Content archiving from IBM Domino and IBM Notes (Lotus Notes) applications is a good data governance practice, regardless of what the future bodes for Notes and Domino. Learn more about how to export and archive content from IBM Notes. http://bit.ly/2GgKAWe
IBM Notes/Domino Applications Report: SummarySWING Software
For most organizations, it’s no longer a question of whether to move from classic IBM Notes and Domino applications, but rather how to do it. 93% of our respondents have an action plan for Notes applications and data.
http://bit.ly/1Tzgibu
Four Methods of IBM Lotus Notes/Domino Application ArchivingSWING Software
If you are responsible for IBM Notes and Domino databases, you’ve at some point probably found yourself thinking about the future of the data in this way: What if I’m asked to restore specific Notes documents that were created ten years ago? If the only archive I have access to is a backup from ten years ago, it will take me hours to dig the documents up.
We all know that creating backups and archiving are two different processes. Besides the regular backup, you still need to preserve Notes and Domino data (or more precisely, both content and data) for long-term retention, and this requires a different approach.
Key Reasons to Extract Inactive Data from Lotus NotesSWING Software
There are a number of reasons why off-loading and archiving of inactive data from Notes/Domino is a good practice for all organizations, regardless of what the future bodes for IBM Notes and Domino.
According to our recent survey, 43% of organizations are looking to preserve Lotus Notes data outside of IBM Domino, whether they are migrating away from Notes or not. Of the larger 1000+ employee organizations surveyed, 55% are especially interested in platform-independent retention of Notes data due to compliance and legal requirements. Such organizations aim to preserve historical records properly before it becomes too difficult or too expensive to do so.
IBM Notes and Domino: Active vs. Inactive DataSWING Software
The majority of accumulated data in Notes/Domino databases is inactive. This data is not frequently used, but still needs to be preserved for business or compliance reasons.
Is it time to retire your legacy Notes applications? If your applications are kept alive only for historical data, it's time for exporting the data to an open standard repository.
When it comes to IBM Notes and Domino application retirement, there are basically two ways to go. You can either choose to keep decommissioned databases on your Domino servers or decide to export the application data to an open standard repository.
3 Keys to IBM Notes/Domino Data Export and ArchivingSWING Software
If you are looking to export data out of IBM Notes/Domino applications to an open standard repository, these are the key requirements to be considered.
http://bit.ly/1onMR3E
This tutorial shows how to create Excel reports and charts from Lotus Notes data using SWING Integrator. It requires Lotus Notes, Excel, and SWING Integrator. The tutorial walks through copying design elements from an Integrator database, adding an action button, and creating an Excel template to map fields and transfer data. This allows users to generate Excel-based reports and analyze dynamic data from Lotus Notes without additional training. The tutorial notes additional capabilities like saving reports to Notes, exporting to PDF, and extending the application by adding new Office templates.
This document provides a 3-step tutorial for creating PDFs from Lotus Notes data using SWING Integrator:
1) Copy SWING Integrator design elements to the target database using the Setup Wizard.
2) Add an action button to a Notes form or view and copy code from the Integrator sample library.
3) Create an Office template in Word, Excel, or OpenOffice to design document layouts and select Notes forms and fields for data transfer.
This document demonstrates how to perform a mail merge from Lotus Notes using SWING Integrator. It outlines requirements including Lotus Notes, MS Word or OpenOffice, and SWING Integrator. It provides steps to copy SWING Integrator design elements, add an action button in Domino Designer, and create a mail merge template by setting up field mapping between Notes data and the template. The result is a simple "select-and-click" mail merge capability using Office templates.
This tutorial shows how to collect signoffs from readers on published documents. It explains how to select signoff readers when editing a document, how readers are notified of required signoffs, and how readers can view and signoff on pending documents. Readers signoff by confirming they have read the document. Administrators can track pending and completed signoffs.
SWING DocPublisher is a document publishing solution that allows organizations to easily manage and publish internal documentation online. It supports various types of documentation and can be deployed either on-premises or as a hosted/SaaS solution. Users play different roles like author, owner, or reader and documents go through a customizable workflow involving review and approval. Customers praise how it has improved access to information and made documentation user-friendly across various devices.
This document provides instructions on customizing the look and feel, localization, and workflows of a document management software. It describes how to customize the frameset header, topic headers and footers, colors, and localization. Additional topics covered include adding new document draft stages and properties to comply with organizational workflows.
The document describes how to administer the DocPublisher software. It explains that administrators can access the Administration mode to modify settings and customize the software. It outlines the various sections in the Administration area, including Library Settings to change basic options, Users/Databases/Licensing to manage user accounts and licensing, Templates to manage Word templates, Email Notification to set up notifications, and Customization to change the interface and metadata.
SWING DocPublisher is a document publishing solution that allows organizations to easily manage and publish internal documentation online for employees to access. It integrates with Microsoft Word to allow authors to create and edit documents. Documents go through a review/approval process before being published. Published documents can then be navigated and viewed by employees through a web browser. Customers praise how DocPublisher allows easy access to critical information and helps ensure compliance.
03 How To Create a Document - DocPublisherSWING Software
1) The document describes how to create a new document in the DocPublisher system using MS Word or an HTML editor.
2) It involves selecting a folder, clicking "New" and choosing a document type, entering metadata, setting permissions, and saving as a draft.
3) Additional steps include editing the content, specifying properties, setting access permissions, and saving the draft.
The document provides instructions for installing the DocPublisher software. It involves unzipping the downloaded file, adding yourself as an administrator to the database access control list in Notes Client, copying the database to the server and signing it with the server ID, and then opening it in a web browser where you can add new users and manage documents.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
13 Howto Templates
1. How-To: Templates www.swingsoftware.com This section allows you to import MS Word templates into DocPublisher. These templates can be used each time a new document is being created. Using templates enables consistent document layout throughout the library .
2. How-To: Templates www.swingsoftware.com 1) To add a new template click on the ‘Add New Template’ button .
3. How-To: Template www.swingsoftware.com 2) Type in the template name and click on the Browse button to locate the MS Word document which you will use as a template . Click OK.
4. How-To: Template www.swingsoftware.com 3) The template is now uploaded and available in the list of templates. Here you can also edit or delete any existing templates.
5. How-To: Templates www.swingsoftware.com 4) When a new document is being created, the template can be selected and opened from the list in the pop-up window.