Facilità di accesso e orientamento in Bicocca: uno studio nella prospettiva di un miglioramento. Analisi svolta durante il corso di Ergonomia Cognitiva
This document provides a list of web addresses including cnettv.com, youtube.com, and accessibility.mitsue.co.jp. It also includes the text "Point and Read" and "WebTrek" along with a copyright notice for Hayashi Lab at Niigata University from 2009.
The document discusses the development of TMACS, a web-based mapping application that uses PostGIS for spatial querying and data storage in PostgreSQL. It allows users to find objects within a certain distance from a point and visualize the results on a map through MapServer and a Web API. Release years for TMACS included 2008, 2009, and 2010.
The document discusses accessibility guidelines for captioning live streaming media. It provides guidelines from WCAG 2.0, JIS X8341-3:2010, and ITU-T F.730 for adding captions to live video streams so they are accessible to deaf and hard of hearing users. It also includes diagrams of the broadcasting system used to live stream and add captions to a meeting, including the hardware and software components.
Facilità di accesso e orientamento in Bicocca: uno studio nella prospettiva di un miglioramento. Analisi svolta durante il corso di Ergonomia Cognitiva
This document provides a list of web addresses including cnettv.com, youtube.com, and accessibility.mitsue.co.jp. It also includes the text "Point and Read" and "WebTrek" along with a copyright notice for Hayashi Lab at Niigata University from 2009.
The document discusses the development of TMACS, a web-based mapping application that uses PostGIS for spatial querying and data storage in PostgreSQL. It allows users to find objects within a certain distance from a point and visualize the results on a map through MapServer and a Web API. Release years for TMACS included 2008, 2009, and 2010.
The document discusses accessibility guidelines for captioning live streaming media. It provides guidelines from WCAG 2.0, JIS X8341-3:2010, and ITU-T F.730 for adding captions to live video streams so they are accessible to deaf and hard of hearing users. It also includes diagrams of the broadcasting system used to live stream and add captions to a meeting, including the hardware and software components.
The document summarizes the activity of the Niigata IT Support Center for Persons with Disabilities (NITSC) from April 2008 to June 2010. Over this period, NITSC provided IT support to 60 individuals with disabilities, with the majority (52) receiving support in 2010. Support included assisting with basic computer use, the internet, and software applications. The top three areas of support were basic computer use, the internet, and word processing.
The Niigata IT Support Center for Persons with Disabilities (NITSC) opened in October 2008 to provide IT support and training to people with disabilities. In its first year, NITSC had 60 visitors per month on average, which increased to over 100 visitors by 2010. The center offers services like website creation, video chat using Skype, and software programs to help people with disabilities like ALS. Training sessions cover topics such as using computers, the internet, and assistive technologies. Photos show visitors receiving one-on-one instruction from staff.
The document outlines the development of TMACS from 2008 to 2010, including creating a web interface in 2009 and adding additional features such as scheduling and document management in 2010. Testing was conducted in September and November, and the system was implemented.
This document discusses various tools used for web conferencing and live streaming including WIT53, Ustream, IPtalk Broadcaster, CamTwist, and Tiarra. It provides information on how to connect these tools via different devices and software configurations like ngIRCd to allow sharing video and audio over IRC in different encodings. Specific instructions are given for connecting CamTwist and Tiarra using UTF8 encoding through IRC and ngIRCd.
This 3 sentence summary provides an overview of the Niigata IT Support Center for Persons with Disabilities annual report:
The report details the Center's activities in 2009, noting they provided IT support and training to over 1500 people with disabilities, of which over 850 participated in their programs. Major services offered included basic computer skills training, assistive software training, website creation support, and technical support via phone and in-person. The Center aims to continue expanding their services and providing more opportunities for IT skills development and inclusion for people with disabilities.
This document discusses using the Perl Image::Magick module to composite multiple image layers. It shows code for reading a base image and route overlay, making the overlay transparent, and compositing it onto the base image. Additional code demonstrates compositing a marks overlay on top using the 'Over' composite method and writing the output.
PgRouting is an open source library that provides routing functionality for PostgreSQL/PostGIS. It allows finding the shortest path between points on a network using algorithms like Dijkstra's algorithm. The document provides steps to install pgRouting into a PostGIS database and run shortest path queries.
The document describes the 25th Annual International Technology & Persons with Disabilities Conference held from March 22-27, 2010 in San Diego, CA. The conference included presentations and exhibitions on topics related to aging and disability, augmentative and alternative communication, blindness and low vision, and other areas. Presentations described technologies such as a system to help visually impaired pedestrians navigate crosswalks, tactile maps of Montreal subway stations, and a wireless Braille keyboard. The conference also covered making websites accessible and using jQuery for accessibility.
CD-R is a type of CD that can be recorded once and read many times. It uses a dye layer that is exposed to laser light during recording, which causes a chemical reaction that determines whether the medium is reflective or not. This allows digital information to be encoded as a series of pits and lands that can then be read back with a laser.
The document describes the development of a Tactile Map Production System (TMAP) for blind persons that allows users to create tactile maps from online maps using a web-based graphical user interface. TMAP extracts map data from sources like Google Maps API and converts it into tactile maps that can be produced on an eBraille embosser. The system aims to provide blind users with independent access to tactile maps for mobility and navigation purposes.
Tactile maps are designed to help visually impaired people understand spatial layouts and navigate environments. The National Institute of Special Needs Education has developed a new system to more efficiently produce tactile maps. Their system uses 3D printing and thermoforming techniques to create tactile maps that are detailed, durable, and can be mass produced for widespread distribution and use by the visually impaired community.
The document is about the Niigata University Niigata IT Support Center for Persons with Disabilities. The center aims to remove accessibility barriers for people with disabilities, including the deaf, blind, physically challenged, and those with cognitive or visual impairments. It works to provide IT support and make technology more accessible for people with disabilities at Niigata University.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
The document summarizes the activity of the Niigata IT Support Center for Persons with Disabilities (NITSC) from April 2008 to June 2010. Over this period, NITSC provided IT support to 60 individuals with disabilities, with the majority (52) receiving support in 2010. Support included assisting with basic computer use, the internet, and software applications. The top three areas of support were basic computer use, the internet, and word processing.
The Niigata IT Support Center for Persons with Disabilities (NITSC) opened in October 2008 to provide IT support and training to people with disabilities. In its first year, NITSC had 60 visitors per month on average, which increased to over 100 visitors by 2010. The center offers services like website creation, video chat using Skype, and software programs to help people with disabilities like ALS. Training sessions cover topics such as using computers, the internet, and assistive technologies. Photos show visitors receiving one-on-one instruction from staff.
The document outlines the development of TMACS from 2008 to 2010, including creating a web interface in 2009 and adding additional features such as scheduling and document management in 2010. Testing was conducted in September and November, and the system was implemented.
This document discusses various tools used for web conferencing and live streaming including WIT53, Ustream, IPtalk Broadcaster, CamTwist, and Tiarra. It provides information on how to connect these tools via different devices and software configurations like ngIRCd to allow sharing video and audio over IRC in different encodings. Specific instructions are given for connecting CamTwist and Tiarra using UTF8 encoding through IRC and ngIRCd.
This 3 sentence summary provides an overview of the Niigata IT Support Center for Persons with Disabilities annual report:
The report details the Center's activities in 2009, noting they provided IT support and training to over 1500 people with disabilities, of which over 850 participated in their programs. Major services offered included basic computer skills training, assistive software training, website creation support, and technical support via phone and in-person. The Center aims to continue expanding their services and providing more opportunities for IT skills development and inclusion for people with disabilities.
This document discusses using the Perl Image::Magick module to composite multiple image layers. It shows code for reading a base image and route overlay, making the overlay transparent, and compositing it onto the base image. Additional code demonstrates compositing a marks overlay on top using the 'Over' composite method and writing the output.
PgRouting is an open source library that provides routing functionality for PostgreSQL/PostGIS. It allows finding the shortest path between points on a network using algorithms like Dijkstra's algorithm. The document provides steps to install pgRouting into a PostGIS database and run shortest path queries.
The document describes the 25th Annual International Technology & Persons with Disabilities Conference held from March 22-27, 2010 in San Diego, CA. The conference included presentations and exhibitions on topics related to aging and disability, augmentative and alternative communication, blindness and low vision, and other areas. Presentations described technologies such as a system to help visually impaired pedestrians navigate crosswalks, tactile maps of Montreal subway stations, and a wireless Braille keyboard. The conference also covered making websites accessible and using jQuery for accessibility.
CD-R is a type of CD that can be recorded once and read many times. It uses a dye layer that is exposed to laser light during recording, which causes a chemical reaction that determines whether the medium is reflective or not. This allows digital information to be encoded as a series of pits and lands that can then be read back with a laser.
The document describes the development of a Tactile Map Production System (TMAP) for blind persons that allows users to create tactile maps from online maps using a web-based graphical user interface. TMAP extracts map data from sources like Google Maps API and converts it into tactile maps that can be produced on an eBraille embosser. The system aims to provide blind users with independent access to tactile maps for mobility and navigation purposes.
Tactile maps are designed to help visually impaired people understand spatial layouts and navigate environments. The National Institute of Special Needs Education has developed a new system to more efficiently produce tactile maps. Their system uses 3D printing and thermoforming techniques to create tactile maps that are detailed, durable, and can be mass produced for widespread distribution and use by the visually impaired community.
The document is about the Niigata University Niigata IT Support Center for Persons with Disabilities. The center aims to remove accessibility barriers for people with disabilities, including the deaf, blind, physically challenged, and those with cognitive or visual impairments. It works to provide IT support and make technology more accessible for people with disabilities at Niigata University.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away