SlideShare a Scribd company logo
#G4G_CoM_MAD
                     7/11/2011, FM UCM




            Madrid



http://c4d.udg.edu
The Maths of Chemistry




But are those ALL
maths in chemistry?
There is some nice stuff
out there too!
QuirkChemistry
Moebius aromaticity
QuirkChemistry
Penrose Staircase
QuirkChemistry
Borromean Molecules
QuirkChemistry
Trefoil Knotted Molecules




                   To knot or not to knot,
                   that’s the question
QuirkChemistry
Solomon Ring Molecules
QuirkChemistry
Arquimedian Endohedric Molecules
Fullerenes, Nobel Prize 1996 chem
Fullerenes
Endohedral fullerenes: space
ships?




                 He@C60
Nanocars
Nanotubes
Graphene, Nobel Prize 2010 ph
Graphene: light polarizing filter
Nature Photonics 5, 411–415 (2011) (abril 2011)
we demonstrate the operation of a broadband fibre polarizer based on
  graphene, an ultrathin two-dimensional carbon material. The out-
  coupled light in the telecommunication band shows a strong s-
  polarization effect with an extinction ratio of 27 dB. Unlikecan
  support transverse-electric-mode surface wave propagation due to
  its linear dispersion of Dirac electrons. polarizers made from thin
  metal film, a graphene polarizer
Not long ago (AJP 5-Abr): from
Schrödinger’s Cat to Schrödinger’s Octopus




Quantum interference of large molecules:
 wave-particle duality
Schrödinger’s Cat experiment
Dead or alive?
Is card red or black?
Qubit

Quantum computing
Quantum world
      Quantum world      Physical systems may be represented by
                       states in superpostion, e.g:


                 |alive >                    |dead >


                                  +
Quantum state:   |0 >             +              |1 >
                            Quantum bit: qubit
                                                    e Criptografia,
                                                    2007
Einstein-Podolski-Rosen pairs
Quantum Entanglement

Quantum Cryptography
Quantum key distribution: most important!
One-time keypad, length of key=length of
message
Generated through EPR pairs            Bob

                             Alice                            Diagonal
                                                              detector basis
               Diagonal
      polarization filters                                    Horizontal-
                                                              vertical
      Horizontal-vertical                                     detector basis
      polarization filters




  Light source

      Alice’s bit sequence 1 0 1 1 0 0 1 1 0 0 1 1 1 0
     Bob’s detection basis
      Bob’s measurement 1 0 0 1 0 0 1 1 0 0 0 1 0 0
    Retained bit sequence 1 – – 1 0 0 – 1 0 0 – 1 – 0
                                                   Curs d’estiu de
                                                   Criptografia, 2007
Relation to the Gilbreath
principle and Martin Gardner
My preferred chemist: Panoramix

                     Further information:
                     http://miquelduran.net
                     http://edunomia.net
                     http://c4d.udg.edu
                     miquel.duran@udg.edu
                     twitter, facebook:
                     miquelduran

 Thank you very much for your attention!
#G4G_CoM




            a Girona



http://c4d.udg.edu

More Related Content

Viewers also liked

VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)
VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)
VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)
Franco AQUINO
 
Menejemen syi’ar kampus
Menejemen syi’ar kampusMenejemen syi’ar kampus
Menejemen syi’ar kampus
Muhammad Nur Fadhli
 
Inundaciones en málaga
Inundaciones en málagaInundaciones en málaga
Inundaciones en málaga
juliojauregui10
 
Tema 14 Belén
Tema 14 BelénTema 14 Belén
Tema 14 Belénbelenpm9
 
Cesar arce actividad 1.2_mapa_conceptual
Cesar arce actividad 1.2_mapa_conceptualCesar arce actividad 1.2_mapa_conceptual
Cesar arce actividad 1.2_mapa_conceptual
Cesar Arce
 
Verbs junior
Verbs juniorVerbs junior
Verbs junior
Dora Kouri
 
5 s workplace organization
5 s workplace organization 5 s workplace organization
5 s workplace organization
W3 Group Canada Inc.
 
Fracture- Greenlight meeting
Fracture- Greenlight meetingFracture- Greenlight meeting
Fracture- Greenlight meeting
Sonali Narane
 

Viewers also liked (8)

VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)
VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)
VAUGHAN COMMUNITY MARKET REPORT (Nov 1, 2016 - Jan 31, 2017)
 
Menejemen syi’ar kampus
Menejemen syi’ar kampusMenejemen syi’ar kampus
Menejemen syi’ar kampus
 
Inundaciones en málaga
Inundaciones en málagaInundaciones en málaga
Inundaciones en málaga
 
Tema 14 Belén
Tema 14 BelénTema 14 Belén
Tema 14 Belén
 
Cesar arce actividad 1.2_mapa_conceptual
Cesar arce actividad 1.2_mapa_conceptualCesar arce actividad 1.2_mapa_conceptual
Cesar arce actividad 1.2_mapa_conceptual
 
Verbs junior
Verbs juniorVerbs junior
Verbs junior
 
5 s workplace organization
5 s workplace organization 5 s workplace organization
5 s workplace organization
 
Fracture- Greenlight meeting
Fracture- Greenlight meetingFracture- Greenlight meeting
Fracture- Greenlight meeting
 

Similar to 20111107 g4g-com-mad

Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
Information Security Awareness Group
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
Information Security Awareness Group
 
Invisible excitations in hexagonal Boron Nitride
Invisible excitations  in hexagonal Boron NitrideInvisible excitations  in hexagonal Boron Nitride
Invisible excitations in hexagonal Boron Nitride
Claudio Attaccalite
 
Oltre l'orizzonte cosmologico
Oltre l'orizzonte cosmologicoOltre l'orizzonte cosmologico
Oltre l'orizzonte cosmologico
nipslab
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
Roe_Summer_Lecture------------------.ppt
Roe_Summer_Lecture------------------.pptRoe_Summer_Lecture------------------.ppt
Roe_Summer_Lecture------------------.ppt
lily rosemary masilang
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Basundhara Deb Basundhara
 
H0324143
H0324143H0324143
H0324143
iosrjournals
 
Final Research Paper
Final Research PaperFinal Research Paper
Final Research PaperGlenn Kewley
 
Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...
Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...
Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...
Saroosh Shabbir
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Shyam Mohan
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
AliceBob EveMallory
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
IOSR Journals
 

Similar to 20111107 g4g-com-mad (20)

quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Invisible excitations in hexagonal Boron Nitride
Invisible excitations  in hexagonal Boron NitrideInvisible excitations  in hexagonal Boron Nitride
Invisible excitations in hexagonal Boron Nitride
 
Oltre l'orizzonte cosmologico
Oltre l'orizzonte cosmologicoOltre l'orizzonte cosmologico
Oltre l'orizzonte cosmologico
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Roe_Summer_Lecture------------------.ppt
Roe_Summer_Lecture------------------.pptRoe_Summer_Lecture------------------.ppt
Roe_Summer_Lecture------------------.ppt
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
H0324143
H0324143H0324143
H0324143
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Final Research Paper
Final Research PaperFinal Research Paper
Final Research Paper
 
Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...
Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...
Majorana Representation in Quantum Optics - SU(2) Interferometry and Uncertai...
 
Ieee lecture
Ieee lectureIeee lecture
Ieee lecture
 
Piezo material
Piezo materialPiezo material
Piezo material
 
Presentation2 (1)
Presentation2 (1)Presentation2 (1)
Presentation2 (1)
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
 

More from Miquel Duran

Flatland and Chemistry
Flatland and ChemistryFlatland and Chemistry
Flatland and Chemistry
Miquel Duran
 
20220627-7camins.pptx
20220627-7camins.pptx20220627-7camins.pptx
20220627-7camins.pptx
Miquel Duran
 
Online magic struggled in pandemic times, but it overcame difficulties. Scien...
Online magic struggled in pandemic times, but it overcame difficulties. Scien...Online magic struggled in pandemic times, but it overcame difficulties. Scien...
Online magic struggled in pandemic times, but it overcame difficulties. Scien...
Miquel Duran
 
Magazine-style live streaming as a new tool to disseminate science in (post)p...
Magazine-style live streaming as a new tool to disseminate science in (post)p...Magazine-style live streaming as a new tool to disseminate science in (post)p...
Magazine-style live streaming as a new tool to disseminate science in (post)p...
Miquel Duran
 
Communication of Research.
Communication of Research. Communication of Research.
Communication of Research.
Miquel Duran
 
Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...
Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...
Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...
Miquel Duran
 
Beyond virtualization of teaching
Beyond virtualization of teachingBeyond virtualization of teaching
Beyond virtualization of teaching
Miquel Duran
 
52 Games with the Periodic Table of the Elements - and beyond
52 Games with the Periodic Table of the Elements - and beyond52 Games with the Periodic Table of the Elements - and beyond
52 Games with the Periodic Table of the Elements - and beyond
Miquel Duran
 
Virtualization of Teaching in Higher Education
Virtualization of Teaching in Higher EducationVirtualization of Teaching in Higher Education
Virtualization of Teaching in Higher Education
Miquel Duran
 
Les 1000 cares de la Taula Periòdica
Les 1000 cares de la Taula PeriòdicaLes 1000 cares de la Taula Periòdica
Les 1000 cares de la Taula Periòdica
Miquel Duran
 
150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant
150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant
150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant
Miquel Duran
 
Fostering research in science communicatoin by means of competitive projects
Fostering research in science communicatoin by means of competitive projectsFostering research in science communicatoin by means of competitive projects
Fostering research in science communicatoin by means of competitive projects
Miquel Duran
 
ccsc2019 burgos mathematics of the periodic table
ccsc2019 burgos mathematics of the periodic tableccsc2019 burgos mathematics of the periodic table
ccsc2019 burgos mathematics of the periodic table
Miquel Duran
 
ccsc2019 simon-s clowcore playing cards
ccsc2019 simon-s clowcore playing cardsccsc2019 simon-s clowcore playing cards
ccsc2019 simon-s clowcore playing cards
Miquel Duran
 
Màgia i ciència
Màgia i ciènciaMàgia i ciència
Màgia i ciència
Miquel Duran
 
52 games with the Periodic Table
52 games with the Periodic Table52 games with the Periodic Table
52 games with the Periodic Table
Miquel Duran
 
De la recerca a la societat: conceptes complexos, explicació planera
De la recerca a la societat: conceptes complexos, explicació planeraDe la recerca a la societat: conceptes complexos, explicació planera
De la recerca a la societat: conceptes complexos, explicació planera
Miquel Duran
 
Periodic Table for Children and Youth
Periodic Table for Children and YouthPeriodic Table for Children and Youth
Periodic Table for Children and Youth
Miquel Duran
 
From the Magic of Science to the Science of Magic
From the Magic of Science to the Science of MagicFrom the Magic of Science to the Science of Magic
From the Magic of Science to the Science of Magic
Miquel Duran
 
Taula rodona Int Artif Miquel Estévez
Taula rodona Int Artif Miquel EstévezTaula rodona Int Artif Miquel Estévez
Taula rodona Int Artif Miquel Estévez
Miquel Duran
 

More from Miquel Duran (20)

Flatland and Chemistry
Flatland and ChemistryFlatland and Chemistry
Flatland and Chemistry
 
20220627-7camins.pptx
20220627-7camins.pptx20220627-7camins.pptx
20220627-7camins.pptx
 
Online magic struggled in pandemic times, but it overcame difficulties. Scien...
Online magic struggled in pandemic times, but it overcame difficulties. Scien...Online magic struggled in pandemic times, but it overcame difficulties. Scien...
Online magic struggled in pandemic times, but it overcame difficulties. Scien...
 
Magazine-style live streaming as a new tool to disseminate science in (post)p...
Magazine-style live streaming as a new tool to disseminate science in (post)p...Magazine-style live streaming as a new tool to disseminate science in (post)p...
Magazine-style live streaming as a new tool to disseminate science in (post)p...
 
Communication of Research.
Communication of Research. Communication of Research.
Communication of Research.
 
Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...
Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...
Science education and Artificial Intelligence. A Chatbot on Magic and Quantum...
 
Beyond virtualization of teaching
Beyond virtualization of teachingBeyond virtualization of teaching
Beyond virtualization of teaching
 
52 Games with the Periodic Table of the Elements - and beyond
52 Games with the Periodic Table of the Elements - and beyond52 Games with the Periodic Table of the Elements - and beyond
52 Games with the Periodic Table of the Elements - and beyond
 
Virtualization of Teaching in Higher Education
Virtualization of Teaching in Higher EducationVirtualization of Teaching in Higher Education
Virtualization of Teaching in Higher Education
 
Les 1000 cares de la Taula Periòdica
Les 1000 cares de la Taula PeriòdicaLes 1000 cares de la Taula Periòdica
Les 1000 cares de la Taula Periòdica
 
150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant
150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant
150 Anys de la Taula Periòdica, que ni és cap taula, ni té el període constant
 
Fostering research in science communicatoin by means of competitive projects
Fostering research in science communicatoin by means of competitive projectsFostering research in science communicatoin by means of competitive projects
Fostering research in science communicatoin by means of competitive projects
 
ccsc2019 burgos mathematics of the periodic table
ccsc2019 burgos mathematics of the periodic tableccsc2019 burgos mathematics of the periodic table
ccsc2019 burgos mathematics of the periodic table
 
ccsc2019 simon-s clowcore playing cards
ccsc2019 simon-s clowcore playing cardsccsc2019 simon-s clowcore playing cards
ccsc2019 simon-s clowcore playing cards
 
Màgia i ciència
Màgia i ciènciaMàgia i ciència
Màgia i ciència
 
52 games with the Periodic Table
52 games with the Periodic Table52 games with the Periodic Table
52 games with the Periodic Table
 
De la recerca a la societat: conceptes complexos, explicació planera
De la recerca a la societat: conceptes complexos, explicació planeraDe la recerca a la societat: conceptes complexos, explicació planera
De la recerca a la societat: conceptes complexos, explicació planera
 
Periodic Table for Children and Youth
Periodic Table for Children and YouthPeriodic Table for Children and Youth
Periodic Table for Children and Youth
 
From the Magic of Science to the Science of Magic
From the Magic of Science to the Science of MagicFrom the Magic of Science to the Science of Magic
From the Magic of Science to the Science of Magic
 
Taula rodona Int Artif Miquel Estévez
Taula rodona Int Artif Miquel EstévezTaula rodona Int Artif Miquel Estévez
Taula rodona Int Artif Miquel Estévez
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 

20111107 g4g-com-mad