The document discusses SK Planet, a South Korean company that was spun off from SK Telecom in 2011 to provide new value to customers through platform business in areas such as content delivery, location-based services, new media, commerce, advertising, communication, social networking, music, internet services, and finance portals. It aims to create value across diverse business areas and have worldwide competitive strength. Major services include 11ST, ONESTOP+, and SK PLANET T Store. More information can be found on the company's home and career pages.
Scala as "Better Java" from object-oriented viewpointlyrical_logical
The document discusses some limitations of object-oriented programming in Java, such as lack of support for multiple inheritance and dependency injection. It proposes that Scala addresses these issues through features like traits that allow for mixing and abstracting dependencies through interfaces. This reduces tightly coupled code and avoids problems like unintended polymorphism that can occur with implementation inheritance in Java.
RF Integration Inc. is a leading independent RF product development and semiconductor company located in Billerica, MA. It was incorporated in 1999 and has experience in several technologies. RF Integration develops both proprietary RF system analysis tools and turnkey product solutions for wireless applications like UWB, WiMax, WLAN, cellular, GPS and defense systems through collaborations with baseband partners. It provides complete solutions from RF ICs to individual IP blocks.
Luciano Resende is a staff software engineer at Shutterfly and committer to Apache projects. He presented on using MongoDB and developing a data access layer and schema definition. The schema definition uses a textual domain-specific language to define models for code generation including persistence, DTOs, mapping, validation and more across platforms like Java, RDBMS and MongoDB.
Even though this is a trivial example, the advantages of Python stand out.
Yorktown’s Computer Science I course has no prerequisites, so many of the
students seeing this example are looking at their first program. Some of them
are undoubtedly a little nervous, having heard that computer programming is
difficult to learn. The C++ version has always forced me to choose between
two unsatisfying options: either to explain the #include, void main(), {, and
} statements and risk confusing or intimidating some of the students right at
the start, or to tell them, “Just don’t worry about all of that stuff now; we will
talk about it later,” and risk the same thing. The educational objectives at
this point in the course are to introduce students to the idea of a programming
statement and to get them to write their first program, thereby introducing
them to the programming environment. The Python program has exactly what
is needed to do these things, and nothing more.
Comparing the explanatory text of the program in each version of the book
further illustrates what this means to the beginning student. There are thirteen
paragraphs of explanation of “Hello, world!” in the C++ version; in the Python
version, there are only two. More importantly, the missing eleven paragraphs
do not deal with the “big ideas” in computer programming but with the minutia
of C++ syntax. I found this same thing happening throughout the book.
Whole paragraphs simply disappear from the Python version of the text because
Python’s much clearer syntax renders them unnecessary.
Using a very high-level language like Python allows a teacher to postpone talking
about low-level details of the machine until students have the background that
they need to better make sense of the details. It thus creates the ability to put
“first things first” pedagogically. One of the best examples of this is the way in
which Python handles variables. In C++ a variable is a name for a place that
holds a thing. Variables have to be declared with types at least in part because
the size of the place to which they refer needs to be predetermined. Thus, the
idea of a variable is bound up with the hardware of the machine. The powerful
and fundamental concept of a variable is already difficult enough for beginning
students (in both computer science and algebra). Bytes and addresses do not
help the matter. In Python a variable is a name that refers to a thing. This
is a far more intuitive concept for beginning students and is much closer to the
meaning of “variable” that they learned in their math courses. I had much less
difficulty teaching variables this year than I did in the past, and I spent less
time helping students with problems using them.
* 나는 왜 개발자인데자신이 없을까?
초보 개발자들은 다양한 공부를 했으면서도, 정작 개발에는 자신이 없어합니다. 그 이유를 알아보고, 그것을 극복하는 방법을 이야기합니다. 개발자로서 어떤 생각을 하면서, 어떤 자세로 살아야 하는지, 새로운 기술은 어떻게 배워나가야하는지, 자신있어 보이는 선수 개발자는 뭐가 다른지를 설명합니다. 모든 초보 개발자들이 가지고 있는 내면의 자신감을 끌어 올릴 수 있도록 도와주고, 이제 소프트웨어 개발자로 서의 커리어를 시작하는 사람들이 지속가능한 발전과 성공을 할 수 있도록 도와줍니다.
동영상 link: http://serviceapi.nmv.naver.com/flash/convertIframeTag.nhn?vid=8102105A2B82DE6DC96D57AA820458275CD7&outKey=V1210a0ea4d005fd624546a616cd783b464042b6f6db81e78fe926a616cd783b46404&width=720&height=438
Scala as "Better Java" from object-oriented viewpointlyrical_logical
The document discusses some limitations of object-oriented programming in Java, such as lack of support for multiple inheritance and dependency injection. It proposes that Scala addresses these issues through features like traits that allow for mixing and abstracting dependencies through interfaces. This reduces tightly coupled code and avoids problems like unintended polymorphism that can occur with implementation inheritance in Java.
RF Integration Inc. is a leading independent RF product development and semiconductor company located in Billerica, MA. It was incorporated in 1999 and has experience in several technologies. RF Integration develops both proprietary RF system analysis tools and turnkey product solutions for wireless applications like UWB, WiMax, WLAN, cellular, GPS and defense systems through collaborations with baseband partners. It provides complete solutions from RF ICs to individual IP blocks.
Luciano Resende is a staff software engineer at Shutterfly and committer to Apache projects. He presented on using MongoDB and developing a data access layer and schema definition. The schema definition uses a textual domain-specific language to define models for code generation including persistence, DTOs, mapping, validation and more across platforms like Java, RDBMS and MongoDB.
Even though this is a trivial example, the advantages of Python stand out.
Yorktown’s Computer Science I course has no prerequisites, so many of the
students seeing this example are looking at their first program. Some of them
are undoubtedly a little nervous, having heard that computer programming is
difficult to learn. The C++ version has always forced me to choose between
two unsatisfying options: either to explain the #include, void main(), {, and
} statements and risk confusing or intimidating some of the students right at
the start, or to tell them, “Just don’t worry about all of that stuff now; we will
talk about it later,” and risk the same thing. The educational objectives at
this point in the course are to introduce students to the idea of a programming
statement and to get them to write their first program, thereby introducing
them to the programming environment. The Python program has exactly what
is needed to do these things, and nothing more.
Comparing the explanatory text of the program in each version of the book
further illustrates what this means to the beginning student. There are thirteen
paragraphs of explanation of “Hello, world!” in the C++ version; in the Python
version, there are only two. More importantly, the missing eleven paragraphs
do not deal with the “big ideas” in computer programming but with the minutia
of C++ syntax. I found this same thing happening throughout the book.
Whole paragraphs simply disappear from the Python version of the text because
Python’s much clearer syntax renders them unnecessary.
Using a very high-level language like Python allows a teacher to postpone talking
about low-level details of the machine until students have the background that
they need to better make sense of the details. It thus creates the ability to put
“first things first” pedagogically. One of the best examples of this is the way in
which Python handles variables. In C++ a variable is a name for a place that
holds a thing. Variables have to be declared with types at least in part because
the size of the place to which they refer needs to be predetermined. Thus, the
idea of a variable is bound up with the hardware of the machine. The powerful
and fundamental concept of a variable is already difficult enough for beginning
students (in both computer science and algebra). Bytes and addresses do not
help the matter. In Python a variable is a name that refers to a thing. This
is a far more intuitive concept for beginning students and is much closer to the
meaning of “variable” that they learned in their math courses. I had much less
difficulty teaching variables this year than I did in the past, and I spent less
time helping students with problems using them.
* 나는 왜 개발자인데자신이 없을까?
초보 개발자들은 다양한 공부를 했으면서도, 정작 개발에는 자신이 없어합니다. 그 이유를 알아보고, 그것을 극복하는 방법을 이야기합니다. 개발자로서 어떤 생각을 하면서, 어떤 자세로 살아야 하는지, 새로운 기술은 어떻게 배워나가야하는지, 자신있어 보이는 선수 개발자는 뭐가 다른지를 설명합니다. 모든 초보 개발자들이 가지고 있는 내면의 자신감을 끌어 올릴 수 있도록 도와주고, 이제 소프트웨어 개발자로 서의 커리어를 시작하는 사람들이 지속가능한 발전과 성공을 할 수 있도록 도와줍니다.
동영상 link: http://serviceapi.nmv.naver.com/flash/convertIframeTag.nhn?vid=8102105A2B82DE6DC96D57AA820458275CD7&outKey=V1210a0ea4d005fd624546a616cd783b464042b6f6db81e78fe926a616cd783b46404&width=720&height=438
Bi-directional RPC communications on dynamic TCP ports are required between all vCenters in Linked Mode. Connections and ports are required between vCenter Server, Site Recovery Manager, and other VMware products for monitoring, management, and communication. Common ports include TCP ports 80, 443, 389, 902, and 8443.
EXPERIENCES WITH HIGH DEFINITION INTERACTIVE VIDEO ...Videoguy
This document summarizes the design and implementation of UltraGrid, a high definition video conferencing system. UltraGrid was the first system capable of supporting gigabit rate HD interactive video conferencing using commodity hardware and networks. The authors present experimental results showing UltraGrid's performance on both pure IP and hybrid IP/optical networks. Their data demonstrates the benefits of hybrid networks for high-quality real-time applications and motivates further development of congestion control for pure IP networks.
Microsoft lync server 2010 protocol workloads posterHuda Kamaruzaman
1. The document describes the internal and external sign-in processes for IM and presence workloads.
2. It outlines the various protocol workloads including A/V and web conferencing, application sharing, and enterprise voice.
3. Port numbers, protocols, and load balancing configurations are provided for each workload and infrastructure component.
The document discusses HTML5, Canvas, SVG, Video, Audio, and Web Storage technologies that can be used to build high quality web and hybrid mobile applications. It provides code examples and demos for drawing shapes, images, and text on Canvas, creating simple SVG graphics, playing video and audio, and using local storage. It also introduces the Titanium framework for building native mobile apps using web technologies.
Evolution of a Memcached Deployment Webinar 2010 01 13Gear6
Memcached has become a critical tool in the web technology stack. High traffic web sites with dynamic content - like Facebook, Twitter, and Wikipedia - rely on Memcached to scale and ensure “snappy” site performance.
This presentation willl cover a brief overview of Memcached, then dive into the evolution of Memcached’s use in dynamic web sites and how you can scale your site and get better performance with Memcached. We’ll also review emerging architectures and tools of high performance, large scale dynamic websites.
In this webinar you will learn best practices used by some of the hottest sites and get tips on how to avoid potential pitfalls when scaling. Whether you're just building the infrastructure for a brand new site or have a large dynamic site with millions of users, this webinar is for you.
The document summarizes a lightning talk given by Makoto Kuwata on benchmarking and performance testing in Python. It shows the results of several benchmarks comparing the speed of different string operations in Python like addition, formatting, and joining. It demonstrates that the + operator is fastest for short strings while += is fastest for string concatenation. It also discusses using the Benchmarker utility for benchmarking code in Python.
The document discusses various topics around barcode and QR codes including:
- Different types of barcode formats like PDF417, DataMatrix, MaxiCode and QR Code.
- Using API requests to generate codes and the number of codes generated.
- Issues with exposing URL parameters in codes and abuse of landing page redirection.
- Using codes for exhibition configuration and scene setup.
- Optimizing CPU usage and preventing memory leaks.
- Ensuring stable operation even with unstable network connections on site.
This document discusses various options for developing mobile applications including native apps, web apps, and hybrid apps. It focuses on hybrid frameworks like PhoneGap, Titanium, and Appspresso which allow developing apps using web technologies that are then wrapped into native containers. These hybrid frameworks provide access to device features while developing using HTML, CSS, and JavaScript instead of native languages. Demo code examples are provided for building hybrid mobile apps with jQuery Mobile and Sencha Touch using the Appspresso framework.
Primitives And Design Patterns for Top-Down SOA ImplementationsMichael zur Muehlen
Presentation given at the SOA Symposium 2009, Government and Industry Issues and Solutions. This presentation focuses on the development of a BPMN styleguide for the Department of Defense.
SDEC2011 Replacing legacy Telco DB/DW to Hadoop and HiveKorea Sdec
Currently telecom companies store their data in database or data warehouse, treating them through ETL process and working on statistics and analysis by using OLAP tools or data mining engines. However, due to the data explosion along with the spread of Smart Phones traditional data storages like DB and DW aren’t sufficient to cope with these “Big Data”. As an alternative the method of storing data in Hadoop and performing ETL process and Ad-hoc Query with Hive is being introduced, and China Mobile is being mentioned as the most representative example. But, they are adopted mainly by new projects, which have low barriers in applying the new Hive data model and HQL. On the other hand, it is extremely difficult to replace the existing database with the combination of Hadoop and Hive if there are already a number of tables and SQL queries. NexR is migrating the telecom company’s data from Oracle DB to Hadoop, and converting a lot of existing Oracle SQL queries to Hive HQL queries. Though HQL supports a similar syntax to ANSI-SQL, it lacks a large portion of basic functions and hardly supports Oracle analytic functions like rank() which are utilized mainly in statistical analysis. Furthermore, the difference of data types like null value is also blocking the application of it. In this presentation, we will share the experience converting Oracle SQL to Hive HQL and developing additional functions with MapReduce. Also, we will introduce several ideas and trials to improve Hive performance.
http://sdec.kr/
The document is a presentation on REST and SOA given by Stefan Tilkov at QCon London 2008. It begins by introducing the presenter and topic, then provides definitions of SOA from various sources to establish common understanding. It notes that defining SOA is difficult due to various interpretations. The presentation next asks what REST is, and says it will provide 3 definitions as it did for SOA. It previews that the first definition of REST will view it as an architectural style described by Roy Fielding in his dissertation.
This document summarizes a presentation about Memcached and using the cloud. It discusses how Memcached alleviates database load for dynamic web applications by caching objects in memory. Using the cloud allows sites to leverage elastic, on-demand resources and pay only for what they use. The document recommends designing systems to be loosely coupled and resilient to failures when using the cloud. It presents two use cases - a system entirely in the cloud using Memcached and EC2 instances, and a hybrid model with an on-premise Memcached cache. Gear6 is introduced as a commercial distribution of Memcached optimized for use in the cloud.
Best of Breed OpenStack Compute & Block Storage Cloud... .pdfOpenStack Foundation
This document outlines a project to deploy a production-ready OpenStack compute and block storage environment using Ubuntu, OpenStack, and SolidFire technologies. Key goals were to provide a reference architecture emphasizing predictable performance, quality of service, and ease of use. The deployment utilized Nova, Cinder, Swift and Ubuntu Charms. Results included an estimated 600-1200 virtual machines and 210-415 IOPS per application instance on a SolidFire cluster. Lessons learned included the ongoing challenges of OpenStack deployment and the need to adjust defaults and be prepared for configuration changes between releases.
Providing user support in Web-of-Things enabled Smart SpacesBenoit Christophe
The slides that I have presented at the 2nd International workshop of the Web of Things. They describe the paper entitled "Providing user support in Web-of-Things enabled Smart Spaces" that has been accepted to this workshop.
The document discusses the architecture and development of a programming language. It outlines different layers including the language specific layer with scanner and parser, middle-end layer for analysis, and back-end layer for execution including just-in-time compilation and garbage collection. It notes the initial implementation used IDL and C libraries on a single CPU. Future plans include utilizing GPUs and developing a more modern syntax.
This document discusses HTML5 and web technologies. It provides an agenda and overview of key topics including what HTML5 is, how it evolves HTML incrementally, and new APIs like drag and drop, forms, canvas, and web sockets. It also discusses cross-browser support, uses of technologies like CSS3, SVG and WebGL across devices, and references for further information.
The document describes the LG SuperSign Elite-w digital signage player and software. It can support up to 30 players with the option to scale up to 1,000. The software provides a web-based content management system that allows for multi-user access and role-based permissions. It also includes templates, clip arts, and supports various media formats for display on players.
The document discusses various machine learning clustering algorithms like K-means clustering, DBSCAN, and EM clustering. It also discusses neural network architectures like LSTM, bi-LSTM, and convolutional neural networks. Finally, it presents results from evaluating different chatbot models on various metrics like validation score.
Bi-directional RPC communications on dynamic TCP ports are required between all vCenters in Linked Mode. Connections and ports are required between vCenter Server, Site Recovery Manager, and other VMware products for monitoring, management, and communication. Common ports include TCP ports 80, 443, 389, 902, and 8443.
EXPERIENCES WITH HIGH DEFINITION INTERACTIVE VIDEO ...Videoguy
This document summarizes the design and implementation of UltraGrid, a high definition video conferencing system. UltraGrid was the first system capable of supporting gigabit rate HD interactive video conferencing using commodity hardware and networks. The authors present experimental results showing UltraGrid's performance on both pure IP and hybrid IP/optical networks. Their data demonstrates the benefits of hybrid networks for high-quality real-time applications and motivates further development of congestion control for pure IP networks.
Microsoft lync server 2010 protocol workloads posterHuda Kamaruzaman
1. The document describes the internal and external sign-in processes for IM and presence workloads.
2. It outlines the various protocol workloads including A/V and web conferencing, application sharing, and enterprise voice.
3. Port numbers, protocols, and load balancing configurations are provided for each workload and infrastructure component.
The document discusses HTML5, Canvas, SVG, Video, Audio, and Web Storage technologies that can be used to build high quality web and hybrid mobile applications. It provides code examples and demos for drawing shapes, images, and text on Canvas, creating simple SVG graphics, playing video and audio, and using local storage. It also introduces the Titanium framework for building native mobile apps using web technologies.
Evolution of a Memcached Deployment Webinar 2010 01 13Gear6
Memcached has become a critical tool in the web technology stack. High traffic web sites with dynamic content - like Facebook, Twitter, and Wikipedia - rely on Memcached to scale and ensure “snappy” site performance.
This presentation willl cover a brief overview of Memcached, then dive into the evolution of Memcached’s use in dynamic web sites and how you can scale your site and get better performance with Memcached. We’ll also review emerging architectures and tools of high performance, large scale dynamic websites.
In this webinar you will learn best practices used by some of the hottest sites and get tips on how to avoid potential pitfalls when scaling. Whether you're just building the infrastructure for a brand new site or have a large dynamic site with millions of users, this webinar is for you.
The document summarizes a lightning talk given by Makoto Kuwata on benchmarking and performance testing in Python. It shows the results of several benchmarks comparing the speed of different string operations in Python like addition, formatting, and joining. It demonstrates that the + operator is fastest for short strings while += is fastest for string concatenation. It also discusses using the Benchmarker utility for benchmarking code in Python.
The document discusses various topics around barcode and QR codes including:
- Different types of barcode formats like PDF417, DataMatrix, MaxiCode and QR Code.
- Using API requests to generate codes and the number of codes generated.
- Issues with exposing URL parameters in codes and abuse of landing page redirection.
- Using codes for exhibition configuration and scene setup.
- Optimizing CPU usage and preventing memory leaks.
- Ensuring stable operation even with unstable network connections on site.
This document discusses various options for developing mobile applications including native apps, web apps, and hybrid apps. It focuses on hybrid frameworks like PhoneGap, Titanium, and Appspresso which allow developing apps using web technologies that are then wrapped into native containers. These hybrid frameworks provide access to device features while developing using HTML, CSS, and JavaScript instead of native languages. Demo code examples are provided for building hybrid mobile apps with jQuery Mobile and Sencha Touch using the Appspresso framework.
Primitives And Design Patterns for Top-Down SOA ImplementationsMichael zur Muehlen
Presentation given at the SOA Symposium 2009, Government and Industry Issues and Solutions. This presentation focuses on the development of a BPMN styleguide for the Department of Defense.
SDEC2011 Replacing legacy Telco DB/DW to Hadoop and HiveKorea Sdec
Currently telecom companies store their data in database or data warehouse, treating them through ETL process and working on statistics and analysis by using OLAP tools or data mining engines. However, due to the data explosion along with the spread of Smart Phones traditional data storages like DB and DW aren’t sufficient to cope with these “Big Data”. As an alternative the method of storing data in Hadoop and performing ETL process and Ad-hoc Query with Hive is being introduced, and China Mobile is being mentioned as the most representative example. But, they are adopted mainly by new projects, which have low barriers in applying the new Hive data model and HQL. On the other hand, it is extremely difficult to replace the existing database with the combination of Hadoop and Hive if there are already a number of tables and SQL queries. NexR is migrating the telecom company’s data from Oracle DB to Hadoop, and converting a lot of existing Oracle SQL queries to Hive HQL queries. Though HQL supports a similar syntax to ANSI-SQL, it lacks a large portion of basic functions and hardly supports Oracle analytic functions like rank() which are utilized mainly in statistical analysis. Furthermore, the difference of data types like null value is also blocking the application of it. In this presentation, we will share the experience converting Oracle SQL to Hive HQL and developing additional functions with MapReduce. Also, we will introduce several ideas and trials to improve Hive performance.
http://sdec.kr/
The document is a presentation on REST and SOA given by Stefan Tilkov at QCon London 2008. It begins by introducing the presenter and topic, then provides definitions of SOA from various sources to establish common understanding. It notes that defining SOA is difficult due to various interpretations. The presentation next asks what REST is, and says it will provide 3 definitions as it did for SOA. It previews that the first definition of REST will view it as an architectural style described by Roy Fielding in his dissertation.
This document summarizes a presentation about Memcached and using the cloud. It discusses how Memcached alleviates database load for dynamic web applications by caching objects in memory. Using the cloud allows sites to leverage elastic, on-demand resources and pay only for what they use. The document recommends designing systems to be loosely coupled and resilient to failures when using the cloud. It presents two use cases - a system entirely in the cloud using Memcached and EC2 instances, and a hybrid model with an on-premise Memcached cache. Gear6 is introduced as a commercial distribution of Memcached optimized for use in the cloud.
Best of Breed OpenStack Compute & Block Storage Cloud... .pdfOpenStack Foundation
This document outlines a project to deploy a production-ready OpenStack compute and block storage environment using Ubuntu, OpenStack, and SolidFire technologies. Key goals were to provide a reference architecture emphasizing predictable performance, quality of service, and ease of use. The deployment utilized Nova, Cinder, Swift and Ubuntu Charms. Results included an estimated 600-1200 virtual machines and 210-415 IOPS per application instance on a SolidFire cluster. Lessons learned included the ongoing challenges of OpenStack deployment and the need to adjust defaults and be prepared for configuration changes between releases.
Providing user support in Web-of-Things enabled Smart SpacesBenoit Christophe
The slides that I have presented at the 2nd International workshop of the Web of Things. They describe the paper entitled "Providing user support in Web-of-Things enabled Smart Spaces" that has been accepted to this workshop.
The document discusses the architecture and development of a programming language. It outlines different layers including the language specific layer with scanner and parser, middle-end layer for analysis, and back-end layer for execution including just-in-time compilation and garbage collection. It notes the initial implementation used IDL and C libraries on a single CPU. Future plans include utilizing GPUs and developing a more modern syntax.
This document discusses HTML5 and web technologies. It provides an agenda and overview of key topics including what HTML5 is, how it evolves HTML incrementally, and new APIs like drag and drop, forms, canvas, and web sockets. It also discusses cross-browser support, uses of technologies like CSS3, SVG and WebGL across devices, and references for further information.
The document describes the LG SuperSign Elite-w digital signage player and software. It can support up to 30 players with the option to scale up to 1,000. The software provides a web-based content management system that allows for multi-user access and role-based permissions. It also includes templates, clip arts, and supports various media formats for display on players.
The document discusses various machine learning clustering algorithms like K-means clustering, DBSCAN, and EM clustering. It also discusses neural network architectures like LSTM, bi-LSTM, and convolutional neural networks. Finally, it presents results from evaluating different chatbot models on various metrics like validation score.
The document discusses challenges with using reinforcement learning for robotics. While simulations allow fast training of agents, there is often a "reality gap" when transferring learning to real robots. Other approaches like imitation learning and self-supervised learning can be safer alternatives that don't require trial-and-error. To better apply reinforcement learning, robots may need model-based approaches that learn forward models of the world, as well as techniques like active localization that allow robots to gather targeted information through interactive perception. Closing the reality gap will require finding ways to better match simulations to reality or allow robots to learn from real-world experiences.
[243] Deep Learning to help student’s Deep LearningNAVER D2
This document describes research on using deep learning to predict student performance in massive open online courses (MOOCs). It introduces GritNet, a model that takes raw student activity data as input and predicts outcomes like course graduation without feature engineering. GritNet outperforms baselines by more than 5% in predicting graduation. The document also describes how GritNet can be adapted in an unsupervised way to new courses using pseudo-labels, improving predictions in the first few weeks. Overall, GritNet is presented as the state-of-the-art for student prediction and can be transferred across courses without labels.
[234]Fast & Accurate Data Annotation Pipeline for AI applicationsNAVER D2
This document provides a summary of new datasets and papers related to computer vision tasks including object detection, image matting, person pose estimation, pedestrian detection, and person instance segmentation. A total of 8 papers and their associated datasets are listed with brief descriptions of the core contributions or techniques developed in each.
[226]NAVER 광고 deep click prediction: 모델링부터 서빙까지NAVER D2
This document presents a formula for calculating the loss function J(θ) in machine learning models. The formula averages the negative log likelihood of the predicted probabilities being correct over all samples S, and includes a regularization term λ that penalizes predicted embeddings being dissimilar from actual embeddings. It also defines the cosine similarity term used in the regularization.
[214] Ai Serving Platform: 하루 수 억 건의 인퍼런스를 처리하기 위한 고군분투기NAVER D2
The document discusses running a TensorFlow Serving (TFS) container using Docker. It shows commands to:
1. Pull the TFS Docker image from a repository
2. Define a script to configure and run the TFS container, specifying the model path, name, and port mapping
3. Run the script to start the TFS container exposing port 13377
The document discusses linear algebra concepts including:
- Representing a system of linear equations as a matrix equation Ax = b where A is a coefficient matrix, x is a vector of unknowns, and b is a vector of constants.
- Solving for the vector x that satisfies the matrix equation using linear algebra techniques such as row reduction.
- Examples of matrix equations and their component vectors are shown.
This document describes the steps to convert a TensorFlow model to a TensorRT engine for inference. It includes steps to parse the model, optimize it, generate a runtime engine, serialize and deserialize the engine, as well as perform inference using the engine. It also provides code snippets for a PReLU plugin implementation in C++.
The document discusses machine reading comprehension (MRC) techniques for question answering (QA) systems, comparing search-based and natural language processing (NLP)-based approaches. It covers key milestones in the development of extractive QA models using NLP, from early sentence-level models to current state-of-the-art techniques like cross-attention, self-attention, and transfer learning. It notes the speed and scalability benefits of combining search and reading methods for QA.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.