Slide for speaking at Droidcon Vietnam 2017
Introduction:
Million of android developers around the world are making great apps. But very few really take care about their compiled code really looks like. How do reverse engineers view their app under different perspective.
This speaking will explain in detail about android reverse engineering from the ground up. Attendee will learn about reading byte code, modify and compile apk file, hooking framework and all additional tools for reverse engineering life.
Code Example: https://github.com/vladimir-dejanovic/grpc-bank-example
You heard of "new thing" called gRPC and promises that it will solve all issues for you, so now you are not sure if you should use it for breaking up your monolith to Microservices.
On the other hand, you have been using REST API's for some time now, at least as a consumer, so maybe this would be better approach in Microservices waters, or would it?
Which one to chose and which one will fit your use case better?
Join me in this talk were I will try to explain both approaches, good and bad. I will give some points and tips, which will help you in understanding better which one will be better for you. By doing this I will also share some best practices for both approaches
REST API vs gRPC, which one should you use in breaking a monolith [Kdg.net 2018]Vladimir Dejanovic
You heard of "new thing" called gRPC and promises that it will solve all issues for you, so now you are not sure if you should use it for breaking up your monolith to Microservices. If it is good for Google it should be good for you also right?
On the other hand, you have been using REST API's for some time now, at least as a consumer, so maybe this would be better approach in Microservices waters, or would it?
Which one to chose and which one will fit your use case better?
Join me in this talk were I will try to explain both approaches, good and bad. I will give some points and tips, which will help you in understanding better which one will be better for you. By doing this I will also share some best practices for both approaches
Android Dev Conference 2017 - Produtividade Ninja no Android StudioiMasters
Ramon Rabello - Android Software Engineer Senior na Colab.re, fala sobre Produtividade Ninja no Android Studio no Android Dev Conference 2017.
https://eventos.imasters.com.br/android-devconference/
REST API vs gRPC, which one should you use in breaking a monolith [Dev conf 2...Vladimir Dejanovic
You heard of "new thing" called gRPC and promises that it will solve all issues for you, so now you are not sure if you should use it for breaking up your monolith to Microservices. If it is good for Google it should be good for you also right?
On the other hand, you have been using REST API's for some time now, at least as a consumer, so maybe this would be better approach in Microservices waters, or would it?
Which one to chose and which one will fit your use case better?
Join me in this talk were I will try to explain both approaches, good and bad. I will give some points and tips, which will help you in understanding better which one will be better for you. By doing this I will also share some best practices for both approaches
Revisiting Code Ownership and Its Relationship with Software Quality in the S...The University of Adelaide
This work was presented at The 38th International Conference on Software Engineering (ICSE2016).
Abstract: Code ownership establishes a chain of responsibility for modules in large software systems. Although prior work uncovers a link between code ownership heuristics and software quality, these heuristics rely solely on the authorship of code changes. In addition to authoring code changes, developers also make important contributions to a module by reviewing code changes. Indeed, recent work shows that reviewers are highly active in modern code review processes, often suggesting alternative solutions or providing updates to the code changes. In this paper, we complement traditional code ownership heuristics using code review activity. Through a case study of six releases of the large Qt and OpenStack systems, we find that: (1) 67%-86% of developers did not author any code changes for a module, but still actively contributed by reviewing 21%-39% of the code changes, (2) code ownership heuristics that are aware of reviewing activity share a relationship with software quality, and (3) the proportion of reviewers without expertise shares a strong, increasing relationship with the likelihood of having post-release defects. Our results suggest that reviewing activity captures an important aspect of code ownership, and should be included in approximations of it in future studies.
Code Example: https://github.com/vladimir-dejanovic/grpc-bank-example
You heard of "new thing" called gRPC and promises that it will solve all issues for you, so now you are not sure if you should use it for breaking up your monolith to Microservices.
On the other hand, you have been using REST API's for some time now, at least as a consumer, so maybe this would be better approach in Microservices waters, or would it?
Which one to chose and which one will fit your use case better?
Join me in this talk were I will try to explain both approaches, good and bad. I will give some points and tips, which will help you in understanding better which one will be better for you. By doing this I will also share some best practices for both approaches
REST API vs gRPC, which one should you use in breaking a monolith [Kdg.net 2018]Vladimir Dejanovic
You heard of "new thing" called gRPC and promises that it will solve all issues for you, so now you are not sure if you should use it for breaking up your monolith to Microservices. If it is good for Google it should be good for you also right?
On the other hand, you have been using REST API's for some time now, at least as a consumer, so maybe this would be better approach in Microservices waters, or would it?
Which one to chose and which one will fit your use case better?
Join me in this talk were I will try to explain both approaches, good and bad. I will give some points and tips, which will help you in understanding better which one will be better for you. By doing this I will also share some best practices for both approaches
Android Dev Conference 2017 - Produtividade Ninja no Android StudioiMasters
Ramon Rabello - Android Software Engineer Senior na Colab.re, fala sobre Produtividade Ninja no Android Studio no Android Dev Conference 2017.
https://eventos.imasters.com.br/android-devconference/
REST API vs gRPC, which one should you use in breaking a monolith [Dev conf 2...Vladimir Dejanovic
You heard of "new thing" called gRPC and promises that it will solve all issues for you, so now you are not sure if you should use it for breaking up your monolith to Microservices. If it is good for Google it should be good for you also right?
On the other hand, you have been using REST API's for some time now, at least as a consumer, so maybe this would be better approach in Microservices waters, or would it?
Which one to chose and which one will fit your use case better?
Join me in this talk were I will try to explain both approaches, good and bad. I will give some points and tips, which will help you in understanding better which one will be better for you. By doing this I will also share some best practices for both approaches
Revisiting Code Ownership and Its Relationship with Software Quality in the S...The University of Adelaide
This work was presented at The 38th International Conference on Software Engineering (ICSE2016).
Abstract: Code ownership establishes a chain of responsibility for modules in large software systems. Although prior work uncovers a link between code ownership heuristics and software quality, these heuristics rely solely on the authorship of code changes. In addition to authoring code changes, developers also make important contributions to a module by reviewing code changes. Indeed, recent work shows that reviewers are highly active in modern code review processes, often suggesting alternative solutions or providing updates to the code changes. In this paper, we complement traditional code ownership heuristics using code review activity. Through a case study of six releases of the large Qt and OpenStack systems, we find that: (1) 67%-86% of developers did not author any code changes for a module, but still actively contributed by reviewing 21%-39% of the code changes, (2) code ownership heuristics that are aware of reviewing activity share a relationship with software quality, and (3) the proportion of reviewers without expertise shares a strong, increasing relationship with the likelihood of having post-release defects. Our results suggest that reviewing activity captures an important aspect of code ownership, and should be included in approximations of it in future studies.
Crystal clear service interfaces w/ Swagger/OpenAPIScott Triglia
Learn how to better communicate between Python services. We'll use simple-to-follow examples and go from a service with undocumented endpoints to one which has full docs and validation on requests. Learn how to use Swagger tooling for python, including the bravado (client) and pyramid_swagger (server) libraries. In the end, you'll (hopefully!) find nirvana and make the machines do all the hard work for you.
(Presentation at HITcon 2011) This talk introduces how to do Android application reverse engineering by real example. And, it covers the advanced topics like optimized DEX and JNI.
Metrics-Driven Devops: Delivering High Quality Software Faster! Dynatrace
Becoming the next Uber is only possible if you can deliver your code updates faster to your end users. But for your organization, does delivering code faster present a higher likelihood of failing faster?
Discover four metrics you should be tracking starting from your workstation all the way through CI and into Ops.
Learn how companies like Facebook, CreditOne, and others apply metric-driven DevOps.
See use cases of crashed rapid deployments and how they used the metrics to detect the root cause.
Learn how to apply these metrics to steer your pipeline to build better code and deploy faster, without failing faster!
Scale your Experimentation with Full Stack Best PracticesOptimizely
Are you struggling to go from 1 to 10 or from 100 to 1000 experiments? Optimizely Full Stack is a powerful tool, but knowing best practices for implementation is key to 10x-ing your experimentation program. In this workshop, we'll describe best practices like installing and wrapping the SDK, strategies for code footprint, and fitting a product experimentation culture into your team's process. Come learn how to best leverage Full Stack to scale your product experimentation program.
Building android apps with MVP, Dagger, Retrofit, Gson, JSON, Kotlin Data Cl...Hammad Tariq
Architect android apps with MVP, Dagger, Retrofit, Gson, JSON, Kotlin Data Classes and RecyclerView using Kotlin.
How to Convert JSON to Kotlin Data Classes.
Kotlin Retrofit Example with RecyclerView.
MVP Android using Kotlin project structure.
Kotlin Android Dagger2 Tutorial.
How to use GSON serialization for JSON response in Kotlin.
Find More on:
http://developine.com/building-android-mvp-app-in-kotlin-using-dagger-retrofit/
And
http://developine.com/
Reverse engineering Java et contournement du mécanisme de paiement inapp AndroidJUG Lausanne
Session du 28 Septembre 2017
Android fournit une API Java pour la facturation d'achats in-app, permettant aux développeurs de vendre des fonctionnalités supplémentaires directement depuis l'application. Ce mécanisme est très souvent utilisé dans les jeux pour acheter des crédits donnant accès à du contenu supplémentaire, des bonus, etc ... Mais l'intégration du paiement est souvent mal comprise: on ne peut pas faire confiance au code tournant sur le smartphone. Ainsi, toutes les vérifications et l'obtention du contenu doivent s'effectuer côté serveur. Comme ce n'est pas très clair dans la documentation de Google, beaucoup de jeux continuent de faire la gestion côté client.
Nous allons exploiter une véritable application Android du Playstore pour obtenir des crédits gratuits. Et constater à quel point il est facile d'en faire son reverse engineering et d'identifier les validations effectuées côté client. Puis grâce au framework de hooking Xposed, nous allons écrire un hook tenant en une seule ligne de code Java permettant de contourner le paiement. Enfin, nous verrons comment patcher le bytecode de l'application (afin d'y injecter le hook) pour être ensuite capable de la distribuer très facilement.
Pour conclure, des recommandations pratiques seront données pour se prémunir de ce genre de problème en utilisant Angry Birds comme exemple.
Speaker
Jeremy Matos (@SecuringApps) a travaillé dans le domaine de la sécurité logicielle depuis plus de 10 ans en Suisse Romande. Avec une formation académique de développeur, il a conçu et participé à l'implémentation d'une solution innovante d'authentification forte mobile.
Il a également effectué des revues de code et des audits sécurité pour des sociétés dont l'utilisateur interne était l'ennemi ou craignant pour leur réputation.
Il fournit désormais des services en sécurité applicative au sein de sa propre société. Il a présenté l'année dernière au Crypto Village de la DefCon un nouveau vecteur d'attaque contre les messageries mobiles chiffrées appelé Man In The Contacts.
Il enseigne également la sécurité logicielle et les technologies blockchain pour des formations d'ingénieur en Suisse et en France.
Meetup : https://www.meetup.com/JUGL-the-Java-User-Group-of-Lausanne/events/242895293/
YouTube : https://youtu.be/mSYuM-PrCaw
The Android NDK is a set of tools that allows the integration of native code (C/C++) in your Android app. In this presentation get know interesting usages of NDK, advantages and disadvantages, and how to stat using it with Android Studio.
Droidcon Greece '15 - Reverse Engineering in Android: Countermeasures and ToolsDario Incalza
Reverse Engineering (RE) is the art of taking an application apart and try to understand the internal mechanisms.
There’s a positive side and a negative side to this approach. The positive side is the fact that RE gives us a means to research and understand malware.
The negative side is that distributed binaries can be torn apart to look at intellectual property or to inject it with malicious code.
The talk will guide you through the Android app build process and learn some countermeasures to make it harder for hackers to reverse engineer your Android code. Further more the talk will cover opensource tools that you can use to reverse engineer Android applications to inspect it for malware.
People are leaving WhatsApp for Signal and Telegram. Privacy becomes important more than ever. Have we ever stepped back and rethought carefully how these applications handle end-users’ privacy? Is that a myth; a promise; or back-up by some scientific evidence? How can we, as an end-user, can verify and make sure these claims?
This presentation will explain the history of the development of Signal and Telegram; and how they handle user’s data privacy under the technical microscope.
Prerequisites: Some fundamental knowledge about cryptography: symmetric encryption; asymmetric encryption; public key; private key;
Consensus and Raft Algorithm in Distributed SystemThao Huynh Quang
A modern computing system requires multiple components distributed on different machines to provide scalability, high availability, fault tolerance, and low latency. Therefore, consensus is essential when communicating between nodes to agree on some data value required during computation.
There are many examples of consensus around our tooling:
- Google Chubby uses Paxos, which is a consensus algorithm.
- Kubernetes uses etcd as the backing store for all cluster data. Etcd uses Raft, which is a consensus algorithm.
- Hadoop; Kafka uses ZooKeeper for service discovery; leader’s election, ... ZooKeeper uses a Paxos-variant algorithm.
- Blockchain cannot exist without consensus algorithms such as Proof-of-work; Proof-of-stake; ...
As the result, knowledge of consensus in the distributed system is crucial to understand the behavior of those systems. This presentation will:
Brief introduction about the consensus; challenges and achieved result.
Raft algorithm - the main consensus algorithm used in most of the recent systems.
Some references to get our hand wet on this topic:
https://medium.com/@isuruboyagane.16/what-is-consensus-in-distributed-system-6d51d0802b8c
https://www.youtube.com/watch?v=5m3eBWKjHtM&ab_channel=HasgeekTV
Crystal clear service interfaces w/ Swagger/OpenAPIScott Triglia
Learn how to better communicate between Python services. We'll use simple-to-follow examples and go from a service with undocumented endpoints to one which has full docs and validation on requests. Learn how to use Swagger tooling for python, including the bravado (client) and pyramid_swagger (server) libraries. In the end, you'll (hopefully!) find nirvana and make the machines do all the hard work for you.
(Presentation at HITcon 2011) This talk introduces how to do Android application reverse engineering by real example. And, it covers the advanced topics like optimized DEX and JNI.
Metrics-Driven Devops: Delivering High Quality Software Faster! Dynatrace
Becoming the next Uber is only possible if you can deliver your code updates faster to your end users. But for your organization, does delivering code faster present a higher likelihood of failing faster?
Discover four metrics you should be tracking starting from your workstation all the way through CI and into Ops.
Learn how companies like Facebook, CreditOne, and others apply metric-driven DevOps.
See use cases of crashed rapid deployments and how they used the metrics to detect the root cause.
Learn how to apply these metrics to steer your pipeline to build better code and deploy faster, without failing faster!
Scale your Experimentation with Full Stack Best PracticesOptimizely
Are you struggling to go from 1 to 10 or from 100 to 1000 experiments? Optimizely Full Stack is a powerful tool, but knowing best practices for implementation is key to 10x-ing your experimentation program. In this workshop, we'll describe best practices like installing and wrapping the SDK, strategies for code footprint, and fitting a product experimentation culture into your team's process. Come learn how to best leverage Full Stack to scale your product experimentation program.
Building android apps with MVP, Dagger, Retrofit, Gson, JSON, Kotlin Data Cl...Hammad Tariq
Architect android apps with MVP, Dagger, Retrofit, Gson, JSON, Kotlin Data Classes and RecyclerView using Kotlin.
How to Convert JSON to Kotlin Data Classes.
Kotlin Retrofit Example with RecyclerView.
MVP Android using Kotlin project structure.
Kotlin Android Dagger2 Tutorial.
How to use GSON serialization for JSON response in Kotlin.
Find More on:
http://developine.com/building-android-mvp-app-in-kotlin-using-dagger-retrofit/
And
http://developine.com/
Reverse engineering Java et contournement du mécanisme de paiement inapp AndroidJUG Lausanne
Session du 28 Septembre 2017
Android fournit une API Java pour la facturation d'achats in-app, permettant aux développeurs de vendre des fonctionnalités supplémentaires directement depuis l'application. Ce mécanisme est très souvent utilisé dans les jeux pour acheter des crédits donnant accès à du contenu supplémentaire, des bonus, etc ... Mais l'intégration du paiement est souvent mal comprise: on ne peut pas faire confiance au code tournant sur le smartphone. Ainsi, toutes les vérifications et l'obtention du contenu doivent s'effectuer côté serveur. Comme ce n'est pas très clair dans la documentation de Google, beaucoup de jeux continuent de faire la gestion côté client.
Nous allons exploiter une véritable application Android du Playstore pour obtenir des crédits gratuits. Et constater à quel point il est facile d'en faire son reverse engineering et d'identifier les validations effectuées côté client. Puis grâce au framework de hooking Xposed, nous allons écrire un hook tenant en une seule ligne de code Java permettant de contourner le paiement. Enfin, nous verrons comment patcher le bytecode de l'application (afin d'y injecter le hook) pour être ensuite capable de la distribuer très facilement.
Pour conclure, des recommandations pratiques seront données pour se prémunir de ce genre de problème en utilisant Angry Birds comme exemple.
Speaker
Jeremy Matos (@SecuringApps) a travaillé dans le domaine de la sécurité logicielle depuis plus de 10 ans en Suisse Romande. Avec une formation académique de développeur, il a conçu et participé à l'implémentation d'une solution innovante d'authentification forte mobile.
Il a également effectué des revues de code et des audits sécurité pour des sociétés dont l'utilisateur interne était l'ennemi ou craignant pour leur réputation.
Il fournit désormais des services en sécurité applicative au sein de sa propre société. Il a présenté l'année dernière au Crypto Village de la DefCon un nouveau vecteur d'attaque contre les messageries mobiles chiffrées appelé Man In The Contacts.
Il enseigne également la sécurité logicielle et les technologies blockchain pour des formations d'ingénieur en Suisse et en France.
Meetup : https://www.meetup.com/JUGL-the-Java-User-Group-of-Lausanne/events/242895293/
YouTube : https://youtu.be/mSYuM-PrCaw
The Android NDK is a set of tools that allows the integration of native code (C/C++) in your Android app. In this presentation get know interesting usages of NDK, advantages and disadvantages, and how to stat using it with Android Studio.
Droidcon Greece '15 - Reverse Engineering in Android: Countermeasures and ToolsDario Incalza
Reverse Engineering (RE) is the art of taking an application apart and try to understand the internal mechanisms.
There’s a positive side and a negative side to this approach. The positive side is the fact that RE gives us a means to research and understand malware.
The negative side is that distributed binaries can be torn apart to look at intellectual property or to inject it with malicious code.
The talk will guide you through the Android app build process and learn some countermeasures to make it harder for hackers to reverse engineer your Android code. Further more the talk will cover opensource tools that you can use to reverse engineer Android applications to inspect it for malware.
People are leaving WhatsApp for Signal and Telegram. Privacy becomes important more than ever. Have we ever stepped back and rethought carefully how these applications handle end-users’ privacy? Is that a myth; a promise; or back-up by some scientific evidence? How can we, as an end-user, can verify and make sure these claims?
This presentation will explain the history of the development of Signal and Telegram; and how they handle user’s data privacy under the technical microscope.
Prerequisites: Some fundamental knowledge about cryptography: symmetric encryption; asymmetric encryption; public key; private key;
Consensus and Raft Algorithm in Distributed SystemThao Huynh Quang
A modern computing system requires multiple components distributed on different machines to provide scalability, high availability, fault tolerance, and low latency. Therefore, consensus is essential when communicating between nodes to agree on some data value required during computation.
There are many examples of consensus around our tooling:
- Google Chubby uses Paxos, which is a consensus algorithm.
- Kubernetes uses etcd as the backing store for all cluster data. Etcd uses Raft, which is a consensus algorithm.
- Hadoop; Kafka uses ZooKeeper for service discovery; leader’s election, ... ZooKeeper uses a Paxos-variant algorithm.
- Blockchain cannot exist without consensus algorithms such as Proof-of-work; Proof-of-stake; ...
As the result, knowledge of consensus in the distributed system is crucial to understand the behavior of those systems. This presentation will:
Brief introduction about the consensus; challenges and achieved result.
Raft algorithm - the main consensus algorithm used in most of the recent systems.
Some references to get our hand wet on this topic:
https://medium.com/@isuruboyagane.16/what-is-consensus-in-distributed-system-6d51d0802b8c
https://www.youtube.com/watch?v=5m3eBWKjHtM&ab_channel=HasgeekTV
Consensus and Raft algorithm (Vietnamese version)Thao Huynh Quang
Giới thiệu tổng quan về bài toán đồng thuận trong hệ thống phân tán: Two General Problem; FLP;...
Trình bày về thuật toán Raft:
- Leader election
- Log Replication
- Safety property
Các paper / blog ... tham khảo.
- Discuss Java pros and cons
- Kool features in Kotlin.
- How to use Kotlin in Android development.
- How to migrate old Android java code to new Kotlin code.
Designed and presented by Telco internships.
- Explain all basic components in Git: commit, commit hash, branch, git logs, reflogs ...
- Explain some common use operations and the differences between them: merge, rebase, revert, reset, pull, push ...
- How to use GitHub in daily work.
- Discuss the Android Jetpack: New Android libraries officially developed by Google.
- Discuss the Room persistence library in Jetpack. How does Room library help developer life easier when working with databases.
This presentation gives audiences a broad viewpoint from old to modern architecture. How Kubernetes and service mesh (istio) can help developers in those missions:
- Explain from traditional to modern architecture. The role of Kubernetes in modern architecture.
- Build basic k8s components from the ground up with illustrations: Pod; Node; Service; ReplicaSet; Deployment; Namespace; Ingress ...
- Kubernetes under the developer viewpoint: write a YAML application file and deploy k8s application to the cluster.
- Kubernetes advanced concepts: master node design, how does the auto-scale for pods/nodes work, Kubernetes networking model.
- Discuss microservice challenges. The role of the service mesh in the microservice ecosystem.
- Introduce Envoy, istio and their application in the service mesh.
This presentation introduces every aspects of the Kafka ecosystem:
- Concepts: explain all misleading concepts such as topic vs partition vs replication, producer vs consumer vs consumer group, group leader vs group coordinator, ...
- Advanced concepts: delivery semantic; idempotent producers; isolation levels; differences between the offsets such as High Watermark, Log End Offset, Last Stable Offset ...
- Kafka architecture: explain all Kafka components such as brokers, controllers, zookeeper, ...
- Overview of Kafka security: TLS/SSL, SASL, Kerberos, ...
- Overview of Kafka ecosystem: Kafka Stream, Kafka Connect, Schema Registry, monitoring tools.
- Kafka in Golang: How to use Kafka client in Golang.
- Comparison with other message queues such as RabbitMQ.
This is the short presentation of how does the theorem works at a high level.
This presentation introduces Metamask, Infura, Etherscan, ... and how those systems interact with smart contracts.
- Discuss coroutines and channels in modern architecture.
- Concurrency vs Parallelism with real-world examples.
- Simple to advanced concurrency patterns in Kotlin.
- Discuss the role of Observability (Logging; Tracing; and Metric) in modern architecture.
- How to implement observability in Golang using OpenCensus.
- The 4 golden signals when designing the metrics.
- How to apply observability into the process.
Most developers are familiar with making network requests using RESTFUL APIs. However, there are some disadvantages to this approach: very coupling between the backend and the client. For instance, they must communicate back with the backend team when a mobile client wants to change or add some fields to the response. The time for discussions among teams and service deployment might delay project deadlines, hence affecting business opportunities. This topic will discuss the newer approach, GraphQL, and how to apply libraries to the Android world to solve this problem.
- Discussion about client server communication such as JSON/SOAP and RPC.
- Advantages/Disadvantages of GRPC in micro service, developing application ...
- How to apply GRPC in Android application. Providing source code for both client and server side.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Modern design is crucial in today's digital environment, and this is especially true for SharePoint intranets. The design of these digital hubs is critical to user engagement and productivity enhancement. They are the cornerstone of internal collaboration and interaction within enterprises.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
19. Android bytecode datatype
V Void
Z Boolean
B byte
S short
C char
I int
J long (64 bits)
F Kloat
D double (64 bits)
Lpackage1/package2/className;
package com.hqt.model;
class Person {
}
20. Android bytecode datatype
V Void
Z Boolean
B byte
S short
C char
I int
J long (64 bits)
F Kloat
D double (64 bits)
Lpackage1/package2/className;
package com.hqt.model;
class Person {
}
Lcom/hqt/model/Person;
21. Android bytecode datatype
V Void
Z Boolean
B byte
S short
C char
I int
J long (64 bits)
F Kloat
D double (64 bits)
Lpackage1/package2/className;
package com.hqt.model;
class Person {
}
Lcom/hqt/model/Person;
22. Android bytecode datatype
V Void
Z Boolean
B byte
S short
C char
I int
J long (64 bits)
F Kloat
D double (64 bits)
Lpackage1/package2/ className;
package com.hqt.model;
class Person {
}
Lcom/hqt/model/ Person;
47. calcButton.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View view) {
int firstNumber = Integer.parseInt(firstNumberText.getText().toString());
int secondNumber = Integer.parseInt(secondNumberText.getText().toString());
ICalc calc = new CalcImpl();
int result = calc.sum(firstNumber, secondNumber);
resultText.setText(result + "");
}
});
48. calcButton.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View view) {
int firstNumber = Integer.parseInt(firstNumberText.getText().toString());
int secondNumber = Integer.parseInt(secondNumberText.getText().toString());
ICalc calc = new CalcImpl();
int result = calc.sum(firstNumber, secondNumber);
resultText.setText(result + "");
}
});
49. calcButton.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View view) {
int firstNumber = Integer.parseInt(firstNumberText.getText().toString());
int secondNumber = Integer.parseInt(secondNumberText.getText().toString());
ICalc calc = new CalcImpl();
int result = calc.sum(firstNumber, secondNumber);
resultText.setText(result + "");
}
});
public interface ICalc {
int sum(int first, int second);
}
50. calcButton.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View view) {
int firstNumber = Integer.parseInt(firstNumberText.getText().toString());
int secondNumber = Integer.parseInt(secondNumberText.getText().toString());
ICalc calc = new CalcImpl();
int result = calc.sum(firstNumber, secondNumber);
resultText.setText(result + "");
}
});
public interface ICalc {
int sum(int first, int second);
}
public class CalcImpl implements ICalc {
@Override
public int sum(int first, int second) {
return first + second;
}
}