"Are Drones our best friends?" by Nicola Marietti
Close to 4.3 million drones were shipped worldwide in 2015, and with each drone sold, the risk of 'bad-drone' abuse increases. During those years unexpected convergent consequences explode onto the drone scene at once .A drone is an aerial robot that can be controlled remotely or autonomously, drones are now effective data gathering platforms, Computer vision, sense-and-avoid and optical tracking become standard in consumer drones. Are we safe from a little drone attack? How we can defend our site from this new threat. Security solutions are the big new deal the next future.
Insight into an Emerging Technology: Commercial DronesFoiz Rahman
The idea of using civil or commercial drones is relatively new. The usage of drones in various purposes in everyday life is being discovered and the usage is gradually expanding. This report mainly focuses on civil drones with an insight into the technology, usage and future prospects.
Drones and their Increasing Number of ApplicationsJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how drones are becoming economic feasible for an increasing number of applications as their costs fall. The costs of drones are falling as the costs of various ICs (controllers, GPS) and MEMS sensors rapidly fall, their performance rises (e.g., accuracy of GPS) and as the cost of carbon fibers fall at a somewhat slower pace than do ICs and MEMS. These falling costs are making drones economically feasible for a number of applications such as producing movies, TV reporting, surveillance, and delivery.
Class presentation discussing the economic impact of drones as well as what kind of drone technology companies are implementing or planning on implementing.
Session to introduce Rakuten Drone project, and to explain Rakuten’s approach towards emerging Drone technology.
The session will cover both general information about drone industry like regulation issues, and more detail information about
our new technology behind Sora Raku service, which was held at Camel Golf Course held in May
https://tech.rakuten.co.jp/
Real estate agents are using drones themselves or hiring third party vendors to take drone footage, either of these meets the definition of "commercial purpose." What are the FAA rules surrounding this new issue?
Insight into an Emerging Technology: Commercial DronesFoiz Rahman
The idea of using civil or commercial drones is relatively new. The usage of drones in various purposes in everyday life is being discovered and the usage is gradually expanding. This report mainly focuses on civil drones with an insight into the technology, usage and future prospects.
Drones and their Increasing Number of ApplicationsJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how drones are becoming economic feasible for an increasing number of applications as their costs fall. The costs of drones are falling as the costs of various ICs (controllers, GPS) and MEMS sensors rapidly fall, their performance rises (e.g., accuracy of GPS) and as the cost of carbon fibers fall at a somewhat slower pace than do ICs and MEMS. These falling costs are making drones economically feasible for a number of applications such as producing movies, TV reporting, surveillance, and delivery.
Class presentation discussing the economic impact of drones as well as what kind of drone technology companies are implementing or planning on implementing.
Session to introduce Rakuten Drone project, and to explain Rakuten’s approach towards emerging Drone technology.
The session will cover both general information about drone industry like regulation issues, and more detail information about
our new technology behind Sora Raku service, which was held at Camel Golf Course held in May
https://tech.rakuten.co.jp/
Real estate agents are using drones themselves or hiring third party vendors to take drone footage, either of these meets the definition of "commercial purpose." What are the FAA rules surrounding this new issue?
As technology evolves, society changes to adapt and incorporate the new technology into people's daily lives. Drones are a fairly new innovative technology that companies like Verizon and Amazon are trying to incorporate in their products. However, are drones evolving too fast where unethical practices will arise?
Ben Sheehy discusses how both Amazon and Google continue to push forward with plans for one day offering an unmanned delivery service. This service, which would use drones, is not currently permitted by FAA regulations. Google and Amazon have been testing their drones overseas and are looking at whether it is a viable option in the United States.
Drone use by firefighters isn't really new, departments all over have been using drones to assist in putting out fires for several years. While it is true that irresponsible use of UAVs is a major problem for fire departments, the responsible use of this technology can also be greatly beneficial to firefighting efforts – see how drones are being used for firefighting.
Drone Aviation Holding Corp. (DAHC) provides critical aerial and land based surveillance and communications solutions to government and commercial customers.
Internet of Civil Unmanned Aerial Systems: Challenges and Opportunities (by J...TUS Expo
At TUS Nordics 2017, Jie Jin gave the keynote presentation ‘Internet of Civil Unmanned Aerial Systems: Challenges and Opportunities’ on Thursday 12 October 2017.
Commercial Drones - Technology & Industry AnalysisSudhir Manchanda
Unmanned Aerial Vehicles have long been used in armed forces. Now that they are at the cusp of commercial applications, let's get a sense of the technology, industry, leading startups and business applications that they are trying to build for!
Geo Sense Unmanned Aerial Mapping ServicesIsmail Ibrahim
Geo Sense is a private company, collaborating with Iskandar Malaysia Research Center under Universiti Teknologi Malaysia. Has been providing service in taking high res aerial mapping using glider based unmanned aerial vehicle. The high resolution aerial image is a premium geo data to support mapping and project monitoring purposes. more info about geosense at www.geosense.com.my
A brief discussion about Drones 0r Quadcopters. A drone is a as simple as robot but works in air. It follows your commands as you want to. So, it is pdf format. If you want to edit and make some research on it, Ask me anytime.
P.S It is in pdf because, ppt don't embedd fonts.
Drones are a different kind of new technology from what we’re used to. They offer something else: the conquest of physical space, the extension of society’s compass, the ability to be anywhere and see anything.
For the past few years, one of the most exciting class of gadgets on display has been drones. They got cheaper, lighter, and easier to use even as they became more powerful.
We believe 2015 is an important year for drones as they will change how brands interact with consumers in both advertising and events, and here's everything you need to know about the drone technology.
"The road to Ember.js 2.0" by Lucio Grenzi
Why should I use Ember.js? JavaScript MVC frameworks are plentiful. In this presentation I will give you some compelling reasons to consider Ember,and the the new parts coming from the upcoming version 2.0. Different from other framework the new vesion does not brings a far new world because the dev team has planned continuos releases in order to improve backward compatibility. But there are new parts, like in React, the "virtual DOM" to improve performance. In this talk I will go through the new parts of EmberJS 2.0
As technology evolves, society changes to adapt and incorporate the new technology into people's daily lives. Drones are a fairly new innovative technology that companies like Verizon and Amazon are trying to incorporate in their products. However, are drones evolving too fast where unethical practices will arise?
Ben Sheehy discusses how both Amazon and Google continue to push forward with plans for one day offering an unmanned delivery service. This service, which would use drones, is not currently permitted by FAA regulations. Google and Amazon have been testing their drones overseas and are looking at whether it is a viable option in the United States.
Drone use by firefighters isn't really new, departments all over have been using drones to assist in putting out fires for several years. While it is true that irresponsible use of UAVs is a major problem for fire departments, the responsible use of this technology can also be greatly beneficial to firefighting efforts – see how drones are being used for firefighting.
Drone Aviation Holding Corp. (DAHC) provides critical aerial and land based surveillance and communications solutions to government and commercial customers.
Internet of Civil Unmanned Aerial Systems: Challenges and Opportunities (by J...TUS Expo
At TUS Nordics 2017, Jie Jin gave the keynote presentation ‘Internet of Civil Unmanned Aerial Systems: Challenges and Opportunities’ on Thursday 12 October 2017.
Commercial Drones - Technology & Industry AnalysisSudhir Manchanda
Unmanned Aerial Vehicles have long been used in armed forces. Now that they are at the cusp of commercial applications, let's get a sense of the technology, industry, leading startups and business applications that they are trying to build for!
Geo Sense Unmanned Aerial Mapping ServicesIsmail Ibrahim
Geo Sense is a private company, collaborating with Iskandar Malaysia Research Center under Universiti Teknologi Malaysia. Has been providing service in taking high res aerial mapping using glider based unmanned aerial vehicle. The high resolution aerial image is a premium geo data to support mapping and project monitoring purposes. more info about geosense at www.geosense.com.my
A brief discussion about Drones 0r Quadcopters. A drone is a as simple as robot but works in air. It follows your commands as you want to. So, it is pdf format. If you want to edit and make some research on it, Ask me anytime.
P.S It is in pdf because, ppt don't embedd fonts.
Drones are a different kind of new technology from what we’re used to. They offer something else: the conquest of physical space, the extension of society’s compass, the ability to be anywhere and see anything.
For the past few years, one of the most exciting class of gadgets on display has been drones. They got cheaper, lighter, and easier to use even as they became more powerful.
We believe 2015 is an important year for drones as they will change how brands interact with consumers in both advertising and events, and here's everything you need to know about the drone technology.
"The road to Ember.js 2.0" by Lucio Grenzi
Why should I use Ember.js? JavaScript MVC frameworks are plentiful. In this presentation I will give you some compelling reasons to consider Ember,and the the new parts coming from the upcoming version 2.0. Different from other framework the new vesion does not brings a far new world because the dev team has planned continuos releases in order to improve backward compatibility. But there are new parts, like in React, the "virtual DOM" to improve performance. In this talk I will go through the new parts of EmberJS 2.0
"Commodore 64 Mon Amour" by Andrea Ferlito.
Cosa succede se dopo 30 anni riprendi in mano un vecchio listato assembly? E' quello che racconterò in questo speech. Utilizzando come esempio un piccolo platform a livelli capiremo come si progettava e si scriveva un videogioco negi anni 80 e quali possono essere gli strumenti che oggi ci permettono di farlo ancora semplificandoci, e non poco, la vita. Un minimo di conoscenza del linguaggio assembly del 6510 sarebbe opportuno.
"Let's go HTTPS" by Simone Carletti
HTTPS has gone mainstream and nowadays it's a good practice to serve a website via HTTPS. However, simply installing a TLS/SSL certificate may not be not enough to stay secure. It's important to understand how HTTPS works and how to configure it properly. In this talk we'll take a look at different types of SSL certificates, along with how to obtain a trusted SSL certificate and install it on the most common web servers/PaaS. Finally, we'll discuss the best practices surrounding HTTPS, including the HSTS headers, public key pinning, and common pitfalls such as the mixed security error.
For the full video of this presentation, please visit:
http://www.embedded-vision.com/platinum-members/qualcomm/embedded-vision-training/videos/pages/may-2016-embedded-vision-summit-talluri
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Raj Talluri, Senior Vice President of Product Management at Qualcomm Technologies, presents the "Is Vision the New Wireless?" tutorial at the May 2016 Embedded Vision Summit.
Over the past 20 years, digital wireless communications has become an essential technology for many industries, and a primary driver for the electronics industry. Today, computer vision is showing signs of following a similar trajectory. Once used only in low-volume applications such as manufacturing inspection, vision is now becoming an essential technology for a wide range of mass-market devices, from cars to drones to mobile phones. In this presentation, Talluri examines the motivations for incorporating vision into diverse products, presents case studies that illuminate the current state of vision technology in high-volume products, and explores critical challenges to ubiquitous deployment of visual intelligence.
Refactoring to a Single Page ApplicationCodemotion
"Refactoring to a Single Page Application" by Marcello Teodori
In origine era il monolite. Spesso dietro una startup web di successo c'è un'applicazione in tecnologia singola (Java, Rails, ecc.) che cresce finché fatica a scalare all'aumentare degli utenti e con essa il relativo processo di sviluppo all'aumentare degli sviluppatori. Sul back-end una strategia consolidata è suddividere progressivamente il monolite in microservice. Per il front-end la soluzione duale è estrarre gradualmente il codice HTML, CSS e JavaScript in una Single Page Application, applicando diverse tecniche come quelle maturate durante la mia esperienza in Workshare.
SMPS Build Business 2016 - Attack of the Drones! Adopting Disruptive TechnologyNathan C. Wood
Drones, laser scanning, and the cloud … OH MY! The technology revolution is happening in the A/E/C industry but are we prepared for it? Do we even know how it works? While the bells and whistles look awesome and our clients are amazed by what the technology can do, a major hurdle for firms is “people-first innovation”. Companies are not properly educated on how to capture the return on investment when it comes to cutting-edge technology. This session will discuss the risk associated with innovative technology, how marketing and business development can utilize the data to be client-centric, and how to get leadership on board with an implementation plan.
Serene 2015
Davide Scaramuzza
Abstract: With drones becoming more and more popular, safety is a big concern. A critical situation occurs when a drone temporarily loses its GPS position information, which might lead it to crash. This can happen, for instance, when flying close to buildings where GPS signal is lost. In such situations, it is desirable that the drone can rely on fall-back systems and regain stable flight as soon as possible. In this talk, I will present novel methods to automatically recover and stabilize a quadrotor from any initial condition or execute emergency landing. On the one hand, this new technology will allow quadrotors to be launched by simply tossing them in the air, like a “baseball ball”. On the other hand, it will allow them to recover back into stable flight or land on a safe area after a system failure. Since this technology does not rely on any external infrastructure, such as GPS, it enables the safe use of drones in both indoor and outdoor environments. Thus, it can become relevant for commercial use of drones, such as parcel delivery.
Recent videos:
Automatic failure recovery without GPS: https://youtu.be/pGU1s6Y55JI
Autonomous Landing-site detection and landing: https://youtu.be/phaBKFwfcJ4
Drones: The Insurance Industry's Next Game-Changer?Cognizant
Drones promise to be the next disruptive technology -- poised to dramatically alter how industry sectors, including property and casualty insurers, conduct business. Drones have the potential to streamline and reduce the cost of insurance-related processes, including claims adjustment, risk-engineering, post-catastrophe claims settlements and weeding out fraudulent agricultural claims.
As drones continue to advance in capabilities
and come into wider and wider use by both
legitimate users and by malicious actors, it is
essential that law enforcement, corrections,
security and military professionals increase
their levels of knowledge and preparedness
regarding drone threats, including the art
and science of drone forensics.
The Rise of Anti-Drone Technology: A Look at Drone JammersNovoQuad
By blocking signals, drone signal jammers keep people safe and stop possible dangers and illegal drone activities. Here, we will now go into more detail about drone signal jammers.
Firewalls have proved to be ineffective for cyber-security. Instead, a new category of security applications has emerged which learn from the criminal behavior of intruders and use data in combination with deception to trap hackers.
Understanding the Functionalities of the Anti-Drone Systems.pdfNovoQuad
The ideal solution is to rely on anti-drone systems to counter threats and enhance airspace security. Here, you will explore the top functionalities of counter-drone systems.
Presentation “Protecting the Energy Supply Chain – From Cyber Attacks to Drones”
The presentation is about cyber and physical protection of sustainable supply chain management and the need for advanced risk analytics.
The presentation was given by Thomas Zakrzewski in Dubai at GITEX in 2020. Issues of supply chain management still make headlines in 2022 and are expected to stay top of the minds of the C-suite for foreseeable future.
Internet of Things ( IoT ) will be all in the future, are we ready for this 4th revolution ? My presentation will show the main topics regarging IoT, including the history, the applications and some arguments behind it, including criticism and controversies.
Here are some of the best guesses about what we will see in 2017 from several dozen vendors and analysts. There are many more than 15 predictions out there, of course, but these are the ones we heard most frequently.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
IBM X-Force Threat Intelligence Quarterly,
4Q 2014
Get a closer look at today’s security risks—from new threats arising from within the
Internet of Things, to the sources of malware and botnet infections.
IoT Internet of Things , represents many kinds of devices in the field, connected to data centres via various networks, submitting data, and allow themselves to be controlled. Connected cameras, TV, media players, access control systems, and wireless sensors are becoming pervasive. Their applications include Retail Solutions, Home, Transportation and Automotive, Industrial and Energy etc. This growth also represents security threat, as several hacker attacks been launched using these devices as agents. We explore the current environment and propose a quantitative and qualitative trust model, using a multi dimensional exploration space, based on the hardware and software stack. This can be extended to any combination of IoT devices, and dynamically updated as the type of applications, deployment environment or any ingredients change. Karthik MV "Trust Modelling for Security of IoT Devices" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31573.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31573/trust-modelling-for-security-of-iot-devices/karthik-mv
Drones and the Internet of Things: realising the potential of airborne comput...Prayukth K V
This paper focuses on services and applications provided to mobile users using airborne computing infrastructure. Concepts such as drones-as-a-service and flyin,fly-out
infrastructure, and note data management and system
design issues that arise in these scenarios are discussed. Issues of Big Data arising from such applications, optimising the configuration of airborne and ground infrastructure to provide the best QoS and QoE, situation-awareness, scalability, reliability, scheduling for efficiency, interaction with users and drones using physical annotations are outlined.
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
Increased complexity makes it very hard and time-consuming to keep your software bug-free and secure. We introduce fuzz-testing as a method for automatically and continuously discovering vulnerabilities hidden in your code. The talk will explain how fuzzing works and how to integrate fuzz-testing into your Software Development Life Cycle to increase your code’s security.
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
It was 1993 when we decided to venture in a beat'em up game for Amiga. The Catalypse's success story pushed me and my comrade to create something astonishing for this incredible game machine... but things went harder, assumptions were slightly different, and italian competitors appeared out of nowhere... the project died in 1996. Story ended? Probably not...
Il Commodore 65 è un prototipo di personal computer che Commodore avrebbe dovuto mettere in commercio quale successore del Commodore 64. Purtroppo la sua realizzazione si fermò appunto allo stadio prototipale. Racconterò l'affascinante storia del suo sviluppo ed il perchè della soppressione del progetto ormai ad un passo dalla immissione in commercio.
Rivivere l'ebbrezza di progettare un vecchio computer o una consolle da bar è oggi possibile sfruttando le FPGA, ovvero logiche programmabili che consentono a chiunque di progettare il proprio hardware o di ricrearne uno del passato. In questa sessione si racconta come dal reverse engineering dell'hardware di vecchie glorie come il Commodore 64 e lo ZX Spectrum sia stato possibile farle rivivere attraverso tecnologie oggi alla portata di tutti.
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Codemotion
There's a lot of talk about blockchain, but how does the technology behind it actually work? For developers, getting some hands-on experience is the fastest way to get familiair with new technologies. So let's build a blockchain, then! In this session, we're going to build one in plain old Java, and have it working in 40 minutes. We'll cover key concepts of a blockchain: transactions, blocks, mining, proof-of-work, and reaching consensus in the blockchain network. After this session, you'll have a better understanding of core aspects of blockchain technology.
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Codemotion
When was the last time you were truly lost? Thanks to the maps and location technology in our phones, a whole generation has now grown up in a world where getting lost is truly a thing of the past. Location technology goes far beyond maps in the palm of our hand, however. In this talk, we will explore how a ridesharing app works. How do we discover our destination?How do we find the closest driver? How do we display this information on a map? How do we find the best route?To answer these questions,we will be learning about a variety of location APIs, including Maps, Positioning, Geocoding etc.
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Codemotion
Eward Driehuis, SecureLink's research chief, will guide you through the bumpy ride we call the cyber threat landscape. As the industry has over a decade of experience of dealing with increasingly sophisticated attacks, you might be surprised to hear more attacks slip through the cracks than ever. From analyzing 20.000 of them in 2018, backed by a quarter of a million security events and over ten trillion data points, Eward will outline why this happens, how attacks are changing, and why it doesn't matter how neatly or securely you code.
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 - Codemotion
IoT revolution is ended. Thanks to hardware improvement, building an intelligent ecosystem is easier than never before for both startups and large-scale enterprises. The real challenge is now to connect, process, store and analyze data: in the cloud, but also, at the edge. We’ll give a quick look on frameworks that aggregate dispersed devices data into a single global optimized system allowing to improve operational efficiency, to predict maintenance, to track asset in real-time, to secure cloud-connected devices and much more.
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Codemotion
What if Virtual Reality glasses could transform your environment into a three-dimensional work of art in realtime in the style of a painting from Van Gogh? One of the many interesting developments in the field of Deep Learning is the so called "Style Transfer". It describes a possibility to create a patchwork (or pastiche) from two images. While one of these images defines the the artistic style of the result picture, the other one is used for extracting the image content. A team from TNG Technology Consulting managed to build an AI showcase using OpenCV and Tensorflow to realize such goggles.
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
Blockchain (and Cryptocurrency) is an evolution of 20-year old research from scientists like Chaum, Lamport, and Castro & Liskov. Due to the current hype, it's hard to distinguish beneficial aspects of the technology from a desire for a "silver bullet" for device security, verifiable logistics, or "saving democracy". The problem: blockchain introduces new security challenges - and blind adoption without understanding reduces overall security. In this talk, Melanie Rieback and Klaus Kursawe explain the pitfalls and limits of blockchain, so you can avoid making your applications LESS secure.
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Codemotion
Networking is a core part of computing in the digital world we inhabit. But, how well do you know how it works? Do you understand all the moving parts of the OSI stack inside your computer, and how the network is actually put together? How can this ever work? This guided safari of layers, standards, protocols, and happenstance will bring us close to the copper wire, and up through the layers of CDMA/CD, ARP, routing and HTTP. We will make a few excursions through patchworks that still work forty years later, and cleverly designed mechanisms that show that simplicity is the only way to last.
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Codemotion
Performance tests are not only an important instrument for understanding a system and its runtime environment. It is also essential in order to check stability and scalability – non-functional requirements that might be decisive for success. But won't my cloud hosting service scale for me as long as I can afford it? Yes, but… It only operates and scales resources. It won't automatically make your system fast, stable and scalable. This talk shows how such and comparable questions can be clarified with performance tests and how DevOps teams benefit from regular test practise.
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Codemotion
Sascha will demonstrate the opportunities and challenges of Conversational AI learned from the practice. Both Technology and User Experience will be covered introducing a process finding micro-moments, writing happy paths, gathering intents, designing the conversational flow, and finally publishing on almost all channels including Voice Services and Chatbots. Valuable for enterprises, developers, and designers. All live on stage in just minutes and with almost no code.
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Codemotion
A key challenge we face at Pacmed is quickly calibrating and deploying our tools for clinical decision support in different hospitals, where data formats may vary greatly. Using Intensive Care Units as a case study, I’ll delve into our scalable Python pipeline, which leverages Pandas’ split-apply-combine approach to perform complex feature engineering and automatic quality checks on large time-varying data, e.g. vital signs. I’ll show how we use the resulting flexible and interpretable dataframes to quickly (re)train our models to predict mortality, discharge, and medical complications.
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Codemotion
Coolblue is a proud Dutch company, with a large internal development department; one that truly takes CI/CD to heart. Empowerment through automation is at the heart of these development teams, and with more than 1000 deployments a day, we think it's working out quite well. In this session, Pat Hermens (a Development Managers) will step you through what enables us to move so quickly, which tools we use, and most importantly, the mindset that is required to enable development teams to deliver at such a rapid pace.
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
Quantum computers can use all of the possible pathways generated by quantum decisions to solve problems that will forever remain intractable to classical compute power. As the mega players vie for quantum supremacy and Rigetti announces its $1M "quantum advantage" prize, we live in exciting times. IBM-Q and Microsoft Q# are two ways you can learn to program quantum computers so that you're ready when the quantum revolution comes. I'll demonstrate some quantum solutions to problems that will forever be out of reach of classical, including organic chemistry and large number factorisation.
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Codemotion
Chinese food exploded across America in the early 20th century, rapidly adapting to local tastes while also spreading like wildfire. How was it able to spread so fast? The GY6 is a family of scooter engines that has achieved near total ubiquity in Europe. It is reliable and cheap to manufacture, and it's made in factories across China. How are these factories able to remain afloat? Chinese-American food and the GY6 are both riveting studies in product-market fit, and both are the product of a distributed open source-like development model. What lessons can we learn for open source software?
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Codemotion
The design space has exploded in size within the last few years and Sketch is one of the most important milestones to represent the phenomenon. But behind the scenes of this growing reality there is a remote team that revolutionizes the design space all without leaving the home office. This talk will present how Sketch has grown to become a modern, product designer's tool.
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Codemotion
Would you fly in a plane designed by a craftsman or would you prefer your aircraft to be designed by engineers? We are learning that science and empiricism works in software development, maybe now is the time to redefine what “Software Engineering” really means. Software isn't bridge-building, it is not car or aircraft development either, but then neither is Chemical Engineering. Engineering is different in different disciplines. Maybe it is time for us to begin thinking about retrieving the term "Software Engineering" maybe it is time to define what our "Engineering" discipline should be.
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Codemotion
What is the job of a CTO and how does it change as a startup grows in size and scale? As a CTO, where should you spend your focus? As an engineer aspiring to be a CTO, what skills should you pursue? In this inspiring and personal talk, I describe my journey from early Red Hat engineer to CTO at Bloomon. I will share my view on what it means to be a CTO, and ultimately answer the question: Should the CTO be coding?
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
4. This is what happens when different exponential
technologies all explode onto the scene at once
An expert might be reasonably good at predicting
the growth of a single exponential technology (e.g.,
3D printing), but
Try to predict the future when AI, robotics, VR, IoT
and computation are all doubling, morphing and
recombining.
7. A drone is an aerial robot that can be controlled remotely or
autonomously.
Over the past few years, a technological tipping point, driven by the
smartphone electronics industry, has demonetized the price of drones and
democratized their use for everyone.
The cost of MEMs, accelerometers and gyroscopes have dropped 10 to 100-
fold at the same time that cheap and powerful microcontrollers enable low-
cost and powerful navigational control systems.
8. As a result, we now have drones that
everyone can use, and companies like
DJI, Parrot, 3D Robotics are enabling
both a consumer and entrepreneurial
drone renaissance
With the addition of next-generation
sensors and high bandwidth
communications, drones are now
effective data gathering platforms
used by the Construction, Agriculture,
Oil & Gas and Security industries.
10. 1 - Drones go into mainstream business
Over the past few years, drones have moved from the
"government phase" to the "consumer phase" into the
"commercial phase"
In the consumer phase, the drone was more toy than tool.
The video capabilities and simple flight interfaces made them
fun and accessible.
But more recently, these toys have been rapidly turning into
tools, and we're thinking of them now as
"sensors in the sky."
Top Recent Drone Breakthroughs: 2013 - 2015
11.
12.
13.
14. 1 - Drones go into mainstream business
It's like we forget about the drone.
Now, we are just connecting a sensor to the cloud and that
sensor's in the air.
It's below the satellites and above street view.
Top Recent Drone Breakthroughs: 2013 - 2015
15. With today's drones you get connectivity, you get the cloud, and if
you architect your system correctly, the drone is just an extension of
the Internet.”
When you distribute the computational task between these three
things (the drone, the cloud, and the Internet), you get a very
powerful platform that can do an extraordinary number of things.
think of it as extending the App Store into the sky!
Top Recent Drone Breakthroughs: 2013 - 2015
2. Consumer drones run distributed computation, running apps
on drone, phone and cloud simultaneously.
16. Drones are very powerful computing platforms.
They now have built-in, Linux-based, computer vision technology.
They look like toys (and you can use them as toys), but they're really flying AI
platforms, and this is just the beginning.
Right now we're doing 1 gigahertz but with these converging technologies,
we're going to be moving to multicore, multi-gigahertz GraphiCPUs, the works
and they're going to be selling for less than a thousand bucks.
Top Recent Drone Breakthroughs: 2013 - 2015
3. Powerful onboard Linux processors appear on sub-
$1,000 drones
17. Top Recent Drone Breakthroughs: 2013 - 2015
4. Prices for autonomous GPS-guided drones fall 50% (US $500),
go mass-market retail
Drones are demonetizing
rapidly.
Ten years ago, drones were
million-dollar
military/industrial things.
Today they are on the
shelves of Walmart. But it
didn't stop there...
18. So what's in store for the near future?
Here are predictions for the most exciting, disruptive developments coming in drone
technology over the next three years. As investors, these are the areas you should be
focusing on, as the business opportunities are tremendous.
Drones are powerful
Drones are avaiable
Drones are performing
19. Top Anticipated Drone Breakthroughs 2016 - 2018
The next big breakthrough in drone research will be sense-and-
avoid.
Right now, drones are either manually piloted or GPS piloted,
but as we integrate them into our urban fabric, they'll need
true autonomy.
Drones will need to have eyes.
Sensors like radar, LiDAR, stereo vision, sonar, and they'll need
to use this to autonomously avoid obstacles and fly.
It's environmental awareness and it is necessary to safely
navigate worlds they've never explored.
1. Computer vision, sense-and-avoid and optical tracking
20. Top Anticipated Drone Breakthroughs 2016 - 2018
2. Major software companies integrate drone data into core
offerings, taking "reality capture" mainstream
It's really hard to digitize the physical world!
Satellites are too high, and two-thirds of the planet's covered by clouds at
any given point in time.
Street View is limited to the street.
The way we're going to digitize the planet is by putting sensors out there on
drones, with anywhere/anytime access to the sky.
Once we do that, we'll create the biggest big data opportunity we've ever
seen.
Autodesk, Salesforce, ESRI, Google, etc. want to take that data and turn it
into analytics to track all kinds of things, like how things change.
21. Top Anticipated Drone Breakthroughs 2016 - 2018
3. Drones surpass satellites in amount of data gathered and used
A transition is happening!
Earth observation started in the space age with
satellites.
We're going to see drones become the main way that
we digitize the planet from the air thanks to the
avaiability of different sensors.
Satellites are going to be complimentary, covering big
areas but at lower resolution."
22. Both Amazon, Google, Facebook, Inter, Qualcomm have announced
their strategy in the drone industry.
23. View in the future
What might a standard drone look like, when we lifted all limits in the near future?
Presumably, this drone would be an autonomous flying machine - modular constructed,
equipped with a variety of sensors and tools, available in any sizes, incredibly fast, with
unimaginable capacity and boundless energy.
It could become an everyday part of our society.
25. There is hardly any other technology currently developing as fast as drone technology.
However, the increase in drone efficiency also means more opportunities to misuse them
for criminal purposes. When your airspace is exposed, no longer are fences, video cameras,
and security guards adequate to protect sensitive buildings or personal.
The drones (UAVs) are representing a new threat to the security system.
Detection of these drones has become an important factor for the maintenance of the
security.
The main drivers of this growth are increased security incidences by the unidentified
drones and use of drones for terrorist activities.
Drones = threat
Reasons Why
27. Latest Incidents:
USA: Drone intercepted near Maryland prison
USA: Drones are smuggler’s newest way into prison
AU: Drone's flying drugs into jail
DE: Smuggling items into jail
UK: Drone carries contraband into prison
Reasons Why
Drones = threat
29. Drones a Growing Threat to Network Security
http://www.lightreading.com/drones/drones-a-growing-threat-to-network-security/d/d-id/721225
It's just a matter of time before someone
is caught using drones to compromise the
security of communications networks.
Drones can fly undetected in places
people never had physical access to,
which puts every company at risk, from
data centers to financial institutions
Drones = threat
Reasons Why
30. Drones a Growing Threat to Network Security
http://www.lightreading.com/drones/drones-a-growing-threat-to-network-security/d/d-id/721225
One example shown at
last year's DefCon show is
a device called Aerial
Assault, a drone designed
to find and pinpoint the
location of (via GPS)
unsecured networks. The developers intend to
market it shortly at an
expected cost of $2,500.
31. At their core, drones are little more than computers that fly. At DEFCON, the large
hacker conference held annually in Las Vegas, David Jordan of Aerial Assault
revealed a drone that can swoop down and break into computer networks.
On board the drone, an ultra-cheap Raspberry Pi computer runs Kali Linux, an
aggressive cybersecurity diagnostic tool that looks for weaknesses in the systems it
attacks. Set up as a security testing tool, with some reconfiguring it could go from a
testing device to an actual weapon.
The Aerial Assault drone looks for unsecured networks, and using its onboard GPS it
records the locations of the targets and relays that information back to the remote
pilot. The pilot can then decide whether to use Kali Linux to, say, hack into the
network's servers.
http://www.lightreading.com/drones/drones-a-growing-threat-to-network-security/d/d-id/721225
Drones a Growing Threat to Network Security
32. using Wi-Fi and connecting to an unsecured network port on the
drone itself. With a simple text command, Satterfield, a
researcher, sends a hovering drone crashing to the ground.
Drone companies are not known for their cybersecurity finesse.
Twice at this year’s annual hacker conference DEFCON, presenters demonstrated hacks
on the Parrot drone.
33. Man arrested for landing 'radioactive' drone on Japanese Prime Minister's roof
The drone was discovered on the roof by an official, who was giving a tour of the
building to new employees.
Governments around the world are struggling with how to regulate the use of drones,
which are becoming increasingly sophisticated and affordable - Japan has set up a
taskforce to deal control the use of drones, in an effort to protect public buildings from
the security threat.
40-year old Yasuo Yamamoto turned himself in to police late on Friday night, claiming
he landed the drone on Prime Minister Shinzo Abe's roof in protest against the
Japanese government's nuclear energy policy.
Fukui is home to around a quarter of Japan's 48 nuclear reactors - all are offline after
the 2011 Fukushima disaster, but Mr Abe's government wants to restart as many of
the reactors as possible.
The small drone, which was equipped with a camera, was also carrying a plastic
bottle which Yamamoto says was filled with sand from Fukushima, where radiation
levels are still high after the tsunami-trigged meltdown of the Fukushima Dai-ichi
power plant
Saturday 25 April 2015
http://www.independent.co.uk/news/world/asia/man-arrested-for-landing-radioactive-drone-on-japanese-prime-ministers-roof-10203517.html
34. Anti-Drone Market by Technology (Laser System, Traditional
Kinetic System, Electronics System), Vertical (Military and
Defense, Commercial, Homeland Security), and Region (North
America, Europe, APAC, RoW) - Global Forecast to 2022
March 2016
The anti-drone market is expected to reach USD 1.14 Billion by 2022 and is expected to grow
at a CAGR of 23.89% between 2017 and 2022.
The key drivers responsible for this are increased security breach incidences by the
unidentified drones and increased terrorism and illicit activities.
The use of drones for border trespassing and smuggling has increased, thereby resulting into
border security concern. This is a key factor driving the demand for anti-drone systems in the
military and defense vertical.
http://www.researchandmarkets.com/research/c7t7wh/antidrone_market
35. Anti-Drone Market by Technology (Laser System, Traditional
Kinetic System, Electronics System), Vertical (Military and
Defense, Commercial, Homeland Security), and Region (North
America, Europe, APAC, RoW) - Global Forecast to 2022
March 2016
As the anti-drone system technology is fairly new in the market, the technologies used to
manufacture the anti-drone systems are not very popular. On the other hand, the market
players who are introducing these new technologies are planning to patent it. Moreover, the
cost incurred in research and development aspect is quite high due to the use of laser and
other costly technologies.
http://www.researchandmarkets.com/research/c7t7wh/antidrone_market
36. - Airbus Group SE
- Blighter Surveillance Systems
- DDC-LLC
- Dedrone GmbH
- Droneshield
- Israel Aerospace Industries
- Lockheed Martin Corporation
- Orelia
- Raytheon Company
- SAAB AB
- Selex Es S. P. A.
- Thales Group
- The Boeing Company
http://www.researchandmarkets.com/research/c7t7wh/antidrone_market
Anti-Drone Market by Companies