In JavaScript, events are blocked by currently executing code. Callbacks allow asynchronous code to be executed after the current execution thread is clear. Promises provide a standard way to manage asynchronous processes by sharing a communication object between the consumer and producer of asynchronous results. This avoids nested callbacks and makes error handling and composition easier.
1. JBoss Arquillian is a test framework that manages containers and deploys applications and tests to containers. It supports various container types and container adapters.
2. ShrinkWrap is used to bundle dependent classes and resources into deployable archives. The ShrinkWrap Resolver helps to resolve dependencies.
3. Arquillian Drone integrates WebDriver with Arquillian for browser interaction and testing. Arquillian Graphene provides Page Object and other support for WebDriver tests.
4. Arquillian Warp allows executing HTTP requests and server-side tests in the same request cycle. Arquillian Droidium provides Android testing support.
This document provides an introduction to JavaScript fundamentals and common patterns, jQuery optimization techniques, and an introduction to Node.js. It discusses JavaScript data types and variables, scoping, objects and classes. It also covers immediate execution functions, private patterns, event attaching in jQuery, and dependency management in Node.js projects. The document includes code examples for selecting elements and caching selectors in jQuery as well as creating an Express server and using middleware in Node.js applications.
Build a custom (micro)framework with ZF2 Components (as building blocks)Corley S.r.l.
This document discusses building a custom microframework with Zend Framework 2 components as building blocks. It describes using the Zend Framework 2 event manager and service manager as core components. The framework would follow an event-driven design and dependency inversion principle. Examples are provided of how to configure and use the event manager, service manager, router, hydrators and more. The goal is to have a testable framework while leveraging existing ZF2 components.
SecureSocial - Authentication for Play Frameworkjaliss
This document provides an overview and agenda for SecureSocial, an authentication module for Play!. It discusses main concepts like identity providers and user services. It covers installation, configuration, protecting actions, and customizing views. It also describes extending SecureSocial by creating new identity providers and internationalizing messages. The document aims to explain how SecureSocial works and how developers can customize it for their needs.
This document provides information about admission to Bachelor of Arts (Honours) programs at Chittagong University. It states that admission will be through an admission test in three units- Bangla, English, and General Knowledge. For each unit, the document outlines the syllabus, number of questions, duration of the exam, and marks allocation. It also provides details about eligibility criteria, equivalent qualifications, and important dates. Key information terms like ID, password, subject codes are also mentioned.
This document provides formulas and theorems related to trigonometric functions, differentiation, integration, limits, continuity, derivatives, and exponential and logarithmic functions. Some key points include:
1) Trigonometric formulas for sine, cosine, tangent, cotangent, secant and cosecant functions and their sums and differences.
2) Differentiation formulas for common functions including polynomials, trigonometric, exponential, logarithmic and inverse trigonometric functions.
3) Basic integration formulas for polynomials, trigonometric, logarithmic and inverse trigonometric functions.
4) Theorems on limits, continuity, derivatives, mean value theorem, extreme value theorem and properties related to concav
The document discusses issues facing aircraft manufacturers in India. It says that government support is needed to cushion manufacturers from risks, through mechanisms like advance market commitments. The government should commit to supporting new development projects and honoring those commitments. While private companies need to be accountable to stakeholders, government-owned airlines have a national duty as the government is involved.
The document presents code for several numerical root-finding methods - bisection, fixed point, Newton-Raphson, secant and false position. It defines functions to calculate f(x) and its derivatives, then uses iterative formulas to approximate roots within a given tolerance. The secant method provides the closest approximation to the root of x^2-6 of the methods shown.
1. JBoss Arquillian is a test framework that manages containers and deploys applications and tests to containers. It supports various container types and container adapters.
2. ShrinkWrap is used to bundle dependent classes and resources into deployable archives. The ShrinkWrap Resolver helps to resolve dependencies.
3. Arquillian Drone integrates WebDriver with Arquillian for browser interaction and testing. Arquillian Graphene provides Page Object and other support for WebDriver tests.
4. Arquillian Warp allows executing HTTP requests and server-side tests in the same request cycle. Arquillian Droidium provides Android testing support.
This document provides an introduction to JavaScript fundamentals and common patterns, jQuery optimization techniques, and an introduction to Node.js. It discusses JavaScript data types and variables, scoping, objects and classes. It also covers immediate execution functions, private patterns, event attaching in jQuery, and dependency management in Node.js projects. The document includes code examples for selecting elements and caching selectors in jQuery as well as creating an Express server and using middleware in Node.js applications.
Build a custom (micro)framework with ZF2 Components (as building blocks)Corley S.r.l.
This document discusses building a custom microframework with Zend Framework 2 components as building blocks. It describes using the Zend Framework 2 event manager and service manager as core components. The framework would follow an event-driven design and dependency inversion principle. Examples are provided of how to configure and use the event manager, service manager, router, hydrators and more. The goal is to have a testable framework while leveraging existing ZF2 components.
SecureSocial - Authentication for Play Frameworkjaliss
This document provides an overview and agenda for SecureSocial, an authentication module for Play!. It discusses main concepts like identity providers and user services. It covers installation, configuration, protecting actions, and customizing views. It also describes extending SecureSocial by creating new identity providers and internationalizing messages. The document aims to explain how SecureSocial works and how developers can customize it for their needs.
This document provides information about admission to Bachelor of Arts (Honours) programs at Chittagong University. It states that admission will be through an admission test in three units- Bangla, English, and General Knowledge. For each unit, the document outlines the syllabus, number of questions, duration of the exam, and marks allocation. It also provides details about eligibility criteria, equivalent qualifications, and important dates. Key information terms like ID, password, subject codes are also mentioned.
This document provides formulas and theorems related to trigonometric functions, differentiation, integration, limits, continuity, derivatives, and exponential and logarithmic functions. Some key points include:
1) Trigonometric formulas for sine, cosine, tangent, cotangent, secant and cosecant functions and their sums and differences.
2) Differentiation formulas for common functions including polynomials, trigonometric, exponential, logarithmic and inverse trigonometric functions.
3) Basic integration formulas for polynomials, trigonometric, logarithmic and inverse trigonometric functions.
4) Theorems on limits, continuity, derivatives, mean value theorem, extreme value theorem and properties related to concav
The document discusses issues facing aircraft manufacturers in India. It says that government support is needed to cushion manufacturers from risks, through mechanisms like advance market commitments. The government should commit to supporting new development projects and honoring those commitments. While private companies need to be accountable to stakeholders, government-owned airlines have a national duty as the government is involved.
The document presents code for several numerical root-finding methods - bisection, fixed point, Newton-Raphson, secant and false position. It defines functions to calculate f(x) and its derivatives, then uses iterative formulas to approximate roots within a given tolerance. The secant method provides the closest approximation to the root of x^2-6 of the methods shown.
2013-02-21 - .NET UG Rhein-Neckar: JavaScript Best PracticesJohannes Hoppe
The document provides JavaScript best practices focusing on code quality, avoiding antipatterns like implied globals and eval, and recommendations for style like indentation and naming conventions. It also discusses testing with Jasmine including writing tests, making them pass, refactoring code, and repeating the test-driven development process. Modular code organization techniques like revealing module pattern and event publishing are also covered.
The document discusses creating Windows Store JavaScript apps. It covers prototype design, app flow considerations like form factors and touch interfaces, and using promises for asynchronous code. Promises represent values that will be available later and are wrapped in methods like .then and .done. Presenters separate responsibilities in an MVP pattern, with one presenter per view component coordinating other presenters and forwarding events. Updates to tiles are handled by a tile updater class that gets new images and updates tiles using promises.
How to create a 3.2 billion dollar business in 20 minutes: combining AngularJ...Ari Lerner
My talk from the very first ngConf, dedicated to the Angular community. This talk details how to build a NEST clone with Angular and an Arduino in 20 minutes.
This document introduces Seq, a library for Node.js that provides a cleaner way to handle asynchronous flow control and parallel execution. It summarizes Seq's installation, basic usage with examples, handling errors, nested execution, and more advanced features. Seq allows asynchronous functions to be executed sequentially or in parallel using methods like seq(), seqEach(), and parEach() to simplify complex asynchronous code and avoid "boomerang code". The document provides resources to learn more about Seq and asynchronous programming.
This document summarizes some common JavaScript pitfalls and provides examples to illustrate them. It begins with a disclaimer that the examples are meant to run in the global scope. It then covers declarations and expressions, issues with touching undeclared variables, undefined properties, variable hoisting, function declarations and expressions, hidden globals, arrays not being sparse, the need to use strict mode, and parentheses operator precedence. It also discusses immediately invoked function expressions (IIFEs) and provides different styles for writing them.
JavaFX is a software platform for creating and delivering desktop applications, as well as rich internet applications (RIAs) that can run across a wide variety of devices. Some key aspects of the JavaFX platform include its base classes like Application, Scene and Stage; the use of FXML for building the user interface with CSS styling and JavaScript capabilities; JavaFX properties and bindings for observing value changes; and support for animation. The JavaFX architecture provides objects, APIs and utilities to help developers create visually-engaging and responsive user experiences.
Arquillian - extensions which you have to take with you to a deserted islandSoftwareMill
Arquillian has plenty of useful extentions, In this talk Michał will present these that in his opinion are most helpful and should be used in most Arquillian-powered Java projects.
The media player framework in Android involves both Java and native C++ code. When a media player is created, the Java code calls native functions that create a corresponding C++ media player object. This native object then interacts with classes like MediaPlayerService and Client to set the data source and start playback. The key steps are the native_setup function creating the native player, setDataSource passing the URI to native code, and MediaPlayerService::create using IMediaPlayerService to get a Client handling playback.
The document discusses refactoring a codebase to use Symfony components. It covers installing components via Composer, using the Dependency Injection container Pimple to manage dependencies, refactoring routing logic with the Routing component, and parsing configuration files with the YAML component. It also discusses using the EventDispatcher component to avoid duplicated logic by dispatching events for common tasks like redirection and notifications.
The document discusses building compilers and domain-specific languages (DSLs) in F#. It describes using FParsec for parsing, building an abstract syntax tree (AST), and interpretation/execution. Examples include building parsers and interpreters for a turtle graphics language, an internal DSL for build automation, an external DSL for games, and a Small Basic compiler. It recommends resources like F# Koans, TryFSharp.org and the book for learning more.
This document provides an overview of how to write plugins for the Apache Traffic Server (ATS) web server. It discusses the plugin architecture, including initialization, hook registration, and handling events through continuations. It also covers key APIs for interacting with transactions, sessions, URLs, HTTP headers, and more. The goal is to provide newcomers with enough information to get started writing their first ATS plugin.
This document provides additional information about LEX and describes several LEX patterns, variables, functions, start conditions, and examples. It explains that LEX is used for text processing and scanner generation. It also describes pattern matching symbols, special directives like ECHO and REJECT, variables like yytext, and functions like yylex(), yyless(), and yywrap(). Examples are provided for multi-file scanning, counting character sequences, and generating HTML.
The document describes a macroprocessor program that takes macro definitions from a MACRO.txt file and expands them in an INPUT.txt file. It scans the MACRO.txt file to build name, definition, and parameter tables. When it finds a macro call in INPUT.txt, it substitutes the parameters into the macro body from the tables and prints the expanded output.
This document discusses the proxy pattern in PHP. It defines a proxy as an object whose interface sits between the client and a different object with the same interface. Proxies are commonly used for lazy loading, handling remote objects, implementing smart references, adding protection layers, and providing null object fallbacks. The document provides examples of implementing proxies for value holders, remote objects, smart references using weak references and registries, protection proxies, and null object fallback proxies. It also discusses how to implement the public API of a proxy class in PHP by extending the proxied class and rewriting its methods while handling public properties and serialization. Useful proxy libraries and code generation techniques are mentioned.
The document summarizes lambda expressions and concurrency APIs in C++. It provides examples of lambda expressions with different capture modes. It also discusses features of concurrency APIs like std::future, std::promise, std::packaged_task and how to use them to asynchronously execute tasks and retrieve/propagate results and exceptions.
This document contains mathematical equations and integrals. It is discussing calculus concepts like derivatives, integrals, and solving equations. The document contains several examples of evaluating integrals and derivatives as well as solving equations.
This document provides an overview of Language Integrated Query (LINQ) in 3 main sections. It begins with an introduction and basics of LINQ, including the var keyword, extension methods, and lambda expressions. The second section covers LINQ to XML, showing how to query and manipulate XML documents and elements. The third section discusses LINQ to SQL for querying databases. Examples are provided throughout to demonstrate LINQ concepts and methods.
Advanced QUnit - Front-End JavaScript Unit TestingLars Thorup
Code: https://github.com/larsthorup/qunit-demo-advanced
Unit testing front-end JavaScript presents its own unique set of challenges. In this session we will look at number of different techniques to tackle these challenges and make our JavaScript unit tests fast and robust. We plan to cover the following subjects:
* Mocking and spy techniques to avoid dependencies on
- Functions, methods and constructor functions
- Time (new Date())
- Timers (setTimeout, setInterval)
- Ajax requests
- The DOM
- Events
* Structuring tests for reuse and readability
* Testing browser-specific behaviour
* Leak testing
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
2013-02-21 - .NET UG Rhein-Neckar: JavaScript Best PracticesJohannes Hoppe
The document provides JavaScript best practices focusing on code quality, avoiding antipatterns like implied globals and eval, and recommendations for style like indentation and naming conventions. It also discusses testing with Jasmine including writing tests, making them pass, refactoring code, and repeating the test-driven development process. Modular code organization techniques like revealing module pattern and event publishing are also covered.
The document discusses creating Windows Store JavaScript apps. It covers prototype design, app flow considerations like form factors and touch interfaces, and using promises for asynchronous code. Promises represent values that will be available later and are wrapped in methods like .then and .done. Presenters separate responsibilities in an MVP pattern, with one presenter per view component coordinating other presenters and forwarding events. Updates to tiles are handled by a tile updater class that gets new images and updates tiles using promises.
How to create a 3.2 billion dollar business in 20 minutes: combining AngularJ...Ari Lerner
My talk from the very first ngConf, dedicated to the Angular community. This talk details how to build a NEST clone with Angular and an Arduino in 20 minutes.
This document introduces Seq, a library for Node.js that provides a cleaner way to handle asynchronous flow control and parallel execution. It summarizes Seq's installation, basic usage with examples, handling errors, nested execution, and more advanced features. Seq allows asynchronous functions to be executed sequentially or in parallel using methods like seq(), seqEach(), and parEach() to simplify complex asynchronous code and avoid "boomerang code". The document provides resources to learn more about Seq and asynchronous programming.
This document summarizes some common JavaScript pitfalls and provides examples to illustrate them. It begins with a disclaimer that the examples are meant to run in the global scope. It then covers declarations and expressions, issues with touching undeclared variables, undefined properties, variable hoisting, function declarations and expressions, hidden globals, arrays not being sparse, the need to use strict mode, and parentheses operator precedence. It also discusses immediately invoked function expressions (IIFEs) and provides different styles for writing them.
JavaFX is a software platform for creating and delivering desktop applications, as well as rich internet applications (RIAs) that can run across a wide variety of devices. Some key aspects of the JavaFX platform include its base classes like Application, Scene and Stage; the use of FXML for building the user interface with CSS styling and JavaScript capabilities; JavaFX properties and bindings for observing value changes; and support for animation. The JavaFX architecture provides objects, APIs and utilities to help developers create visually-engaging and responsive user experiences.
Arquillian - extensions which you have to take with you to a deserted islandSoftwareMill
Arquillian has plenty of useful extentions, In this talk Michał will present these that in his opinion are most helpful and should be used in most Arquillian-powered Java projects.
The media player framework in Android involves both Java and native C++ code. When a media player is created, the Java code calls native functions that create a corresponding C++ media player object. This native object then interacts with classes like MediaPlayerService and Client to set the data source and start playback. The key steps are the native_setup function creating the native player, setDataSource passing the URI to native code, and MediaPlayerService::create using IMediaPlayerService to get a Client handling playback.
The document discusses refactoring a codebase to use Symfony components. It covers installing components via Composer, using the Dependency Injection container Pimple to manage dependencies, refactoring routing logic with the Routing component, and parsing configuration files with the YAML component. It also discusses using the EventDispatcher component to avoid duplicated logic by dispatching events for common tasks like redirection and notifications.
The document discusses building compilers and domain-specific languages (DSLs) in F#. It describes using FParsec for parsing, building an abstract syntax tree (AST), and interpretation/execution. Examples include building parsers and interpreters for a turtle graphics language, an internal DSL for build automation, an external DSL for games, and a Small Basic compiler. It recommends resources like F# Koans, TryFSharp.org and the book for learning more.
This document provides an overview of how to write plugins for the Apache Traffic Server (ATS) web server. It discusses the plugin architecture, including initialization, hook registration, and handling events through continuations. It also covers key APIs for interacting with transactions, sessions, URLs, HTTP headers, and more. The goal is to provide newcomers with enough information to get started writing their first ATS plugin.
This document provides additional information about LEX and describes several LEX patterns, variables, functions, start conditions, and examples. It explains that LEX is used for text processing and scanner generation. It also describes pattern matching symbols, special directives like ECHO and REJECT, variables like yytext, and functions like yylex(), yyless(), and yywrap(). Examples are provided for multi-file scanning, counting character sequences, and generating HTML.
The document describes a macroprocessor program that takes macro definitions from a MACRO.txt file and expands them in an INPUT.txt file. It scans the MACRO.txt file to build name, definition, and parameter tables. When it finds a macro call in INPUT.txt, it substitutes the parameters into the macro body from the tables and prints the expanded output.
This document discusses the proxy pattern in PHP. It defines a proxy as an object whose interface sits between the client and a different object with the same interface. Proxies are commonly used for lazy loading, handling remote objects, implementing smart references, adding protection layers, and providing null object fallbacks. The document provides examples of implementing proxies for value holders, remote objects, smart references using weak references and registries, protection proxies, and null object fallback proxies. It also discusses how to implement the public API of a proxy class in PHP by extending the proxied class and rewriting its methods while handling public properties and serialization. Useful proxy libraries and code generation techniques are mentioned.
The document summarizes lambda expressions and concurrency APIs in C++. It provides examples of lambda expressions with different capture modes. It also discusses features of concurrency APIs like std::future, std::promise, std::packaged_task and how to use them to asynchronously execute tasks and retrieve/propagate results and exceptions.
This document contains mathematical equations and integrals. It is discussing calculus concepts like derivatives, integrals, and solving equations. The document contains several examples of evaluating integrals and derivatives as well as solving equations.
This document provides an overview of Language Integrated Query (LINQ) in 3 main sections. It begins with an introduction and basics of LINQ, including the var keyword, extension methods, and lambda expressions. The second section covers LINQ to XML, showing how to query and manipulate XML documents and elements. The third section discusses LINQ to SQL for querying databases. Examples are provided throughout to demonstrate LINQ concepts and methods.
Advanced QUnit - Front-End JavaScript Unit TestingLars Thorup
Code: https://github.com/larsthorup/qunit-demo-advanced
Unit testing front-end JavaScript presents its own unique set of challenges. In this session we will look at number of different techniques to tackle these challenges and make our JavaScript unit tests fast and robust. We plan to cover the following subjects:
* Mocking and spy techniques to avoid dependencies on
- Functions, methods and constructor functions
- Time (new Date())
- Timers (setTimeout, setInterval)
- Ajax requests
- The DOM
- Events
* Structuring tests for reuse and readability
* Testing browser-specific behaviour
* Leak testing
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
2. WANT TO HEAR A JAVASCRIPT JOKE?
CALLBACK LATER AND
I'LL TELL IT TO YA!
3. CALLBACKS ARE HOW JAVASCRIPT MANAGES THINGS THAT
NEED TO HAPPEN IN THE FUTURE
fnto dlvrucln( {
ucin eiePnhie)
cnoelg"eas te tk tig ltrly";
osl.o(Bcue hy ae hns ieal.)
}
fnto stpoe){
ucin eUJk(
cnoelg"h dntketmnaslk pn?)
osl.o(Wy o' lpoaic ie us";
stieu(eiePnhie 20)
eTmotdlvrucln, 00;
}
stpoe)
eUJk(;
5. WHAT HAPPENS IF THE EXECUTION THREAD IS BUSY?
fnto dlvrucln( {
ucin eiePnhie)
cnoelg"eas svnhssm bds ttos";
osl.o(Bcue ee a oe aas ato.)
}
fnto cnrvdxml( {
ucin otieEape)
cnoelg"h i sxari o svn";
osl.o(Wy s i fad f ee?)
stieu(eiePnhie 20)
eTmotdlvrucln, 00;
fnPieatrFrETEEYLRENME)
idrmFcoso(XRML_AG_UBR;
}
fnto cnrvdxml(;
ucin otieEape)
14. (The 'X' in 'Ajax' is 'XML', but we'll ignore that)
15. fnto laSuf){
ucin odtf(
vrxr=nwXLtpeus(;
a h
e MHtRqet)
xrorayttcag =fnto( {
h.nedsaehne
ucin)
i(h.edSae==4 {
fxrraytt = )
cnoelgxrrsosTx)
osl.o(h.epneet;
}
}
xroe(GT,'di?ea=';
h.pn'E' /otdly5)
xrsn(;
h.ed)
cnoelg"eus sn!)
osl.o(Rqet et";
}
laSuf)
odtf(;
16. YOU CAN'T WRITE ASYNCHRONOUS CODE SYNCHRONOUSLY
fnto gttf( {
ucin eSuf)
vrxr=nwXLtpeus(;
a h
e MHtRqet)
vrrsls
a eut;
xrorayttcag =fnto( {
h.nedsaehne
ucin)
i(h.edSae==4 {
fxrraytt = )
rsls=xrrsosTx;
eut
h.epneet
}
}
xroe(GT,'di?ea=';
h.pn'E' /otdly5)
xrsn(;
h.ed)
rtr rsls
eun eut;
}
cnoelg"tf i " gttf()
osl.o(Suf s , eSuf);
17. YOU CAN MAKE SOME ASYNCHRONOUS CODE SYNCHRONOUS,
BUT EXECUTION WILL BLOCK ALL EVENTS
fnto gttf( {
ucin eSuf)
vrxr=nwXLtpeus(;
a h
e MHtRqet)
vrrsls
a eut;
xrorayttcag =fnto( {
h.nedsaehne
ucin)
i(h.edSae==4 {
fxrraytt = )
rsls=xrrsosTx;
eut
h.epneet
}
}
xroe(GT,'di?ea=' fle;/ tidprmi te'sn'prm
h.pn'E' /otdly5, as) / hr aa s h ayc aa
xrsn(;
h.ed)
rtr rsls
eun eut;
}
cnoelg"tf i " gttf()
osl.o(Suf s , eSuf);
18. HOW DO WE MAKE THE ASYNCHRONOUS CODE MORE
UNDERSTANDABLE?
CALLBACKS
19. fnto gttf(r,clbc){
ucin eSuful alak
vrxr=nwXLtpeus(;
a h
e MHtRqet)
xrorayttcag =fnto( {
h.nedsaehne
ucin)
i(h.edSae==4 {
fxrraytt = )
clbc(h.epneet;
alakxrrsosTx)
}
}
xroe(GT,ul;
h.pn'E' r)
xrsn(;
h.ed)
}
gttf(/otdly5,fnto(epne {
eSuf'di?ea=' ucinrsos)
cnoelgrsos)
osl.o(epne;
};
)
20. BUT WHAT IF I NEED TO DO THINGS THAT DEPEND ON EACH
OTHER?
30. fnto gttfASaeOjc(r){
ucin eSufshrdbetul
vrxr=nwXLtpeus(;
a h
e MHtRqet)
vrsae ={
a hrd
rsls
eut:
nl
ul
}
;
xrorayttcag =fnto( {
h.nedsaehne
ucin)
i(h.edSae==4 {
fxrraytt = )
sae.eut =xrrsosTx;
hrdrsls
h.epneet
}
}
xroe(GT,ul;
h.pn'E' r)
xrsn(;
h.ed)
rtr sae;
eun hrd
}
fnto cetSaeHnlrsae){
ucin raehrdade(hrd
vrhnlr=fnto( {
a ade
ucin)
i(sae.eut){
f!hrdrsls
stieu(ade,
eTmothnlr
}
es {
le
cnoelgsae.eut)
osl.o(hrdrsls;
}
}
rtr hnlr
eun ade;
}
0;
)
vrsae =gttfASaeOjc(di?ea=';
a hrd
eSufshrdbet'otdly5)
cetSaeHnlrsae))
raehrdade(hrd(;
31. Create an object in a producer that can be told that processing
is done
Get an object from the producer to the consumer so that the
consumer can tell it to do something
32. fnto gttfWtCodntrul {
ucin eSufihoriao(r)
vrxr=nwXLtpeus(;
a h
e MHtRqet)
vrcodntr=nwCodntr)
a oriao
e oriao(;
xrorayttcag =fnto( {
h.nedsaehne
ucin)
i(h.edSae==4 {
fxrraytt = )
codntraloenTeaasxrrsosTx)
oriao.lDnAdhDtI(h.epneet;
}
}
xroe(GT,ul;
h.pn'E' r)
xrsn(;
h.ed)
rtr codntrcnueOjc(;
eun oriao.osmrbet)
}
45. Promises are more than just a fancy callback system. A promise
stands in place of a future value.
46. When an object is "thenable", the value can be retrieved in the
future and used directly, making asynchronous concepts look
synchronous.
47. GOOD THINGS WITH THIS APPROACH
Code is much more flat
Easier to test
We can compose functions that take promises
We can handle exceptions very clearly
We can pass around promises as though they were the actual
value, using .then() to get the result
48. BAD THINGS WITH THIS APPROACH
Tends to cause some confusion because the abstraction isn't
straightforward
Using this in a public API is considered very opinionated, and
forces consumers of your API to use a specific paradigm
Multiple implementations of this, not all meet the standard
(*cough* jQuery *cough*)
50. Asynchronous processes in JavaScript are handled with
callbacks.
Callback mechanisms introduce some problems such as error
handling, composition, testing.
Callbacks are functions, which are first class objects.
Instead of callbacks, what if we used a different object that
mediates between consumer and producer?
Promise objects are a type of mediator that represent the
future value of an async process.
Promises/A+ is an open standard with a specification.
Promise objects can be used in place of actual values to make
asynchronous code look synchronous.