The document discusses CD-ROMs and how they work. It describes that CD-ROMs use lasers to read digital data stored as pits and lands on the disc's reflective layer. When the laser hits a land, light reflects back and is detected as a 1, while a pit scatters light and is detected as a 0. The binary data is then converted back to sounds or other digital information that can be understood by the computer.
Making a simple variable power supply.
Power supply applications.
Ac and Dc current defintions.
Half wave and full wave rectifier.
Power supply circuit.
Used tools.
Working steps.
Testing.
A diode is a semiconductor device with two terminals, typically allowing the flow of current in one direction only. In this presentation, I have introduced the different applications of diode.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Making a simple variable power supply.
Power supply applications.
Ac and Dc current defintions.
Half wave and full wave rectifier.
Power supply circuit.
Used tools.
Working steps.
Testing.
A diode is a semiconductor device with two terminals, typically allowing the flow of current in one direction only. In this presentation, I have introduced the different applications of diode.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
CD-ROM & Power Supply.pdf
1. There are basically two types of storage devices
Magnetic storages(hard disk drive)
Optical storages(CD-ROM)
2. Compact disk-read only memory.
It is an optical disk used to store digital data,
originally developed for storing digital audio.
A CD is flat, round, portable metal disc, which
is coated with a thin metal or plastic or other
material that is highly reflective.
3. A CD-ROM drive operates by using a laser to
reflect light off the bottom of the CD or disc.
The reflected light pulses are read by a photo
detector.
These incoming pulses are decoded by the
microprocessor and then sent as usable data to
the rest of the computer where it is processed
and used.
4.
5. It's actually made of three layers.
1. CD is made from a tough, plastic
called polycarbonate.
6. 2. Sandwiched in the middle there is a thin layer
of aluminum called reflecting layer and this
reflecting layer stores data. It's shiny so that
a laser beam can bounce off the disc and read the
information stored on it.
3. Finally, on top of the aluminum, is a protective
layer of plastic and lacquer.
The dull side usually has a label on it telling you
what's on the CD
7. Photocells are sensors that allow you to detect
light. They are small, inexpensive, low-power,
easy to use and don't wear out.
They are often referred to as CDS cells (they are
made of Cadmium-Sulfide), light-dependent
resistors (LDR), and photo resistors.
They used in toys, gadgets and appliances
8. The information to be stored is digitized, that is, the
data can be represented by binary numbers, which are
made up of '1' and '0' digits. This information is stored
on the metal layer. The data is represented using pits
(1) and space between pits is called land (0).
Lands are flat areas on the metal surface
Pits are depression or bumps
9. Step1:: Inside your CD player, there is a laser beam
(called a semiconductor diode laser) and a
small photoelectric cell (an electronic light detector).
Step2:: When you press play, an electric motor
makes the disc rotate at high speed (up to 500rpm).
Step3:: The laser beam switches on and scans along a
track, with the photocell, from the center of the CD to
the outside
10. Step4:: The laser flashes up onto the shiny side of
the CD, bouncing off the pattern of pits and lands
on the disc. The lands reflect the laser light straight
back, while the pits scatter the light.
Step5:: Every time the light reflects back, the
photocell detects it, realizes it's seen a land, and
sends a burst of electric current to an electronic
circuit that generates the number one.
11. A transition from a land to pit or pit to land is
1.
Absence of transition is interpreted as 0.
12. Step6:: When the light fails to reflect back, the
photocell realizes there is no land there and
doesn't register anything, so the electronic circuit
generates the number zero.
13. Step7:: Another electronic circuit in the CD player
(called a digital to analog converter or DAC) decodes
these binary numbers and converts them back into a
changing pattern of electric currents.
Step8:: A loudspeaker transforms the electric
currents into sounds you can hear (by changing their
electrical energy into sound energy).
14. There are no pits and lands imprinted on
plastic. Instead, in between the protective
polycarbonate and the reflective aluminum,
there's a layer of dye.
A CD-R writer has a higher-powered laser than
normal, which generates heat when it strikes
the disc, "burning" the dye and making a tiny
black spot.
15. Later, when a CD reader aims its laser at that
spot, the light is completely absorbed and
doesn't reflect back. This indicates that a zero
("0") is stored on the disc at that point.
In places where the dye is unburned, the laser
light reflects straight back again, indicating that
a "1" is stored on the disc.
16. By creating areas of "burned" dots, and other
places where the dye is left alone, a CD-R
writer creates a pattern of binary zeros and
ones that can be used to store information.
Unfortunately, once the dye is "burned" it's
permanently transformed: you can't change it
back again. And that's why you can only write
a CD-R disc once.
17.
18. Regulated power supply
Unregulated power supply
Unregulated power supply
The output voltage is not constant. It will
vary with the input voltage and the load
current.
19. Regulated linear power supplies
Regulated linear power supplies are same to
the unregulated linear power supply except
that regulator/stabilizer is used in place of the
bleeder resistor.
The main aim of this supply is to provide the
required level of DC power to the load. The
DC power supply uses an AC supply as the
input
20. switched-mode power supply is an
electronic power supply that incorporates
a switching regulator to convert electrical
power efficiently.
SMPS transfers power from a DC or AC source
to DC loads.
SMPS always provide a well regulated power
to the load irrespective of the input variations.
22. SMPS working
1. Rectifier:: The SMPS has an AC input, then its first job is to
convert the input to DC. This is called rectification. A SMPS with
dc input does not require this stage.
• The rectifier produces unregulated(high voltage DC) dc which
is then passed through the filter circuit.
• Hence the high AC becomes High Voltage DC from this
operation we eliminate high spikes, surge and ripple effect.
23. 2. Chopper:: A chopper is basically a dc to dc
converter whose main function/usage is to create
adjustable dc voltage from fixed dc voltage
sources
i. A DC chopper is a static device that converts
fixed dc input voltage to a variable dc output
voltage directly.
24. ii. AC Link Chopper
In the case of an ac link chopper, first dc is
converted to ac with the help of an inverter. After
that, AC is stepped-up or stepped-down by a
transformer, which is then converted back to dc
by a diode rectifier. Ac link chopper is costly,
bulky and less efficient as the conversion is done
in two stages.
25. 3. Flyback or Output transformer(step-down transformer)
If the output required is to be isolated from input, the
inverted AC is used to draw the primary winding of a
high frequency transformer.
IT inverts AC voltage up to down to the required output
level.
4. Output rectifier and filter : If the DC output is
required, the AC output from transformer is rectified.
it gives Rectified constant DC output Voltage without
current fluctuations.
26. 5. Chopper controller: feedback circuit monitors
the output voltage and compare it with the
reference voltage.
Some portion of output is taken as feedback
signal and this signal compared with reference
voltage and the error (if present) is amplified
depends on the error chopper controller
changes its frequency hence the switching
device regulates the output. So the minimum
changes in output DC regulated instantly
without affecting load.
27. The full form of the UPS is an uninterruptible
power supply.
It is an electrical device, gives emergency power
to various loads when the input power typically
fails.
The main purpose of a UPS is to provide a
protection to the equipment like computers,
electrical equipment, when there is a power
disruption.
28. Charger card:: it contains rectifier which
convert AC to DC to charge the battery
Inverter card:: It convert DC to AC
29. EMI( electromagnetic interference) filter helps
to reduce the electric noise.
Stabilizer:: regulate the voltage to the constant
range that is safe for the loads.
30. Display card and buzzer::
Led are used to indicate the status of UPS
Status: overloading ,charging, online/offline
Buzzer: is used to give warnings like:
Low battery
Overloading
FAN:: It is used for the cooling the fan system.
31.
32. Battery: UPS battery is used as a storage device,
which consists of several cells in series with a
capacity to maintain its size determine the is
charge time. its main function: when the
electricity is normal the energy converted into
chemical energy stored in the battery internal,
when the electricity us fail the chemical energy
into electrical energy provided to the inverter o
the load.
33. Static switch: s1 –generally OFF
s2- always ON
Inverter card is always active
When inverter fails S1-ON
It always remains on battery, whether input supply is
present or not.
It uses its battery throughout the time when the electronic
device is in use. Therefore the battery is always used here.
34. The online UPS is connected to the main load at all the
time or until the battery in it gets charged. In this case,
our electronic device gets the power from the online
UPS and not directly from the AC main supply. So,
even when the main AC fails, our electronic device’s
operations need not be stopped.
35. Input is directly connected to output
Switches: s1 normally ON
s2 OFF
When main fails s2 ON
It never uses the battery until there is a power failure.
Therefore the battery is rarely used here.
36. It is required only when the main power
supply fails. Yes, in this case, the electronic
device gets power directly from the main AC
power supply and not from the UPS. When
there is any voltage surge or fluctuation in the
main input power, then the offline UPS
supplies power to the electronic devices.
Therefore, these kinds of UPSs are required
only during power failures and not all the time.
One of the best examples for offline UPS is the
desktop computers.