The document describes a technique called CodeCity which maps source code to a 3D city visualization. Classes are represented as buildings with attributes mapped to building dimensions. Packages are represented as districts with color representing nesting level. The number of methods and attributes are mapped to building height using different mapping techniques like identity, linear, boxplot-based, and threshold-based mapping. The technique is demonstrated on visualizing the design of the ArgoUML and JDK systems, with class-level disharmony highlighted. Potential uses in understanding software design, detecting design flaws and visualizing re-engineering are discussed.
- Device Tree (DT) is a data structure that describes hardware configurations and is used as a standard interface between bootloaders and operating systems on ARM devices.
- DT avoids hardcoding platform details and makes it easier to support multiple device types with a single kernel image.
- Key components of DT include the device tree source (DTS) file, device tree compiler (DTC), and device tree blob (DTB) binary file. DT provides a unified way to describe hardware across ARM platforms in Linux.
The document discusses the Android audio system initialization process and the creation of playback and recording threads. The audio HAL library is loaded based on the device properties, and the AudioFlinger service initializes and manages the audio streams. It creates a MixerThread for playback using the audio HAL output, and a RecordThread is generated for audio input using the HAL functions.
To meet the new connectivity requirements of the emerging IoT segment, 3GPP has taken evolutionary steps on both the network side and the device side. A single technology or solution cannot be ideal to all the different potential IoT applications, market situations and spectrum availability. As a result, the 3GPP standardizing several technologies, including Extended Coverage GSM (EC-GSM), LTE-M and NB-IoT.
LTE-M, NB-IoT and EC-GSM are all superior solutions to meet IoT requirements as a family of solutions, and can complement each other based on technology availability, use case requirements and deployment scenarios. The evolution for these technologies is shown in figure #5. Technical studies and normative work for the support of Machine Type Communication (MTC) as part of 3GPP LTE specifications for RAN began in 3GPP Release 12 and are continuing with the goals of developing features optimized for devices with MTC traffic.
Memory allocation for real time operating systemAsma'a Lafi
Memory allocation strategies in real-time operating systems differ from traditional operating systems in order to improve system performance. Real-time operating systems use static and dynamic memory allocation. Static allocation assigns memory at design time while dynamic allocation occurs at runtime using memory managers. Common dynamic allocation algorithms for real-time systems include buddy allocation, indexed fit, bitmapped fit, and two-level segregated fit, which aim to minimize fragmentation and response times. The document compares various allocation algorithms and concludes that dynamic allocation presents challenges for real-time systems to optimize fragmentation, response time, and locality.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition3G4G
This document provides an overview of Open RAN terminology including virtualization, disaggregation, and decomposition. It explains the evolution from traditional integrated RAN architectures to disaggregated architectures with open interfaces. The key aspects covered are horizontal openness through open interfaces, vertical openness through virtualization and compute disaggregation, and the decomposition of RAN functions into distributed units and centralized units. References for further reading on Open RAN, O-RAN, and RAN disaggregation are also provided.
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
- Device Tree (DT) is a data structure that describes hardware configurations and is used as a standard interface between bootloaders and operating systems on ARM devices.
- DT avoids hardcoding platform details and makes it easier to support multiple device types with a single kernel image.
- Key components of DT include the device tree source (DTS) file, device tree compiler (DTC), and device tree blob (DTB) binary file. DT provides a unified way to describe hardware across ARM platforms in Linux.
The document discusses the Android audio system initialization process and the creation of playback and recording threads. The audio HAL library is loaded based on the device properties, and the AudioFlinger service initializes and manages the audio streams. It creates a MixerThread for playback using the audio HAL output, and a RecordThread is generated for audio input using the HAL functions.
To meet the new connectivity requirements of the emerging IoT segment, 3GPP has taken evolutionary steps on both the network side and the device side. A single technology or solution cannot be ideal to all the different potential IoT applications, market situations and spectrum availability. As a result, the 3GPP standardizing several technologies, including Extended Coverage GSM (EC-GSM), LTE-M and NB-IoT.
LTE-M, NB-IoT and EC-GSM are all superior solutions to meet IoT requirements as a family of solutions, and can complement each other based on technology availability, use case requirements and deployment scenarios. The evolution for these technologies is shown in figure #5. Technical studies and normative work for the support of Machine Type Communication (MTC) as part of 3GPP LTE specifications for RAN began in 3GPP Release 12 and are continuing with the goals of developing features optimized for devices with MTC traffic.
Memory allocation for real time operating systemAsma'a Lafi
Memory allocation strategies in real-time operating systems differ from traditional operating systems in order to improve system performance. Real-time operating systems use static and dynamic memory allocation. Static allocation assigns memory at design time while dynamic allocation occurs at runtime using memory managers. Common dynamic allocation algorithms for real-time systems include buddy allocation, indexed fit, bitmapped fit, and two-level segregated fit, which aim to minimize fragmentation and response times. The document compares various allocation algorithms and concludes that dynamic allocation presents challenges for real-time systems to optimize fragmentation, response time, and locality.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition3G4G
This document provides an overview of Open RAN terminology including virtualization, disaggregation, and decomposition. It explains the evolution from traditional integrated RAN architectures to disaggregated architectures with open interfaces. The key aspects covered are horizontal openness through open interfaces, vertical openness through virtualization and compute disaggregation, and the decomposition of RAN functions into distributed units and centralized units. References for further reading on Open RAN, O-RAN, and RAN disaggregation are also provided.
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120Linaro
"Session ID: BUD17-120
Session Name: Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Speaker: Stefan Schmidt
Track: LITE
★ Session Summary ★
Adding support for IEEE 802.15.4 and 6LoWPAN to an embedded Linux system opens up new possibilities to communicate with tiny devices. The mainline kernel
supports the wireless protocols to connect such devices to the internet, acting
as border router for such networks.
This talk will show the current kernel support, how to enable and configure the
subsystems to use it and how to communicate between Linux and IoT operating
systems like RIOT, Contiki or Zephyr.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-120/
Presentation: https://www.slideshare.net/linaroorg/linuxwpan-ieee-802154-and-6lowpan-in-the-linux-kernel-bud17120
Video: https://youtu.be/6YNeF2H2i-U
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: linux-wpan, kernel, IEEE, Stefan Schmidt
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
The document provides an introduction to 5G architecture and use cases. It discusses how 5G aims to support services with diverse requirements through enhanced mobile broadband, massive machine type communication, and ultra-reliable low latency communication. 5G will have several deployment scenarios including non-standalone using LTE infrastructure initially, and standalone 5G networks. The core network is expected to see the most radical innovation since 2G, moving to a cloud-native architecture with network slicing, separation of control and user plane, and network functions that can be deployed flexibly. The smart grid is presented as a challenging use case that may benefit from 5G capabilities such as low latency and connectivity of millions of devices.
Here are the key steps:
1. Kill any existing controllers running on the system
2. Clear out any existing Mininet topology using mn -c
3. Start the Ryu OpenFlow controller by running:
ryu-manager --verbose ./simple_switch_13.py
This starts the Ryu controller with the simple_switch_13.py application, which provides basic OpenFlow switch functionality. The --verbose flag prints debug information from the controller. We have now initialized the SDN environment with Ryu acting as the controller.
Emulator vs Simulator
Emulators mimic both software and hardware of a target device by recreating its processor and instruction set on a computer, slowing performance due to binary translation. Simulators mimic only software by running apps inside virtual devices on a computer OS. Emulators are useful for early testing without real devices but are slower than simulators due to binary translation between instruction sets. Certain device features like cameras cannot be tested on virtual devices.
The document discusses various types of wireless network attacks including Bluetooth, Near Field Communication (NFC), and Radio Frequency Identification (RFID) attacks. It also covers vulnerabilities in IEEE 802.11 wireless security standards and the evolution of wireless networking standards over time with increasing speeds and capabilities. Common attacks described are bluejacking, bluesnarfing, eavesdropping, man-in-the-middle, and unauthorized access of wireless networks or tagged devices. The document emphasizes the importance of securing wireless networks and devices to prevent such attacks and data theft.
Technology Manager Andreas Roessler covers 5G basics in this keynote presentation at the RF Lumination 2019 conference in February 2019.
RF Lumination 2019
"Meet 158+ years of RF design & test expertise at one event. If they can't answer your question, it must be a really good question!"
Watch all the presentations here:
https://www.rohde-schwarz-usa.com/RFLuminationContent.html
Andreas Roessler is the Rohde & Schwarz Technology Manager focused on UMTS Long Term Evolution (LTE) and LTE-Advanced. With responsibility for the strategic marketing and product portfolio development for LTE/LTE-Advanced, Andreas follows the standardization process in 3GPP very closely, particularly on core specifications as well as protocol conformance, RRM and RF conformance specifications for device and base stations testing. He graduated from Otto-von-Guericke University in Magdeburg, Germany, and received a Master's Degree in communication engineering.
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...3G4G
In this basic tutorial we look at different types of RAN architectures that are always being discussed. We start with the Distributed RAN (D-RAN) and then look at Centralized and Cloud RAN (both referred to as C-RAN) architectures. We also quickly look at RAN functional splits for 5G and then tie this all together.
We also look at how Samsung and Nokia discuss these architectures in the context of 5G.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Open RAN Page: https://www.3g4g.co.uk/OpenRAN/
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Kali Linux is a Debian-based Linux distribution designed for penetration testing and security auditing. It contains over 600 security and forensics tools for tasks like penetration testing, computer forensics, and reverse engineering. While powerful for security professionals, Kali Linux requires specialized skills and carries risks if misused due to its hacking-focused tools. The documentation discusses Kali Linux capabilities and tools, as well as providing guidance on its appropriate uses and limitations.
A high level introductory look at what is meant by Fixed Wireless Access or FWA that is being touted as one of the initial 5G use cases. This presentation (with embedded video) introduces FWA and looks at a practical deployment example.
Ten Things You Should not Forget in Mainframe Security CA Technologies
Given the current state of security and breaches in the news every day, you won’t want to miss this session. We will cover the top 10 areas that you should be reviewing as a security practitioner that most organizations overlook. With the knowledge taken from this session, you will be able to better educate your staff and auditors about how to take security to the next level for your business and protect z/OS®.
For more information, please visit http://cainc.to/Nv2VOe
Firewalls work by denying or permitting network traffic based on configured policies. A firewall protects internal networks from unauthorized external access and can also separate internal networks. Stateful firewalls are aware of network connections and maintain related information in a connection table, while stateless firewalls make decisions based only on individual packets.
Bitbucket Pipelines is an integrated CI/CD solution that allows specifying Docker containers and commands to run for each branch. It integrates with Bitbucket repositories and configures via a bitbucket-pipelines.yml file. Compared to Drone.io, it has longer build times per user, customizable builds per branch, and integrates with the Bitbucket UI. The documentation demonstrates configuring pipeline steps and debugging locally by running commands in a Docker container.
This document provides an outline for a tutorial on wireless communications with unmanned aerial vehicles (UAVs) given at the IEEE International Conference on Communications on May 24, 2019 in Shanghai, China. The 3.5 hour tutorial covers topics such as UAV applications, channel modeling fundamentals, performance of LTE and Wi-Fi for aerial users estimated through theory, simulations and measurements, and aerial base stations for future cellular networks. It provides details on the schedule, topics to be discussed, and references related materials and models for UAV wireless channel characterization.
This chapter discusses key concepts of network programming and socket-based communication between programs running on different computers. It introduces the java.net package and classes used for creating sockets and allowing message communication using TCP and UDP protocols. Example programs are provided to demonstrate how to create basic client-server applications using sockets in Java.
How to successfully migrate to Bazel from Maven or Gradle - Riga Dev DaysNatan Silnitsky
At Wix We decided to switch to the Bazel build tool. The result was a dramatic improvement in performance and accuracy.
As Wix Backend grew exponentially with more than 700 micro-services, it became obvious our build times on Maven have been slowing us down. We decided to switch to the Bazel build tool while harnessing the “remote build execution” feature. The result was a dramatic improvement in performance and accuracy of builds.
In this talk, I will share with you how to achieve a successful migration to Bazel from Maven or Gradle, focusing on 5 important areas you have to think about and decide on the right approach for you, ranging from choosing the right build unit granularity to remote caching best practices.
I will also describe and demonstrate some of the available tools in the eco-system that help with the migration and with making everyday work easier.
3GPP Standards for the Internet-of-ThingsEiko Seidel
Presenation by 3GPP RAN3 Chairman - Philippe Reininger - at the IoT Business & Technologies Congress (November 30, in Singapore). Main topics are eMTC, NB-IOT and EC-GSM-IoT as completed in 3GPP Release 13 and enhanced in Release 14
NFV +SDN
(Network Function Virtualization + Software Defined Networking)
- What, Why and When NFV and SDN?
- Basic concepts and definition of NFV, SDN.
- Benefits of NFV.
- NFV Architecture
This document provides an overview of the Kali Linux operating system. It describes Kali Linux as a Debian-based distribution aimed at advanced penetration testing and security auditing. It contains hundreds of tools for tasks like penetration testing, forensics, and reverse engineering. Kali Linux is developed and maintained by Offensive Security and was created as a rebuild of BackTrack Linux, with its first version releasing in 2013. It highlights some of Kali Linux's core developers and features, such as over 600 preinstalled applications, support for multiple languages and wireless devices, and flexibility in running on physical/virtual machines or mobile devices.
Servi sMART proposes a smart market for services that uses periodic auctions and mathematical optimization to match service requests to anonymous service providers. It aims to enforce regulation, fairness and transparency through a market algorithm. The system would compile microservices by translating existing APIs and annotating them with input/output queries. Project managers would define projects including test queries to be solved through combinations of microservices on a Graph Reactor platform. This would expand the search engine business model to generate solutions by composing microservices.
LaWzer, a still image codec designed by L. GuillemotLudovic Guillemot
LAWZER, A STILL IMAGE CODEC DESIGNED BY L. GUILLEMOT
THE LAWZER PROJECT MATERIALIZES 10 YEARS OF SCIENTIFIC CONTRIBUTIONS IN IMAGE COMPRESSION AND SOURCE CODING.
LaWzer is a personal project, a showcase for the skills and interests of its designer, Ludovic Guillemot, and a way to celebrate a regular activity in research with academic partners.
LAWZER IS A STILL IMAGE CODEC allowing to efficiently encode digital images at the desired size. LaWzer 1.0 has been developed (in C++) between July 2013 and August 2014. It includes works previously published as well as new coding algorithms specially designed for LaWzer.
LAWZER TECHNOLOGY IS BASED ON LATTICE VECTOR QUANTIZATION (LVQ) AND WAVELET TRANSFORM.
In (very) few words, LVQ is a blockwise approach i.e. the basic elements of the coding process are vectors of data. This is a highly efficient approach but usually renowned for the algorithmic complexity involved by operations on n-dimensional objects. LaWzer focuses on reversing this reputation while still improving the rate-distortion trade-off.
Because compression is a must in the big data era, we believe that some applications could be in need of a fast and efficient vectorwise compression scheme.
LAWZER V1.0 IS A PROOF OF CONCEPT.
The most challenging task was to develop a real-life codec, i.e. showing that processing n-dimensional objects was no more a technical hurdle for the execution speed. Various algorithms have been designed and implemented to reach this goal: quantizers and lossless coding, statistical estimation in wavelet domain, numerical optimization, etc.
WORK IN PROGRESS:
The first phase of the project is now achieved. One have a complete compression scheme which produces compressed files (“.law”) with short execution times (short means of the order of few seconds for very big images). But much more can be done, further versions will include enhanced coding algorithm, new functionalities (color, watermarking, etc.), code optimization, etc.
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120Linaro
"Session ID: BUD17-120
Session Name: Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Speaker: Stefan Schmidt
Track: LITE
★ Session Summary ★
Adding support for IEEE 802.15.4 and 6LoWPAN to an embedded Linux system opens up new possibilities to communicate with tiny devices. The mainline kernel
supports the wireless protocols to connect such devices to the internet, acting
as border router for such networks.
This talk will show the current kernel support, how to enable and configure the
subsystems to use it and how to communicate between Linux and IoT operating
systems like RIOT, Contiki or Zephyr.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-120/
Presentation: https://www.slideshare.net/linaroorg/linuxwpan-ieee-802154-and-6lowpan-in-the-linux-kernel-bud17120
Video: https://youtu.be/6YNeF2H2i-U
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: linux-wpan, kernel, IEEE, Stefan Schmidt
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
The document provides an introduction to 5G architecture and use cases. It discusses how 5G aims to support services with diverse requirements through enhanced mobile broadband, massive machine type communication, and ultra-reliable low latency communication. 5G will have several deployment scenarios including non-standalone using LTE infrastructure initially, and standalone 5G networks. The core network is expected to see the most radical innovation since 2G, moving to a cloud-native architecture with network slicing, separation of control and user plane, and network functions that can be deployed flexibly. The smart grid is presented as a challenging use case that may benefit from 5G capabilities such as low latency and connectivity of millions of devices.
Here are the key steps:
1. Kill any existing controllers running on the system
2. Clear out any existing Mininet topology using mn -c
3. Start the Ryu OpenFlow controller by running:
ryu-manager --verbose ./simple_switch_13.py
This starts the Ryu controller with the simple_switch_13.py application, which provides basic OpenFlow switch functionality. The --verbose flag prints debug information from the controller. We have now initialized the SDN environment with Ryu acting as the controller.
Emulator vs Simulator
Emulators mimic both software and hardware of a target device by recreating its processor and instruction set on a computer, slowing performance due to binary translation. Simulators mimic only software by running apps inside virtual devices on a computer OS. Emulators are useful for early testing without real devices but are slower than simulators due to binary translation between instruction sets. Certain device features like cameras cannot be tested on virtual devices.
The document discusses various types of wireless network attacks including Bluetooth, Near Field Communication (NFC), and Radio Frequency Identification (RFID) attacks. It also covers vulnerabilities in IEEE 802.11 wireless security standards and the evolution of wireless networking standards over time with increasing speeds and capabilities. Common attacks described are bluejacking, bluesnarfing, eavesdropping, man-in-the-middle, and unauthorized access of wireless networks or tagged devices. The document emphasizes the importance of securing wireless networks and devices to prevent such attacks and data theft.
Technology Manager Andreas Roessler covers 5G basics in this keynote presentation at the RF Lumination 2019 conference in February 2019.
RF Lumination 2019
"Meet 158+ years of RF design & test expertise at one event. If they can't answer your question, it must be a really good question!"
Watch all the presentations here:
https://www.rohde-schwarz-usa.com/RFLuminationContent.html
Andreas Roessler is the Rohde & Schwarz Technology Manager focused on UMTS Long Term Evolution (LTE) and LTE-Advanced. With responsibility for the strategic marketing and product portfolio development for LTE/LTE-Advanced, Andreas follows the standardization process in 3GPP very closely, particularly on core specifications as well as protocol conformance, RRM and RF conformance specifications for device and base stations testing. He graduated from Otto-von-Guericke University in Magdeburg, Germany, and received a Master's Degree in communication engineering.
Beginners: Different Types of RAN Architectures - Distributed, Centralized & ...3G4G
In this basic tutorial we look at different types of RAN architectures that are always being discussed. We start with the Distributed RAN (D-RAN) and then look at Centralized and Cloud RAN (both referred to as C-RAN) architectures. We also quickly look at RAN functional splits for 5G and then tie this all together.
We also look at how Samsung and Nokia discuss these architectures in the context of 5G.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Open RAN Page: https://www.3g4g.co.uk/OpenRAN/
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Kali Linux is a Debian-based Linux distribution designed for penetration testing and security auditing. It contains over 600 security and forensics tools for tasks like penetration testing, computer forensics, and reverse engineering. While powerful for security professionals, Kali Linux requires specialized skills and carries risks if misused due to its hacking-focused tools. The documentation discusses Kali Linux capabilities and tools, as well as providing guidance on its appropriate uses and limitations.
A high level introductory look at what is meant by Fixed Wireless Access or FWA that is being touted as one of the initial 5G use cases. This presentation (with embedded video) introduces FWA and looks at a practical deployment example.
Ten Things You Should not Forget in Mainframe Security CA Technologies
Given the current state of security and breaches in the news every day, you won’t want to miss this session. We will cover the top 10 areas that you should be reviewing as a security practitioner that most organizations overlook. With the knowledge taken from this session, you will be able to better educate your staff and auditors about how to take security to the next level for your business and protect z/OS®.
For more information, please visit http://cainc.to/Nv2VOe
Firewalls work by denying or permitting network traffic based on configured policies. A firewall protects internal networks from unauthorized external access and can also separate internal networks. Stateful firewalls are aware of network connections and maintain related information in a connection table, while stateless firewalls make decisions based only on individual packets.
Bitbucket Pipelines is an integrated CI/CD solution that allows specifying Docker containers and commands to run for each branch. It integrates with Bitbucket repositories and configures via a bitbucket-pipelines.yml file. Compared to Drone.io, it has longer build times per user, customizable builds per branch, and integrates with the Bitbucket UI. The documentation demonstrates configuring pipeline steps and debugging locally by running commands in a Docker container.
This document provides an outline for a tutorial on wireless communications with unmanned aerial vehicles (UAVs) given at the IEEE International Conference on Communications on May 24, 2019 in Shanghai, China. The 3.5 hour tutorial covers topics such as UAV applications, channel modeling fundamentals, performance of LTE and Wi-Fi for aerial users estimated through theory, simulations and measurements, and aerial base stations for future cellular networks. It provides details on the schedule, topics to be discussed, and references related materials and models for UAV wireless channel characterization.
This chapter discusses key concepts of network programming and socket-based communication between programs running on different computers. It introduces the java.net package and classes used for creating sockets and allowing message communication using TCP and UDP protocols. Example programs are provided to demonstrate how to create basic client-server applications using sockets in Java.
How to successfully migrate to Bazel from Maven or Gradle - Riga Dev DaysNatan Silnitsky
At Wix We decided to switch to the Bazel build tool. The result was a dramatic improvement in performance and accuracy.
As Wix Backend grew exponentially with more than 700 micro-services, it became obvious our build times on Maven have been slowing us down. We decided to switch to the Bazel build tool while harnessing the “remote build execution” feature. The result was a dramatic improvement in performance and accuracy of builds.
In this talk, I will share with you how to achieve a successful migration to Bazel from Maven or Gradle, focusing on 5 important areas you have to think about and decide on the right approach for you, ranging from choosing the right build unit granularity to remote caching best practices.
I will also describe and demonstrate some of the available tools in the eco-system that help with the migration and with making everyday work easier.
3GPP Standards for the Internet-of-ThingsEiko Seidel
Presenation by 3GPP RAN3 Chairman - Philippe Reininger - at the IoT Business & Technologies Congress (November 30, in Singapore). Main topics are eMTC, NB-IOT and EC-GSM-IoT as completed in 3GPP Release 13 and enhanced in Release 14
NFV +SDN
(Network Function Virtualization + Software Defined Networking)
- What, Why and When NFV and SDN?
- Basic concepts and definition of NFV, SDN.
- Benefits of NFV.
- NFV Architecture
This document provides an overview of the Kali Linux operating system. It describes Kali Linux as a Debian-based distribution aimed at advanced penetration testing and security auditing. It contains hundreds of tools for tasks like penetration testing, forensics, and reverse engineering. Kali Linux is developed and maintained by Offensive Security and was created as a rebuild of BackTrack Linux, with its first version releasing in 2013. It highlights some of Kali Linux's core developers and features, such as over 600 preinstalled applications, support for multiple languages and wireless devices, and flexibility in running on physical/virtual machines or mobile devices.
Servi sMART proposes a smart market for services that uses periodic auctions and mathematical optimization to match service requests to anonymous service providers. It aims to enforce regulation, fairness and transparency through a market algorithm. The system would compile microservices by translating existing APIs and annotating them with input/output queries. Project managers would define projects including test queries to be solved through combinations of microservices on a Graph Reactor platform. This would expand the search engine business model to generate solutions by composing microservices.
LaWzer, a still image codec designed by L. GuillemotLudovic Guillemot
LAWZER, A STILL IMAGE CODEC DESIGNED BY L. GUILLEMOT
THE LAWZER PROJECT MATERIALIZES 10 YEARS OF SCIENTIFIC CONTRIBUTIONS IN IMAGE COMPRESSION AND SOURCE CODING.
LaWzer is a personal project, a showcase for the skills and interests of its designer, Ludovic Guillemot, and a way to celebrate a regular activity in research with academic partners.
LAWZER IS A STILL IMAGE CODEC allowing to efficiently encode digital images at the desired size. LaWzer 1.0 has been developed (in C++) between July 2013 and August 2014. It includes works previously published as well as new coding algorithms specially designed for LaWzer.
LAWZER TECHNOLOGY IS BASED ON LATTICE VECTOR QUANTIZATION (LVQ) AND WAVELET TRANSFORM.
In (very) few words, LVQ is a blockwise approach i.e. the basic elements of the coding process are vectors of data. This is a highly efficient approach but usually renowned for the algorithmic complexity involved by operations on n-dimensional objects. LaWzer focuses on reversing this reputation while still improving the rate-distortion trade-off.
Because compression is a must in the big data era, we believe that some applications could be in need of a fast and efficient vectorwise compression scheme.
LAWZER V1.0 IS A PROOF OF CONCEPT.
The most challenging task was to develop a real-life codec, i.e. showing that processing n-dimensional objects was no more a technical hurdle for the execution speed. Various algorithms have been designed and implemented to reach this goal: quantizers and lossless coding, statistical estimation in wavelet domain, numerical optimization, etc.
WORK IN PROGRESS:
The first phase of the project is now achieved. One have a complete compression scheme which produces compressed files (“.law”) with short execution times (short means of the order of few seconds for very big images). But much more can be done, further versions will include enhanced coding algorithm, new functionalities (color, watermarking, etc.), code optimization, etc.
Smart Markets of Services / ATG meetup TorontoStefan Ianta
Evolutionary machine intelligence in a smart services market. Presentation at Analytics and Technology Group meetup / Ivey Tangerine Centre of Leadership, Toronto, Aug 18, 2016
3XN BIM Environment, A case study of Architecture firmDuong Binh
This document discusses various aspects of 3XN's Building Information Modeling (BIM) environment and processes, including their model splitting strategy with separate models for site, structure, envelope, interiors, and landscaping; use of worksets, design options, material patterns, wall types, and interoperability tools like Speckle and Kinship; and guidelines for project setup, naming conventions, and template content. It provides an overview of 3XN's digital workflows and tools for collaborative BIM project delivery.
Clean Architecture A Craftsman’s Guide to Software Structure and Design by Ro...HbBazan
This document is the preface to the book "Clean Architecture" by Robert C. Martin. It provides background on why the author chose the title "Clean Architecture" and his motivations for writing the book. Some key points:
- The author has been writing code for over 50 years, since 1964, giving him significant experience to draw from.
- Through this long career, he has seen many software projects fail due to architectural problems, despite the quality of the code. This motivated him to research architectural patterns and principles.
- The book aims to teach proven architectural principles and patterns so readers can design and develop software that is robust, maintainable, and long-lasting like physical structures. The title "
The document discusses the PipeFab plugin for Revit, which automates pipe fabrication and drafting. It reduces production of installation drawings by 60%. The plugin lists pipes, exports data to Excel, and generates CNC files. It provides direction labels and exports cutting sheets to Excel for easier review. The document also discusses several other BIM projects for facilities in Saudi Arabia.
The document discusses architectural analysis, which involves discovering important system properties using architectural models. It covers the goals of analysis including completeness, consistency, compatibility, and correctness. Additionally, it examines the scope of analysis, level of formality, type of analysis, and stakeholders involved in the analysis process.
The document discusses domain-specific software engineering (DSSE). It explains that DSSE involves exploiting common solutions to common problems once multiple similar systems have been built in a domain. DSSE maps domains to domain-specific software architectures (DSSAs) and involves three key factors - the domain being addressed, relevant business goals, and available technologies. An effective DSSA is informed by a domain model that defines the vocabulary, entities, data, and functions of the domain.
From Copycat Codelets to an AI Market Internet ProtocolStefan Ianta
Presentation for the Transformative Code Pile 1 Programming Meetup on Aug 3, 2017 on expanding the Copycat Project into an AI Genetic Internet of Reactive Services
ABD322_Implementing a Flight Simulator Interface Using AI, Virtual Reality, a...Amazon Web Services
This workshop explores the technology options, architectures, and implementations associated with instrumenting AR, VR, and simulated worlds. Using flight simulation as the primary use case, you learn to consume, process, store, and analyze high velocity telemetry as well as exploring control plane implementations using AWS IoT, AWS Lambda, Amazon Kinesis, and Amazon SNS. This is a hands-on workshop and you need a laptop (tablets are not suitable). You should have a solid understanding of AWS products and Node.js.
Heb je ook een onderbuik gevoel dat er iets mis is als mensen praten over microservices? Alsof je verplicht bent services te bouwen van hooguit enkele regels code, die expliciet autonoom en los inzetbaar zijn, en altijd via REST moeten communiceren? Iedereen zegt dat je deployment goed op orde moet hebben, omdat dit anders een nachtmerrie wordt, maar niemand geeft een oplossing. In deze sessie geven we je een andere kijk op microservices en hoe je dit ook kunt implementeren binnen je bestaande architectuur.
VLSI lab manual Part A, VTU 7the sem KIT-tipturPramod Kumar S
This document provides procedures for digital and analog VLSI design experiments using CAD tools. It includes the VLSI design flow, prerequisites for using the tools, verification using simulation, and synthesis. Experiments cover digital logic gates, flip-flops, adders, counters, and analog circuits like inverters, amplifiers, and data converters. The goal is to introduce students to computer-aided design of digital and analog VLSI systems.
Opening talk at Monitorama, talks about the problems of monitoring, challenges of creating monitoring tools and why monitoring vendors keep getting disrupted. Ended with a discussion of simulation testing and serverless architectures - Monitorless.
Hatii seminar 2014 - The emerging needs and the long standing issues curating...Ruggero Lancia
On February the 4th, I have presented at the HATII, for its research seminars, a lesson entitled "The emerging needs and the long standing issues curating digital assets from the Construction Industry". In this presentation I have retraced the introduction of digital tools in the Architecture practices and delved into the recent emerging procedures in Digital Design to discuss against both the DIDECU and the DEDICATE results the issues, requirements and expected development in the Digital Curation of assets from the Construction sector.
fyp presentation of group 43011 final.pptxIIEE - NEDUET
This document presents a final year project on localization and 3D mapping for an indoor environment. The project is carried out by 4 students under the supervision of two professors. The project aims to develop a rover-based system using two low-cost 2D laser scanners to build a 3D map of the indoor environment in real-time. The methodology involves designing the rover, simulating and implementing the transformation of the laser scanners, developing a 3D mapping package on ROS, and using the rover to generate a real-time 3D map. The results from the simulation and experimental runs will be analyzed and compared to evaluate the performance of the proposed solution.
The Cytoscape Cyberinfrastructure extends Cytoscape and its community into web-connected services.The CI is a Service Oriented Architecture that supports network biology oriented computations that can be orchestrated into repeatable workflows.
Commit to the Cause, Push for Change: Contributing to Call for Code Open Sour...Daniel Krook
Materials for the OPEN TALK: Commit to the Cause, Push for Change: Contributing to Call for Code Open Source Projects session at DeveloperWeek Virtual on February 18, 2020
https://www.developerweek.com/conference/
Daniel Krook
IBM, Chief Technology Officer for the Call for Code Global Initiative
Andres Meira
Grillo, Founder & CEO
Lakshyana K.C.
Build Change, Technology Consultant
Call for Code is a multi-year program that calls on developers to create practical, effective, and high-quality applications based on one or more IBM Cloud services (for example, web, mobile, data, analytics, AI, IoT, or weather) or Red Hat platforms (including OpenShift) to build a solution that can have an immediate and lasting impact on humanitarian issues as open source projects. In this session you'll learn more about the solutions built to tackle natural hazards, climate change, and the pandemic. What sets Call for Code apart from other technology-for-good competitions is the commitment to deploy the winning solutions with the IBM Service Corps and to help teams build sustainable open source communities through The Linux Foundation. Join us at this talk to hear about the most recent winning projects, get an update on previous year's progress, and learn about how to contribute to two projects directly from the developers.
Workshop: Identifying concept inventories in agile programmingESUG
This document discusses the development of a concept inventory to identify common misconceptions in agile programming and object-oriented development. The project aims to strengthen collaboration between INRIA/Lille and ÉTS/UQAM by creating a concept inventory that can be used to improve teaching of agile development with object-oriented languages like TypeScript, JavaScript, and Pharo. The methodology involves identifying misconceptions, proposing a concept inventory, and validating it in courses by measuring understanding before and after instruction. A workshop will help identify initial misconceptions in Smalltalk/Pharo by capturing them in a collaborative tool.
This document proposes integrating documentation into the Pharo language metamodel and environment to improve documentation support. It suggests making documentation first-class citizens in Pharo by providing built-in support and a minimal API, which would allow tight integration with development tools and future extensions without requiring grammar changes or large efforts. This could improve documentation quality by enabling direct references between code and documentation and automatic logging of documentation usage.
The Pharo Debugger and Debugging tools: Advances and RoadmapESUG
This document outlines advances and the roadmap for debugging tools in Pharo. It discusses recent improvements to the debugging infrastructure, including architectural changes and new debugging commands. It also describes upcoming work, such as additional infrastructure improvements, an emergency debugger, support for meta-object protocols, a redesigned user experience, a remote debugger, and improved documentation. The document concludes by inviting participants to help evaluate new debugging experiments.
The document describes Sequence, a pipeline modeling and discrete event simulation framework developed in Pharo Smalltalk. Sequence allows describing system resources, building blocks that use those resources, assembling scenarios from blocks, collecting information during simulated runs, and interactively exploring system traces. The framework implements a discrete event simulation engine with event streams that model periodic processes and resources. Sequence provides tools for evaluating system performance through simulation before complete hardware is available.
Migration process from monolithic to micro frontend architecture in mobile ap...ESUG
This document discusses migrating a monolithic mobile application called CARL Touch to a micro frontend architecture. It presents a migration process involving three steps: 1) analysis of the monolithic codebase, 2) identification of potential micro frontends, and 3) transformation of the codebase to implement the identified micro frontends. Previous experiments at Berger-Levrault involving two teams migrating CARL Touch provided insights. The proposed process uses static and dynamic analysis, code visualization and clustering techniques to help identify optimal micro frontends and transform the codebase in a semi-automated manner.
Analyzing Dart Language with Pharo: Report and early resultsESUG
This document summarizes an analysis of the Dart programming language using tools in the Pharo environment. It describes generating a parser for Dart using SmaCC, which produces an AST. It also details defining a Famix meta-model for Dart and the Chartreuse-D importer that creates a FamixDart model from the AST. Future work is outlined, including improving SmaCCDart, continuing to develop the FamixDart meta-model, and handling dynamic types when importing associations. The goal is to analyze Dart and explore modeling Flutter applications.
Transpiling Pharo Classes to JS ECMAScript 5 versus ECMAScript 6ESUG
This document summarizes research on transpiling Pharo classes to JavaScript using ECMAScript 5 versus ECMAScript 6. It finds that transpiling to ES6 provides benefits like significantly faster load times, improved benchmark performance up to 43%, and more idiomatic code compared to ES5. However, fully emulating Smalltalk semantics like metaclass inheritance remains challenging when targeting JavaScript.
The document presents an approach for automated test generation from software models and execution traces. Key aspects of the approach include using metamodels to represent the codebase, values, and desired unit test structure. Models are built from the codebase and traces, then transformations are applied to generate unit tests conforming to the test metamodel. Abstract syntax trees are used to export the generated tests to code. The approach aims to generate tests that are relevant, readable and maintainable without relying on existing tests. An example demonstrates generating a JUnit test from an application class.
Genetic programming is used to generate unit tests by evolving test code via genetic algorithms to maximize coverage. Tests are represented as chromosomes of object and message statements. The genetic algorithm selects tests based on coverage, combines tests through crossover, and replaces tests in the population over generations to find optimal test sequences. Future work includes improving path exploration and comparing with other test generation tools.
Threaded-Execution and CPS Provide Smooth Switching Between Execution ModesESUG
Threaded execution and continuation-passing style (CPS) allow for smooth switching between execution modes in Zag Smalltalk. Threaded execution interprets code as a sequence of addresses like bytecode but is 2.3-4.7 times faster, while CPS passes continuations explicitly like in functional languages and is 3-5 times faster than bytecode. Both approaches allow fallback to debugging. The implementation shares context and stack between modes to easily switch with proper object structures.
Exploring GitHub Actions through EGAD: An Experience ReportESUG
This document summarizes an experience report on exploring GitHub Actions through EGAD, a tool for GitHub Action analysis. It discusses three key lessons learned: 1) Composing a story by documenting tasks and linking documentation to code, 2) Navigating custom views to conduct research, and 3) Supporting onboarding of researchers by assigning mentors, scheduling meetings, and encouraging use of resources. EGAD takes workflow YAML files, wraps them in a domain model to provide context, and allows inspecting examples to fully explore the GitHub Actions domain model.
Pharo: a reflective language A first systematic analysis of reflective APIsESUG
This document analyzes the reflective features and APIs in Pharo, a reflective programming language. It presents a catalog of Pharo's reflective APIs and analyzes how they relate to metaobjects. The analysis highlights areas for potential improvement, such as providing solutions for intercession on state reads/writes and addressing constraints when changing an object's class. The document contributes to understanding Pharo's reflective design and its evolution over time.
The document discusses garbage collector tuning for applications with pathological allocation patterns. It begins by explaining the motivation and issues caused by pathological patterns, such as applications taking over an hour and a half to run. It then provides an overview of garbage collection and how allocation patterns can impact performance. The document dives into two specific tuning techniques - increasing the full GC threshold to prevent premature full GCs from being triggered, and increasing the tenuring threshold to avoid large objects residing in the remembered set and slowing down scavenges. These tunings resulted in significant performance improvements for the sample DataFrame application, reducing the run time from over an hour and a half to around seven minutes.
Improving Performance Through Object Lifetime Profiling: the DataFrame CaseESUG
This document discusses improving garbage collection performance in Pharo through object lifetime profiling. It presents Illimani, a lifetime profiler developed for Pharo. Illimani was used to profile the lifetimes of objects created when loading a large DataFrame. The profiling revealed that most objects had short lifetimes, suggesting the garbage collector could be tuned. Tuning the garbage collector parameters based on the lifetime profiles improved the performance of loading the DataFrame.
This document discusses the past, present, and future of Pharo DataFrames. It began as a student project but has evolved into a mature project with dedicated engineers, improving performance and adding functionality. Future plans include further performance enhancements, adding more functionality, better integration with other Pharo projects, and support for big data. Evaluation of DataFrames is also planned.
This document discusses issues with thisContext in the Pharo debugger not correctly representing the execution context and being the DoIt context instead. This was fixed in Pharo12 by making thisContext a variable object that is wrapped in a DoItVariable, so the debugger context is used. When inspecting or doing DoIt, the doIt Variable is pushed and read to provide the proper execution context.
This document proposes using websockets to display fencing scores and a chronometer from an arena server to mobile phones over the internet in real-time. It includes links to video examples of a chronometer display and photos from fencing competitions.
ShowUs: PharoJS.org Develop in Pharo, Run on JavaScriptESUG
This document discusses PharoJS, which allows developers to develop applications in Pharo and then export them to run as JavaScript applications. PharoJS enables 100% of Pharo code to be executed during development, and then 100% of that same code is exported to JavaScript to be executed in production. The document also briefly mentions deployment options for exported PharoJS applications like GitHub Pages and GitHub Actions.
The document contains testimonials from participants of the Pharo MOOC praising its effectiveness at teaching object-oriented design. It also announces an upcoming advanced design MOOC that will have over 60 lectures, slides, videos and an exercise booklet. Finally, it provides links to the course websites and encourages people to stay tuned for the new MOOC.
A New Architecture Reconciling Refactorings and TransformationsESUG
This document discusses reconciling refactorings and transformations in software engineering. It proposes a new architecture where refactorings decorate transformations by checking preconditions and composing multiple transformations. Refactorings ensure transformations are applied safely while transformations focus on model changes. Open questions remain around precondition handling and composition semantics. The goals are to reduce duplication, support custom refactorings/transformations, and provide a modern driver-based user interface.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
4. Richard Wettel and Michele
CodeCity
The city metaphor
3
domain mapping
classes buildings
package
s
districts
system city
5. Richard Wettel and Michele
CodeCity
The city metaphor
3
domain mapping
classes buildings
package
s
districts
system city
6. Richard Wettel and Michele
CodeCity
The city metaphor
3
domain mapping
classes buildings
package
s
districts
system city
7. Richard Wettel and Michele
CodeCity
The city metaphor
3
domain mapping
classes buildings
package
s
districts
system city
8. Richard Wettel and Michele
CodeCity
The city metaphor
3
domain mapping
classes buildings
package
s
districts
system city
class metric building
propertynumber of
methods (NOM)
height
number of
attributes (NOA)
width,
length
9. Richard Wettel and Michele
CodeCity
The city metaphor
3
domain mapping
classes buildings
package
s
districts
system city
package
metric
district
propertynesting level color
class metric building
propertynumber of
methods (NOM)
height
number of
attributes (NOA)
width,
length
24. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
25. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
very high
high
average
low
very low
26. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
very high
high
average
low
very low
27. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
very high
high
average
low
very low
upper quartile
lower quartile
median
lower whisker
upper whisker
28. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
very high
high
average
low
very low
upper quartile
lower quartile
median
lower whisker
upper whisker
29. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
very high
high
average
low
very low
30. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
very high
high
average
low
very low
31. Richard Wettel and Michele
CodeCity
3. Boxplot-based mapping
10
NOM heightclustering
very high
high
average
low
very low
69. Richard Wettel and Michele
CodeCity
Class-level disharmony maps
24
KeyEvent
(NOA 205, NOM 18) java.awt.event
InputEvent
(NOA 21, NOM 14)
Frame
(NOA 33, NOM 38)
java.awt.geom
Container
(NOA 21, NOM 127)
Component
(NOA 88, NOM 280)
java.util.concurrent.locks
AbstractQueuedSynchronizer
(NOA 9, NOM 54)
String
(NOA 7, NOM 81)
Event
(NOA 84, NOM 14)
Class
(NOA 27, NOM 107)
BigInteger
(NOA 28, NOM 103)
BigDecimal
(NOA 18, NOM 96)
Security
(NOA 3, NOM 30)
java.util.regex
Pattern
(NOA 29, NOM 66)
Matcher
(NOA 17, NOM 38)
LogRecord
(NOA 17, NOM 28)
Logger
(NOA 18, NOM 53)
Font
(NOA 34, NOM 78)
KeyboardFocusManager
(NOA 33, NOM 94)
Frame
(NOA 33, NOM 38)
Calendar
(NOA 81, NOM 71)
java.util.logging
JDK 1.5
70. Richard Wettel and Michele
CodeCity
Class-level disharmony ma
25
org.argouml.reveng.java
Modeller
(NOA 15, NOM 52)
JavaRecognizer
(NOA 79, NOM 176)
org.argouml.reveng.classfile
SimpleByteLexer$GeneratorCPP
(NOA 34, NOM 100)
SimpleByteLexer$CPPParser
(NOA 85, NOM 204)
SimpleByteLexer$GeneratorPHP4
(NOA 4, NOM 33)
org.argouml.diagram.ui
FigNodeModelElement
(NOA 39, NOM 98)
FigEdgeModelElement
(NOA 13, NOM 76)
FigAssociation
(NOA 8, NOM 17)
JavaRecognizer
(NOA 24, NOM 91)
GeneratorJava
(NOA 11, NOM 66)
JavaLexer
(NOA 9, NOM 72)
org.argouml.language.java.generator
org.argouml.uml.notation.uml
org.argouml.model.mdr
FacadeMDRImpl
(NOA 3, NOM 349)
CoreHelperMDRImpl
(NOA 3, NOM 349)
Facade
(NOA 1, NOM 337)
JavaTokenTypes
(NOA 173, NOM 0)
UmlFactoryMDRImpl
(NOA 9, NOM 22)
ArgoUML
71. Richard Wettel and Michele
CodeCity
Granularity of representation
26
NOM=7
NOA
=
2
NOA = 2
class C
coarse
72. Richard Wettel and Michele
CodeCity
Granularity of representation
26
NOM=7
NOA
=
2
NOA = 2
class C
coarse fine-grained
73. Richard Wettel and Michele
CodeCity
Granularity of representation
26
NOM=7
NOA
=
2
NOA = 2
class C
class C
coarse fine-grained
74. Richard Wettel and Michele
CodeCity
Granularity of representation
26
NOM=7
NOA
=
2
NOA = 2
class C
class C
m4
m1
m3
m5 m7
m6
m2
coarse fine-grained
82. Richard Wettel and Michele
CodeCity
Modeling history: Hismo
30
Class
time
83. Richard Wettel and Michele
CodeCity
Modeling history: Hismo
30
Class
Class
Version
timetimestamp N
84. Richard Wettel and Michele
CodeCity
Modeling history: Hismo
30
Class
Class
Version
...
timetimestamp N
Class
Version
Class
timestamp 2
85. Richard Wettel and Michele
CodeCity
Modeling history: Hismo
30
Class
Class
Version
...
timetimestamp N
Class
Version
Class
timestamp 1
Class
Version
Class
timestamp 2
86. Richard Wettel and Michele
CodeCity
Modeling history: Hismo
30
Class
Class
Version
Class History
...
timetimestamp N
Class
Version
Class
timestamp 1
Class
Version
Class
timestamp 2
87. Richard Wettel and Michele
CodeCity
Visualizing evolution
31
Time travel
Age map
Timeline
fine
88. Richard Wettel and Michele
CodeCity
Visualizing evolution
31
Time travel
Age map
Timeline
fine
89. Richard Wettel and Michele
CodeCity
Visualizing evolution
31
Time travel
Age map
Timeline
fine
90. Richard Wettel and Michele
CodeCity
Consistent locality
32
A
BarFoo
Blueprint for the city,
based on the maximal
expansion of each artifact
(building, district).
91. Richard Wettel and Michele
CodeCity
Consistent locality
32
A
BarFoo
Blueprint for the city,
based on the maximal
expansion of each artifact
(building, district).
Fo
version 1
Bar
92. Richard Wettel and Michele
CodeCity
Consistent locality
32
A
BarFoo
Blueprint for the city,
based on the maximal
expansion of each artifact
(building, district).
Fo
version 1
Bar
A
Foo Ba
version 2
93. Richard Wettel and Michele
CodeCity
Consistent locality
32
A
BarFoo
Blueprint for the city,
based on the maximal
expansion of each artifact
(building, district).
Fo
version 1
Bar
A
Foo Ba
version 2
Foo
A
version 3
94. Richard Wettel and Michele
CodeCity
Age map
33
Bricks position is
chronological
neighbors are contemporary class C
95. Richard Wettel and Michele
CodeCity
Superficial glimpse in the past.
color layer according to age (number of versions)
Age map
33
Bricks position is
chronological
neighbors are contemporary class C
96. Richard Wettel and Michele
CodeCity
Superficial glimpse in the past.
color layer according to age (number of versions)
Age map
33
1N
Bricks position is
chronological
neighbors are contemporary class C
97. Richard Wettel and Michele
CodeCity
Superficial glimpse in the past.
color layer according to age (number of versions)
Age map
33
1N
Bricks position is
chronological
neighbors are contemporary class C
98. Richard Wettel and Michele
CodeCity
Superficial glimpse in the past.
color layer according to age (number of versions)
Age map
33
1N
Bricks position is
chronological
neighbors are contemporary class C
m4
m1
m3
m5
m7
m6
m2
99. Richard Wettel and Michele
CodeCity
Age map interpretation
34
age: 1 2 3 4 5 6 7 8
100. Richard Wettel and Michele
CodeCity
Age map interpretation
34
age: 1 2 3 4 5 6 7 8
stable
very old
101. Richard Wettel and Michele
CodeCity
Age map interpretation
34
age: 1 2 3 4 5 6 7 8
stable
oldvery old
rarely updated
102. Richard Wettel and Michele
CodeCity
Age map interpretation
34
age: 1 2 3 4 5 6 7 8
stable
youngoldvery old
rarely updated
highly unstable
103. Richard Wettel and Michele
CodeCity
Age map interpretation
34
age: 1 2 3 4 5 6 7 8
stable
youngoldvery old
rarely updated
highly unstable
very old
updated
often,
rather
unstable
104. Richard Wettel and Michele
CodeCity
Age map, fine-grained
35
library packages:
java
javax
junit
org.w3c.dom
(classes) AllTests
CH.ifa.draw.standard
CH.ifa.draw.framework
CH.ifa.draw.figures
CH.ifa.draw.test
class DrawApplication
in CH.ifa.draw.application
class StandardDrawingView
in CH.ifa.draw.standard.
105. Richard Wettel and Michele
CodeCity
Time travel, coarse-grained
36
ArgoUML
106. Richard Wettel and Michele
CodeCity
Time travel, coarse-grained
36
ArgoUML
107. Richard Wettel and Michele
CodeCity
Time travel, fine-grained
37
JHotDraw
108. Richard Wettel and Michele
CodeCity
Time travel, fine-grained
37
JHotDraw