This document discusses comets, asteroids, and meteors. Comets are dirty balls of ice that develop tails when passing near the sun. Asteroids are large chunks of rock and metal that orbit the sun. When asteroids and comet fragments enter Earth's atmosphere, they are called meteoroids. Most burn up and are seen as meteors, also known as shooting stars. If fragments survive entry and reach the ground, they are called meteorites. Large impacts from asteroids or comets in the past have created craters and possibly contributed to mass extinctions like the dinosaurs.
Earthquake waves and types of faults caused by earthquake Udayram Patil
unstable movement of ground is known as earthquake . Earthquake is transferred by waves known as Primary waves and secondary waves.
Effect of earthquake includes faults. There are three types of faults caused by earthquake .
This is all about comets. Their parts, their origin, and this also have The Top 10 Famous Comets. This also have the definition of the Kuiper Belt and the Oort Cloud. Have a Blast!!!
Earthquake waves and types of faults caused by earthquake Udayram Patil
unstable movement of ground is known as earthquake . Earthquake is transferred by waves known as Primary waves and secondary waves.
Effect of earthquake includes faults. There are three types of faults caused by earthquake .
This is all about comets. Their parts, their origin, and this also have The Top 10 Famous Comets. This also have the definition of the Kuiper Belt and the Oort Cloud. Have a Blast!!!
In this interactive and informative presentation, 8th-grade students will explore the fascinating members of our solar system and learn about the crucial role artificial satellites play in space exploration. From the blazing sun to the mysterious outer planets, students will embark on a journey through the cosmos, discovering each celestial body's unique characteristics and features. Through engaging visuals and interactive activities, students will gain a deep understanding of the wonders of our solar system and the important tools used to explore it.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
5. Comets………Dirty Balls of Ice
They look like a star
with a ghostly
white tail.
The term "comet"
derives from the
Greek aster
kometes, which
means "longhaired star"---a
reference to the
tail.
6. Comets………Dirty Balls of Ice
They can be seen by us only when they
pass by the sun and the sun’s heat
melts them.
The comet's tail is made of material
from the comet; gas
from the ices and dust that is mixed
in with the ice. They escape as the
comet melts.
The tail always points away from the
sun due to the solar winds
(movement of heat away from sun)
7. They travel around the sun in long
looping orbits that bring them near the
sun on one end and around Jupiter on
the other end.
Example:
If a comet has a large orbit, it takes a
long time to go around the Sun.
Some comets are "short-period"
comets that take five or ten years to
complete an orbit. Some comets are
"long-period" comets that take
decades, centuries, or millenia to
orbit the Sun.
8. Comets………Dirty Balls of Ice
The icy, hard part of the comet is
called the nucleus. As the comet
melts, sometimes large chunks of ice
break off in a hurry and large
amounts of gases escape at once
and cause a bright “outburst”.
The gas and dust are released and
form an atmosphere around the
comet called the coma.
9. After 500 or so
passes near the
Sun off most of
a comet's ice
and gas is lost
leaving a rocky
object very
much like an
asteroid in
appearance.
10. Asteroids……Rockin’ Around
Asteroids are
LARGE chunks
of rock and metal
that orbit the sun.
They range from just
over ½ a mile
(1km) to a few
hundred miles in
diameter
(diameter = how
wide across)
11. Most asteroids travel
in the wide gap
between the inner
planets and outer
planets (between
Mars and Jupiter).
But a few travel in
paths across Mar’s
orbit and some
even cross in Earth’s
orbit.
12. Most of the chunks or
rock and metal in
space came together
long ago to form the
planets and moons.
Asteroids are leftover pieces of rock
from when the solar
system was formed.
13.
14. How are meteorites
related to
asteroids?
Meteorites are pieces of
asteroids - or sometimes planets
or the Moon.
15. Key Questions:
1.Has Earth ever been hit by
a comet or an asteroid? If
yes, how have such impacts
affected Earth?
2.How often does a comet or
an asteroid hit Earth?
16. Module 3 Activity 1:
(Simulation Activity)
What happens when a comet or an
asteroid hits Earth?
Main objective
- describe how impact craters are
formed when a comet or asteroid hits
Earth, based on a simulation
17.
18.
19.
20. QUESTIONS:
Q1. What do you notice about the shape
of your pebble’s crater and the shape of
the impact crater shown in the photo?
Q2. What do you think happened to the
plants and animals living in the area where
the comet or asteroid crashed?
Q3. Which is most likely to make a more
frequent “visitor” of Earth: a comet or an
asteroid? Why do you think so?
28. Barringer’s Crater
An iron meteorite 100 feet across and 70,000 tons
slamed into the Earth at about 43,000mph in the
Arizona desert near Flagstaff 40,000 years ago.
Barringer Crater is 4,100 feet wide and 571 feet deep.
29.
30. Key Ideas
Some comets and asteroids may
become Near-Earth Objects as they
orbit the Sun.
Other planets in the Solar System
(gravity) are believed to affect the
NEOs’ orbits, thus they crashed into
Earth.
Comets and asteroids have hit Earth
in the past.
31. An impact crater is formed on the ground
where a comet, asteroid, or their
fragments hit Earth's surface.
Large-scale impacts changed the physical
geography of the surrounding, killed
living creatures in the surrounding
area, and most probably caused global
climate change (e.g., ice age).
Comets and asteroids have similarities
and differences (Table 1). Their major
differences are in their origin and
composition.
44. Answer
A meteor shower happens when Earth
passes through the orbit of a comet
(or an asteroid) where fragments and
dust remain in orbit and orbits the
Sun as well while Earth goes around
the Sun. Since there are more dust
and fragments, there are more
meteoroids that may burn up in
Earth’s atmosphere as Earth passes
the orbit of the parent comet or
asteroid.
45.
46.
47. What have we learned?
• Why is there an asteroid belt?
Orbital resonances with
Jupiter disrupted the orbits of
planetesimals, preventing
them from accreting into a
planet. Those that were not
ejected from this region make
• How are meteorites related to
up the asteroid belt today.
asteroids?
Most asteroids in other regions
Most meteorites are pieces of
of the inner solar system
asteroids. Primitive meteorites
accreted into one of the
are essentially unchanged
planets.
since the birth of the solar
system. Processed meteorites
are fragments of larger
asteroids that underwent
differentiation.
48. Comets and asteroids may break
apart while orbiting the Sun.
These smaller fragments are
called meteoroids.
Rock fragments coming from
the Moon, Mars, and other
planets are also called
meteoroids.
49. The meteoroid burns as it
enters Earth’s
atmosphere. Surviving
fragments that land on
Earth are called
meteorites.
Meteor and meteor
showers are light
phenomena.
50. Meteors…Shooting Stars or Space
Garbage
Meteors are also called
shooting stars
Meteors are small pieces of
space debris (junk) pulled
into Earth’s atmosphere by
gravity.
Meteorites are metallic rocks
broken off from asteroids and
comets
Meteors fall to Earth at speeds
from 22,000 MPH to 64,000
MPH (8x shuttle speed)
You Can Buy Meteors-
51. Most meteors are only as
big as a grain of sand.
Most burn up while
entering Earth’s
Atmosphere
However………………
They can be bigger.
Craters in the Earth and
ones studied below the
surface show that one
about the size of a house
landed about 250,000
years ago! Is that what
killed the dinosaurs???
52. Meteors are
falling all the
time.
On a clear, dark
night you may
see one.
During the annual
meteor storms,
you may see 100
per hour.
53. How can something as small as a grain
of sand light up so brightly?
Entering the Earth’s atmosphere so fast
creates a lot of friction. The friction
causes them to heat up and give off
light.
The light trail may stay in the sky for up
to 30 minutes and end with a “POP”.
REALLY bright meteors are called
54.
55. What’s That Up In The
Sky???
COMETS
ASTEROIDS
METEORS
Made of icehave tails
Made of rock
and metal
Made of rock
and metal
Stay in space
Stay in space
Fall into Earth’s
atmosphere
Orbit the sun
Orbit the sun
Gravity pulls to
Earth; they burn
up as they fall