The unprecedented growth of microservices changed the behavioural traits of an average developer. In this brief presentation, i'm going to touch up on various concepts of microservices which empowered an average developer to become and entrepreneur.
A presentation on Social Network Analysis & network graphing using #Python, NetworkX, Graph-Tool and Gephi. Presented to the Ottawa Python Meetup group on August 27, 2015.
Examples include graphing of twitter data for the #Rstats and #Python communities based on 1000 tweet samples per community.
The document discusses choosing the right database for a project. It explains that the size and shape of the data, how the data will be retrieved, and costs should be considered. The questions that are asked about the data will determine the best database choice, such as if the data is big and needs to be distributed, how it will be retrieved through an API, and if it involves complex relationships. Relational databases may be best for smaller fixed data, while NoSQL options provide more flexibility but require choosing between consistency, availability and partition tolerance.
The document discusses different types of databases and when each may be suitable. It begins with an introduction to the author and their background. It then discusses key differences between SQL and NoSQL databases, such as how SQL databases are better for large amounts of structured data while NoSQL databases can be useful for unstructured or distributed data. The document emphasizes that the type of database chosen depends on factors like the size and shape of the data as well as how the data will be used. Specific databases are described like MongoDB, Elasticsearch, Neo4j and others.
A real-world example with Microsoft Graph API and OutlookHansamali Gamage
What if you have hundreds of invoices landed in your Outlook as in the email. And you need a way of processing them into real invoices or maybe store in a database. Lets discuss how to do this using Microsoft Graph API, Outlook and Azure functions.
This talk introduces microservices as a tool in an API developer's arsenal. We'll introduce what they are, see how and why they could fit into a modern application (and when they may not), and tools that will make dealing with a microservices architecture easier than ever before.
This document outlines the steps taken to analyze Twitter data on the hashtag #PAPUA using various natural language processing and machine learning techniques. It describes crawling Twitter data, preprocessing the data by cleaning it, and then applying sentiment analysis, clustering, social network analysis, and latent Dirichlet allocation. The results of these analyses are then visualized.
The document provides an overview of SQL and NoSQL databases. It begins with introductions to SQL theory, including the SQL standard, relational database management systems (RDBMS), and ACID transactions. It discusses how SQL can scale vertically but has challenges scaling writes horizontally. The document then covers NoSQL databases like DynamoDB, Cassandra, and Neo4j. It explains that NoSQL databases sacrifice consistency for availability and discusses when different database types may be preferable depending on use cases and data shape.
Knowledge and identification of Malware binaries is a crucial part of detection and incident response. There was a time when using MD5s was sufficient to ID binaries. The reverse engineering analysis conducted once would be useful anytime that same MD5 hash was seen again. This has rapidly changed in recent years. Polymorphic samples of the same specimen change the file hash (MD5, SHAx etc) without much effort by the attacker. Also, cyber criminals and advanced adversaries reuse their codebase to create newer versions of their malware, but changes in the file hash disallow any opportunity to connect and leverage previous analyses of similar samples by defenders. This gives them an asymmetric advantage.
In recent years, there has been research into “similarity metrics”― methods that can identify whether, or to what degree, two malware binaries are similar to each other. Imphash, ssdeep and sdhash are examples of such techniques. In this talk, Bhavna will review which of these techniques is more suitable for evaluating similarities in code for APT related samples. This presentation will take a data analytics approach. We will look at binary samples from APT events from Jan- Mar 2015 and create clusters of similar binaries based on each of the three similarity metrics under consideration. We will then evaluate the accuracy of the clusters and examine their implications on the effectiveness of each technique in identifying provenance of an APT related binary. This can aid Incident responders in connecting otherwise disparate infections in their environment to a single threat group and apply past analyses of the abilities and motivations of that adversary to conduct more effective response.
A presentation on Social Network Analysis & network graphing using #Python, NetworkX, Graph-Tool and Gephi. Presented to the Ottawa Python Meetup group on August 27, 2015.
Examples include graphing of twitter data for the #Rstats and #Python communities based on 1000 tweet samples per community.
The document discusses choosing the right database for a project. It explains that the size and shape of the data, how the data will be retrieved, and costs should be considered. The questions that are asked about the data will determine the best database choice, such as if the data is big and needs to be distributed, how it will be retrieved through an API, and if it involves complex relationships. Relational databases may be best for smaller fixed data, while NoSQL options provide more flexibility but require choosing between consistency, availability and partition tolerance.
The document discusses different types of databases and when each may be suitable. It begins with an introduction to the author and their background. It then discusses key differences between SQL and NoSQL databases, such as how SQL databases are better for large amounts of structured data while NoSQL databases can be useful for unstructured or distributed data. The document emphasizes that the type of database chosen depends on factors like the size and shape of the data as well as how the data will be used. Specific databases are described like MongoDB, Elasticsearch, Neo4j and others.
A real-world example with Microsoft Graph API and OutlookHansamali Gamage
What if you have hundreds of invoices landed in your Outlook as in the email. And you need a way of processing them into real invoices or maybe store in a database. Lets discuss how to do this using Microsoft Graph API, Outlook and Azure functions.
This talk introduces microservices as a tool in an API developer's arsenal. We'll introduce what they are, see how and why they could fit into a modern application (and when they may not), and tools that will make dealing with a microservices architecture easier than ever before.
This document outlines the steps taken to analyze Twitter data on the hashtag #PAPUA using various natural language processing and machine learning techniques. It describes crawling Twitter data, preprocessing the data by cleaning it, and then applying sentiment analysis, clustering, social network analysis, and latent Dirichlet allocation. The results of these analyses are then visualized.
The document provides an overview of SQL and NoSQL databases. It begins with introductions to SQL theory, including the SQL standard, relational database management systems (RDBMS), and ACID transactions. It discusses how SQL can scale vertically but has challenges scaling writes horizontally. The document then covers NoSQL databases like DynamoDB, Cassandra, and Neo4j. It explains that NoSQL databases sacrifice consistency for availability and discusses when different database types may be preferable depending on use cases and data shape.
Knowledge and identification of Malware binaries is a crucial part of detection and incident response. There was a time when using MD5s was sufficient to ID binaries. The reverse engineering analysis conducted once would be useful anytime that same MD5 hash was seen again. This has rapidly changed in recent years. Polymorphic samples of the same specimen change the file hash (MD5, SHAx etc) without much effort by the attacker. Also, cyber criminals and advanced adversaries reuse their codebase to create newer versions of their malware, but changes in the file hash disallow any opportunity to connect and leverage previous analyses of similar samples by defenders. This gives them an asymmetric advantage.
In recent years, there has been research into “similarity metrics”― methods that can identify whether, or to what degree, two malware binaries are similar to each other. Imphash, ssdeep and sdhash are examples of such techniques. In this talk, Bhavna will review which of these techniques is more suitable for evaluating similarities in code for APT related samples. This presentation will take a data analytics approach. We will look at binary samples from APT events from Jan- Mar 2015 and create clusters of similar binaries based on each of the three similarity metrics under consideration. We will then evaluate the accuracy of the clusters and examine their implications on the effectiveness of each technique in identifying provenance of an APT related binary. This can aid Incident responders in connecting otherwise disparate infections in their environment to a single threat group and apply past analyses of the abilities and motivations of that adversary to conduct more effective response.
Statistical Programming with JavaScriptDavid Simons
Almost every application needs data to function - and if you don't know how to be nice to your data, then things will start to go wrong. This talk aims to convince JavaScript developers that they do need to care about statistics, and then talk about how to do so. We look at some theory and lots of case studies and real-world advice to deal with a range of scenarios.
The talk aims to touch on the entire data life cycle: We'll dive into data modelling and how the shape and size of your data affects your architecture, and how to build these architectures using JavaScript. Once the data is in the front-end, we'll touch on the wide range of libraries that allows your code to react based on the data, and the wrappers on top that aid visualisation and readability.
Master’s voice: the rise of voice assistantsDaniel Harvey
Siri. Alexa. Google. Voice computing is emerging as the next wave of “no ui” in the post-smartphone world. What’s the current context for this paradigm shift? What’s around the corner in the next 3-5 years? How will this change the way writers and UX people work?
Visibility into your applications and systems is critical in guarding against errors, maintaining uptime, and protecting performance. In this session, learn how DevOps enables us to build better systems by leveraging the perspectives of different teams in order to gain that visibility.
The CIA Mindset: Securing Your WordPress Code” on March 19th. Using the classic CIA Security Triad, David will explore how developers can have more confidence in the Confidentiality, Integrity and Availablity regarding their own WordPress Sites, plugins and themes.
SEWM'14 keynote: Mining Events from Multimedia StreamsJonathon Hare
Keynote at the ICMR 2014 Workshop on Social Events in Web Multimedia (SEWM). Glasgow, UK. 1st April 2014.
The aggregation of items from social media streams, such as Flickr photos and Twitter tweets, into meaningful groups can help users contextualise and effectively consume the torrents of information on the social web. This task is challenging due to the scale of the streams and the inherently multimodal nature of the information being contextualised.
In this talk we’ll describe some of our recent work on trend and event detection in multimedia data streams. We focus on scalable streaming algorithms that can be applied to multimedia data streams from the web and the social web. The talk will cover two particular aspects of our work: mining Twitter for trending images by detecting near duplicates; and detecting social events in multimedia data with streaming clustering algorithms. We will describe in detail our techniques, and explore open questions and areas of potential future work, in both these tasks.
Mining Events from Multimedia Streams (WAIS Research group seminar June 2014)Jonathon Hare
The document discusses mining meaningful events and trends from multimedia streams on social media. It describes challenges including dealing with massive amounts of data and making effective use of different modalities. It then presents two case studies: monitoring Twitter's visual pulse by detecting trending images, and detecting social events from a Flickr image collection using features like time, location, text and image similarities between photos. Clustering algorithms are used to group related photos into events. Feature weighting is also explored to determine the most important features for separating events.
From Content Strategy to Drupal Site Building - Connecting the dotsRonald Ashri
Content strategy is, undoubtedly, a hot topic these days. A lot is being said that spans the range from concerns regarding the ability to display content on any device to the ability to drive engagement and increase traffic through better content creation and social media strategies. In this presentation we will connect the dots between these issues and practical Drupal site-building concerns with tools that are readily available now.
We will show, through specific examples and references to available modules, how different approaches to content strategy can be practically implemented on Drupal sites. The aim is to equip Drupal site-builders with a handy toolkit that will allow them to both implement a content strategy for their sites as well as better exchange information with content strategists.
The examples will include:
- Different approaches to building content types so as to empower content creators to create a range of different structures.
- Best practices in using vocabularies (fixed, open, user-generated, moderated, etc) or where alternative categorization methods may be relevant.
We will also discuss:
- Editorial calendars and scheduling.
- The true benefit of workflows (and how, sometimes, they can be a disadvantage).
- Analytics and how the ability to measure the effects of any strategy is as important as defining the strategy itself.
Attendees will go away with practical examples and techniques that they can apply to their sites as well as a better understanding of what content strategy really is and how they can use it to improve their sites.
The examples are a result of our own experiences in helping both clients develop their content strategy as well as applying it on italymagazine.com, an in-house product of ours. We grew italymagazine.com to a relevant online digital brand with a strong community by expressing our content strategy ideas through the tools that Drupal 7 made available to us. The resulting ~250% increase in traffic over 3 months is a testament to both the value of a content strategy as well as the power of Drupal to allow you to flexibly and iteratively support it.
Hbase and phoenix usage at eHarmony. Presented the lambda architecture and implementation of HBase and phoenix usage in eharmony at Apache PhoenixCon 2016.
Gain Maximum Visibility into Your Applications - DEM03 - Chicago AWS SummitAmazon Web Services
Visibility into your applications and systems is critical to guarding against errors, maintaining uptime, and protecting performance. In this session, we show how DevOps enables us to build better systems by leveraging the perspectives of different teams in order to gain that visibility. This session is brought to you by AWS partner, Datadog.
The document provides planning and travel tips for an upcoming trip to the United States to attend conferences in San Francisco, Mountain View, Las Vegas, and the AWS Re:Invent event in Las Vegas. It discusses preparing ESTA registration, packing appropriate clothing and items, using Uber and ZipSIM for transportation and WiFi, safety tips for being in Las Vegas and on the Las Vegas Strip, basic casino etiquette, and attending and participating in events at Re:Invent like the hackathon, workshops, and pub crawl. The goal is for the CTO to learn from the conferences and events and have an enjoyable trip abroad.
The document outlines plans for an trip to the US to attend WWDC and other tech conferences. It details travel plans from Japan including flights, hotels, packing, and obtaining an ESTA visa. Transportation and activity plans are provided for the US trip, including using Uber and Yelp to get around San Jose and attending events at WWDC and other conferences.
2014 06-25 velocity sc natives are getting restlessBuddy Brewer
The document discusses various challenges and considerations around mobile performance and monitoring. It covers familiar problems like performance by geography and network calls. It also discusses unfamiliar problems such as crash reporting, app store approval times, and upgrade adoption. Finally, it analyzes several monitoring tools that can help with issues like crash diagnostics, backend application performance monitoring, and correlating performance metrics with business metrics.
This document discusses online communication and best practices. It provides an overview of the evolution of online communication from 1995 to present day, highlighting the integration of online and offline channels. The document emphasizes that online communication requires asset management and presenting content across channels in a consistent way.
The document discusses various topics related to machine learning and artificial intelligence including computer vision APIs, natural language processing, bias in algorithms, and applications of AI in areas like healthcare and for social good. Specific models and algorithms mentioned include LUIS, neural networks, naive Bayes, and nearest neighbors. Concerns about privacy, transparency, and potential harms of AI are also addressed.
Trust, Elections and Twitter (fscons 2017)Patricia Aas
September 1st 2017 the Norwegian government issued a regulation that mandated that all votes in the upcoming parliamentary election (10 days later) had to be counted manually at least once. This talk describes the personal Twitter campaign that preceded it and how the public and the media have power and influence when they join forces.
Data Interoperability for Learning Analytics and Lifelong LearningMegan Bowe
This document discusses the need for data interoperability to enable lifelong learning analytics. It notes that currently most learning analytics focus on understanding and optimizing formal learning environments rather than the learner perspective across multiple contexts. The lack of interoperability between different education systems means data is often stored in incompatible ways, making analysis difficult. The document proposes using open standards like xAPI to better link learning data across systems and support personalized, lifelong learning through interoperable analysis.
The document provides tips and advice for lifelong learning. It emphasizes that education is a continuous journey, and learning happens through practice, challenging work, teaching others, and connecting with a community of learners. It encourages pursuing useful information, adopting coding standards, studying tools, and sharing work with others to help learning grow.
100% Visibility - Jason Yee - Codemotion Amsterdam 2018Codemotion
Monitoring systems has traditionally been the responsibility of Ops teams. But our goal is to align devs, ops, & other roles in the organization (aka DevOps), so we need to ensure they are all monitoring critical business systems & do so in ways that take advantage of the unique perspective that each role offers. In this session, I’ll break down the expansive monitoring landscape into 5 categories that each provide a unique view of your systems. I’ll show how each category allows your team to have complete observability, avoid blind spots, & work together to quickly resolve issues & outages.
To guard against errors, maintain uptime, and protect performance, it is critical to have visibility into your applications and systems. In this session, learn how DevOps enables us to build better systems by leveraging the perspectives of different teams to gain that visibility.
The document discusses best practices for web developers working with clients. It recommends that developers focus on providing expertise rather than time or tools. Developers should use platforms like WordPress and Drupal to empower clients to add and manage frequent content updates independently while restricting page edits and design changes. The document also lists various technologies, tools, and skills relevant to web development.
Statistical Programming with JavaScriptDavid Simons
Almost every application needs data to function - and if you don't know how to be nice to your data, then things will start to go wrong. This talk aims to convince JavaScript developers that they do need to care about statistics, and then talk about how to do so. We look at some theory and lots of case studies and real-world advice to deal with a range of scenarios.
The talk aims to touch on the entire data life cycle: We'll dive into data modelling and how the shape and size of your data affects your architecture, and how to build these architectures using JavaScript. Once the data is in the front-end, we'll touch on the wide range of libraries that allows your code to react based on the data, and the wrappers on top that aid visualisation and readability.
Master’s voice: the rise of voice assistantsDaniel Harvey
Siri. Alexa. Google. Voice computing is emerging as the next wave of “no ui” in the post-smartphone world. What’s the current context for this paradigm shift? What’s around the corner in the next 3-5 years? How will this change the way writers and UX people work?
Visibility into your applications and systems is critical in guarding against errors, maintaining uptime, and protecting performance. In this session, learn how DevOps enables us to build better systems by leveraging the perspectives of different teams in order to gain that visibility.
The CIA Mindset: Securing Your WordPress Code” on March 19th. Using the classic CIA Security Triad, David will explore how developers can have more confidence in the Confidentiality, Integrity and Availablity regarding their own WordPress Sites, plugins and themes.
SEWM'14 keynote: Mining Events from Multimedia StreamsJonathon Hare
Keynote at the ICMR 2014 Workshop on Social Events in Web Multimedia (SEWM). Glasgow, UK. 1st April 2014.
The aggregation of items from social media streams, such as Flickr photos and Twitter tweets, into meaningful groups can help users contextualise and effectively consume the torrents of information on the social web. This task is challenging due to the scale of the streams and the inherently multimodal nature of the information being contextualised.
In this talk we’ll describe some of our recent work on trend and event detection in multimedia data streams. We focus on scalable streaming algorithms that can be applied to multimedia data streams from the web and the social web. The talk will cover two particular aspects of our work: mining Twitter for trending images by detecting near duplicates; and detecting social events in multimedia data with streaming clustering algorithms. We will describe in detail our techniques, and explore open questions and areas of potential future work, in both these tasks.
Mining Events from Multimedia Streams (WAIS Research group seminar June 2014)Jonathon Hare
The document discusses mining meaningful events and trends from multimedia streams on social media. It describes challenges including dealing with massive amounts of data and making effective use of different modalities. It then presents two case studies: monitoring Twitter's visual pulse by detecting trending images, and detecting social events from a Flickr image collection using features like time, location, text and image similarities between photos. Clustering algorithms are used to group related photos into events. Feature weighting is also explored to determine the most important features for separating events.
From Content Strategy to Drupal Site Building - Connecting the dotsRonald Ashri
Content strategy is, undoubtedly, a hot topic these days. A lot is being said that spans the range from concerns regarding the ability to display content on any device to the ability to drive engagement and increase traffic through better content creation and social media strategies. In this presentation we will connect the dots between these issues and practical Drupal site-building concerns with tools that are readily available now.
We will show, through specific examples and references to available modules, how different approaches to content strategy can be practically implemented on Drupal sites. The aim is to equip Drupal site-builders with a handy toolkit that will allow them to both implement a content strategy for their sites as well as better exchange information with content strategists.
The examples will include:
- Different approaches to building content types so as to empower content creators to create a range of different structures.
- Best practices in using vocabularies (fixed, open, user-generated, moderated, etc) or where alternative categorization methods may be relevant.
We will also discuss:
- Editorial calendars and scheduling.
- The true benefit of workflows (and how, sometimes, they can be a disadvantage).
- Analytics and how the ability to measure the effects of any strategy is as important as defining the strategy itself.
Attendees will go away with practical examples and techniques that they can apply to their sites as well as a better understanding of what content strategy really is and how they can use it to improve their sites.
The examples are a result of our own experiences in helping both clients develop their content strategy as well as applying it on italymagazine.com, an in-house product of ours. We grew italymagazine.com to a relevant online digital brand with a strong community by expressing our content strategy ideas through the tools that Drupal 7 made available to us. The resulting ~250% increase in traffic over 3 months is a testament to both the value of a content strategy as well as the power of Drupal to allow you to flexibly and iteratively support it.
Hbase and phoenix usage at eHarmony. Presented the lambda architecture and implementation of HBase and phoenix usage in eharmony at Apache PhoenixCon 2016.
Gain Maximum Visibility into Your Applications - DEM03 - Chicago AWS SummitAmazon Web Services
Visibility into your applications and systems is critical to guarding against errors, maintaining uptime, and protecting performance. In this session, we show how DevOps enables us to build better systems by leveraging the perspectives of different teams in order to gain that visibility. This session is brought to you by AWS partner, Datadog.
The document provides planning and travel tips for an upcoming trip to the United States to attend conferences in San Francisco, Mountain View, Las Vegas, and the AWS Re:Invent event in Las Vegas. It discusses preparing ESTA registration, packing appropriate clothing and items, using Uber and ZipSIM for transportation and WiFi, safety tips for being in Las Vegas and on the Las Vegas Strip, basic casino etiquette, and attending and participating in events at Re:Invent like the hackathon, workshops, and pub crawl. The goal is for the CTO to learn from the conferences and events and have an enjoyable trip abroad.
The document outlines plans for an trip to the US to attend WWDC and other tech conferences. It details travel plans from Japan including flights, hotels, packing, and obtaining an ESTA visa. Transportation and activity plans are provided for the US trip, including using Uber and Yelp to get around San Jose and attending events at WWDC and other conferences.
2014 06-25 velocity sc natives are getting restlessBuddy Brewer
The document discusses various challenges and considerations around mobile performance and monitoring. It covers familiar problems like performance by geography and network calls. It also discusses unfamiliar problems such as crash reporting, app store approval times, and upgrade adoption. Finally, it analyzes several monitoring tools that can help with issues like crash diagnostics, backend application performance monitoring, and correlating performance metrics with business metrics.
This document discusses online communication and best practices. It provides an overview of the evolution of online communication from 1995 to present day, highlighting the integration of online and offline channels. The document emphasizes that online communication requires asset management and presenting content across channels in a consistent way.
The document discusses various topics related to machine learning and artificial intelligence including computer vision APIs, natural language processing, bias in algorithms, and applications of AI in areas like healthcare and for social good. Specific models and algorithms mentioned include LUIS, neural networks, naive Bayes, and nearest neighbors. Concerns about privacy, transparency, and potential harms of AI are also addressed.
Trust, Elections and Twitter (fscons 2017)Patricia Aas
September 1st 2017 the Norwegian government issued a regulation that mandated that all votes in the upcoming parliamentary election (10 days later) had to be counted manually at least once. This talk describes the personal Twitter campaign that preceded it and how the public and the media have power and influence when they join forces.
Data Interoperability for Learning Analytics and Lifelong LearningMegan Bowe
This document discusses the need for data interoperability to enable lifelong learning analytics. It notes that currently most learning analytics focus on understanding and optimizing formal learning environments rather than the learner perspective across multiple contexts. The lack of interoperability between different education systems means data is often stored in incompatible ways, making analysis difficult. The document proposes using open standards like xAPI to better link learning data across systems and support personalized, lifelong learning through interoperable analysis.
The document provides tips and advice for lifelong learning. It emphasizes that education is a continuous journey, and learning happens through practice, challenging work, teaching others, and connecting with a community of learners. It encourages pursuing useful information, adopting coding standards, studying tools, and sharing work with others to help learning grow.
100% Visibility - Jason Yee - Codemotion Amsterdam 2018Codemotion
Monitoring systems has traditionally been the responsibility of Ops teams. But our goal is to align devs, ops, & other roles in the organization (aka DevOps), so we need to ensure they are all monitoring critical business systems & do so in ways that take advantage of the unique perspective that each role offers. In this session, I’ll break down the expansive monitoring landscape into 5 categories that each provide a unique view of your systems. I’ll show how each category allows your team to have complete observability, avoid blind spots, & work together to quickly resolve issues & outages.
To guard against errors, maintain uptime, and protect performance, it is critical to have visibility into your applications and systems. In this session, learn how DevOps enables us to build better systems by leveraging the perspectives of different teams to gain that visibility.
The document discusses best practices for web developers working with clients. It recommends that developers focus on providing expertise rather than time or tools. Developers should use platforms like WordPress and Drupal to empower clients to add and manage frequent content updates independently while restricting page edits and design changes. The document also lists various technologies, tools, and skills relevant to web development.
The document discusses web application hacking and penetration testing. It introduces the Zed Attack Proxy (ZAP) tool for testing web applications. ZAP allows intercepting proxies, active and passive scanning, spidering, brute force tests, fuzzing and more. The document also lists other scanning and enumeration tools like Arachni, Wapiti, OpenVas and Nmap. It discusses penetration testing operating systems like Kali Linux and provides references for common vulnerabilities.
From Content Strategy to Drupal Site Building - Connecting the DotsRonald Ashri
The document discusses connecting content strategy to building Drupal sites. It defines content strategy as understanding user and organizational needs to produce and govern content. Successful content strategy allows flexible, findable, and measurable content. Building Drupal sites involves modeling content types and relationships using entities, fields, taxonomies, and modules. Content audits and models are created to meet goals. Content is then produced, published, and measured according to strategy. User engagement must also be considered.
Chris Johnson, General Manager of Provoke Solutions in Seattle, gave a presentation on Yammer. He discussed Yammer 101 including how it is like Facebook for the enterprise. He reviewed Microsoft's vision for social which includes integrating Yammer and Office 365. He also covered how to decide between social options in the cloud or on-premises and how to develop with the Yammer APIs.
David Gevorkyan graduated from AUA in 2008. He discusses big data, data science, and how eHarmony uses these fields to create successful relationships. eHarmony collects vast amounts of user data through detailed questionnaires and analyzes this data using algorithms to make compatibility match recommendations to users.
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitAmazon Web Services
Within complex systems, even well-written code can behave in unexpected ways and lead to outages and critical issues. Amazon Elastic Container Service for Kubernetes (Amazon EKS) enables you to easily run Kubernetes, quickly deploy new code, and revert to safe, stable releases when issues are identified. But the damage done in the short period between deployment and rollback can be significant. In this session, we show you how to limit the effect of unforeseen issues using canary deployments with Istio and how to better monitor your applications in Amazon EKS and spot potential problems before they affect your customer base. This session is brought to you by AWS partner, Datadog.
Blockchain Technology : Privacy Perspectives and Security ConcernsGokul Alex
My Session on the emerging contours of identity and privacy in the Digital World and how Blockchain is playing a decisive role in this landscape in the upcoming #FintechSummit, Bangalore on August 08, 2018. You can find further details on the Event Portal. https://lnkd.in/fbAmsqf
Serverless WordPress & next Interface of WordPressHidetaka Okamoto
WordCamp Singapore 2017
Talk about ...
- What is Serverless ?
- WordPress + Serverless: What are the benefits?
- Voice Control: Next interface of WordPress
- WordPress + Amazon Alexa: An easy way to try VUI
This document summarizes Benjamin Bischoff's career journey from a programmer to a test automation engineer. It describes his early experiences programming on Commodore computers in school and his various roles developing software, including freelancing, working in gaming, and developing test automation frameworks. It outlines the benefits he sees in developers transitioning to QA roles and shares key learnings around test automation, communication, and continuous learning.
Comprehensive approach to delivering great developer productsLINE Corporation
DevRelCon Tokyo 2017
https://tokyo-2017.devrel.net/
Comprehensive approach to delivering great developer products
Ryohei Miyota / LINE Corpration
While LINE is the most popular consumer messaging application in Japan, we are not as popular a developer product as we are as a consumer product. Although we always recognized the strategical importance of opening our platform, we have not opened our platform aggressively until recently as can be seen by the notable fact that we still do not have a developer relations team. Why? There were scalability issues unique to a company who rapidly grew by aggressively releasing consumer products. In this talk, we discuss challenges we faced in such areas as engineering itself and approaches to engineering, and describe our recent efforts to overcome these problems. Furthermore, we show our prospect of developer advocacy with platforms that have been closed but might open in the future.
The Bitcoin Blockchain has given rise to a new infrastructure paradigm, this slide deck presents ideas on how Blockchain technologies and applications can be presented as an opportunity for the Enterprise. For questions please contact hello@vanbex.com
This document provides an overview of different analytics tools and metrics that can be used to measure website and marketing performance. It discusses Google Analytics for measuring website traffic sources and user behavior. It also covers marketing automation analytics for measuring email marketing and list growth. The document notes that while these tools provide useful insights, they often only capture on-platform actions and may miss other customer interactions. It recommends integrating different analytics code for more precise measurements.
Visibility and societal impact : UMCG research output, Altmetric and PureGuus van den Brekel
Pilot project on Altmetrics in UMCG, by Central Medical Library, UMCG. Presentation at Seminar Altmetrics for research evaluation… or not?
Date: 16 NOV 2016
Wednesday November 16th 2016, experts in altmetrics will gather to discuss about this topic and how altmetrics can support Open Science. Several providers with different kind of altmetric tools will provide practical solutions and present use cases.
https://www.surf.nl/en/agenda/2016/11/seminar-altmetrics-for-research-evaluation...-or-not/index.html
SharePoint Saturday Redmond - Building solutions with the future in mindChris Johnson
Chris Johnson, General Manager of Provoke Solutions in Seattle, gave a presentation on designing and building solutions with the future in mind. He discussed the changes in the SharePoint app model between farm solutions and sandbox solutions. He explained the new SharePoint app architecture using app types, scopes, and catalogs. He provided advice on transitioning existing customizations to the new approaches and emphasized designing solutions with flexibility and the future in mind.
This document discusses the evolving role of UX designers and the changing technology landscape. It touches on the speaker's experience transitioning to UX design for e-commerce sites about a decade ago. Key points made include:
- UX now encompasses psychology and the overall user experience, not just the user interface.
- Design problems are changing faster than people are used to, requiring assumptions to constantly be re-evaluated with research and data.
- The role of designers is shifting to creative collaborators and facilitators of cross-functional teams addressing complex problems.
- Emerging technologies like Google Glass and voice interfaces will continue transforming design needs.
- Empathy for the human being should remain
How do we cover everything? How do we cover it well? This presentation will outline some of the best practices for storytellers to efficiently produce content in the field.
This document discusses what it means to be a professional in IT. It emphasizes that everyone was once a beginner and that experience comes from making mistakes. It addresses communicating with clients and establishing processes to make work easier for both the freelancer and client. Creating a process shows professionalism and that your time has value. The document encourages asking questions to fully understand what clients want before beginning any work.
We want to
explore the benefits of implementing altmetric data in the hospital,
map all stakeholders and interested parties
increase awareness of additional methods of measuring impact tools,
Increase awareness of tools to influence visibility of the umcg research & it's output
discuss current use of bibliometrics in evaluations including the growing interest in measuring/visualising the "societal impact" of scientific research.
Scaling your Tableau - Migrating from Tableau Online to a proper DWH solution...Sergii Khomenko
Initially storing data with Tableau Online storage could sound like a good idea, mainly because you get it for free. From another side Tableau doesn't say they provide a DWH platform, so you can not expect any kind of production use-cases from the storage of Tableau Online. In the talk, we will go through the process of automatically duplicating your Tableau datasources to Amazon Redshift. That will enable us to be more flexible with scaling your data, be sure about backup strategies and many-many more points. We will introduce our python toolchain that helps us in a daily management of our BI.
Similar to Transforming developer from Commodity to Premium - A tale of micorservices (20)
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
5. R A I S E O F T H I R D PA R T Y T O O L I N G
• AI As Service
• Tensor Flow, Wit.ai, SciKit-learn
• Bot As Service (Chatops)
• Facebook Messenger, Slack, Hipchat
• Voice Recognition As Service
• Amazon Echo, Google Home, IBM Watson
• Authentication/Authorisation as Service
• Auth0, firebase, OneLogin, OAuth providers
8. • Datawire
• Docker
• HashiCorp tools
• Joyent’s Autopilot
• ELK
• Terraform
• ECS
• Kubernetes
• CoreOS
• UniKernels
• Serverless
• Pipeline as code
• Lambda CD, Drone, GoCD,
Concourse
• Packer
R A I S E O F D E V O P S P L AT F O R M S &
D E P L O Y M E N T I N N O VAT I O N
10. • AppDynamics
• NewRelic
• FireHol Netdata
• Grafana
• Datadog
• Monit
• ELK
• Zipkin
• Service & Server
monitoring
• Logs monitoring
• Correlation IDs
• Circuit Breakers
• Service & Server metrics
B E T T E R M O N I T O R I N G S Y S T E M S &
R A I S E O F B 2 B B U S I N E S S E S
12. – E R I C S R AY M O N D
“If you have four groups working on a compiler,
you'll get a 4-pass compiler”
13. • Full stack development
• Devops
• Building a product/service
from scratch
• Service Integration
• Release management
• Taking actions on the
service metrics
A S E L F O R G A N I S E D T E A M
14. B U I L D I N G
E N T R E P R E N E U R S
S TA R T U P W I T H I N A S TA R T U P
15. R A I S E O F A P R E M I U M
D E V E L O P E R
16. • N O B O D Y T O G I V E W O R K
• P R O G R A M M E R S TA K E
R E S P O N S I B I L I T Y O F S U C C E S S
O F T H E P R O J E C T
• C O M E O U T O F “ F E A R O F
FA I L U R E ”
• P R O G R A M M E R S TA L K T O
B U S I N E S S A N D M O D E L T H E I R
D O M A I N S A R O U N D T H E
B U S I N E S S
• F O L L O W S T H E R U L E S O F
A G I L E M A N I F E S T O & S O M E
T I M E S C O N S I D E R E D A S P O S T
A G I L E
A N A R C H Y
18. • Stripe Atlas
• Quora
• Fiverr
• Upwork
• FBA
• IOT Systems
• AWS, Heroku, GCP
• Facebook platform, Slack and ChatOps
• Trello
• Lets Encrypt, Gitlab, Zoho Email
• Freshchat, tawk.to
• Sparkpost, Mautic
• Hubspot, Freshsales
• Microsoft Bizspark
• AWS Activate
C O M P O U N D Y O U R S O F T WA R E Q U A L I T Y
B Y C O M B I N I N G Y O U R S A A S T O O L K I T
19. I N D I V I D U A L S W H O C R E AT E T H E B U S I N E S S
A R E R E WA R D E D M O R E H A N D S O M E LY
20. C O R P O R AT E L A D D E R
V S
E N T R E P R E N E U R S H I P
22. R E F E R E N C E S
http://www.forbes.com/sites/mikekavis/2014/08/01/are-software-
engineers-a-commodity/#59c94688660a
http://a16z.com/2014/07/30/the-happy-demise-of-the-10x-engineer
https://henrikwarne.com/2015/04/16/lessons-learned-in-software-
development/
https://softwareengineeringdaily.com/2016/08/07/you-are-not-a-
commodity/