This document discusses different types of computer memory including primary memory like RAM and ROM, secondary storage like hard disks, and different types of each. It explains RAM types like SRAM and DRAM that use static and dynamic cells. ROM types are covered like PROM, EPROM, and EEPROM that can be programmed once, with UV light, and electrically. Hybrid memory types combine aspects of RAM and ROM like flash memory, EEPROM, and NVRAM. Caches and virtual memory are also summarized briefly.
Viruses, worms, and Trojan horses are types of malicious software (malware) that can damage computers. Viruses spread by attaching to host programs and replicating, worms spread across networks without user action, and Trojans allow hackers remote access. Some examples provided include the CIH virus from 1998 that overwrites partition tables, the 2001 Code Red worm that allowed network hacking, and the 2012 Trojan.Flame malware that stole data. Basic safety tips to avoid malware include keeping systems updated, using antivirus software, avoiding unsafe files/links, and being wary of suspicious messages.
Computer assignment on virus and memory and printerShamzayAli
This document contains a computer science assignment submitted by Shamza Ali to Professor Imran. It includes questions about viruses, antiviruses, computer memory, output devices, and printers. For question 1, Shamza defines viruses and their types. For question 2, the differences between memory and storage are explained. Various types of computer memories like RAM, ROM, and hard drives are also detailed.
This document provides an overview of viruses and worms, including how they work and different types. It begins by defining viruses as programs that can copy themselves without permission to infect computers, while worms are self-replicating programs that spread through a network. The document then covers the basic structure and components of viruses, differences between viruses and worms, and types of viruses such as boot sector, file, macro, and multipartite viruses. It also discusses worms like the Morris Worm and how they differ from viruses in spreading through a network rather than specific files or programs.
The document provides information about internet and computer viruses. It defines internet as a global network of interconnected computers and lists key services like World Wide Web, email, chat, etc. It also describes the components required to connect to internet like a computer, modem, internet service provider (ISP), and web browser. It then explains what a computer virus is, how it spreads and affects systems, and the need for antivirus software to detect and remove viruses.
This document discusses viruses, worms, and other types of malware. It defines viruses and worms as replicating programs that can attach themselves to other programs or files to spread. Viruses can remain dormant until certain conditions are met before activating. The document outlines the life stages of viruses from design, replication, activation, detection, and incorporation into antivirus defenses. It discusses various types of viruses like encryption viruses, polymorphic viruses, and macro viruses. Motivations for creating viruses and common infection methods are explained. Finally, some famous viruses are described like Mydoom, Melissa, ILOVEU, Bubble Boy, and Blaster to illustrate how different viruses function and spread.
Wannacry / WannaCrypt ransomware spreads laterally between computers on the same LAN using the ETERNALBLUE exploit of SMB protocol vulnerabilities in Windows systems. It encrypts files on infected systems with various extensions and demands ransom payments in bitcoin. Users and organizations are advised to apply Windows patches, enable firewalls, practice backups, and follow other best practices to prevent infection and data loss from this ransomware.
WORM VIRUS ACCESS CONTROL HOW DO WORM VIRUS/COMPUTER WORMS WORK AND SPREAD HOW TO TELL IF YOU’RE COMPUTER HAS A WORM TRPOJAN TYPES OF TROJAN ACCESS CONTROL DISTRIBUTED DENIAL OF SERVICE SQL INJECTIONS & DATA ATTACK AUTHENTICATION BASIC AUTHENTICATION
The document provides an overview of basic computer components, operations, and functions. It discusses hardware and software, the major operations computers perform, types of memory, input/output devices, operating systems, application software, and basic security concepts. The summary covers the key topics and components discussed in the document at a high level in 3 sentences:
Computer hardware and software work together, with hardware being the physical components and software being programs. The document defines the major components of a computer system and how they work together, including memory, processors, input/output devices, operating systems, and common software applications. It also provides a basic introduction to computer security concepts and threats.
Viruses, worms, and Trojan horses are types of malicious software (malware) that can damage computers. Viruses spread by attaching to host programs and replicating, worms spread across networks without user action, and Trojans allow hackers remote access. Some examples provided include the CIH virus from 1998 that overwrites partition tables, the 2001 Code Red worm that allowed network hacking, and the 2012 Trojan.Flame malware that stole data. Basic safety tips to avoid malware include keeping systems updated, using antivirus software, avoiding unsafe files/links, and being wary of suspicious messages.
Computer assignment on virus and memory and printerShamzayAli
This document contains a computer science assignment submitted by Shamza Ali to Professor Imran. It includes questions about viruses, antiviruses, computer memory, output devices, and printers. For question 1, Shamza defines viruses and their types. For question 2, the differences between memory and storage are explained. Various types of computer memories like RAM, ROM, and hard drives are also detailed.
This document provides an overview of viruses and worms, including how they work and different types. It begins by defining viruses as programs that can copy themselves without permission to infect computers, while worms are self-replicating programs that spread through a network. The document then covers the basic structure and components of viruses, differences between viruses and worms, and types of viruses such as boot sector, file, macro, and multipartite viruses. It also discusses worms like the Morris Worm and how they differ from viruses in spreading through a network rather than specific files or programs.
The document provides information about internet and computer viruses. It defines internet as a global network of interconnected computers and lists key services like World Wide Web, email, chat, etc. It also describes the components required to connect to internet like a computer, modem, internet service provider (ISP), and web browser. It then explains what a computer virus is, how it spreads and affects systems, and the need for antivirus software to detect and remove viruses.
This document discusses viruses, worms, and other types of malware. It defines viruses and worms as replicating programs that can attach themselves to other programs or files to spread. Viruses can remain dormant until certain conditions are met before activating. The document outlines the life stages of viruses from design, replication, activation, detection, and incorporation into antivirus defenses. It discusses various types of viruses like encryption viruses, polymorphic viruses, and macro viruses. Motivations for creating viruses and common infection methods are explained. Finally, some famous viruses are described like Mydoom, Melissa, ILOVEU, Bubble Boy, and Blaster to illustrate how different viruses function and spread.
Wannacry / WannaCrypt ransomware spreads laterally between computers on the same LAN using the ETERNALBLUE exploit of SMB protocol vulnerabilities in Windows systems. It encrypts files on infected systems with various extensions and demands ransom payments in bitcoin. Users and organizations are advised to apply Windows patches, enable firewalls, practice backups, and follow other best practices to prevent infection and data loss from this ransomware.
WORM VIRUS ACCESS CONTROL HOW DO WORM VIRUS/COMPUTER WORMS WORK AND SPREAD HOW TO TELL IF YOU’RE COMPUTER HAS A WORM TRPOJAN TYPES OF TROJAN ACCESS CONTROL DISTRIBUTED DENIAL OF SERVICE SQL INJECTIONS & DATA ATTACK AUTHENTICATION BASIC AUTHENTICATION
The document provides an overview of basic computer components, operations, and functions. It discusses hardware and software, the major operations computers perform, types of memory, input/output devices, operating systems, application software, and basic security concepts. The summary covers the key topics and components discussed in the document at a high level in 3 sentences:
Computer hardware and software work together, with hardware being the physical components and software being programs. The document defines the major components of a computer system and how they work together, including memory, processors, input/output devices, operating systems, and common software applications. It also provides a basic introduction to computer security concepts and threats.
This document provides an overview of different types of malware including viruses, worms, Trojans, and backdoors. Viruses can damage or delete files while replicating themselves. Worms replicate endlessly without damaging files. Trojans masquerade as legitimate programs but provide unauthorized access. Backdoors bypass authentication to remotely access systems. The document describes characteristics and examples of each type as well as how they infect systems.
Computer viruses refer to malicious programs that can copy themselves and damage computer systems by destroying data without the user's permission or knowledge. Some of the earliest detected viruses include the Creeper virus from the early 1970s. Common types of viruses include time bombs, logic bombs, worms, boot sector viruses, DOS viruses, and Trojan horses. To prevent virus infections, users should install and regularly update antivirus software, install security updates, avoid opening unknown emails, and back up important files.
This document discusses network and internet security and types of cyber crimes. It notes that while computers can be used for good or bad, some people use them to carry out illegal activities known as computer crimes. It then describes different types of perpetrators of cyber crimes like hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. The document also provides details on different types of computer viruses like worms, Trojan horses, macros, and boot sector viruses. It explains concepts like logic bombs, time bombs, data diddling, data stealing, and software piracy.
The document discusses different types of computer viruses and malware. It defines a computer virus as a program that can copy itself and infect computers without permission. The first PC virus was discovered in 1986. Common viruses mentioned include Brain, I Love You, and W32. The document outlines different types of viruses like boot sector viruses, file viruses, and system infectors. It also discusses trojan horses, worms, spyware, and the use of antivirus software, anti-spyware, and firewalls to protect against malware.
After massive hit of ransomware WannaCry. Check the basics of ransomware, protection and prevention tips. Find out history of ransomeware, spreading method, prevention tips in detail.
Operating systems and computer securitySwati Bhonde
This document discusses operating systems and computer security. It begins by explaining the roles of operating systems and applications in managing computer resources and providing interfaces. Commonly used operating systems like Windows, Mac OS, and Linux are mentioned. The document then discusses several computer security challenges including viruses, email viruses, worms, Trojan horses, and spam. It provides details on each type of threat and suggestions for securing computers and networks. The document concludes with sections on wireless network security, attacking and defending WEP and WPA/WPA2 encryption, and common defense techniques like changing defaults, hiding SSIDs, and restricting access.
This document defines and provides examples of utility programs, language processors, compilers, interpreters, and assemblers. It then discusses primary memory types like RAM and ROM. RAM is volatile memory used to temporarily store active programs and data, while ROM is non-volatile and stores permanent programs like an operating system. The document also covers binary numbering, storage vs memory, storage mediums, and defines systems software and applications software.
ICT refers to all tools used for information and communication, including hardware like computers, tablets, and smartphones, as well as software, websites, and communication networks. An operating system performs basic tasks like booting up a device, managing memory and storage, and allowing interaction through input/output devices. Operating systems can be classified based on their interface (GUI vs. CUI), number of users supported (single vs. multi-user), and processing capability (single vs. multi-processing). Common operating systems include Windows, Mac OS, Android, Linux, and mobile operating systems.
Computer viruses, worms, and other threats can damage systems. Viruses are programs that attach themselves to other programs and replicate. There are several types of viruses including boot sector, TSR, macro, and polymorphic viruses. Worms replicate independently across networks. Trojans also carry payloads but don't replicate. Antivirus software uses signatures to detect threats but also monitors for unusual activity. Maintaining strong passwords, firewalls, and updating systems help prevent infection.
This document discusses computer viruses, including their definition, types (resident and non-resident), vectors of transmission, vulnerability of operating systems, antivirus software and how it works to detect viruses using signatures and heuristics, virus removal methods, and a brief history of early academic work on the theory of self-replicating programs.
1. A computer virus is a malicious program that attaches itself to other programs and replicates, potentially damaging infected programs or the system. Computer worms are similar but self-contained and spread via networks or email.
2. Viruses are classified by their method of infection such as boot sector, TSR, macro, or polymorphic viruses.
3. Viruses work by attaching to a host program, replicating themselves, and potentially damaging the system through deleting files, sending data, or using resources. They typically spread via removable media, downloads, email attachments, or unpatched software.
4. Basic computer security involves using
Viruses, worms, and Trojans are types of malware. Viruses propagate by inserting copies of themselves into other programs and spreading when those programs are run. Worms propagate across networks without needing user interaction by exploiting vulnerabilities to transfer themselves to other systems. Trojan horses appear to have legitimate functions but secretly perform malicious actions like unauthorized access. Defenses include antivirus software, firewalls, and patching systems.
This document provides an overview of computer viruses presented in a slideshow format. It begins with definitions of computer viruses and malware. It then discusses types of malware like worms, trojans, and adware. It also covers topics like antivirus software functions, common signs of virus infections, impacts of infections, and how to protect against and deal with viruses and malware. The document contains over 40 slides on these topics and provides details on the history of computer viruses and examples of specific viruses like Brain, Morris Worm, and others.
This document discusses the topic of computer virology. It begins with an introduction to virology and the history of computer viruses. It then covers the different categories of viruses and malware. The document discusses the environment that viruses need to survive, including operating systems, file formats, and networks. It provides details on how viruses replicate, including through boot sectors and by infecting executable files. It promises to cover more on executable file internals and infection techniques in future presentations.
This document discusses computer viruses, including their definition, types (resident and non-resident), vectors of transmission, how antivirus software works to detect viruses using signatures and heuristics, methods of virus removal, and a brief history of early work on the theory of computer viruses. It provides an overview of the key topics around computer viruses.
Computers are powerful electronic devices that process data and produce outputs. They are important tools used in many fields like education, science, business, and government. Computers have revolutionized communications through the internet. Computer crimes like software piracy and computer viruses are major issues. Piracy hurts software developers while viruses can damage programs and steal data. Various protections try to prevent piracy while antivirus software helps detect and remove viruses to keep computers secure.
Computers are powerful electronic devices that process data and produce outputs. They are important tools used in many fields like education, science, business, government, and communications. Computers have transformed how we communicate through the internet and do business. Computer crimes like software piracy and computer viruses are major issues. Piracy hurts software developers while viruses can infect computers and spread in various ways like through email or infected disks. Antivirus software and keeping definitions updated can help prevent virus infections.
This document discusses various types of program and system threats including Trojan horses, trapdoors, buffer overflows, worms, viruses, and denial of service attacks. A Trojan horse masquerades as legitimate software to gain unauthorized access. Trapdoors are secret vulnerabilities built into programs by designers. Buffer overflows occur when more data is input than a program expects, potentially allowing code execution. Worms self-replicate to spread while viruses require host files or human action. Examples like the Morris worm and Love Bug virus are provided. Protection involves antivirus software and safe computing practices. The key differences between worms and viruses are also outlined.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
This document provides an overview of different types of malware including viruses, worms, Trojans, and backdoors. Viruses can damage or delete files while replicating themselves. Worms replicate endlessly without damaging files. Trojans masquerade as legitimate programs but provide unauthorized access. Backdoors bypass authentication to remotely access systems. The document describes characteristics and examples of each type as well as how they infect systems.
Computer viruses refer to malicious programs that can copy themselves and damage computer systems by destroying data without the user's permission or knowledge. Some of the earliest detected viruses include the Creeper virus from the early 1970s. Common types of viruses include time bombs, logic bombs, worms, boot sector viruses, DOS viruses, and Trojan horses. To prevent virus infections, users should install and regularly update antivirus software, install security updates, avoid opening unknown emails, and back up important files.
This document discusses network and internet security and types of cyber crimes. It notes that while computers can be used for good or bad, some people use them to carry out illegal activities known as computer crimes. It then describes different types of perpetrators of cyber crimes like hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. The document also provides details on different types of computer viruses like worms, Trojan horses, macros, and boot sector viruses. It explains concepts like logic bombs, time bombs, data diddling, data stealing, and software piracy.
The document discusses different types of computer viruses and malware. It defines a computer virus as a program that can copy itself and infect computers without permission. The first PC virus was discovered in 1986. Common viruses mentioned include Brain, I Love You, and W32. The document outlines different types of viruses like boot sector viruses, file viruses, and system infectors. It also discusses trojan horses, worms, spyware, and the use of antivirus software, anti-spyware, and firewalls to protect against malware.
After massive hit of ransomware WannaCry. Check the basics of ransomware, protection and prevention tips. Find out history of ransomeware, spreading method, prevention tips in detail.
Operating systems and computer securitySwati Bhonde
This document discusses operating systems and computer security. It begins by explaining the roles of operating systems and applications in managing computer resources and providing interfaces. Commonly used operating systems like Windows, Mac OS, and Linux are mentioned. The document then discusses several computer security challenges including viruses, email viruses, worms, Trojan horses, and spam. It provides details on each type of threat and suggestions for securing computers and networks. The document concludes with sections on wireless network security, attacking and defending WEP and WPA/WPA2 encryption, and common defense techniques like changing defaults, hiding SSIDs, and restricting access.
This document defines and provides examples of utility programs, language processors, compilers, interpreters, and assemblers. It then discusses primary memory types like RAM and ROM. RAM is volatile memory used to temporarily store active programs and data, while ROM is non-volatile and stores permanent programs like an operating system. The document also covers binary numbering, storage vs memory, storage mediums, and defines systems software and applications software.
ICT refers to all tools used for information and communication, including hardware like computers, tablets, and smartphones, as well as software, websites, and communication networks. An operating system performs basic tasks like booting up a device, managing memory and storage, and allowing interaction through input/output devices. Operating systems can be classified based on their interface (GUI vs. CUI), number of users supported (single vs. multi-user), and processing capability (single vs. multi-processing). Common operating systems include Windows, Mac OS, Android, Linux, and mobile operating systems.
Computer viruses, worms, and other threats can damage systems. Viruses are programs that attach themselves to other programs and replicate. There are several types of viruses including boot sector, TSR, macro, and polymorphic viruses. Worms replicate independently across networks. Trojans also carry payloads but don't replicate. Antivirus software uses signatures to detect threats but also monitors for unusual activity. Maintaining strong passwords, firewalls, and updating systems help prevent infection.
This document discusses computer viruses, including their definition, types (resident and non-resident), vectors of transmission, vulnerability of operating systems, antivirus software and how it works to detect viruses using signatures and heuristics, virus removal methods, and a brief history of early academic work on the theory of self-replicating programs.
1. A computer virus is a malicious program that attaches itself to other programs and replicates, potentially damaging infected programs or the system. Computer worms are similar but self-contained and spread via networks or email.
2. Viruses are classified by their method of infection such as boot sector, TSR, macro, or polymorphic viruses.
3. Viruses work by attaching to a host program, replicating themselves, and potentially damaging the system through deleting files, sending data, or using resources. They typically spread via removable media, downloads, email attachments, or unpatched software.
4. Basic computer security involves using
Viruses, worms, and Trojans are types of malware. Viruses propagate by inserting copies of themselves into other programs and spreading when those programs are run. Worms propagate across networks without needing user interaction by exploiting vulnerabilities to transfer themselves to other systems. Trojan horses appear to have legitimate functions but secretly perform malicious actions like unauthorized access. Defenses include antivirus software, firewalls, and patching systems.
This document provides an overview of computer viruses presented in a slideshow format. It begins with definitions of computer viruses and malware. It then discusses types of malware like worms, trojans, and adware. It also covers topics like antivirus software functions, common signs of virus infections, impacts of infections, and how to protect against and deal with viruses and malware. The document contains over 40 slides on these topics and provides details on the history of computer viruses and examples of specific viruses like Brain, Morris Worm, and others.
This document discusses the topic of computer virology. It begins with an introduction to virology and the history of computer viruses. It then covers the different categories of viruses and malware. The document discusses the environment that viruses need to survive, including operating systems, file formats, and networks. It provides details on how viruses replicate, including through boot sectors and by infecting executable files. It promises to cover more on executable file internals and infection techniques in future presentations.
This document discusses computer viruses, including their definition, types (resident and non-resident), vectors of transmission, how antivirus software works to detect viruses using signatures and heuristics, methods of virus removal, and a brief history of early work on the theory of computer viruses. It provides an overview of the key topics around computer viruses.
Computers are powerful electronic devices that process data and produce outputs. They are important tools used in many fields like education, science, business, and government. Computers have revolutionized communications through the internet. Computer crimes like software piracy and computer viruses are major issues. Piracy hurts software developers while viruses can damage programs and steal data. Various protections try to prevent piracy while antivirus software helps detect and remove viruses to keep computers secure.
Computers are powerful electronic devices that process data and produce outputs. They are important tools used in many fields like education, science, business, government, and communications. Computers have transformed how we communicate through the internet and do business. Computer crimes like software piracy and computer viruses are major issues. Piracy hurts software developers while viruses can infect computers and spread in various ways like through email or infected disks. Antivirus software and keeping definitions updated can help prevent virus infections.
This document discusses various types of program and system threats including Trojan horses, trapdoors, buffer overflows, worms, viruses, and denial of service attacks. A Trojan horse masquerades as legitimate software to gain unauthorized access. Trapdoors are secret vulnerabilities built into programs by designers. Buffer overflows occur when more data is input than a program expects, potentially allowing code execution. Worms self-replicate to spread while viruses require host files or human action. Examples like the Morris worm and Love Bug virus are provided. Protection involves antivirus software and safe computing practices. The key differences between worms and viruses are also outlined.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
Codeless Generative AI Pipelines
(GenAI with Milvus)
https://ml.dssconf.pl/user.html#!/lecture/DSSML24-041a/rate
Discover the potential of real-time streaming in the context of GenAI as we delve into the intricacies of Apache NiFi and its capabilities. Learn how this tool can significantly simplify the data engineering workflow for GenAI applications, allowing you to focus on the creative aspects rather than the technical complexities. I will guide you through practical examples and use cases, showing the impact of automation on prompt building. From data ingestion to transformation and delivery, witness how Apache NiFi streamlines the entire pipeline, ensuring a smooth and hassle-free experience.
Timothy Spann
https://www.youtube.com/@FLaNK-Stack
https://medium.com/@tspann
https://www.datainmotion.dev/
milvus, unstructured data, vector database, zilliz, cloud, vectors, python, deep learning, generative ai, genai, nifi, kafka, flink, streaming, iot, edge
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Aggregage
This webinar will explore cutting-edge, less familiar but powerful experimentation methodologies which address well-known limitations of standard A/B Testing. Designed for data and product leaders, this session aims to inspire the embrace of innovative approaches and provide insights into the frontiers of experimentation!
Build applications with generative AI on Google CloudMárton Kodok
We will explore Vertex AI - Model Garden powered experiences, we are going to learn more about the integration of these generative AI APIs. We are going to see in action what the Gemini family of generative models are for developers to build and deploy AI-driven applications. Vertex AI includes a suite of foundation models, these are referred to as the PaLM and Gemini family of generative ai models, and they come in different versions. We are going to cover how to use via API to: - execute prompts in text and chat - cover multimodal use cases with image prompts. - finetune and distill to improve knowledge domains - run function calls with foundation models to optimize them for specific tasks. At the end of the session, developers will understand how to innovate with generative AI and develop apps using the generative ai industry trends.
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Kaxil Naik
Navigating today's data landscape isn't just about managing workflows; it's about strategically propelling your business forward. Apache Airflow has stood out as the benchmark in this arena, driving data orchestration forward since its early days. As we dive into the complexities of our current data-rich environment, where the sheer volume of information and its timely, accurate processing are crucial for AI and ML applications, the role of Airflow has never been more critical.
In my journey as the Senior Engineering Director and a pivotal member of Apache Airflow's Project Management Committee (PMC), I've witnessed Airflow transform data handling, making agility and insight the norm in an ever-evolving digital space. At Astronomer, our collaboration with leading AI & ML teams worldwide has not only tested but also proven Airflow's mettle in delivering data reliably and efficiently—data that now powers not just insights but core business functions.
This session is a deep dive into the essence of Airflow's success. We'll trace its evolution from a budding project to the backbone of data orchestration it is today, constantly adapting to meet the next wave of data challenges, including those brought on by Generative AI. It's this forward-thinking adaptability that keeps Airflow at the forefront of innovation, ready for whatever comes next.
The ever-growing demands of AI and ML applications have ushered in an era where sophisticated data management isn't a luxury—it's a necessity. Airflow's innate flexibility and scalability are what makes it indispensable in managing the intricate workflows of today, especially those involving Large Language Models (LLMs).
This talk isn't just a rundown of Airflow's features; it's about harnessing these capabilities to turn your data workflows into a strategic asset. Together, we'll explore how Airflow remains at the cutting edge of data orchestration, ensuring your organization is not just keeping pace but setting the pace in a data-driven future.
Session in https://budapestdata.hu/2024/04/kaxil-naik-astronomer-io/ | https://dataml24.sessionize.com/session/667627
5. Viruses
A virus is a small piece of
software that piggybacks on
real programs.
2 main characteristics of viruses
It must execute itself.
It must replicate itself.
6. Virus
Virus might attach itself to a program such
as spreadsheet. Each time the spreadsheet
program runs, the virus runs too and
replicate itself.
7. E-mail Viruses
• Moves around in e-mail messages
• Usually replicate itself by automatically
mailing itself to dozens of people in the
victim’s email address book.
• Example “MELISSA VIRUS”
• Example “I LOVE YOU VIRUS”
8. WORMS
• Small piece of software that uses computer
networks and security holes to replicate
itself.
• Copy of the worm scans the network for
another machine that has a specific security
hole.
• Copy itself to the new machine using the
security hole and start replicating.
• Example “CODE RED”
9. Trojan Horses
• A simple computer program
• It claim to be a game
• Erase your hard disk
• No way to replicate itself.
10. Difference between Virus and Worm
The difference between a worm and a virus is
that a virus does not have a propagation
vector. i.e., it will only effect one host and
does not propagate to other hosts. Worms
propagate and infect other computers.
Majority of threats are actually worms that
propagate to other hosts.
11. Why do people do it ?
• For some people creating viruses seems to be
thrill.
• Thrill of watching things blow up.
12. Viruses
• Viruses show us how vulnerable we are
• A properly engineered virus can have an
amazing effect on the Internet
• They show how sophisticated and
interconnected human beings have become.
13. – File infector virus
• Infect program files
– Boot sector virus
• Infect the system area of a disk
– Master boot record virus
• infect disks in the same manner as boot sector viruses. The difference
between these two virus types is where the viral code is located.
– Multi-partite virus
• infect both boot records and program files
– Macro virus
• infect data files. Examples: Microsoft Office Word, Excel,
PowerPoint and Access files
Types of Viruses
14. Melissa Virus (March 1999)
Melissa virus spread in Microsoft Word documents sent
via e-mail.
How it works ?
• Created the virus as word document
• Uploaded to an internet newsgroup
• Anyone who download the document and opened it
would trigger the virus.
• Send friendly email messages to first 50 people in
person’s address book.
15. Melissa Virus
Melissa Virus was the fastest spreading virus
ever seen.
Forced a number of large companies to shut
down their e-mail systems.
16. I Love You Virus (May,2000)
• Contained a piece of code as an attachment.
• Double Click on the attachment triggered the
code.
• Sent copies of itself to everyone in the victim’s
address book
• Started corrupting files on the victim’s
machine.
17. Code Red (Worm)
• Code Red made huge headlines in 2001
• It slowed down internet traffic when it began
to replicate itself.
• Each copy of the worm scanned the internet
for Windows NT or Windows 2000 that don’t
have security patch installed.
• Each time it found an unsecured server, the
worm copied itself to that server.
18. Code Red Worm
Designed to do three things
Replicate itself for the first 20 days of each
month.
Replace web pages on infected servers with a
page that declares “Hacked by Chinese”
Launch a concreted attack on the White House
Web server
19. Symptoms of Infection
• Programs take longer to load than normal.
• Computer’s hard drive constantly runs out of
free space.
• The floppy disk drive or hard drive runs when
you are not using it.
• New files keep appearing on the system and
you don’t know where it come from.
20. Symptoms of Infection Cont..
• Strange sounds or beeping noises come from
the computer.
• Strange graphics are displayed on your
computer monitor.
• Unable to access the hard drive when booting
from the floppy drive.
• Program sizes keep changing.
21. Protection
• TO protect yourself you need to be
“Proactive” about Security issues. Being
reactive won’t solve anything; Specially at
crunch time and deadlines!! In matter of fact
it can make the problem much more complex
to solve, and the situation much worse,
resulting in a complete Nightmare!!
• Best Measures are the preventative ones.
22. Conclusion
Be aware of the new infections out there.
Take precaution measures.
Always backup your data.
Keep up-to-date on new Anti virus software.
Simply avoid programs from unknown sources.
25. Secondary Memory
The computer usually uses its input/output channels to
access secondary storage and transfers the desired data
using intermediate area in primary storage. Secondary
storage does not lose the data when the device is powered
down—it is non-volatile. Per unit, it is typically also an order
of magnitude less expensive than primary storage.
The secondary storage is often formatted according to a file
system format, which provides the abstraction necessary to
organize data into files and directories, providing also
additional information (called metadata) describing the
owner of a certain file, the access time, the access
permissions, and other information. Hard disk are usually
used as secondary storage.
26. Memory Types
I. Secondary Memory
II.Primary Memory
a)RAM
i. SRAM
ii. DRAM
b)ROM
i. PROM
ii. EPROM
c)Hybrid
i. EEPROM
ii. NVRAM
iii. Flash Memory
d)Cache Memory
e)Virtual Memory
27. Primary Memory
Primary storage (or main memory or internal
memory), often referred to simply as memory, is the
only one directly accessible to the CPU. The CPU
continuously reads instructions stored there and
executes them as required.
Main memory is directly or indirectly connected to
the CPU via a memory bus. It is actually two buses
(not on the diagram): an address bus and a data bus.
The CPU firstly sends a number through an address
bus, a number called memory address, that indicates
the desired location of data. Then it reads or writes
the data itself using the data bus.
It is divided into RAM and ROM.
28. RAM
The RAM family includes two important memory devices:
static RAM (SRAM) and dynamic RAM (DRAM). The primary
difference between them is the lifetime of the data they
store.
1) SRAM retains its contents as long as electrical power is
applied to the chip. If the power is turned off or lost
temporarily, its contents will be lost forever.
2) DRAM, on the other hand, has an extremely short data
lifetime-typically about four milliseconds. This is true even
when power is applied constantly. DRAM controller is used
to refresh the data before it expires, the contents of
memory can be kept alive for as long as they are needed. So
DRAM is as useful as SRAM after all.
29. Types of RAM
Double Data Rate synchronous dynamic
random access memory or also known as
DDR1 SDRAM is a class of memory integrated
circuits used in computers. The interface uses
double pumping (transferring data on both the
rising and falling edges of the clock signal) to
lower the clock frequency. One advantage of
keeping the clock frequency down is that it
reduces the signal integrity requirements on the
circuit board connecting the memory to the
controller.
30. DDR2, DDR and SDRAM
DDR2 memory is fundamentally similar to DDR SDRAM. Still,
while DDR SDRAM can transfer data across the bus two times
per clock, DDR2 SDRAM can perform four transfers per clock.
DDR2 uses the same memory cells, but doubles the
bandwidth by using the multiplexing technique.
The DDR2 memory cell is still clocked at the same frequency
as DDR SDRAM and SDRAM cells, but the frequency of the
input/output buffers is higher with DDR2 SDRAM (as shown in
Fig. on next Slide). The bus that connects the memory cells
with the buffers is twice wider compared to DDR. Thus, the
I/O buffers perform multiplexing: the data is coming in from
the memory cells along a wide bus and is going out of the
buffers on a bus of the same width as in DDR SDRAM, but of a
twice bigger frequency. This allows to increase the memory
bandwidth without increasing the operational frequency.
31. The interface uses double
pumping (transferring data
on both the rising and falling
edges of the clock signal to
lower the clock frequency.
One advantage of keeping the
clock frequency down is that it
reduces the signal integrity
requirements on the circuit
board connecting the memory
to the controller.
32. Types of ROM
Memories in the ROM family are distinguished by the
methods used to write new data to them (usually
called programming), and the number of times they
can be rewritten. This classification reflects the
evolution of ROM devices from hardwired to
programmable to erasable-and-programmable. A
common feature is their ability to retain data and
programs forever, even during a power failure. The
contents of the ROM had to be specified before chip
production, so the actual data could be used to
arrange the transistors inside the chip.
33. One step up from the masked ROM is the PROM
(programmable ROM), which is purchased in an
unprogrammed state. If you were to look at the
contents of an unprogrammed PROM, the data is
made up entirely of 1's. The process of writing your
data to the PROM involves a special piece of
equipment called a device programmer. The device
programmer writes data to the device one word at a
time by applying an electrical charge to the input
pins of the chip. Once a PROM has been
programmed in this way, its contents can never be
changed. If the code or data stored in the PROM
must be changed, the current device must be
discarded. As a result, PROMs are also known as one-
time programmable (OTP) devices.
PROM
34. An EPROM (erasable-and-programmable ROM) is
programmed in exactly the same manner as a PROM.
However, EPROMs can be erased and reprogrammed
repeatedly. To erase an EPROM, you simply expose
the device to a strong source of ultraviolet light. (A
window in the top of the device allows the light to
reach the silicon.) By doing this, you essentially reset
the entire chip to its initial-unprogrammed-state.
Though more expensive than PROMs, their ability to
be reprogrammed makes EPROMs an essential part
of the software development and testing process.
EPROM
35. Hybrid types
As memory technology has matured in recent years, the line
between RAM and ROM has blurred. Now, several types of
memory combine features of both. These devices do not
belong to either group and can be collectively referred to as
hybrid memory devices. Hybrid memories can be read and
written as desired, like RAM, but maintain their contents
without electrical power, just like ROM. Two of the hybrid
devices, EEPROM and flash, are descendants of ROM devices.
These are typically used to store code. The third hybrid,
NVRAM, is a modified version of SRAM. NVRAM usually holds
persistent data.
36. EEPROMS are electrically-erasable-and-
programmable. Internally, they are similar to
EPROMs, but the erase operation is accomplished
electrically, rather than by exposure to ultraviolet
light. Any byte within an EEPROM may be erased and
rewritten. Once written, the new data will remain in
the device forever-or at least until it is electrically
erased. The primary tradeoff for this improved
functionality is higher cost, though write cycles are
also significantly longer than writes to a RAM. So you
wouldn't want to use an EEPROM for your main
system memory.
37. Flash memory combines the best features of the memory
devices described thus far. Flash memory devices are high
density, low cost, nonvolatile, fast (to read, but not to write),
and electrically reprogrammable. These advantages are
overwhelming and, as a direct result, the use of flash memory
has increased dramatically in embedded systems. From a
software viewpoint, flash and EEPROM technologies are very
similar. The major difference is that flash devices can only be
erased one sector at a time, not byte-by-byte. Typical sector
sizes are in the range 256 bytes to 16KB. Despite this
disadvantage, flash is much more popular than EEPROM and
is rapidly displacing many of the ROM devices as well.
38. The third member of the hybrid memory class is NVRAM
(non-volatile RAM). Nonvolatility is also a characteristic of the
ROM and hybrid memories discussed previously. However, an
NVRAM is physically very different from those devices. An
NVRAM is usually just an SRAM with a battery backup. When
the power is turned on, the NVRAM operates just like any
other SRAM. When the power is turned off, the NVRAM draws
just enough power from the battery to retain its data. NVRAM
is fairly common in embedded systems. However, it is
expensive-even more expensive than SRAM, because of the
battery-so its applications are typically limited to the storage
of a few hundred bytes of system-critical information that
can't be stored in any better way.
39. Cache Memory
A CPU cache is a cache used by the central processing unit of
a computer to reduce the average time to access memory.
The cache is a smaller, faster memory which stores copies of
the data from the most frequently used main memory
locations. As long as most memory accesses are cached
memory locations, the average latency of memory accesses
will be closer to the cache latency than to the latency of main
memory.
When the processor needs to read from or write to a location
in main memory, it first checks whether a copy of that data is
in the cache. If so, the processor immediately reads from or
writes to the cache, which is much faster than reading from or
writing to main memory
40. Locality of Reference
• The better the hit rate for level 0, the better off we
are
– Similarly, if we use 2 caches, we want the hit rate of level 1
to be as high as possible
– We want to implement the memory hierarchy to follow
Locality of Reference
• accesses to memory will generally be near
recent memory accesses and those in the near
future will be around this current access
41. – Three forms of locality:
• Temporal locality – recently accessed items tend to be
accessed again in the near future (local variables,
instructions inside a loop)
• Spatial locality – accesses tend to be clustered
(accessing a[i] will probably be followed by a[i+1] in the
near future)
• Sequential locality – instructions tend to be accessed
sequentially
– How do we support locality of reference?
• If we bring something into cache, bring in neighbors as
well
• Keep an item in the cache for awhile as we hope to
keep using it
42. The diagram on the right shows two memories. Each location in each
memory has a datum (a cache line), which in different designs ranges
in size from 8 to 512 bytes. The size of the cache line is usually larger
than the size of the usual access requested by a CPU instruction,
which ranges from 1 to 16 bytes.
Each location in each memory also
has an index, which is a unique number
used to refer to that location.The index
for a location in main memory is called
an address. Each location in the cache
has a tag that contains the index of the
datum in main memory that has been
cached. In a CPU's data cache these entries
are called cache lines or cache blocks.
Cache Memory
43. Cache and Memory Organization
• Group memory locations into lines (or refill lines)
– For instance, 1 line might store 16 bytes or 4 words
• The line size varies architecture-to-architecture
– All main memory addresses are broken into two parts
• the line #
• the location in the line
– If we have 256 Megabytes, word accessed, with
word sizes of 4, and 4 words per line, we would
have 16,777,216 lines so our 26 bit address has 24
bits for the line number and 2 bits for the word in
the line
44. – The cache has the same organization but there are far
fewer line numbers (say 1024 lines of 4 words each)
• So the remainder of the address becomes the tag
– The tag is used to make sure that the line we want
is the line we found
The valid bit is used to determine if
the given line has been modified or
not (is the line in memory still valid
or outdated?)
45. Types of Cache
– Direct-mapped – each entry in memory has 1 specific
place where it can be placed in cache
• this is a cheap and easy cache to implement (and also
fast), but since there is no need for a replacement
strategy it has the poorest hit rate
– Associative – any memory item can be placed in any cache
line
• this cache uses associative memory so that an entry is
searched for in parallel – this is expensive and tends to
be slower than a direct-mapped cache, however,
because we are free to place an entry anywhere, we
can use a replacement strategy and thus get the best
hit rate
46. – Set-associative – a compromise between these two
extremes
• by grouping lines into sets so that a line is mapped into a given set,
but within that set, the line can go anywhere
• a replacement strategy is used to determine which line within a
set should be used, so this cache improves on the hit rate of the
direct-mapped cache
• while not being as expensive or as slow as the associative cache
47. Direct Mapped Cache
• Assume m refill lines
– A line j in memory will be found in cache at location j mod m
• Since each line has 1 and only 1 location in cache, there is no need for a
replacement strategy
– This yields poor hit rate but fast performance (and cheap)
– All addresses are broken into 3 parts
• a line number (to determine the line in cache)
• a word number
• the rest is the tag – compare the tag to make sure you have the right line
48.
49. Associative Cache
• Any line in memory can be placed in any line in
cache
– No line number portion of the address, just a tag and a word within the
line
– Because the tag is longer, more tag storage space is needed in the cache,
so these caches need more space and so are more costly
• All tags are searched simultaneously using
“associative memory” to find the tag requested
– This is both more expensive and slower than direct-mapped caches but,
because there are choices of where to place a new line, associative caches
require a replacement strategy which might require additional hardware
to implement
51. Virtual Memory
It is a computer system technique which gives an
application program the impression that it has
contiguous working memory (an address space),
while in fact it may be physically fragmented and
may even overflow on to disk storage.
computer operating systems generally use virtual
memory techniques for ordinary applications,
such as word processors,
spreadsheets,multimedia,players accounting,
etc., except where the required hardware
support (memory management unit) is
unavailable or insufficient.
52. Memory is used in
Computer
Mobile
Printer
Digital Camera
CD/DVD Player
Many other appliances like TV, Washing
Machine, Oven, Digital Diaries etc.
53. The Paging Process
• When the CPU generates a memory address, it is a
logical (or virtual) address
– The first address of a program is 0, so the logical
address is merely an offset into the program or
into the data segment
• For instance, address 25 is located 25 from the
beginning of the program
• But 25 is not the physical address in memory,
so the logical address must be translated (or
mapped) into a physical address
54. – Assume memory is broken into fixed size units
known as frames (1 page fits into 1 frame)
• We know the logical address as its page # and
the offset into the page
– We have to translate the page # into the frame #
(that is, where is that particular page currently be
stored in memory – or is it even in memory?)
• Thus, the mapping process for paging means
finding the frame # and replacing the page #
with it
55.
56. • Here, we have a process of 8 pages but only 4 physical
frames in memory – therefore we must place a page
into one of the available frames in memory whenever a
page is needed
• At this point in time, pages 0, 3, 4 and 7 have been
moved into memory at frames 2, 0, 1 and 3
respectively
• This information (of which page is stored in which
frame) is stored in memory in a location known as the
Page Table. The page table also stores whether the
given page has been modified (the valid bit – much like
our cache)
57. Page Faults
• Just as cache is limited in size, so is main memory – a
process is usually given a limited number of frames
• What if a referenced page is not currently in
memory?
– The memory reference causes a page fault
• The page fault requires that the OS handle the problem
– The process’ status is saved and the CPU switches to the
OS
– The OS determines if there is an empty frame for the
referenced page, if not, then the OS uses a replacement
strategy to select a page to discard
58. if that page is dirty, then the page must be written to disk
instead of discarded
– The OS locates the requested page on disk and loads it into
the appropriate frame in memory
– The page table is modified to reflect the changePage
faults are time consuming because of the disk
access – this causes our effective memory access
time to deteriorate badly!
65. Moving Information
Within the Computer
• Bits that compose a word are
passed in parallel from place
to place.
– Ribbon cables:
• Consist of several
wires, molded together.
• One wire for each bit of
the word or byte.
• Additional wires
coordinate the activity
of moving information.
• Each wire sends
information in the form
of a voltage pulse.
67. Video Card
• Connects the computer
to the monitor. It is a
circuit board attached
to the motherboard
that contains the
memory and other
circuitry necessary to
send information to the
monitor for display on
screen.
68. CD Rom Drive
• The drive that plays
CDs and reads data
that has been stored
on the CD.
72. RAM
• Random Access Memory
RAM is a computer’s
temporary memory, which
exists as chips on the
motherboard near the CPU.
It stores data or programs
while they are being used
and requires power.
73. Printer
• An output device that
produces a hard copy
on paper. It gives
information to the user
in printed form.