Michael Schwern presents Method::Signatures, a module that allows defining Perl subroutines with function signatures in a syntax inspired by Perl 6. It works by rewriting the code at compile time using Devel::Declare rather than a source filter. Key features demonstrated include required and optional parameters, named and positional arguments, aliases, and more. While powerful, the module is still a work in progress, with debugging support and better error handling needing further work. The goal is to implement a "signatures" pragma for inclusion in Perl 5.
Simple Ways To Be A Better Programmer (OSCON 2007)Michael Schwern
"Simple Ways To Be A Better Programmer' as presented at OSCON 2007 by Michael G Schwern.
The audio is still out of sync, working on it. Downloading will be available once the sync is done.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
This document provides a full walkthrough for the video game Legend of Legaia, beginning with exploration of the starting town of Rim Elm and progressing through various locations, dungeons, and boss battles. It includes detailed instructions on acquiring items, leveling up, and completing quest objectives at each stage of the game. Side sections cover additional topics like available sidequests, character arts, shops, and a complete list of bosses.
You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Bank...Andrew Petukhov
- The document discusses reversing the architecture of a banking application that uses certified cryptography to ensure security. It describes initial efforts looking at the client-side crypto, which proved difficult due to the closed-source Windows app.
- A more successful approach was to look at how the crypto server communicates validation status and metadata to the application server. The authors aimed to find differences in how HTTP is handled between the crypto server and app server to potentially bypass signature validation.
- Basic steps taken included fingerprinting the HTTP parsers, reversing client and server features, and surveying the integration protocol. This was done through techniques like parameter pollution and duplicate headers to profile inconsistencies.
This document is a table of contents for a book about Backbone.js tutorials for beginners, intermediates, and advanced users. It outlines chapters on views, models, collections, routers, organizing applications with modules, building an infinite scrolling Twitter widget, a simple example app with Node.js, MongoDB, and more. The document provides an overview of the topics and concepts that will be covered in each chapter.
Michael Schwern presents Method::Signatures, a module that allows defining Perl subroutines with function signatures in a syntax inspired by Perl 6. It works by rewriting the code at compile time using Devel::Declare rather than a source filter. Key features demonstrated include required and optional parameters, named and positional arguments, aliases, and more. While powerful, the module is still a work in progress, with debugging support and better error handling needing further work. The goal is to implement a "signatures" pragma for inclusion in Perl 5.
Simple Ways To Be A Better Programmer (OSCON 2007)Michael Schwern
"Simple Ways To Be A Better Programmer' as presented at OSCON 2007 by Michael G Schwern.
The audio is still out of sync, working on it. Downloading will be available once the sync is done.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
This document provides a full walkthrough for the video game Legend of Legaia, beginning with exploration of the starting town of Rim Elm and progressing through various locations, dungeons, and boss battles. It includes detailed instructions on acquiring items, leveling up, and completing quest objectives at each stage of the game. Side sections cover additional topics like available sidequests, character arts, shops, and a complete list of bosses.
You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Bank...Andrew Petukhov
- The document discusses reversing the architecture of a banking application that uses certified cryptography to ensure security. It describes initial efforts looking at the client-side crypto, which proved difficult due to the closed-source Windows app.
- A more successful approach was to look at how the crypto server communicates validation status and metadata to the application server. The authors aimed to find differences in how HTTP is handled between the crypto server and app server to potentially bypass signature validation.
- Basic steps taken included fingerprinting the HTTP parsers, reversing client and server features, and surveying the integration protocol. This was done through techniques like parameter pollution and duplicate headers to profile inconsistencies.
This document is a table of contents for a book about Backbone.js tutorials for beginners, intermediates, and advanced users. It outlines chapters on views, models, collections, routers, organizing applications with modules, building an infinite scrolling Twitter widget, a simple example app with Node.js, MongoDB, and more. The document provides an overview of the topics and concepts that will be covered in each chapter.
This document provides an overview of ESRI's routing and transportation technology. It discusses how geographic information systems (GIS) can help with routing by integrating spatial data like street networks, addresses and traffic conditions. The document demonstrates how GIS manages routing data, performs network analysis, calculates accurate distances and times, and optimizes routes. It also discusses how GIS supports transportation and logistics applications and provides organizational integration through shared geographic data.
From Stanford BUS 40: User Experience Design for the NonDesigner
How do we get from task flows to interface screens? How do we make sure they are clear and effective?
Covering key design ideas when designing the user interface.
The document discusses the history and development of AskTom, an online question and answer community for Oracle databases. It describes how AskTom started as a Usenet group in the 1990s and evolved through various iterations. Key developments included the creation of an AskTom website in the late 1990s to early 2000s, the transition to a multi-user platform in 2015, and ongoing work to improve the service and build the AskTom community. The presentation provides statistics about the current size and usage of the AskTom database. It also outlines the goals of helping users be successful with Oracle and making AskTom a valuable resource.
The document presents the design of a smart fuel theft detector system. It begins with an acknowledgment and dedication section. It then provides a table of contents and list of figures. The document discusses conducting a survey on fuel theft, presenting the problem and goals of the project. It describes the methodology and components of the solution, including using ultrasonic and slope sensors, a microcontroller, GPRS module for data transmission. It concludes with experimental results on the sensors and an overall conclusion.
The document discusses the term "varnish" and provides definitions. It defines varnish as having a deceptively attractive external appearance or outward show. It further defines varnished and varnishing as giving a smooth and glossy finish to something. The rest of the document is about configuring and using the Varnish caching system.
This document discusses factors that influence the evolution and adoption of programming languages like Scala. It argues that for a language to be evolutionarily stable, it needs to survive, be adopted by a user base that is more than 1%, and be attractive. Scala's main value proposition is its support for static metaprogramming, but it needs to improve concurrency support, reduce boilerplate code, and simplify its core to lower the learning curve. New developments like Dotty and Squid could help address current issues and support further language evolution.
WebAssembly for the rest of us - Jan-Erik Rediger - Codemotion Amsterdam 2017Codemotion
Did you ever want to port that cool game you built to the browser? Or have your 3D design app work there as well? It's already possible now, but it will get even better in the future! We have asm.js as a subset of JavaScript, optimized for use cases like games, compression or image editing. Now WebAssembly promises to take this one step further by reducing storage size and decoding time, while providing the same safe sandboxed environment with near-native performance. It takes your native code, no matter if C or Rust, and turns that into something that runs blazingly fast in your browser.
This document appears to be a presentation on JavaScript best practices. It discusses using JavaScript pipelines and techniques like using arrow functions, template strings, and async/await that are common in modern JavaScript. It encourages writing type-safe JavaScript and having testing suites that run across browsers, command line and continuous integration for quality code. The presentation promotes tools like Wallaby that can provide instant feedback during development.
The document discusses Odoo Studio, a prototyping tool that allows users to customize databases, interfaces, reports, and flows without any programming knowledge. It can be used to build apps from scratch. Odoo Studio aims to address issues with traditional prototyping approaches like efforts, delays, and frustrations by making the process faster and easier. The document emphasizes that while prototyping is painful, it is crucial for any complex implementation, and that Odoo Studio helps solve this problem.
\n\nThis document is a manual for customizing Windows Vista. It provides instructions for optimizing performance, cleaning up the computer, customizing the boot, login and desktop interfaces, organizing files, and more. The introduction explains that the guide covers thousands of customizations and is intended for any skill level. It recommends reading the "Getting Started" chapter first to prepare for customizing Vista. \n\nThe "Getting Started" chapter discusses slimming down the Vista install, using the backup and restore center, working with the registry safely, getting a recovery disc, and disabling annoying features like UAC before making changes. \n\nThe manual provides step-by-step guides to fully personalize the Windows Vista experience
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmxMilen Dyankov
This slide deck will be removed from here in the future. It has been moved to : https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx
User Experience Design, Navigation, and Interaction FlowsOmar Sosa-Tzec
Relation between interaction flows and the three basic questions of information architecture -- Where am I? What can I do here? Where can I go from here? Lecture slides for Fall 2016 course INFO-I 300: Human-Computer Interaction/Interaction Design at Indiana University Bloomington, School of Informatics and Computing. Instructor of record: Omar Sosa-Tzec, PhD Candidate in Informatics (HCI Design).
The document discusses challenges with getting users to adopt new technologies like RSS and web 2.0 features. It notes that only a small percentage of internet users are aware of or use RSS, and many consume RSS feeds without realizing it through web portals. It also discusses how users are often not aware of new features or don't see the value in them. The document advocates talking to users to understand how technologies could fit into their lives and designing products with the intended users in mind from the beginning.
The document discusses Java 8 streams and stream performance. It provides background on streams and why they were introduced in Java 8. It discusses sequential and parallel streams, how to visualize them, and practical benefits. It covers microbenchmarking and a case study comparing a sequential grep implementation to a parallelized version. Key points are that streams can improve readability but performance must be tested, parallelism helps if the workload is large enough to outweigh overhead, and stream sources need to be splittable for parallelism.
Tomaszewski, Mark - Thesis: Application of Consumer-Off-The-Shelf (COTS) Devi...Mark Tomaszewski
This is the full text of my master's thesis.
Contributions include:
1. Development of original software tools to enable use of Myo and Sphero in MATLAB
2. Theoretical Mathematical framework for modeling human upper limb using Myo and Sphero including intrinsic and extrinsic model calibration and methods for analyzing model assumptions and accuracy
3. Implementation of experiments utilizing upper limb model (2) using Myo and Sphero with the present software tools (1) to validate the model's correctness (i.e. satisfaction of modeling assumptions) and performance (i.e. accuracy)
This thesis proposes two new random walk-based sampling techniques, K-Avoiding Random Walk (KARW) and Neighborhood-Avoiding Random Walk (NARW), to sample nodes from large social graphs while capturing the statistical features of the original graph. The techniques are tested on a Facebook dataset containing 63,000 users. Simulation results show that KARW and NARW sample a higher percentage of unique nodes and better preserve properties like degree distribution, centrality measures, modularity, and clustering coefficient compared to existing methods.
Outfittery hiring at TechStartupJobs Fair Berlin Spring 2015TechMeetups
The document shows the SSH login of a user to an outfittery server. It lists the available files and directories in the pub directory. When running the list_stack.sh script, a table is output listing backend, frontend, infrastructure and tools technologies.
The document summarizes an agenda for a deep learning practitioners meeting on convolutional neural networks. The agenda includes: an introduction to machine learning, coding examples using Keras, an introduction to CNN basics, understanding CNN filters, introducing CNN architectures, explaining the Skymind Intelligent Layer for model deployment, and a closing. Breakout sessions are also included to discuss CNN architectures and using Skymind.
Crab: A Python Framework for Building Recommender Systems Marcel Caraciolo
Crab is a Python framework for building recommendation engines. It began as a community-driven project one year ago and was incorporated into the open-source labs Muriçoca in April 2011. Crab is being rewritten as a Scikit (toolkit for machine learning in Python) to take advantage of the Scikit-Learn algorithms and infrastructure. The current version of Crab implements collaborative filtering algorithms like user-based, item-based, and matrix factorization and can evaluate recommender algorithms with metrics like precision, recall, and RMSE. It also provides APIs to build recommendation systems and deploy them using REST frameworks. Crab is already used in some production recommender systems.
This paper presents an image-based communication system that allows people with severe disabilities to communicate using limited voluntary motions. The system uses a low-cost webcam and computer. It divides daily living options into 7 groups that can be selected using arm movements, mouth opening/closing, or eye blinks depending on the user's abilities. Experimental results showed the system performed well and provided an encouraging communication option for those with disabilities.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
This document provides an overview of ESRI's routing and transportation technology. It discusses how geographic information systems (GIS) can help with routing by integrating spatial data like street networks, addresses and traffic conditions. The document demonstrates how GIS manages routing data, performs network analysis, calculates accurate distances and times, and optimizes routes. It also discusses how GIS supports transportation and logistics applications and provides organizational integration through shared geographic data.
From Stanford BUS 40: User Experience Design for the NonDesigner
How do we get from task flows to interface screens? How do we make sure they are clear and effective?
Covering key design ideas when designing the user interface.
The document discusses the history and development of AskTom, an online question and answer community for Oracle databases. It describes how AskTom started as a Usenet group in the 1990s and evolved through various iterations. Key developments included the creation of an AskTom website in the late 1990s to early 2000s, the transition to a multi-user platform in 2015, and ongoing work to improve the service and build the AskTom community. The presentation provides statistics about the current size and usage of the AskTom database. It also outlines the goals of helping users be successful with Oracle and making AskTom a valuable resource.
The document presents the design of a smart fuel theft detector system. It begins with an acknowledgment and dedication section. It then provides a table of contents and list of figures. The document discusses conducting a survey on fuel theft, presenting the problem and goals of the project. It describes the methodology and components of the solution, including using ultrasonic and slope sensors, a microcontroller, GPRS module for data transmission. It concludes with experimental results on the sensors and an overall conclusion.
The document discusses the term "varnish" and provides definitions. It defines varnish as having a deceptively attractive external appearance or outward show. It further defines varnished and varnishing as giving a smooth and glossy finish to something. The rest of the document is about configuring and using the Varnish caching system.
This document discusses factors that influence the evolution and adoption of programming languages like Scala. It argues that for a language to be evolutionarily stable, it needs to survive, be adopted by a user base that is more than 1%, and be attractive. Scala's main value proposition is its support for static metaprogramming, but it needs to improve concurrency support, reduce boilerplate code, and simplify its core to lower the learning curve. New developments like Dotty and Squid could help address current issues and support further language evolution.
WebAssembly for the rest of us - Jan-Erik Rediger - Codemotion Amsterdam 2017Codemotion
Did you ever want to port that cool game you built to the browser? Or have your 3D design app work there as well? It's already possible now, but it will get even better in the future! We have asm.js as a subset of JavaScript, optimized for use cases like games, compression or image editing. Now WebAssembly promises to take this one step further by reducing storage size and decoding time, while providing the same safe sandboxed environment with near-native performance. It takes your native code, no matter if C or Rust, and turns that into something that runs blazingly fast in your browser.
This document appears to be a presentation on JavaScript best practices. It discusses using JavaScript pipelines and techniques like using arrow functions, template strings, and async/await that are common in modern JavaScript. It encourages writing type-safe JavaScript and having testing suites that run across browsers, command line and continuous integration for quality code. The presentation promotes tools like Wallaby that can provide instant feedback during development.
The document discusses Odoo Studio, a prototyping tool that allows users to customize databases, interfaces, reports, and flows without any programming knowledge. It can be used to build apps from scratch. Odoo Studio aims to address issues with traditional prototyping approaches like efforts, delays, and frustrations by making the process faster and easier. The document emphasizes that while prototyping is painful, it is crucial for any complex implementation, and that Odoo Studio helps solve this problem.
\n\nThis document is a manual for customizing Windows Vista. It provides instructions for optimizing performance, cleaning up the computer, customizing the boot, login and desktop interfaces, organizing files, and more. The introduction explains that the guide covers thousands of customizations and is intended for any skill level. It recommends reading the "Getting Started" chapter first to prepare for customizing Vista. \n\nThe "Getting Started" chapter discusses slimming down the Vista install, using the backup and restore center, working with the registry safely, getting a recovery disc, and disabling annoying features like UAC before making changes. \n\nThe manual provides step-by-step guides to fully personalize the Windows Vista experience
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmxMilen Dyankov
This slide deck will be removed from here in the future. It has been moved to : https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx
User Experience Design, Navigation, and Interaction FlowsOmar Sosa-Tzec
Relation between interaction flows and the three basic questions of information architecture -- Where am I? What can I do here? Where can I go from here? Lecture slides for Fall 2016 course INFO-I 300: Human-Computer Interaction/Interaction Design at Indiana University Bloomington, School of Informatics and Computing. Instructor of record: Omar Sosa-Tzec, PhD Candidate in Informatics (HCI Design).
The document discusses challenges with getting users to adopt new technologies like RSS and web 2.0 features. It notes that only a small percentage of internet users are aware of or use RSS, and many consume RSS feeds without realizing it through web portals. It also discusses how users are often not aware of new features or don't see the value in them. The document advocates talking to users to understand how technologies could fit into their lives and designing products with the intended users in mind from the beginning.
The document discusses Java 8 streams and stream performance. It provides background on streams and why they were introduced in Java 8. It discusses sequential and parallel streams, how to visualize them, and practical benefits. It covers microbenchmarking and a case study comparing a sequential grep implementation to a parallelized version. Key points are that streams can improve readability but performance must be tested, parallelism helps if the workload is large enough to outweigh overhead, and stream sources need to be splittable for parallelism.
Tomaszewski, Mark - Thesis: Application of Consumer-Off-The-Shelf (COTS) Devi...Mark Tomaszewski
This is the full text of my master's thesis.
Contributions include:
1. Development of original software tools to enable use of Myo and Sphero in MATLAB
2. Theoretical Mathematical framework for modeling human upper limb using Myo and Sphero including intrinsic and extrinsic model calibration and methods for analyzing model assumptions and accuracy
3. Implementation of experiments utilizing upper limb model (2) using Myo and Sphero with the present software tools (1) to validate the model's correctness (i.e. satisfaction of modeling assumptions) and performance (i.e. accuracy)
This thesis proposes two new random walk-based sampling techniques, K-Avoiding Random Walk (KARW) and Neighborhood-Avoiding Random Walk (NARW), to sample nodes from large social graphs while capturing the statistical features of the original graph. The techniques are tested on a Facebook dataset containing 63,000 users. Simulation results show that KARW and NARW sample a higher percentage of unique nodes and better preserve properties like degree distribution, centrality measures, modularity, and clustering coefficient compared to existing methods.
Outfittery hiring at TechStartupJobs Fair Berlin Spring 2015TechMeetups
The document shows the SSH login of a user to an outfittery server. It lists the available files and directories in the pub directory. When running the list_stack.sh script, a table is output listing backend, frontend, infrastructure and tools technologies.
The document summarizes an agenda for a deep learning practitioners meeting on convolutional neural networks. The agenda includes: an introduction to machine learning, coding examples using Keras, an introduction to CNN basics, understanding CNN filters, introducing CNN architectures, explaining the Skymind Intelligent Layer for model deployment, and a closing. Breakout sessions are also included to discuss CNN architectures and using Skymind.
Crab: A Python Framework for Building Recommender Systems Marcel Caraciolo
Crab is a Python framework for building recommendation engines. It began as a community-driven project one year ago and was incorporated into the open-source labs Muriçoca in April 2011. Crab is being rewritten as a Scikit (toolkit for machine learning in Python) to take advantage of the Scikit-Learn algorithms and infrastructure. The current version of Crab implements collaborative filtering algorithms like user-based, item-based, and matrix factorization and can evaluate recommender algorithms with metrics like precision, recall, and RMSE. It also provides APIs to build recommendation systems and deploy them using REST frameworks. Crab is already used in some production recommender systems.
This paper presents an image-based communication system that allows people with severe disabilities to communicate using limited voluntary motions. The system uses a low-cost webcam and computer. It divides daily living options into 7 groups that can be selected using arm movements, mouth opening/closing, or eye blinks depending on the user's abilities. Experimental results showed the system performed well and provided an encouraging communication option for those with disabilities.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
49. Proscriptive
Every time we proscribed something
Came up with our own best practices
Strayed off the cow paths
It all went to hell
We didn't have enough information
Caused implementation problems
54. YOU'RE
WRONG
I'll win
So many people make so many predictions over so much time
Odds are they're wrong
55. Be Descriptive
Describe only as much as you need
Leave the rest open as a user playground
Even the bad things
They provide wedges to do amazing things years later
56. Descriptive embraces change
The world will change
Technologies change
People change
Safe bet
Have a system that works with change
57. Can't predict change
In the long term
Who could have predicted the web?
NCSA Mosaic 15 years ago in 1993
So you can't control it
58.
59. NCSA Mosaic is 15 years old
(The stable releases)
That was the beginning of the modern web.
The first graphical web browser.
60. Perl 5 is 15 years old
Developed before the web took off
75. .---. .---. .---. .---. .---. .---.
OS API '---' '---' '---' '---' '---' '---'
| | | | | |
v v | v | v
.------------. | .-----------. | .-----.
| Filesystem | | | Scheduler | | | MMU |
'------------' | '-----------' | '-----'
| | | |
v | | v
.----. | | .---------.
| IO |<----' | | Network |
'----' | '---------'
| | |
v v v
.---------------------------------------.
| HAL |
'---------------------------------------'
76. ﻧﺪﱘ ﺍﺑﻦ ﺤﻣﻮﺪﺓ ﺍﳋﻤﻴﺮ
(Nadim Khemir)
He had no idea if this would be a cool thing
77. He's written all this other stuff that hasn't gotten a lot of attention
He happened to mention asciio at the hackathon
Everyone made them show it off
It was cheered, surprise hit of the conference
78. Will this be useful?
People spend a tremendous amount of time worrying if something will be useful to anyone
else.
Should they release it?
79. No release
==
No information
You can't predict use
Unless you release it you'll never know if anyone's going to use it.
80. Don't worry,
Be crappy
Guy Kawaski
Just throw it out there and see what sticks.
81. Release Early,
Release Often
Because you don't know what's going to be crap and what's gold
Throw it out there and find out
If nobody uses it, no worries, work on something else
If the first release is crap and it gets used, you can always fix it in the next one
82. Cheap releases
The release process should be so cheap that the cost of release is not a consideration
I automate most of the process
83. Low barriers to entry
CPAN only requires your release is...
freely re-distributable (not even Open Source)
something to do with Perl
84. Feedback about use
The author should get lots of feedback about their release, if it's getting used, if there's bugs,
patches, critiques...
98. Necessary
It is the knowledge you need.
It solves the problems you have.
It includes all the necessary hacks to make it work in the real world.
As opposed to...
117. Write for yourself
It's ok to be selfish
The primary reason for working on something is because you need it
Not because others need it
Working for others for free means burnout.