Richard Moore has over 36 years of experience in the IT industry, primarily working for IBM as a firmware and hypervisor development engineer. He has expertise in operating systems, firmware, and mainframe systems. Richard currently works for IBM's Endicott lab developing enhancements to the mainframe virtualization hypervisor.
Shane Goggins has a Bachelor's of Science in Business Administration with an emphasis in Finance from Marian University. He has experience as a Financial Assistant from 2011-2012 where he invoiced clients, processed transactions, and performed reviews. Prior to that from 2010-2011, he worked as a Disamatic Operator. He can be reached by email at scgoggins09@marianuniversity.edu or by phone at 715-252-5883.
Catching Compliant Retinal Exams Part ILoreen Paulus
This document discusses strategies for accurately abstracting diabetic retinal exams for HEDIS 2017 compliance measurements. Key points include:
- Rules have tightened on what qualifies as a negative exam for retinopathy. Documentation must include evidence that retinopathy was absent, not just a statement of "diabetes without complications."
- Acceptable documentation sources and timeframes for retinal exams remain the same as prior years. Exams are considered hits if performed in the measurement year or if negative in the prior year.
- Deciphering ambiguous exam documentation is challenging but important for capturing all compliant exams. Details like dilating agents, fundus descriptions, and abbreviations can indicate if the retina was sufficiently examined.
This document analyzes lung cancer mortality rates and death counts for black and white males in Kentucky counties between 2000-2004. It identifies counties with mortality rates over 150 for each race and counties with the highest death counts. While black male rates were less concentrated, white male rates were highest in southern and eastern counties. Both black and white male death counts were higher near major population centers. Knox County and Gallatin County had mortality rates over 150 for both races.
The document provides details of the applicant's research skills, experience, and interests. It includes an overview of their academic background and technical skills in areas like modeling, data analysis, and statistics. Specific examples of their research experience are provided, including work on meteorological and CO2 modeling, Square Kilometer Array development, and dark energy research. Projects involved utilizing modeling software, high performance computing, data visualization, and Markov chain Monte Carlo methods. The applicant aims to help research groups through problem solving, skills acquisition, and computational analysis.
The document discusses how user experience (UX) design is delivered within advertising and marketing agencies. It notes there are two types of digital projects - functionally-led and creatively-led. Functionally-led projects focus on usability, while creatively-led projects also emphasize a unique creative idea. This introduces additional stakeholders and priorities. The author argues UX designers can minimize negative impacts by acting as glue between teams, using guerrilla testing, focusing on high-value areas, using examples rather than just talking, and questioning decisions to ensure consistency with goals. UX people can help ensure experiences are usable but also fun, informative or persuasive as needed.
The document outlines 10 topics related to the rise and spread of various civilizations around the world from antiquity to the 15th century CE. The topics covered include the rise of Islam and the Abbasid Caliphate in the Middle East and North Africa, the spread of Islamic civilization to South and Southeast Asia, African civilizations and the influence of Islam, Byzantine and Orthodox Christian civilization in Eastern Europe, the emergence of a new civilization in Western Europe, pre-Columbian civilizations in the Americas, reunification and cultural/economic prosperity during China's Tang and Song dynasties, the influence of Chinese civilization on Japan, Korea and Vietnam, the Mongol Empire and conquests of Chinggis Khan and Timur,
Vivir en la isla Juan Fernández no es fácil debido a su terreno agreste e inhóspito y su aislamiento del continente, del cual depende para la mayoría de los suministros. Aunque el terreno cultivable es escaso, los habitantes de la isla cocinan lo que tienen disponible como papas, cebollas y productos del mar como langosta y cangrejo dorado. Algunos platos emblemáticos de la isla incluyen el vidriolazo, un sándwich de pescado local, y el perol de langosta
Shane Goggins has a Bachelor's of Science in Business Administration with an emphasis in Finance from Marian University. He has experience as a Financial Assistant from 2011-2012 where he invoiced clients, processed transactions, and performed reviews. Prior to that from 2010-2011, he worked as a Disamatic Operator. He can be reached by email at scgoggins09@marianuniversity.edu or by phone at 715-252-5883.
Catching Compliant Retinal Exams Part ILoreen Paulus
This document discusses strategies for accurately abstracting diabetic retinal exams for HEDIS 2017 compliance measurements. Key points include:
- Rules have tightened on what qualifies as a negative exam for retinopathy. Documentation must include evidence that retinopathy was absent, not just a statement of "diabetes without complications."
- Acceptable documentation sources and timeframes for retinal exams remain the same as prior years. Exams are considered hits if performed in the measurement year or if negative in the prior year.
- Deciphering ambiguous exam documentation is challenging but important for capturing all compliant exams. Details like dilating agents, fundus descriptions, and abbreviations can indicate if the retina was sufficiently examined.
This document analyzes lung cancer mortality rates and death counts for black and white males in Kentucky counties between 2000-2004. It identifies counties with mortality rates over 150 for each race and counties with the highest death counts. While black male rates were less concentrated, white male rates were highest in southern and eastern counties. Both black and white male death counts were higher near major population centers. Knox County and Gallatin County had mortality rates over 150 for both races.
The document provides details of the applicant's research skills, experience, and interests. It includes an overview of their academic background and technical skills in areas like modeling, data analysis, and statistics. Specific examples of their research experience are provided, including work on meteorological and CO2 modeling, Square Kilometer Array development, and dark energy research. Projects involved utilizing modeling software, high performance computing, data visualization, and Markov chain Monte Carlo methods. The applicant aims to help research groups through problem solving, skills acquisition, and computational analysis.
The document discusses how user experience (UX) design is delivered within advertising and marketing agencies. It notes there are two types of digital projects - functionally-led and creatively-led. Functionally-led projects focus on usability, while creatively-led projects also emphasize a unique creative idea. This introduces additional stakeholders and priorities. The author argues UX designers can minimize negative impacts by acting as glue between teams, using guerrilla testing, focusing on high-value areas, using examples rather than just talking, and questioning decisions to ensure consistency with goals. UX people can help ensure experiences are usable but also fun, informative or persuasive as needed.
The document outlines 10 topics related to the rise and spread of various civilizations around the world from antiquity to the 15th century CE. The topics covered include the rise of Islam and the Abbasid Caliphate in the Middle East and North Africa, the spread of Islamic civilization to South and Southeast Asia, African civilizations and the influence of Islam, Byzantine and Orthodox Christian civilization in Eastern Europe, the emergence of a new civilization in Western Europe, pre-Columbian civilizations in the Americas, reunification and cultural/economic prosperity during China's Tang and Song dynasties, the influence of Chinese civilization on Japan, Korea and Vietnam, the Mongol Empire and conquests of Chinggis Khan and Timur,
Vivir en la isla Juan Fernández no es fácil debido a su terreno agreste e inhóspito y su aislamiento del continente, del cual depende para la mayoría de los suministros. Aunque el terreno cultivable es escaso, los habitantes de la isla cocinan lo que tienen disponible como papas, cebollas y productos del mar como langosta y cangrejo dorado. Algunos platos emblemáticos de la isla incluyen el vidriolazo, un sándwich de pescado local, y el perol de langosta
Thomas Harrer holds the title of Distinguished Engineer and the Chief Technology Officer Server & Storage EMEA at IBM. He is a member of the IBM Academy of Technology (AoT), (Board) Member TEC DACH, and a computer scientist with a strong background in mathematics, computer architecture and application architecture.
In the mid-nineties, through his groundbreaking diploma thesis, he combined the world of genomics and Artificial Intelligence by leveraging the power of neural networks for analysing genes in the human genome. He is very open-minded and especially interested in cross-collaboration between different areas of expertise.
Since 1995, Thomas Harrer has been working with IBM as a client engineer and architect focused on infrastructure architecture helping clients to innovate with technology increasing cross-platform efficiency.
Starting 2017, Thomas has taken over the responsibilities of Chief Technology Officer for IBM Servers and Storage for Europe and more recently extended them to EMEA. In this technical leadership role, Thomas Harrer and his team deliver innovation with hybrid clouds and AI, leveraging all types of data and evolving the technology that enables clients to achieve business success.
With a strong foundation in computer/data science and extensive experience in IT infrastructure and technology, Thomas enjoys bringing different elements together to build the architecture of the future. He loves to discuss technology, trends, AI, data, blockchains and architectures for mission-critical hybrid cloud solutions.
This document is a career summary for a senior systems engineer with 9 years of experience in the IT field. It outlines his objective of obtaining a senior systems engineer position, his career experience implementing technical solutions for banking and other sectors, his educational background which includes a Bachelor's degree in Information Systems, and his technical skills such as designing customer datacenter solutions and knowledge of Microsoft infrastructure products. It also lists his certifications from IBM and skills in areas such as teamwork, communication, and adapting to changing environments.
This document provides introductions and background information for Emmett Lalish and Kris Iverson. Emmett is a Mechanical Engineer who works on Microsoft's 3D printing team and has experience in aerospace engineering and 3D design. Kris is a Principal Software Design Engineer who has over 18 years of experience at Microsoft across various technologies and is now focused on making Windows the best platform for 3D printing. The document also outlines topics for a course on 3D printing essentials to be offered through Microsoft Virtual Academy, including an overview of 3D printing, hardware, software, modeling, and opportunities in the field. Expectations are that the course will be suitable for engineers, designers, programmers, hobbyists, and kids.
This short paper will address an argument that exists in the WW IT marketplace today and has existed in the marketplace over the last several years. It is an argument between mainframe computing with its z/OS® operating system and distributed server implementations of UNIX® and x86 vendors. The competitors being HP, with its HP-UX operating system, Oracle (Sun) with its Solaris operating system and x86 vendors such as Dell with primarily the Microsoft® Windows® operating system. These vendors also support the Linux® operating system, albeit in a distributed fashion, and with some virtualization techniques such as VMware and Hyper-V.
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance. Demonstrating compliance for your industry can be complex and failure to comply can result in vulnerabilities, audit failures, loss of reputation, security breaches, and even system shut down. How can you simplify enforcement of security policy and best practices? How can you automate security monitoring, threat detection, remediation and compliance reporting? How can you demonstrate governance, risk and compliance on your mainframe? Learn how your modern mainframe can help you to comply with industry regulations, reduce costs and protect your enterprise while supporting cloud, mobile, social and big data environments.
View the full on-demand webcast: https://www2.gotomeeting.com/en_US/island/webinar/registration.tmpl?Action=rgoto&_sf=14
IBM elm alm overview-software engineerin-lifecycle-managementImran Hashmi
Check out more info at https://hashmi.ca
IBM Engineering Lifecycle Management (ELM) Benefits
More effective requirements management establishing single-source of truth and traceability offering higher product quality
Automatically create system specifications, interface design documents, test cases, and track progress of work items to drive constant process improvement
Continuous risk-based testing with prioritization, assessment, and automation improving product quality
Enhance productivity and product quality byinfusing AI throughout workflows
Improved decision making through visualization, prototyping, simulation, and analysis
Optimize engineering productivity through reuseand variant management
RISC-V growth and successes in technology and industry - embedded world 2021RISC-V International
RISC-V International has more than 1,000 members across over 50 countries who are working in hardware, software, services, and various industries for a strong and healthy RISC-V ecosystem. It is projected that by 2025 there will be over 62 billion RISC-V CPU cores and the total market for RISC-V IP and software is expected to grow to over $1b by 2025.
In 2020 alone, we saw successes with newly defined RISC-V accelerator architectures, affordable RISC-V open source small-board computers, development boards for personal computers, and an incredibly fast 64-bit RISC-V Core as the community also ratified key specifications and made advances in security.
As we see the growth of RISC-V into industries such as AI, machine learning, blockchain, 5G, medical, and industrial, we will see the ratifications of new extensions that enable this growth.
Join Kim McMahon, Director of Marketing and Stephano Cetola, Technical Program Manager as we take a look at where RISC-V is going in 2021.
In this deck from the 2016 Stanford HPC Conference, Kurt Keville from R&D Labs at MIT presents: Introduction to RISC-V.
"Today’s server systems provide many knobs which influence energy efficiency and performance. Some of these knobs control the behavior of the operating systems, whereas others control the behavior of the hardware itself. Choosing the optimal configuration of the knobs is critical for energy efficiency. In this talk recent research results will be presented, including examples of big data applications that consume less energy when dynamic tuning is employed."
Kurt works on optimizing HPC codes for educational and institutional (R&D labs) purposes at MIT. He assesses new supercomputing hardware as part of his responsibilities. He has published in IEEE conferences and journals and he teaches embedded programming once a year. Kurt has a BS from West Point and an MS from MIT.
Learn more: http://soc.mit.edu
Sign up for our insideHPC Newsletter: http://insideHPC.com/newsletter
Barry Stephen Foord has over 25 years of experience in IT roles including project management, software development, infrastructure management, and team leadership. He has successfully led teams of up to 50 employees and has experience across a variety of sectors including financial services, healthcare, telecoms, and more. He has a proven track record of executing complex projects on time and within budget.
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
IBM Resilient customers are building versatile, adaptable incident response playbooks and workflows with expanded functions and community applications – recently released on the IBM Security App Exchange.
With the new IBM Resilient community, you can collaborate with fellow security experts on today’s top security challenges, share incident response best practices, and gain insights into the newest integrations.
The IBM Open Cloud Architecture (and Platform)Florian Georg
IBM's open cloud architecture strategy focuses on DevOps practices using a technology stack that includes OpenStack for IaaS, CloudFoundry PaaS, and SaaS applications. This provides on-premise private clouds with IBM PureFlex and SoftLayer, as well as IBM BlueMix for public clouds. IBM UrbanCode Deploy automates application deployments across environments, while IBM DevOps Services provides a pipeline for development, integration and delivery of applications on CloudFoundry and other platforms.
Embo++2022 Unembedding Embedded Systems with TDD Benefits of going beyond the...Francisco Climent Pérez
Slides of my 2nd version talk 'Unembedding embedded systems with TDD: Benefits of going beyond the Make-It-Work phase', delivered at Embo++2022 Conference on March 2022.
Little explanation and link to the talk here:
https://francliment.com/embedded-tdd/unembedding-embedded-systems-with-tdd-at-embo2022-conference/
Mr. Liu YongChun has over 23 years of experience in internet, IT, and energy industries. He is currently the Software Management Director at Schneider Electric, leading software development, marketing, deployment, and services. Previously, he held roles such as Chief Solution Architect and Vice President at Alcatel-Lucent Shanghai-Bell, and was Cisco China's first Systems Engineer Manager, helping establish their leadership in China. He holds advanced degrees from top Chinese universities and has received several prestigious awards.
The document discusses cognitive security and IBM's cognitive security solutions. It begins by explaining that traditional security methods are no longer enough due to increasing technological changes. It then introduces cognitive security as a new era of security that uses techniques like machine learning and natural language processing to mimic the human brain. The document summarizes IBM's cognitive security products like IBM QRadar Security Intelligence Platform, IBM QRadar Vulnerability Manager, and IBM QRadar Risk Manager. It acknowledges challenges to adopting cognitive security but emphasizes the need to educate organizations on cognitive security capabilities.
David Elliot has over 30 years of experience in various IT roles including z/OS systems programmer, mainframe security analyst, DBMS and TP systems programmer, and z/OS software developer. He has extensive experience designing and implementing mainframe security access controls, performing security compliance audits, installing and maintaining z/OS and various database systems, and developing software for mainframe environments. His resume outlines his technical skills and work experience in programming, security, system administration, performance tuning, and project management across z/OS, CICS, DB2, IMS, and other mainframe technologies.
The document provides details about an IMS Technical Conference to be held in Sydney, Australia on May 21-22, 2014. It will include sessions on various topics presented by speakers from IBM, BMC, and Fundi. International speakers include Shyh-Mei Ho from IBM who will discuss IMS trends and directions. Local speakers will also present on topics like using SQL with IMS databases and achieving high transaction rates of over 100k TPS with IMS. The conference aims to provide attendees with information on modernizing and integrating IMS, managing IMS environments, and migrating to the new IMS v13 release.
This document provides details about an IMS Technical Conference to take place in Melbourne, Australia on May 26-27, 2014. It includes information on location, speakers, and session topics. International speakers will discuss trends in IMS, modernization strategies, integration with mobile, and monitoring tools. Local speakers will cover performance testing IMS at 100K TPS, accessing IMS databases with SQL, and using tools to analyze transactions across subsystems. Sessions will help administrators manage IMS environments and migrate to the new IMS v13 release.
CS266 Software Reverse Engineering (SRE)
Introduction to Software Reverse Engineering
Teodoro (Ted) Cipresso, teodoro.cipresso@sjsu.edu
Department of Computer Science
San José State University
Spring 2015
Matrox Imaging provides imaging and machine vision components including smart cameras, vision systems, frame grabbers, and vision processors. They offer the Matrox Imaging Library (MIL) software development toolkit and Matrox Design Assistant integrated development environment. Products are designed for applications in manufacturing, medical imaging, and security and provide image acquisition and processing. Support services include technical support, training, and integration assistance.
Software security starts at the source — your code. When your code isn’t secure, a simple coding error could lead to a catastrophic attack.
But ensuring secure code can be tricky, particularly in C. And especially if you’re developing embedded software for an automobile, airplane, or medical device.
Learn the secret to secure embedded systems.
You’ll:
-Get an example of a security vulnerability.
-Compare four ways to secure embedded systems.
-Learn how MISRA C rules ensure secure code.
Thomas Harrer holds the title of Distinguished Engineer and the Chief Technology Officer Server & Storage EMEA at IBM. He is a member of the IBM Academy of Technology (AoT), (Board) Member TEC DACH, and a computer scientist with a strong background in mathematics, computer architecture and application architecture.
In the mid-nineties, through his groundbreaking diploma thesis, he combined the world of genomics and Artificial Intelligence by leveraging the power of neural networks for analysing genes in the human genome. He is very open-minded and especially interested in cross-collaboration between different areas of expertise.
Since 1995, Thomas Harrer has been working with IBM as a client engineer and architect focused on infrastructure architecture helping clients to innovate with technology increasing cross-platform efficiency.
Starting 2017, Thomas has taken over the responsibilities of Chief Technology Officer for IBM Servers and Storage for Europe and more recently extended them to EMEA. In this technical leadership role, Thomas Harrer and his team deliver innovation with hybrid clouds and AI, leveraging all types of data and evolving the technology that enables clients to achieve business success.
With a strong foundation in computer/data science and extensive experience in IT infrastructure and technology, Thomas enjoys bringing different elements together to build the architecture of the future. He loves to discuss technology, trends, AI, data, blockchains and architectures for mission-critical hybrid cloud solutions.
This document is a career summary for a senior systems engineer with 9 years of experience in the IT field. It outlines his objective of obtaining a senior systems engineer position, his career experience implementing technical solutions for banking and other sectors, his educational background which includes a Bachelor's degree in Information Systems, and his technical skills such as designing customer datacenter solutions and knowledge of Microsoft infrastructure products. It also lists his certifications from IBM and skills in areas such as teamwork, communication, and adapting to changing environments.
This document provides introductions and background information for Emmett Lalish and Kris Iverson. Emmett is a Mechanical Engineer who works on Microsoft's 3D printing team and has experience in aerospace engineering and 3D design. Kris is a Principal Software Design Engineer who has over 18 years of experience at Microsoft across various technologies and is now focused on making Windows the best platform for 3D printing. The document also outlines topics for a course on 3D printing essentials to be offered through Microsoft Virtual Academy, including an overview of 3D printing, hardware, software, modeling, and opportunities in the field. Expectations are that the course will be suitable for engineers, designers, programmers, hobbyists, and kids.
This short paper will address an argument that exists in the WW IT marketplace today and has existed in the marketplace over the last several years. It is an argument between mainframe computing with its z/OS® operating system and distributed server implementations of UNIX® and x86 vendors. The competitors being HP, with its HP-UX operating system, Oracle (Sun) with its Solaris operating system and x86 vendors such as Dell with primarily the Microsoft® Windows® operating system. These vendors also support the Linux® operating system, albeit in a distributed fashion, and with some virtualization techniques such as VMware and Hyper-V.
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance. Demonstrating compliance for your industry can be complex and failure to comply can result in vulnerabilities, audit failures, loss of reputation, security breaches, and even system shut down. How can you simplify enforcement of security policy and best practices? How can you automate security monitoring, threat detection, remediation and compliance reporting? How can you demonstrate governance, risk and compliance on your mainframe? Learn how your modern mainframe can help you to comply with industry regulations, reduce costs and protect your enterprise while supporting cloud, mobile, social and big data environments.
View the full on-demand webcast: https://www2.gotomeeting.com/en_US/island/webinar/registration.tmpl?Action=rgoto&_sf=14
IBM elm alm overview-software engineerin-lifecycle-managementImran Hashmi
Check out more info at https://hashmi.ca
IBM Engineering Lifecycle Management (ELM) Benefits
More effective requirements management establishing single-source of truth and traceability offering higher product quality
Automatically create system specifications, interface design documents, test cases, and track progress of work items to drive constant process improvement
Continuous risk-based testing with prioritization, assessment, and automation improving product quality
Enhance productivity and product quality byinfusing AI throughout workflows
Improved decision making through visualization, prototyping, simulation, and analysis
Optimize engineering productivity through reuseand variant management
RISC-V growth and successes in technology and industry - embedded world 2021RISC-V International
RISC-V International has more than 1,000 members across over 50 countries who are working in hardware, software, services, and various industries for a strong and healthy RISC-V ecosystem. It is projected that by 2025 there will be over 62 billion RISC-V CPU cores and the total market for RISC-V IP and software is expected to grow to over $1b by 2025.
In 2020 alone, we saw successes with newly defined RISC-V accelerator architectures, affordable RISC-V open source small-board computers, development boards for personal computers, and an incredibly fast 64-bit RISC-V Core as the community also ratified key specifications and made advances in security.
As we see the growth of RISC-V into industries such as AI, machine learning, blockchain, 5G, medical, and industrial, we will see the ratifications of new extensions that enable this growth.
Join Kim McMahon, Director of Marketing and Stephano Cetola, Technical Program Manager as we take a look at where RISC-V is going in 2021.
In this deck from the 2016 Stanford HPC Conference, Kurt Keville from R&D Labs at MIT presents: Introduction to RISC-V.
"Today’s server systems provide many knobs which influence energy efficiency and performance. Some of these knobs control the behavior of the operating systems, whereas others control the behavior of the hardware itself. Choosing the optimal configuration of the knobs is critical for energy efficiency. In this talk recent research results will be presented, including examples of big data applications that consume less energy when dynamic tuning is employed."
Kurt works on optimizing HPC codes for educational and institutional (R&D labs) purposes at MIT. He assesses new supercomputing hardware as part of his responsibilities. He has published in IEEE conferences and journals and he teaches embedded programming once a year. Kurt has a BS from West Point and an MS from MIT.
Learn more: http://soc.mit.edu
Sign up for our insideHPC Newsletter: http://insideHPC.com/newsletter
Barry Stephen Foord has over 25 years of experience in IT roles including project management, software development, infrastructure management, and team leadership. He has successfully led teams of up to 50 employees and has experience across a variety of sectors including financial services, healthcare, telecoms, and more. He has a proven track record of executing complex projects on time and within budget.
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
IBM Resilient customers are building versatile, adaptable incident response playbooks and workflows with expanded functions and community applications – recently released on the IBM Security App Exchange.
With the new IBM Resilient community, you can collaborate with fellow security experts on today’s top security challenges, share incident response best practices, and gain insights into the newest integrations.
The IBM Open Cloud Architecture (and Platform)Florian Georg
IBM's open cloud architecture strategy focuses on DevOps practices using a technology stack that includes OpenStack for IaaS, CloudFoundry PaaS, and SaaS applications. This provides on-premise private clouds with IBM PureFlex and SoftLayer, as well as IBM BlueMix for public clouds. IBM UrbanCode Deploy automates application deployments across environments, while IBM DevOps Services provides a pipeline for development, integration and delivery of applications on CloudFoundry and other platforms.
Embo++2022 Unembedding Embedded Systems with TDD Benefits of going beyond the...Francisco Climent Pérez
Slides of my 2nd version talk 'Unembedding embedded systems with TDD: Benefits of going beyond the Make-It-Work phase', delivered at Embo++2022 Conference on March 2022.
Little explanation and link to the talk here:
https://francliment.com/embedded-tdd/unembedding-embedded-systems-with-tdd-at-embo2022-conference/
Mr. Liu YongChun has over 23 years of experience in internet, IT, and energy industries. He is currently the Software Management Director at Schneider Electric, leading software development, marketing, deployment, and services. Previously, he held roles such as Chief Solution Architect and Vice President at Alcatel-Lucent Shanghai-Bell, and was Cisco China's first Systems Engineer Manager, helping establish their leadership in China. He holds advanced degrees from top Chinese universities and has received several prestigious awards.
The document discusses cognitive security and IBM's cognitive security solutions. It begins by explaining that traditional security methods are no longer enough due to increasing technological changes. It then introduces cognitive security as a new era of security that uses techniques like machine learning and natural language processing to mimic the human brain. The document summarizes IBM's cognitive security products like IBM QRadar Security Intelligence Platform, IBM QRadar Vulnerability Manager, and IBM QRadar Risk Manager. It acknowledges challenges to adopting cognitive security but emphasizes the need to educate organizations on cognitive security capabilities.
David Elliot has over 30 years of experience in various IT roles including z/OS systems programmer, mainframe security analyst, DBMS and TP systems programmer, and z/OS software developer. He has extensive experience designing and implementing mainframe security access controls, performing security compliance audits, installing and maintaining z/OS and various database systems, and developing software for mainframe environments. His resume outlines his technical skills and work experience in programming, security, system administration, performance tuning, and project management across z/OS, CICS, DB2, IMS, and other mainframe technologies.
The document provides details about an IMS Technical Conference to be held in Sydney, Australia on May 21-22, 2014. It will include sessions on various topics presented by speakers from IBM, BMC, and Fundi. International speakers include Shyh-Mei Ho from IBM who will discuss IMS trends and directions. Local speakers will also present on topics like using SQL with IMS databases and achieving high transaction rates of over 100k TPS with IMS. The conference aims to provide attendees with information on modernizing and integrating IMS, managing IMS environments, and migrating to the new IMS v13 release.
This document provides details about an IMS Technical Conference to take place in Melbourne, Australia on May 26-27, 2014. It includes information on location, speakers, and session topics. International speakers will discuss trends in IMS, modernization strategies, integration with mobile, and monitoring tools. Local speakers will cover performance testing IMS at 100K TPS, accessing IMS databases with SQL, and using tools to analyze transactions across subsystems. Sessions will help administrators manage IMS environments and migrate to the new IMS v13 release.
CS266 Software Reverse Engineering (SRE)
Introduction to Software Reverse Engineering
Teodoro (Ted) Cipresso, teodoro.cipresso@sjsu.edu
Department of Computer Science
San José State University
Spring 2015
Matrox Imaging provides imaging and machine vision components including smart cameras, vision systems, frame grabbers, and vision processors. They offer the Matrox Imaging Library (MIL) software development toolkit and Matrox Design Assistant integrated development environment. Products are designed for applications in manufacturing, medical imaging, and security and provide image acquisition and processing. Support services include technical support, training, and integration assistance.
Software security starts at the source — your code. When your code isn’t secure, a simple coding error could lead to a catastrophic attack.
But ensuring secure code can be tricky, particularly in C. And especially if you’re developing embedded software for an automobile, airplane, or medical device.
Learn the secret to secure embedded systems.
You’ll:
-Get an example of a security vulnerability.
-Compare four ways to secure embedded systems.
-Learn how MISRA C rules ensure secure code.
1. Curriculum Vitae: Richard J Moore
Last updated: 06/06/15 at 15:54:03
Richard J Moore BSc Pure Mathematics (Special Hons, Kingston upon Hull),
CEng, CITP, FIET, FBCS
Job Title: IBM Mainframe Firmware and zVM Hypervisor Development Engineer
PROFESSIONAL SUMMARY
Richard works for the IBM Endicott Lab on projects connected with the System z
mainframe hypervisor and is a member of IBM's Academy of Technology.
He is in his 36th
year in the IT Industry and 31st
year with IBM. He has worked with IBM's
Development, Support and Sales Organizations, throughout his career, always in an
engineering capacity that combines performance and problem analysis with system design
and development.
Richard's engineering experience spans a broad spectrum of operating systems and firmware
that run on system ranging from microprocessors to the highend mainframes. He was
recently assigned to the IBM mainframe engineering team to work on the processor
microarchitecture. In these areas he has published a number of invention disclosures.
A significant aspect of Richard's expertise concerns the characteristics of IT systems that
make them robust enough for commercial use in safety and missioncritical deployment.
The mitigation of risk caused by potential and actual systems failure has resulted in a
number of his innovations being applied to IBM's product offerings and the Linux kernel.
He has considerable expertise in the practical issues associated with running a successful
team of globally dispersed engineers.
Richard is frequently invited to speak at conferences, give lectures and talks to IBM
customers. During the period in which he was actively working on Linux kernel
development he was invited to speak on numerous occasions. Examples include:
Keble College Oxford; Reykajvík University; Ottawa Linux Symposium; Atlanta
Linux Symposium; FOSDEM; GUIDE; Linux Tag; LinuxCon Prague; UKUUG,
USENIX.
Richard is involved in educational establishments as a STEM ambassador, an instrumental
music teacher and has also been a visiting fellow at Southampton Solent University where
he assisted with mathematics tuition for engineering students.
He is a fellow of the British Computer Society and the Institution for Engineering and
Technology. He serves on the operations committee of the IET Solent Network and was the
previous chair for the Solent Network.
2. Curriculum Vitae: Richard J Moore
Last updated: 06/06/15 at 15:54:03
CAREER HISTORY
Endicott Lab: July 2013 to present
Richard' current assignment is with IBM's Endicott lab in New York State. He works on
enhancements to the mainframe virtualization hypervisor (z/VM). His focus is on
transactional memory, hyperthreading and the interplay between the processor microcode
and the hypervisor.
Poughkeepsie Lab: January 2012 – July 2013
Working on microcode performance analysis, the development of analytical tools and
processor instrumentation. Invention filed for improvements to branch prediction.
Linux Technology Centre: April 2011 – January 2012
Working on improvements to the usability of the Linux Source Development Kit for
POWER Linux.
Poughkeepsie/Manchester Labs: January 2010 – April 2011
Assigned to a research project concerning dynamic optimization of the instruction flow
through the mainframe processor pipeline.
Endicott Lab: November 2008 – April 2010
Assigned to the the hypervisor clustering project. Responsible for the design and
development of virtual architecture management in a dynamically upgradable and
reconfigurable cluster. Patent granted for dynamic architecture management in a live guest
relocation environment.
Linux Technology Centre: 20042008
Engineering consultancy role comprising customer and labbased problem analysis and the
design of custom operating system enhancements.
During this period, fellowships to the BCS and IET were conferred.
Linux Technology Centre: 20002004
Lead engineer for a globally distributed team. Responsible for the development of Linux
kernel diagnostic and serviceability enhancements and associated tooling. This was part of
an initiative to enable Linux to be deployed in missioncritical enterprise IT systems.
Several patents were granted.
Worked with the POSIX standards group on the definition of a portable error logging.
EMEA Technical Support for Personal Systems: 19942000
Responsible for problem analysis relating to the OS/2 operating system installed in customer
systems across Europe, Middle East and Africa. Provided technical leadership and guidance
to other teams working across Asia and the Americas.
Author to many OS/2 operating system serviceability enhancements and diagnostic aids.
Jointly created a series of weeklong classes on diagnostic and debugging techniques These
were delivered globally to IBM teams and customers.
3. Curriculum Vitae: Richard J Moore
Last updated: 06/06/15 at 15:54:03
Joint author to a 1500 page book on OS/2 diagnostic techniques. (The OS/2 Debugging
Guide in four volumes).
Responsible for the training of engineering teams newly appointed to the labs in India and
Latvia.
CDIM development Portsmouth UKIIS/NSD: 19901994
Twoman team responsible for development of CDIM as a Service Offering. This included
product development, support, technical marketing and customer installation and education.
This product was concerned with minimising the risk of failure caused by highvolume,
highfrequency system configuration changes.
IBM PCC Portsmouth N/W Systems Programmer: 19841990
Responsible for problem analysis and maintenance of IBM's internal networking systems.
Reckitt & Colman plc, Hull: 19791984
COBOL & Assembler programmer.
Systems Programmer for S/370, 8100, MVS, DPPX, VTAM, NCP, SNA/SDLC/BSC
networking.
R&C representative for the Article Numbering Association
Read School, Drax: 19771979
Senior school mathematics teacher. Teaching up to Alevel.
PROFESSIONAL APPOINTMENTS
2000: POSIX standards group on error logging
2011: Industry representative assigned to the Periodic Academic Review for Southampton
Solent University
2011: Visiting Fellow for Southampton Solent University.
EDUCATION, TRAINING, QUALIFICATIONS AND AFFILIATIONS
EDUCATION
University of Kingston upon Hull
2(I) Special Honours degree obtained in Pure Mathematics (1977)
AFFILIATIONS
• Chartered Engineer (2000)
• Chartered IT professional (2003)
• Fellow of the British Computing Society (2007)
• Fellow of the Institution of Engineering and Technology (2007)
• Senior Certified member of the IBM IT Specialist Profession.
• Member of the IBM Academy of Technology:
4. Curriculum Vitae: Richard J Moore
Last updated: 06/06/15 at 15:54:03
http://www-03.ibm.com/ibm/academy/index.html
SPECIALISED TRAINING
Richard's professional training is extensive. It covers system programming and
development, operating system design, networking protocols and network management.
PROFESSIONAL AWARDS
• Outstanding Technical Achievement Award for RAS Enhancements to OS/2 Warp 4
• Outstanding Technical Achievement Award for OS/2 debugging education given to the
IBM Development Teams in Latvia and India.
• IBM Stock Options Award for Technical achievement to date within IBM.
• Exceptional Achievement Award for System Trace and Dump reimplementation in
OS/2.
• Exceptional Achievement for writing the OS/2 Debugging Handbooks.
• Sales Technical Excellency Award for the System Anchor Block Design for OS/2 and
Workplace OS.
• First Patent Plateau Award
• Second Patent Plateau Award
INVENTION DISCLOSURES
1. API interception techniques.
2. Award for Generalised Kernel Hooks Interface for Linux.
3. Techniques for handling Zombie Breakpoints.
4. Simulating Hardware Watchpoints by means of Pagepoints.
5. HighLevel Language Compiler for Dynamic Probes
6. Reverse Polish Notation Exceptionhandling Scheme.
7. Method for calculating syllables in an English Language text sentence.
8. Mechanism for Implementing Functionreturn Breakpoints.
9. Method for singlestepping an instruction with interrupts and preemption enabled by
means of multiple threadbased singlestep state stacks.
10. Live Guest Relocation Virtual Architecture Management
11. Branch Prediction Techniques using a Pattern Anchor Table
SELECTION of CONFERENCE LECTURES & PAPERS
2000 DProbes at the Annual Linux Showcase Conference in Atlanta
2001 Dynamic Tracing at the FREENIX track of the USNIX Conference in Boston
2001 UKUUG Dprobes
2002 UKUUG Linux RAS
2002 LinuxTag Linux RAS
2003 Linux World Expo NY, RAS Panel Discussion
2003 IEE Lecture on Linux
2003 Scottish Enterprise Conference – Linux for the Enterprise
2003 NordU Linux at IBM
2003 Oxford University Lunchtime Lecture on Linux
2004 LISA winter conference 2004 keynote on RAS
2004 Rekjavik conference, Linux @ IBM,
5. Curriculum Vitae: Richard J Moore
Last updated: 06/06/15 at 15:54:03
2004 Rekjavik University lunchtime lecture.
2004 ACCU Conference speaker and member of discussion panel.
2004 LinuxUser and Developer Expo Olmpia – LTC technical briefing
2004 LinuxUser&Developer Expo 20004, Olympia. Linux Debugging
2004 Antiabuse conference. Speak on CGL and security. Talk part in discussion panel.
2004 Ottawa Linux Symposium 2004 RAS Bofs
2004 UKUUG lkcd and debugging tutorial at Leeds
2004 "Galiciatic" Conference Keynote talk on LTC and IBM
2005 Ottawa Linux Symposium SystemTap paper
2005 UKUUG Swansea. Talk: SystemTap
2006 UKUUG workshop on using SystemTap and kdump
2006 LUG Radio Wolverhampton Talk on IBM and Linux
2007 UKUUK Tutorial on System Tap and Kdump
2011 LinuxCon.eu Talk on the SDK for POWER Linux
EXTERNAL PROFILES
• 2006 I was profiled in the IET Publication “The IT Professional” in an article on IBM
professionals.
• Linkedin Profile http://uk.linkedin.com/pub/richard-j-moore-fiet-fbcs-ceng-citp/4/4b1/748
PROFESSIONAL MEMBERSHIP
• Fellow of the Institution of Engineering and Technology
• Fellow of the British Computer Society
• Associate Member of the Institute of Electrical and Electronic Engineers
• Member of the British Mathematical Association
• Former Member of USENIX, the UNIX User’s Association
OTHER INTERESTS
• A keen semiprofessional musician (bassoonist). Involved in teaching, performing and
publishing. Edited several works for publication. Articles published with the British Music
Society and other journals. Recorded broadcast for BBC Radio 3.
• Keen amateur entomologist.
• Keen board and card games player. Former member of the English Bridge Union.