The document discusses the many Android app stores that exist, including major ones like the Google Play Store and Amazon App Store, as well as smaller niche stores. It describes the author's experiences submitting their apps K-9 Mail and Kaiten Mail to different stores. Key challenges included long review times, limited statistics and support, and low sales on some stores. The author argues submitting apps to multiple stores can increase revenues but requires managing different processes and policies across each store.
CyanogenMod is an after-market distribution of Android aiming for users and developers who enjoy running and hacking on the latest and greatest version of Android on their devices.
This talk will provide an overview of CyanogenMod detailing the role we play in the android ecosystem, why and how we do it and how you can become a part of it!
- The document discusses responsive design and optimizing websites for mobile use.
- Responsive design uses fluid grids and media queries to automatically adjust a website's layout for different screen sizes. This allows a single website to be accessed on any device.
- As mobile internet usage grows rapidly, responsive design is becoming the standard for website development. It ensures users have a good experience across all devices with a single codebase to maintain.
- Key aspects of responsive design include fluid grids using percentages instead of fixed widths, media queries to define breakpoints, and flexible elements like images that scale appropriately.
This document discusses CocoaPods, an open-source dependency manager for Cocoa projects like iOS and Mac OS X apps. It provides information on what CocoaPods is, how it works, how to install and use it to manage libraries in projects. It also covers creating your own libraries and podspecs to share on CocoaPods.
The document discusses the embedjs library, which allows building cross-device applications by detecting features at runtime rather than branching code. It provides an overview of embedjs' history and capabilities, including how it allows defining and requiring features in a simple way. The presentation demonstrates how embedjs works in practice and its potential future directions, such as optimized modules and mobile features.
The document discusses trends in the mobile application business in Thailand. It notes that smartphone and tablet usage is rising dramatically, with Facebook being the top social network used on mobile. The document outlines different business models for mobile apps, including paid, freemium, and advertising models. It also discusses important factors to consider when developing a mobile app like the target audience, competitors, and focus on user experience.
CyanogenMod is an after-market distribution of Android aiming for users and developers who enjoy running and hacking on the latest and greatest version of Android on their devices.
This talk will provide an overview of CyanogenMod detailing the role we play in the android ecosystem, why and how we do it and how you can become a part of it!
- The document discusses responsive design and optimizing websites for mobile use.
- Responsive design uses fluid grids and media queries to automatically adjust a website's layout for different screen sizes. This allows a single website to be accessed on any device.
- As mobile internet usage grows rapidly, responsive design is becoming the standard for website development. It ensures users have a good experience across all devices with a single codebase to maintain.
- Key aspects of responsive design include fluid grids using percentages instead of fixed widths, media queries to define breakpoints, and flexible elements like images that scale appropriately.
This document discusses CocoaPods, an open-source dependency manager for Cocoa projects like iOS and Mac OS X apps. It provides information on what CocoaPods is, how it works, how to install and use it to manage libraries in projects. It also covers creating your own libraries and podspecs to share on CocoaPods.
The document discusses the embedjs library, which allows building cross-device applications by detecting features at runtime rather than branching code. It provides an overview of embedjs' history and capabilities, including how it allows defining and requiring features in a simple way. The presentation demonstrates how embedjs works in practice and its potential future directions, such as optimized modules and mobile features.
The document discusses trends in the mobile application business in Thailand. It notes that smartphone and tablet usage is rising dramatically, with Facebook being the top social network used on mobile. The document outlines different business models for mobile apps, including paid, freemium, and advertising models. It also discusses important factors to consider when developing a mobile app like the target audience, competitors, and focus on user experience.
Gerd Leonhard Presentation at Emerging Communication Conference & Awards 2009...eCommConf
This document appears to be a slide deck presentation given by Gerd Leonhard on telemedia futures. Some of the key points discussed include the transition from an ego-based media system to an eco-based system focused on collaboration. Mobile, social media, and video are highlighted as major forces changing telecommunications and media. The importance of telecom companies engaging with media and content is also discussed.
IA Ondernemen met innovatieve apps. Wim Vanhenden. Sessie 2Ikinnoveer
The document discusses various aspects of mobile development including operating system market shares with Android dominating globally but iOS higher in countries like the US and Japan, debates around developing native apps versus mobile web apps, and the advantages and disadvantages of different programming technologies like native, web, and hybrid approaches. It also covers considerations for app versus mobile web for different types of products and services as well as tools for wireframing and prototyping mobile applications.
OWASP Birmingham - Mobile Application SecuritySecurity Ninja
David Rook presented on mobile application security at OWASP Birmingham. He discussed how the mobile app explosion has created value for businesses but also risks because most developers are not trained in secure coding. Key statistics included over 1 million apps, $15 billion in app sales in 2011, 30 billion app downloads, and 115 million smartphones sold in Q3 2011.
An introduction to the different architectures of Ember and Angular, two leading JavaScript singlepage / MVC frameworks.
This presentation was given to the Los Angeles RailsBridge "Architecture" meeting on October 25, 2013.
Dakno Real Estate Marketing Boot Camp Apps SessionBobby Carroll
Apps for Real Estate Agents on the Go! presented at the Dakno Real Estate Marketing Boot Camp by VP of Sales/Marketing, Bobby Carroll (@rewebcoach). A special treat during this session was the local introduction of the agent-centric GoConnect real estate app developed by Go Realty Founder Zach Schabot. www.goconnectapp.com
The slides from my section of a group presentation, entitled “iPhone Commerce”. Very short, but the message is that people will shop differently on mobile devices, and we need to consider this in our user interface design.
The document discusses using WebPagetest for private synthetic monitoring. It describes configuring WebPagetest tests using a JSON configuration file to run on a schedule. Test results are sent to Graphite for visualization and Splunk for logging. Advanced features like scripted prepending and multi-page flows are covered. Using WebPagetest is compared to paid tools, and future work like improving the testing process is proposed.
Aristotle and the Art of Software Development (Agile 2009)Jonathan Dahl
Talk on software development and philosophy, given at Agile 2009 in Chicago. (This is an updated version of a talk I gave at RubyConf 2008 in Orlando.)
Aristotle and the Art of Software DevelopmentJonathan Dahl
The document discusses different philosophical approaches to software development, including deontology, utilitarianism, and virtue ethics. It compares Immanuel Kant's deontological view, which focuses on duty and rules, to John Stuart Mill's utilitarian perspective of achieving the greatest good for the greatest number. The document also discusses Aristotle's virtue-based view and how different philosophies can influence various agile methodologies.
Slack launched a new video calling feature. Uber's self-driving cars started picking up passengers in San Francisco. AmazonGo's quicker grocery shopping method may not be more efficient.
The document outlines a proposal for a mobile app called "Sony Exclusive" to be developed for Sony Music Entertainment. It discusses using determination and creativity to help Sony climb to the top of the mobile app world. Various images are included to represent concepts like challenges, solutions, feedback, and connecting fans to artists. A timeline is proposed showing development from 2013-2016, with an initial app release planned for January 2015 and upgrades planned for subsequent years.
The document proposes a mobile app called "Sony Exclusive" to connect Sony Music artists and fans. It provides visualizations and timelines for developing the app over 2 years, with a January 2016 planned release on major platforms. User research methods like app usage tracking and feedback surveys are presented to ensure the app meets consumer needs. The conclusion states the app will directly connect fans to their favorite artists through shared music, news and information.
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...Amazon Web Services
"In March 2012, Japan’s leading mobile operator, NTT DOCOMO, introduced Shabette Concier, an advanced voice-activated personal agent service that enables customers to intuitively and directly operate services and smartphone features with voice commands. Millions of DOCOMO's subscribers are now using this service.
This session explains Shabette Concier's distributed speech recognition architecture, and dialogue-understanding system design, with machine learning technologies and large-scale database systems. Learn why DOCOMO chose the AWS cloud and how DOCOMO engineers overcame all the difficulties from CEO-imposed time constraints, unexpectedly rapid service growth, usage spikes driven by marketing campaigns, and internal resistance to the use of cloud services. The session concludes with lessons learned from a telco's large-scale service development of a mobile app with the AWS cloud."
Presented at the 6th Annual E-Tourism Africa Summit in Cape Town #ETAS13, on how South African Tourism is taking digital and travel forward as a national destination marketing organsation.
See the presentation via Google Hangout here: http://youtu.be/YyFGsjwoUw4
A presentation on social media strategy for the Arkansas Association of Two-Year Colleges, focusing on building relationships with all target audiences.
The document outlines the process for building a keyboard from scratch. It discusses selecting and obtaining the necessary tools and parts, including a microcontroller, switches, wires, and case materials. The document guides the reader through designing the keyboard layout, circuitry, and firmware. It also shares the speaker's experience building multiple prototype keyboards through an iterative design process. The goal is to demonstrate that building a custom keyboard is an achievable project that allows for creative hardware design and customization.
The document provides step-by-step instructions for building a keyboard from scratch. It lists the necessary tools like a soldering iron, parts like keyswitches and diodes, and gives guidance on laying out the keyboard, soldering the components together, and configuring firmware. The document also describes the author's experience building several prototype keyboards and shares photos of the progression from early models to more polished designs.
The document discusses a vision for improving and modernizing Perl 5. Some key points include:
- Making it possible to declare and maintain different versions of Perl 5 semantics to avoid breaking existing code.
- Externalizing features like SysV IPC and sockets into optional modules to reduce the core language size.
- Establishing sane defaults like warnings and stricter open() behavior to clean up parts of the language.
- Continuing to improve the development and release process to make contributions and changes easier.
The overall goal is to make Perl 5 a smaller, simpler, and more stable language while still allowing it to evolve over time without unexpected breaks to existing code.
Perl 5 is evolving rapidly with new stable releases being produced more frequently. The vision is to allow Perl 5 to continue evolving while maintaining backwards compatibility. This may involve externalizing features into modules, allowing different versions of Perl semantics based on version declarations, and moving to saner defaults over time through longer deprecation cycles. The goal is to keep Perl 5 a useful and sustainable language.
Gerd Leonhard Presentation at Emerging Communication Conference & Awards 2009...eCommConf
This document appears to be a slide deck presentation given by Gerd Leonhard on telemedia futures. Some of the key points discussed include the transition from an ego-based media system to an eco-based system focused on collaboration. Mobile, social media, and video are highlighted as major forces changing telecommunications and media. The importance of telecom companies engaging with media and content is also discussed.
IA Ondernemen met innovatieve apps. Wim Vanhenden. Sessie 2Ikinnoveer
The document discusses various aspects of mobile development including operating system market shares with Android dominating globally but iOS higher in countries like the US and Japan, debates around developing native apps versus mobile web apps, and the advantages and disadvantages of different programming technologies like native, web, and hybrid approaches. It also covers considerations for app versus mobile web for different types of products and services as well as tools for wireframing and prototyping mobile applications.
OWASP Birmingham - Mobile Application SecuritySecurity Ninja
David Rook presented on mobile application security at OWASP Birmingham. He discussed how the mobile app explosion has created value for businesses but also risks because most developers are not trained in secure coding. Key statistics included over 1 million apps, $15 billion in app sales in 2011, 30 billion app downloads, and 115 million smartphones sold in Q3 2011.
An introduction to the different architectures of Ember and Angular, two leading JavaScript singlepage / MVC frameworks.
This presentation was given to the Los Angeles RailsBridge "Architecture" meeting on October 25, 2013.
Dakno Real Estate Marketing Boot Camp Apps SessionBobby Carroll
Apps for Real Estate Agents on the Go! presented at the Dakno Real Estate Marketing Boot Camp by VP of Sales/Marketing, Bobby Carroll (@rewebcoach). A special treat during this session was the local introduction of the agent-centric GoConnect real estate app developed by Go Realty Founder Zach Schabot. www.goconnectapp.com
The slides from my section of a group presentation, entitled “iPhone Commerce”. Very short, but the message is that people will shop differently on mobile devices, and we need to consider this in our user interface design.
The document discusses using WebPagetest for private synthetic monitoring. It describes configuring WebPagetest tests using a JSON configuration file to run on a schedule. Test results are sent to Graphite for visualization and Splunk for logging. Advanced features like scripted prepending and multi-page flows are covered. Using WebPagetest is compared to paid tools, and future work like improving the testing process is proposed.
Aristotle and the Art of Software Development (Agile 2009)Jonathan Dahl
Talk on software development and philosophy, given at Agile 2009 in Chicago. (This is an updated version of a talk I gave at RubyConf 2008 in Orlando.)
Aristotle and the Art of Software DevelopmentJonathan Dahl
The document discusses different philosophical approaches to software development, including deontology, utilitarianism, and virtue ethics. It compares Immanuel Kant's deontological view, which focuses on duty and rules, to John Stuart Mill's utilitarian perspective of achieving the greatest good for the greatest number. The document also discusses Aristotle's virtue-based view and how different philosophies can influence various agile methodologies.
Slack launched a new video calling feature. Uber's self-driving cars started picking up passengers in San Francisco. AmazonGo's quicker grocery shopping method may not be more efficient.
The document outlines a proposal for a mobile app called "Sony Exclusive" to be developed for Sony Music Entertainment. It discusses using determination and creativity to help Sony climb to the top of the mobile app world. Various images are included to represent concepts like challenges, solutions, feedback, and connecting fans to artists. A timeline is proposed showing development from 2013-2016, with an initial app release planned for January 2015 and upgrades planned for subsequent years.
The document proposes a mobile app called "Sony Exclusive" to connect Sony Music artists and fans. It provides visualizations and timelines for developing the app over 2 years, with a January 2016 planned release on major platforms. User research methods like app usage tracking and feedback surveys are presented to ensure the app meets consumer needs. The conclusion states the app will directly connect fans to their favorite artists through shared music, news and information.
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...Amazon Web Services
"In March 2012, Japan’s leading mobile operator, NTT DOCOMO, introduced Shabette Concier, an advanced voice-activated personal agent service that enables customers to intuitively and directly operate services and smartphone features with voice commands. Millions of DOCOMO's subscribers are now using this service.
This session explains Shabette Concier's distributed speech recognition architecture, and dialogue-understanding system design, with machine learning technologies and large-scale database systems. Learn why DOCOMO chose the AWS cloud and how DOCOMO engineers overcame all the difficulties from CEO-imposed time constraints, unexpectedly rapid service growth, usage spikes driven by marketing campaigns, and internal resistance to the use of cloud services. The session concludes with lessons learned from a telco's large-scale service development of a mobile app with the AWS cloud."
Presented at the 6th Annual E-Tourism Africa Summit in Cape Town #ETAS13, on how South African Tourism is taking digital and travel forward as a national destination marketing organsation.
See the presentation via Google Hangout here: http://youtu.be/YyFGsjwoUw4
A presentation on social media strategy for the Arkansas Association of Two-Year Colleges, focusing on building relationships with all target audiences.
Similar to Dancing App Stores - Android Open 2011 (18)
The document outlines the process for building a keyboard from scratch. It discusses selecting and obtaining the necessary tools and parts, including a microcontroller, switches, wires, and case materials. The document guides the reader through designing the keyboard layout, circuitry, and firmware. It also shares the speaker's experience building multiple prototype keyboards through an iterative design process. The goal is to demonstrate that building a custom keyboard is an achievable project that allows for creative hardware design and customization.
The document provides step-by-step instructions for building a keyboard from scratch. It lists the necessary tools like a soldering iron, parts like keyswitches and diodes, and gives guidance on laying out the keyboard, soldering the components together, and configuring firmware. The document also describes the author's experience building several prototype keyboards and shares photos of the progression from early models to more polished designs.
The document discusses a vision for improving and modernizing Perl 5. Some key points include:
- Making it possible to declare and maintain different versions of Perl 5 semantics to avoid breaking existing code.
- Externalizing features like SysV IPC and sockets into optional modules to reduce the core language size.
- Establishing sane defaults like warnings and stricter open() behavior to clean up parts of the language.
- Continuing to improve the development and release process to make contributions and changes easier.
The overall goal is to make Perl 5 a smaller, simpler, and more stable language while still allowing it to evolve over time without unexpected breaks to existing code.
Perl 5 is evolving rapidly with new stable releases being produced more frequently. The vision is to allow Perl 5 to continue evolving while maintaining backwards compatibility. This may involve externalizing features into modules, allowing different versions of Perl semantics based on version declarations, and moving to saner defaults over time through longer deprecation cycles. The goal is to keep Perl 5 a useful and sustainable language.
The document discusses plans for future versions of Perl 5. Key points include:
- Perl 5 releases now happen much more frequently due to streamlined processes and rotating release engineers.
- Backward compatibility is a priority, but the language must continue evolving. A proposal to declare expected Perl versions would allow new features while maintaining old semantics for older code.
- Major changes that break backward compatibility would only happen as a last resort, with long deprecation cycles.
- Cleaning up and slimming down the Perl core language is a goal to make it more manageable and easier to learn.
K-9 Mail is an open source email client for Android created by Jesse Vincent after he was dissatisfied with the default email app that came with Android. It has grown significantly since its creation and now has over 150,000 downloads and contributions from many developers. The document outlines how Jesse created K-9 Mail by making a small change to the existing Android email app source code and submitting it to the Android Market. It details how the project has evolved and how new developers can get involved by building it from source and submitting patches.
Perl 5.12 was recently released with several new features and improvements but no critical regressions reported so far. The "Pumpking" or project leader explained that development releases are now made monthly by release managers, reducing the workload on the Pumpking. Contributors now make the majority of changes to Perl, with over 70 unique authors contributing monthly.
SD is a peer-to-peer (P2P) bug tracking system that allows users to track bugs and work even when offline or without reliable network access. It was created by Jesse Vincent, the founder of Best Practical, because existing bug tracking solutions did not meet his needs as someone who spends a lot of time traveling without reliable WiFi access. SD synchronizes issues and changes across devices and other issue trackers using a distributed model rather than depending on a centralized network infrastructure.
SD - A peer to peer issue tracking systemJesse Vincent
SD is a peer-to-peer bug tracking tool that allows users to track bugs offline and sync changes across networks. It addresses common issues with other bug tracking solutions by running at the edge, not depending on network reliability, and being topology-agnostic. SD can sync with other bug trackers like RT, Trac, Google Code and GitHub. It uses principles of distributed computing to resolve conflicts as changes are pulled from other users. The tool has a command line interface and can be installed via a one-line command that handles dependencies.
Hacking your Kindle (OSCON Lightning Talk)Jesse Vincent
This document summarizes the speaker's experience hacking their first ebook reader, the Kindle 2, to add additional functionality. It describes how they used USB networking debugging mode to access the Kindle's Linux filesystem, installed software like Calibre and Savory to allow additional ebook formats like ePub and PDF, and eventually ported Ubuntu and X.org to the device to build a custom PDF reader utilizing the Kindle's screen and inputs. The speaker outlines the device's technical specifications and limitations, and details the steps taken to modify and cross-compile software for the embedded Linux environment.
The document introduces SD, a peer-to-peer bug tracking tool developed by Best Practical to allow tracking bugs offline and syncing work across devices. SD uses a decentralized model where each installation can pull changes from any other replica. It supports syncing with other bug trackers like RT, Trac and Google Code. The author argues that cloud services make users dependent while SD empowers fully offline and distributed work by syncing like users naturally share files.
The document introduces Prophet, an open source peer-to-peer replicated database designed for offline and disconnected use. It aims to provide an alternative to cloud computing by allowing users to own and control their own data. The document discusses Prophet's architecture, capabilities for conflict resolution and synchronization, and potential applications like a bug tracking system called SD. It encourages readers to get involved by helping with improvements and developing new applications that can take advantage of Prophet's capabilities.
Beijing Perl Workshop 2008 Hiveminder Secret SauceJesse Vincent
Template::Declare is a pure Perl templating engine that allows templates to be treated like code. Templates can be refactored, use object orientation and mixins. Tags are implemented as closures that can output content immediately or return closures. CSS::Squish is a CSS compiler that combines multiple small CSS files into one large file for easier serving, improving performance by allowing browsers to cache the combined file.
RT and RTIR are open source ticketing systems designed by Jesse Vincent and Best Practical to help system administrators, helpdesk staff, and CERT teams be more effective. RTIR is based on RT but customized for incident response with features like incident reports, investigations, and network blocks. It provides a workflow and tools to help teams track incidents from initial reports through investigation and resolution. Both systems are free to use and have an active international user and developer community providing support.
Prophet is an open source database created by Jesse Vincent that is designed for team-scale apps and built for peer-to-peer replication and disconnected use. The database has an API similar to Amazon SimpleDB or Google App Engine and the first app being built on it is a canonical offline bug tracker that can sync over local networks.
Web 2.0 services resemble modern sharecropping where users contribute data and labor but do not own the services or have control over their data. If a service goes down or stops allowing new users, there is no recourse for the users. The author argues that users should have access to their own data through open APIs and services should be designed to work offline through peer-to-peer synchronization to avoid lock-in to specific service providers. The author is developing an open source database called Prophet that is aimed at building applications that can work offline through replication and without internet access.
Hiveminder - Everything but the Secret SauceJesse Vincent
Ten tools and techniques to help you:
Find bugs faster バグの検出をもっと素早く
Build web apps ウェブアプリの構築
Ship software ソフトのリリース
Get input from users ユーザからの入力を受けつける
Own the Inbox 受信箱を用意する
今日の話
Prophet - A peer to peer replicated disconnected databaseJesse Vincent
A semirelational,
peer to peer replicated,
disconnected, versioned,
property database with
self-healing conflict resolution, as presented at YAPC::Asia 2008
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data