Selected Talk by Allan Hanbury, at the European Data Forum 2013, 10 April 2013 in Dublin, Ireland: Algorithm any good? A Cloud-based Infrastructure for Evaluation on Big Data
TechRules Risk Analytics allows financial institutions to calculate the risk/return of their asset universe and/or their client's portfolios obtaining a file with all the requested calculations.
Federated Galaxy: Biomedical Computing at the FrontierEnis Afgan
Biomedical data exploration requires integrative analyses of large datasets using a diverse ecosystem of tools. For more than a decade, the Galaxy project (https://galaxyproject.org) has provided researchers with a web-based, user-friendly, scalable data analysis framework complemented by a rich ecosystem of tools (https://usegalaxy.org/toolshed) used to perform genomic, proteomic, metabolomic, and imaging experiments. Galaxy can be deployed on the cloud (https://launch.usegalaxy.org), institutional computing clusters, and personal computers, or readily used on a number of public servers (e.g., https://usegalaxy.org). In this paper, we present our plan and progress towards creating Galaxy-as-a-Service—a federation of distributed data and computing resources into a panoptic analysis platform. Users can leverage a pool of public and institutional resources, in addition to plugging-in their private resources, helping answer the challenge of resource divergence across various Galaxy instances and enabling seamless analysis of biomedical data.
The Discovery Cloud: Accelerating Science via Outsourcing and AutomationIan Foster
Director's Colloquium at Los Alamos National Laboratory, September 18, 2014.
We have made much progress over the past decade toward harnessing the collective power of IT resources distributed across the globe. In high-energy physics, astronomy, and climate, thousands work daily within virtual computing systems with global scope. But we now face a far greater challenge: Exploding data volumes and powerful simulation tools mean that many more--ultimately most?--researchers will soon require capabilities not so different from those used by such big-science teams. How are we to meet these needs? Must every lab be filled with computers and every researcher become an IT specialist? Perhaps the solution is rather to move research IT out of the lab entirely: to leverage the “cloud” (whether private or public) to achieve economies of scale and reduce cognitive load. In this talk, I explore the past, current, and potential future of large-scale outsourcing and automation for science.
Charith Perera, Arkady Zaslavsky, Michael Compton, Peter Christen, and Dimitrios Georgakopoulos, Semantic-driven Configuration of Internet of Things Middleware, Proceedings of the 9th International Conference on Semantics, Knowledge & Grids (SKG), Beijing, China, October, 2013
TechRules Risk Analytics allows financial institutions to calculate the risk/return of their asset universe and/or their client's portfolios obtaining a file with all the requested calculations.
Federated Galaxy: Biomedical Computing at the FrontierEnis Afgan
Biomedical data exploration requires integrative analyses of large datasets using a diverse ecosystem of tools. For more than a decade, the Galaxy project (https://galaxyproject.org) has provided researchers with a web-based, user-friendly, scalable data analysis framework complemented by a rich ecosystem of tools (https://usegalaxy.org/toolshed) used to perform genomic, proteomic, metabolomic, and imaging experiments. Galaxy can be deployed on the cloud (https://launch.usegalaxy.org), institutional computing clusters, and personal computers, or readily used on a number of public servers (e.g., https://usegalaxy.org). In this paper, we present our plan and progress towards creating Galaxy-as-a-Service—a federation of distributed data and computing resources into a panoptic analysis platform. Users can leverage a pool of public and institutional resources, in addition to plugging-in their private resources, helping answer the challenge of resource divergence across various Galaxy instances and enabling seamless analysis of biomedical data.
The Discovery Cloud: Accelerating Science via Outsourcing and AutomationIan Foster
Director's Colloquium at Los Alamos National Laboratory, September 18, 2014.
We have made much progress over the past decade toward harnessing the collective power of IT resources distributed across the globe. In high-energy physics, astronomy, and climate, thousands work daily within virtual computing systems with global scope. But we now face a far greater challenge: Exploding data volumes and powerful simulation tools mean that many more--ultimately most?--researchers will soon require capabilities not so different from those used by such big-science teams. How are we to meet these needs? Must every lab be filled with computers and every researcher become an IT specialist? Perhaps the solution is rather to move research IT out of the lab entirely: to leverage the “cloud” (whether private or public) to achieve economies of scale and reduce cognitive load. In this talk, I explore the past, current, and potential future of large-scale outsourcing and automation for science.
Charith Perera, Arkady Zaslavsky, Michael Compton, Peter Christen, and Dimitrios Georgakopoulos, Semantic-driven Configuration of Internet of Things Middleware, Proceedings of the 9th International Conference on Semantics, Knowledge & Grids (SKG), Beijing, China, October, 2013
EDF2013: Selected Talk Nikolaos Loutas, João Rodrigues Frade: Linked Open Gov...European Data Forum
Selected Talk by Nikolaos Loutas, João Rodrigues Frade, at the European Data Forum 2013, 10 April 2013 in Dublin, Ireland: Linked Open Government Data Business Models
Delivering on Standards for Publishing Government Linked Data3 Round Stones
Progress report on publishing open government data using Open Web Standards. Delivered by Bernadette Hyland, co-chair W3C Government Linked Data Working Group at the European Data Forum 2013, Dublin, Ireland.
Siddhi: A Second Look at Complex Event Processing ImplementationsSrinath Perera
Today there are so much data being available from sources like sensors (RFIDs, Near Field Communication), web activities, transactions, social networks, etc. Making sense of this avalanche of data requires efficient and fast processing.
Processing of high volume of events to derive higher-level information is a vital part of taking critical decisions, and
Complex Event Processing (CEP) has become one of the most rapidly emerging fields in data processing. e-Science
use-cases, business applications, financial trading applications, operational analytics applications and business activity monitoring applications are some use-cases that directly use CEP. This paper discusses different design decisions associated
with CEP Engines, and proposes some approaches to improve CEP performance by using more stream processing
style pipelines. Furthermore, the paper will discuss Siddhi, a CEP Engine that implements those suggestions. We
present a performance study that exhibits that the resulting CEP Engine—Siddhi—has significantly improved performance.
Primary contributions of this paper are performing a critical analysis of the CEP Engine design and identifying
suggestions for improvements, implementing those improvements
through Siddhi, and demonstrating the soundness of those suggestions through empirical evidence.
Mindtree is one of the first IT service providers to invest in emerging technologies and has developed various technology assets. Customers in product engineering services benefit heavily from our domain expertise.
Some of the technology assets developed include short-range wireless connectivity technologies such as Bluetooth and UWB, Video Analytic Algorithms, Acoustic Echo Cancellation, Audio Codecs, VoIP Stacks, etc.
IBM Smarter Business 2012 - PureSystems - PureDataIBM Sverige
År 2013 kommer nästan 70 % av företagens driftkostnader att läggas på existerande IT. Endaste en av fem organisationer lägger idag mer än 50 % av IT-budgeten på nya projekt. Med vetskap om den digitala tillväxt vi har framför oss, handlar ödesfrågan enligt Don Boulia, Vice President Strategy, IBM Software Group, därför om hur väl ett företags infrastruktur klarar förändringarna. Nya lanseringen i familjen IBM PureSystems, PureData, adresserar utmaningarna med stora datamängder.
Talare: Don Boulia, Vice President IBM WebSphere Cloud, Per Fredriksson, IBM PureSystems Executive Architect
Besök http://smarterbusiness.se för mer information.
A vision on collaborative computation of things for personalized analysesDaniele Gianni
Presentation delivered at the 3rd IEEE Track on
Collaborative Modeling & Simulation - CoMetS'12.
Please see http://www.sel.uniroma2.it/comets12/ for further details.
Making Runtime Data Useful for Incident Diagnosis: An Experience ReportQAware GmbH
QuASD/PROFES 2018, Wolfsburg: Talk by Marcus Ciolkowski (@M_Ciolkowski, Principal IT Consultant at QAware) and Florian Lautenschlager (@flolaut, Senior Software Engineer)
=== Please download slides if blurred! ===
Abstract: Important and critical aspects of technical debt often surface at runtime only and are difficult to measure statically.
This is a particular challenge for cloud applications because of their highly distributed nature.
Fortunately, mature frameworks for collecting runtime data exist but need to be integrated.
In this paper, we report an experience from a project that implements a cloud application within Kubernetes on Azure.
To analyze the runtime data of this software system, we instrumented our services with Zipkin for distributed tracing; with Prometheus and Grafana for analyzing metrics; and with fluentd, Elasticsearch and Kibana for collecting, storing and exploring log files.
However, project team members did not utilize these runtime data until we created a unified and simple access using a chat bot.
We argue that even though your project collects runtime data, this is not sufficient to guarantee its usage: In order to be useful, a simple, unified access to different data sources is required that should be integrated into tools that are commonly used by team members.
Get the research paper: http://bitly.com/2QmSNwl
Performance of Hasty and Consistent Multi Spectral Iris Segmentation using De...ijtsrd
The recognition system is composed of seven phases acquisition, preprocessing, segmentation, normalization, feature extraction, feature selection, and classification. In the acquisition phase, iris images are captured, followed by preprocessing to enhance the quality of the images. The segmentation phase involves separating the iris region from the background, and the normalized iris region is shaped into a rectangle in the normalization phase. Iris segmentation is a critical step in iris recognition systems and has a direct impact on authentication and recognition results. However, standard segmentation techniques may not perform well in noisy iris databases captured under challenging conditions. Moreover, the lack of large iris databases hinders the performance improvement of convolution neural networks. The proposed method addresses these challenges by effectively handling irregular iris images captured under visible light. The iris region is processed and evaluated to generate a unique feature vector, which is then used for person identification. VGG16, a well known deep learning model, is employed for image classification, and the feature vector is fed into VGG16 for classification purposes. Ram Niwas Sharma | Ankit Kumar Navalakha | Neha Sharma "Performance of Hasty and Consistent Multi Spectral Iris Segmentation using Deep Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-5 , October 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59853.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/59853/performance-of-hasty-and-consistent-multi-spectral-iris-segmentation-using-deep-learning/ram-niwas-sharma
EDF2013: Selected Talk Nikolaos Loutas, João Rodrigues Frade: Linked Open Gov...European Data Forum
Selected Talk by Nikolaos Loutas, João Rodrigues Frade, at the European Data Forum 2013, 10 April 2013 in Dublin, Ireland: Linked Open Government Data Business Models
Delivering on Standards for Publishing Government Linked Data3 Round Stones
Progress report on publishing open government data using Open Web Standards. Delivered by Bernadette Hyland, co-chair W3C Government Linked Data Working Group at the European Data Forum 2013, Dublin, Ireland.
Siddhi: A Second Look at Complex Event Processing ImplementationsSrinath Perera
Today there are so much data being available from sources like sensors (RFIDs, Near Field Communication), web activities, transactions, social networks, etc. Making sense of this avalanche of data requires efficient and fast processing.
Processing of high volume of events to derive higher-level information is a vital part of taking critical decisions, and
Complex Event Processing (CEP) has become one of the most rapidly emerging fields in data processing. e-Science
use-cases, business applications, financial trading applications, operational analytics applications and business activity monitoring applications are some use-cases that directly use CEP. This paper discusses different design decisions associated
with CEP Engines, and proposes some approaches to improve CEP performance by using more stream processing
style pipelines. Furthermore, the paper will discuss Siddhi, a CEP Engine that implements those suggestions. We
present a performance study that exhibits that the resulting CEP Engine—Siddhi—has significantly improved performance.
Primary contributions of this paper are performing a critical analysis of the CEP Engine design and identifying
suggestions for improvements, implementing those improvements
through Siddhi, and demonstrating the soundness of those suggestions through empirical evidence.
Mindtree is one of the first IT service providers to invest in emerging technologies and has developed various technology assets. Customers in product engineering services benefit heavily from our domain expertise.
Some of the technology assets developed include short-range wireless connectivity technologies such as Bluetooth and UWB, Video Analytic Algorithms, Acoustic Echo Cancellation, Audio Codecs, VoIP Stacks, etc.
IBM Smarter Business 2012 - PureSystems - PureDataIBM Sverige
År 2013 kommer nästan 70 % av företagens driftkostnader att läggas på existerande IT. Endaste en av fem organisationer lägger idag mer än 50 % av IT-budgeten på nya projekt. Med vetskap om den digitala tillväxt vi har framför oss, handlar ödesfrågan enligt Don Boulia, Vice President Strategy, IBM Software Group, därför om hur väl ett företags infrastruktur klarar förändringarna. Nya lanseringen i familjen IBM PureSystems, PureData, adresserar utmaningarna med stora datamängder.
Talare: Don Boulia, Vice President IBM WebSphere Cloud, Per Fredriksson, IBM PureSystems Executive Architect
Besök http://smarterbusiness.se för mer information.
A vision on collaborative computation of things for personalized analysesDaniele Gianni
Presentation delivered at the 3rd IEEE Track on
Collaborative Modeling & Simulation - CoMetS'12.
Please see http://www.sel.uniroma2.it/comets12/ for further details.
Making Runtime Data Useful for Incident Diagnosis: An Experience ReportQAware GmbH
QuASD/PROFES 2018, Wolfsburg: Talk by Marcus Ciolkowski (@M_Ciolkowski, Principal IT Consultant at QAware) and Florian Lautenschlager (@flolaut, Senior Software Engineer)
=== Please download slides if blurred! ===
Abstract: Important and critical aspects of technical debt often surface at runtime only and are difficult to measure statically.
This is a particular challenge for cloud applications because of their highly distributed nature.
Fortunately, mature frameworks for collecting runtime data exist but need to be integrated.
In this paper, we report an experience from a project that implements a cloud application within Kubernetes on Azure.
To analyze the runtime data of this software system, we instrumented our services with Zipkin for distributed tracing; with Prometheus and Grafana for analyzing metrics; and with fluentd, Elasticsearch and Kibana for collecting, storing and exploring log files.
However, project team members did not utilize these runtime data until we created a unified and simple access using a chat bot.
We argue that even though your project collects runtime data, this is not sufficient to guarantee its usage: In order to be useful, a simple, unified access to different data sources is required that should be integrated into tools that are commonly used by team members.
Get the research paper: http://bitly.com/2QmSNwl
Performance of Hasty and Consistent Multi Spectral Iris Segmentation using De...ijtsrd
The recognition system is composed of seven phases acquisition, preprocessing, segmentation, normalization, feature extraction, feature selection, and classification. In the acquisition phase, iris images are captured, followed by preprocessing to enhance the quality of the images. The segmentation phase involves separating the iris region from the background, and the normalized iris region is shaped into a rectangle in the normalization phase. Iris segmentation is a critical step in iris recognition systems and has a direct impact on authentication and recognition results. However, standard segmentation techniques may not perform well in noisy iris databases captured under challenging conditions. Moreover, the lack of large iris databases hinders the performance improvement of convolution neural networks. The proposed method addresses these challenges by effectively handling irregular iris images captured under visible light. The iris region is processed and evaluated to generate a unique feature vector, which is then used for person identification. VGG16, a well known deep learning model, is employed for image classification, and the feature vector is fed into VGG16 for classification purposes. Ram Niwas Sharma | Ankit Kumar Navalakha | Neha Sharma "Performance of Hasty and Consistent Multi Spectral Iris Segmentation using Deep Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-5 , October 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59853.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/59853/performance-of-hasty-and-consistent-multi-spectral-iris-segmentation-using-deep-learning/ram-niwas-sharma
Presentation given by Appistry's Vice President of Product Strategy, Sultan Meghi at the World Genome Data Analysis Summit. Meghi presented about the big data challenges facing labs as they strive to manage the flow of genetic data from sequencer to the clinic.
Abstract-Intrusion Detection System used to discover attacks against computers and network Infrastructures. There are many techniques used to determine the IDS such as Outlier Detection Schemes for Anomaly Detection, K-Mean Clustering of monitoring data, classification detection and outlier detection. The data mining approaches help to determine what meets the criteria as an intrusion versus normal traffic, whether a system uses anomaly detection, misuse detection, target monitoring, or stealth probes. This paper attempts to evaluate, categorize, compares and summarizes the performance of data mining techniques to detect the intrusion.
How RightScale Architects Its Own Databases for Worldwide Scale, HA, and DR S...RightScale
Is your database holding back your application? Find out how we at RightScale use SQL and NoSQL databases such as mySQL and Cassandra to provide a scalable, distributed, and highly available service around the world, that is designed to recover from failures of a whole cloud region.
Similar to EDF2013: Selected Talk: Allan Hanbury: Algorithm any good? A Cloud-based Infrastructure for Evaluation on Big Data (20)
EDF2014: Ralf-Peter Schaefer, Head of Traffic Product Unit, TomTom, Germany: ...European Data Forum
Industry Keynote Talk by Ralf-Peter Schaefer, Head of Traffic Product Unit, TomTom, Germany at the European Data Forum 2014, 20 March 2014 in Athens, Greece: Probe Data Analytics and Processing for Traffic Information, Traffic Planning and Traffic Management.
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...European Data Forum
BIG - NESSI Networking Session, Talk by Edward Curry, National University of Ireland Galway at the European Data Forum 2014, 20 March 2014 in Athens, Greece: The Big Data Value Chain.
EDF2014: BIG - NESSI Networking Session: Nuria de Lama, Representative to the...European Data Forum
BIG - NESSI Networking Session, Talk by Nuria de Lama, Representative to the European Commission, Research & Innovation ATOS, Spain at the European Data Forum 2014, 20 March 2014 in Athens, Greece: Towards a Big Data Public Private Partnership
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...European Data Forum
Selected Talk by Kush Wadhwa, Senior Partner, Trilateral Research & Consulting at the European Data Forum 2014, 20 March 2014 in Athens, Greece: Addressing risks and opportunities engendered by big data: The BYTE project
EDF2014: Adrian Cristal, Barcelona Supercomputing Center, RETHINK big Project...European Data Forum
Selected Talk by Adrian Cristal, Barcelona Supercomputing Center, Spain at the European Data Forum 2014, 20 March 2014 in Athens, Greece: The RETHINK big Project NEEDS YOU.
EDF2014: Dimitris Vassiliadis, Head of Unit, EXUS Innovation Attractor: From ...European Data Forum
Selected Talk by Dimitris Vassiliadis, Head of Unit, EXUS Innovation Attractor at the European Data Forum 2014, 20 March 2014 in Athens, Greece: From Carbon to Diamonds: Business cases of data value.
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...European Data Forum
Selected Talk by Rüdiger Eichin, Research Manager at SAP AG, Germany at the European Data Forum 2014, 20 March 2014 in Athens, Greece: Deriving Value from Big Data for Enterprise Performance Management.
EDF2014: Paul Groth, Department of Computer Science & The Network Institute, ...European Data Forum
Invited Talk by Paul Groth, Department of Computer Science & The Network Institute, VU University Amsterdam, Netherlands at the European Data Forum 2014, 20 March 2014 in Athens, Greece: Open PHACTS: A Data Platform for Drug Discovery.
EDF2014: Christian Lindemann, Wolters Kluwer Germany & Christian Dirschl, Wol...European Data Forum
Invited Talk by Christian Lindemann, Wolters Kluwer Germany & Christian Dirschl, Wolters Kluwer Germany at the European Data Forum 2014, 20 March 2014 in Athens, Greece: Linked Data and Open Government Data as part of the business strategy of Wolters Kluwer Germany.
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...European Data Forum
PPP on Data & Executive Panel on Big Data, Introduction by Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate General for Communications Networks, Content and Technology at the European Data Forum 2014, 20 March 2014 in Athens, Greece: Towards a Data Value Chain Partership in Europe.
EDF2014: Stefan Wrobel, Institute Director, Fraunhofer IAIS / Member of the b...European Data Forum
Opening Keynote by Stefan Wrobel, Institute Director, Fraunhofer IAIS / Member of the board of BITKOM working group Big Data at the European Data Forum 2014, 19 March 2014 in Athens, Greece: Value of Big Data - From Data-Driven Enterprises to a Data-driven Economy
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...European Data Forum
Selected Talk by Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, Italy at the European Data Forum 2014, 19 March 2014 in Athens, Greece: Toward Personal Big Data passing through user Transparency, Control and Awareness: a Living-Lab Experience
EDF2014: Allan Hanbury, Senior Researcher, Vienna University of Technology, A...European Data Forum
Selected Talk by Allan Hanbury, Senior Researcher, Vienna University of Technology, Austria at the European Data Forum 2014, 19 March 2014 in Athens, Greece: Conquering Data in Austria: a technology roadmap
EDF2014: Nikolaos Loutas, Manager at PwC Belgium, Business Models for Linked ...European Data Forum
Selected Talk by Nikolaos Loutas, Manager at PwC Belgium at the European Data Forum 2014, 19 March 2014 in Athens, Greece: Business Models for Linked Government Data: What lies beneath?
EDF2014: Vedran Sabol, Head of the Knowledge Visualisation Area, Know-Center,...European Data Forum
Selected Talk by Vedran Sabol, Head of the Knowledge Visualisation Area, Know-Center, Austria at the European Data Forum 2014, 19 March 2014 in Athens, Greece: CODE - Linked Data in Context: Questions Matter
EDF2014: Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universid...European Data Forum
Selected Talk of Daniel Vila-Suero, Researcher, Ontology Engineering Group, Universidad Politecnica de Madrid, Spain at the European Data Forum 2014, 19 March 2014 in Athens, Greece: 3LD: Towards high quality, industry-ready Linguistic Linked Licensed Data
EDF2014: Piek Vossen, Professor Computational Lexicology, VU University Amste...European Data Forum
Invited Talk of Piek Vossen, Professor Computational Lexicology, VU University Amsterdam, Netherlands at the European Data Forum 2014, 19 March 2014 in Athens, Greece: NewsReader: recording history by processing massive streams of daily news
EDF2014: Taru Rastas, Senior Advisor, Ministry of Communications of Finland: ...European Data Forum
Selected Talk of Taru Rastas, Senior Advisor, Ministry of Communications of Finland at the European Data Forum 2014, 19 March 2014 in Athens, Greece: Open data for transport and communications
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
A tale of scale & speed: How the US Navy is enabling software delivery from l...
EDF2013: Selected Talk: Allan Hanbury: Algorithm any good? A Cloud-based Infrastructure for Evaluation on Big Data
1. Algorithm any good?
A Cloud-based
Infrastructure for
Evaluation on Big Data
Allan Hanbury
Vienna University of Technology
The research leading to these results has received funding from the European Union Seventh
Framework Programme (FP7/2007-2013) under grant agreement n° 318068 (VISCERAL).
2. Evaluation
Evaluation campaigns / Challenges /
Benchmarks / Competitions / ...
Makes economic sense
“for every $1 that NIST and its partners invested in
TREC, at least $3.35 to $5.07 in benefits accrued
to IR researchers.”
Has scientific impact
3. Evaluation Campaigns
Ground
truth
Tasks Data
Organiser
Participants
Kyle Mcdonald: http://www.flickr.com/photos/kylemcdonald/6187343093/
4. Evaluation Campaigns
Ground
truth
Tasks Data
Organiser
Participants
Kyle Mcdonald: http://www.flickr.com/photos/kylemcdonald/6187343093/
5. With Big Data?
Ground
truth
Organiser
Tasks Data
Participants
Kyle Mcdonald: http://www.flickr.com/photos/kylemcdonald/6187343093/
6. Benchmarking Algorithms on Big Data
Distributing terabytes is hard
Sending hard disks, download is not feasible
Bringing algorithms to the data is necessary
Motivating participants
Tasks with general interest and few infrastructure
barriers (how to store or treat terabytes ...)
Allow sharing infrastructure
Manual ground truthing does not scale. Use:
Semi-automation (e.g. silver corpus)
Coercion (e.g. crowd sourcing)
…
7. Evaluation on the Cloud
(http://visceral.eu)
Bring the algorithms to the data, not the data
to the algorithms
Put the data on the cloud
Participants program in computing instances on
the cloud
First benchmark on structure recognition in
medical images
8. Training Phase
Cloud
Training Data Test Data
Participant
Instances
Registration
System
Analysis
System
Participants Organiser
9. Evaluation Phase
Cloud
Training Data Test Data
Participant
Instances
Registration
System
Analysis
System
Participants Organiser
10. Annotators
(Radiologists)
Locally Installed
Annotation
Clients
Annotation
Management System
Cloud
Training Data Test Data
Participant
Instances
Registration
System
Analysis
System
Participants Organiser
11. Future Development
Dealing with private data
Does it make sense to evaluate on data that the
participant cannot see?
Does it make sense to evaluate only on extracted
features?
Moving toward eScience
Data identifiers
Algorithm identifiers?
Continuous evaluation
Modular construction of the algorithms
12. Challenges
Sharing components
Who should provide the cloud service?
Who pays for using it?
Transferring components to industry