Truth table, Karnaugh map & logic circuit with 5 outputs and 8 inputsAbir Chowdhury
This is the Logic circuit which enables taking the MW data from the consumers to the substation, separating them into two major categories: a fixed cost for any 4 loads, and cost will increment from 5th load onwards.
Truth table, Karnaugh map & logic circuit with 5 outputs and 8 inputsAbir Chowdhury
This is the Logic circuit which enables taking the MW data from the consumers to the substation, separating them into two major categories: a fixed cost for any 4 loads, and cost will increment from 5th load onwards.
Vazamentos massivos nas redes sociais: quais medidas os usuários devem tomar?ESET Brasil
Realizamos uma pesquisa com os nossos usuários para obter informações sobre os vazamentos massivos nas redes sociais e as principais medidas tomadas ao se deparar com incidentes desse tipo. Confira um infográfico com os principais dados deixados pela pesquisa.
This ppt describes one of the interesting algorithms to count the number of bits set in an unsigned integer.
x = (x & 0x55555555) + ((x>>1)&0x55555555));
x = (x&0x33333333) + ((x>>2)&0x33333333);
...
....
Design is as good (or flawed) as the people who make itKayla J Heffernan
Talk given at UX Australia 2016 held in Melbourne.
ABOUT THE TALK:
No one sets out to intentionally design a system that is hard to use for - or worse, excludes or discriminates against - some users. Designers are trying their best. You're probably a good person, but a human nonetheless, therefore not perfect. Design can only be as good as the people who make it. Conversely, design is as flawed as the people who make it.
ABOUT THE SPEAKER:
Kayla Heffernan is a user and experiencer of products, frustrated with mediocrity and a passionate advocate for the voice of all users. Kayla is a UX designer at SEEK and also undertaking a PhD in Interaction Design looking at digital insertables. In her spare time… she doesn’t have any.
Reinforcement Learning example with Q-Learning.
The code of the example is located at https://github.com/hyunjong-lee/reinforcement_learning.
The video of the example is located at https://youtu.be/Lu5gY4acEr8
Artificial Intelligence is on the rise. Most of us do not understand the fundamental effects of AI, let alone the brain behind it. Let us build a grassroots movement and fight for transparent AI tech.
Introduction to Keras / Global Artificial Intelligence Conference / Santa Cla...Francesco Mosconi
This is an introductory workshop on Deep Learning with Keras. We start from shallow models: Linear Regression and Logistic Regression and show how they can be implemented with Keras. Then we show how to move to deeper models, how to use more complex architectures and layers.
The workshop explores common use cases and suggests next steps to apply Keras to solve your problems.
Of Search Lights and Blind Spots: Machine Learning in CybersecuritySven Krasser
Talk at the Workshop for Robustness of AI Systems Against Adversarial Attacks 2020 (RAISA3)
https://www.skrasser.com/blog/2020/08/31/adversarial-machine-learning-and-robust-classification/
Fundamentals of Machine Learning: Perspectives from a Data Scientist (ISC Wes...Sven Krasser
https://www.iscwest.com/en/Sessions/52328/Fundamentals-of-Machine-Learning-Perspectives-from-a-Data-Scientist
Abstract:
As our world grows more connected, organizations are collecting ever-growing amounts of data. Almost always there are hidden insights in such data that can lead to better outcomes and more value. One important tool to tap into these opportunities is Machine Learning (ML), and across all verticals more and more companies are investing into their ML operations. In this talk, we will take a look at what ML is, what problems it solves, how it is applied, and why companies need to make sure that they have a strategy to employ ML.
First, we will explain the relevant fundamental concepts with a focus on supervised learning and geometric models. An intuitive data set with an accessible instance space from the physical world is used to illustrate our ability to classify data. Various models are used and visually represented to explain the underlying algorithms in an accessible fashion.
Next, we will discuss how ML is revolutionizing approaches to cybersecurity, and how the cybersecurity industry has been changing its approach to the data it collects. From there, we explore other applications in the larger domain of security.
Lastly, we will wrap up with an outlook of where this technology is going and some pointers to get started with employing ML to the data you already collect.
Vazamentos massivos nas redes sociais: quais medidas os usuários devem tomar?ESET Brasil
Realizamos uma pesquisa com os nossos usuários para obter informações sobre os vazamentos massivos nas redes sociais e as principais medidas tomadas ao se deparar com incidentes desse tipo. Confira um infográfico com os principais dados deixados pela pesquisa.
This ppt describes one of the interesting algorithms to count the number of bits set in an unsigned integer.
x = (x & 0x55555555) + ((x>>1)&0x55555555));
x = (x&0x33333333) + ((x>>2)&0x33333333);
...
....
Design is as good (or flawed) as the people who make itKayla J Heffernan
Talk given at UX Australia 2016 held in Melbourne.
ABOUT THE TALK:
No one sets out to intentionally design a system that is hard to use for - or worse, excludes or discriminates against - some users. Designers are trying their best. You're probably a good person, but a human nonetheless, therefore not perfect. Design can only be as good as the people who make it. Conversely, design is as flawed as the people who make it.
ABOUT THE SPEAKER:
Kayla Heffernan is a user and experiencer of products, frustrated with mediocrity and a passionate advocate for the voice of all users. Kayla is a UX designer at SEEK and also undertaking a PhD in Interaction Design looking at digital insertables. In her spare time… she doesn’t have any.
Reinforcement Learning example with Q-Learning.
The code of the example is located at https://github.com/hyunjong-lee/reinforcement_learning.
The video of the example is located at https://youtu.be/Lu5gY4acEr8
Artificial Intelligence is on the rise. Most of us do not understand the fundamental effects of AI, let alone the brain behind it. Let us build a grassroots movement and fight for transparent AI tech.
Introduction to Keras / Global Artificial Intelligence Conference / Santa Cla...Francesco Mosconi
This is an introductory workshop on Deep Learning with Keras. We start from shallow models: Linear Regression and Logistic Regression and show how they can be implemented with Keras. Then we show how to move to deeper models, how to use more complex architectures and layers.
The workshop explores common use cases and suggests next steps to apply Keras to solve your problems.
Similar to Finding the Needle in the IP Stack (20)
Of Search Lights and Blind Spots: Machine Learning in CybersecuritySven Krasser
Talk at the Workshop for Robustness of AI Systems Against Adversarial Attacks 2020 (RAISA3)
https://www.skrasser.com/blog/2020/08/31/adversarial-machine-learning-and-robust-classification/
Fundamentals of Machine Learning: Perspectives from a Data Scientist (ISC Wes...Sven Krasser
https://www.iscwest.com/en/Sessions/52328/Fundamentals-of-Machine-Learning-Perspectives-from-a-Data-Scientist
Abstract:
As our world grows more connected, organizations are collecting ever-growing amounts of data. Almost always there are hidden insights in such data that can lead to better outcomes and more value. One important tool to tap into these opportunities is Machine Learning (ML), and across all verticals more and more companies are investing into their ML operations. In this talk, we will take a look at what ML is, what problems it solves, how it is applied, and why companies need to make sure that they have a strategy to employ ML.
First, we will explain the relevant fundamental concepts with a focus on supervised learning and geometric models. An intuitive data set with an accessible instance space from the physical world is used to illustrate our ability to classify data. Various models are used and visually represented to explain the underlying algorithms in an accessible fashion.
Next, we will discuss how ML is revolutionizing approaches to cybersecurity, and how the cybersecurity industry has been changing its approach to the data it collects. From there, we explore other applications in the larger domain of security.
Lastly, we will wrap up with an outlook of where this technology is going and some pointers to get started with employing ML to the data you already collect.
Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Wa...Sven Krasser
Sponsored workshop at Black Hat USA 2017
https://www.blackhat.com/us-17/business-hall/schedule/#straight-talk-on-machine-learning----what-the-marketing-department-doesnt-want-you-to-know-8203
Slides from the “Applications of AI to Operations” panel at the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS).
Workshop program: http://www-personal.umich.edu/~arunesh/AICS2017/program.html
Slides from July 2016 ISSA OC talk (https://issa-oc.org/event/july-2016-meeting/).
Abstract:
Machine learning is presently a hot topic in the security industry. On the one side, we have companies praising machine learning as the panacea solving all of our security needs. On the other side, there are companies seeing no merit in machine learning urging us to stay with so-called proven approaches.
As always, the truth is a bit more complicated. In this talk, we will take a sober and scientific look at machine learning beyond the hype. First, we will cover what objectives machine learning addresses and how those are accomplished. Next, we will review how machine learning techniques apply to the security space, which problems they solve (and which ones they don’t), and what challenges and opportunities they present. Lastly, with these preliminaries addressed, we will dive into what customers need to look for when evaluating machine learning based security products.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
10. Best Guess for Gender 100% male 0% female 50% male 50% female Weight (in pounds) Best Guess 0% male 100% female Height (in inches) 10
11. One Dimension Only 0.15 – 0.10 – 0.05 – 0.00 – 55 60 65 70 75 Height (in inches) 11
12. Better Features 200 – 180 – 160 – 140 – 120 – 100 – Weight (in pounds) 800 900 1000 1100 1200 Buttock Circumference: “The circumference of the body measured at the level of the maximum posterior protuberance of the buttocks.” 12
13. Best Guess for Revised Features 13 Weight (in pounds) Best Guess Buttock Circumference
14. Further Improving the Separation Signal to Noise Features with very different distribution per class Correlation Features with low correlation Dimensionality Consider more features at the same time 14
19. Some English Words militate caterwaul deracinate arrant concinnity imprecation vertiginous profuse 19
20. Some English Explanations militate: to have force or influence caterwaul: to make a harsh cry or screech deracinate: to uproot arrant: outright; thoroughgoing concinnity: elegance – used chiefly of literary style imprecation: a curse vertiginous: causing dizziness; also, giddy; dizzy profuse: plentiful; copious 20 Source: http://dictionary.reference.com/
23. Markov Chains .0073 .0641 .0213 .0912 .0912 .0732 .0014 .2175 .0143 .2626 .0301 .0939 .0322 .2419 .3598 .1457 .0633 .1064 .0588 .1733 .0872 .2738 .0431 .1534 .0932 .0714 .2936 .0437 .1860 .0196 .0371 .0291 .1932 .1120 .1269 .0411 .4759 .2979 ab bn nk ko of fp pu nj ja fe er rr ry yl li ne es eb ba ay un in Analysis of recent domain registrations Using Second Order Markov Chains to detect potentially malicious domain names bnkofpunjab is not legitimate ferrylines.com is legitimate ebay.com is not determinable 23
24. Limitations of the Markov model Useful to detect malicious domain names Very effective for randomly generated names Detects some legitimate domain names as malicious domains Malicious names similar to legitimate ones (e.g. ebay.com phishing sites) International domain names and punycode Solution: add DNS related features into classification process 24
25. DNS Features The number of the nameservers that hosted or are hosting this domain The average time of one nameserver to host this domain The maximum time of one nameserver to host this domain The minimum time of one nameserver to host this domain The number of non-activated nameservers that hosted this domain before Whether the domain is an international one 25
26. 0.15 – 0.10 – 0.05 – 0.00 – Example Feature Density 0 200 400 600 Time of domain on name server (in days) 26
29. IP Blacklist Lookup Mail server looks up sender IP over DNS Simple classifier modeled on IP blacklist query logs Narrow data set – queried IP, source IP, timestamp Deep data set – billions of query records monthly More complex data can be included 29
30. Q? Q=x Q? Q=x IP Lookups Sender Receiver DNS Reputation server <Q, S, T> IP=S IP=Q 30