This document discusses strategies for improving Hibernate performance when fetching associated objects and relationships. It describes the n+1 selects problem that can occur when lazily fetching collections and relationships. Solutions discussed include batch fetching, eager fetching at the mapping level, and specifying fetch modes at runtime for a given query to eagerly fetch needed associations in one query.
An improvised tree algorithm for association rule mining using transaction re...Editor IJCATR
Association rule mining technique plays an important role in data mining research where the aim is to find interesting
correlations between sets of items in databases. The apriori algorithm has been the most popular techniques in finding frequent
patterns. However, when applying this method a database has to be scanned many times to calculate the counts of the huge umber
of candidate items sets. A new algorithm has been proposed as a solution to this problem. The proposed algorithm is mainly
concentrated to reduce the candidate sets generation and also aimed to increase the time of execution of the process
The document discusses ways to improve filtering of ArrayCollection objects in Flex/ActionScript applications. It proposes externalizing filter functions into separate classes to make them reusable and testable. It also suggests automatically running filters when filter properties change, and allowing multiple filters to be combined. Additionally, it addresses sharing filtered collection data between views while ensuring they remain in sync as the underlying data changes.
A fast clustering based feature subset selection algorithm for high-dimension...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
An experimental study on hypothyroid using rotation forestIJDKP
This paper majorly focuses on hypothyroid medical diseases caused by underactive thyroid glands. The
dataset used for the study on hypothyroid is taken from UCI repository. Classification of this thyroid
disease is a considerable task. An experimental study is carried out using rotation forest using features
selection methods to achieve better accuracy. An important step to gain good accuracy is a pre- processing
step, thus here two feature selection techniques are used. A filter method, Correlation features subset
selection and wrappers method has helped in removing irrelevant as well as useless features from the data
set. Fourteen different machine learning algorithms were tested on hypothyroid data set using rotation
forest which successfully turned out giving positively improved results
A guide to create a simple Java application and upload it to the Google Cloud Platform with Google App Engine. This presentation covers usage of persistence API with both Google Cloud SQL and Google Cloud Datastore.
Performance Tuning with JPA 2.1 and Hibernate (Geecon Prague 2015)Thorben Janssen
The Java Persistence API (JPA) is the standard way for Java EE applications to persist data in a database. The application server provides all required libraries and is so easy to use that you can learn it within a few hours. But that changes as soon as it gets more complex and the application needs to support a huge amount of data or if you want to guarantee very short response times.
These requirements can also be fulfilled by JPA and on top of that, there are several Hibernate specific features allowing even more optimizations. Some examples are selecting the right fetch strategy, using different caches and performing bulk operations. But using them efficiently requires far more knowledge.
During this talk, you will get an overview about these and other advanced features that can be used to meet challenging performance requirements. You should already have practical experience with JPA and Hibernate.
Hibernate Performance Tuning, presented on JEEConf 2012, Kiev, Ukraine.
Also see: http://branchandbound.net/blog/conferences/2012/05/jeeconf-tripreport/
Adaptation of presentation at http://www.slideshare.net/SanderMak/hibernate-performance-tuning
An improvised tree algorithm for association rule mining using transaction re...Editor IJCATR
Association rule mining technique plays an important role in data mining research where the aim is to find interesting
correlations between sets of items in databases. The apriori algorithm has been the most popular techniques in finding frequent
patterns. However, when applying this method a database has to be scanned many times to calculate the counts of the huge umber
of candidate items sets. A new algorithm has been proposed as a solution to this problem. The proposed algorithm is mainly
concentrated to reduce the candidate sets generation and also aimed to increase the time of execution of the process
The document discusses ways to improve filtering of ArrayCollection objects in Flex/ActionScript applications. It proposes externalizing filter functions into separate classes to make them reusable and testable. It also suggests automatically running filters when filter properties change, and allowing multiple filters to be combined. Additionally, it addresses sharing filtered collection data between views while ensuring they remain in sync as the underlying data changes.
A fast clustering based feature subset selection algorithm for high-dimension...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
An experimental study on hypothyroid using rotation forestIJDKP
This paper majorly focuses on hypothyroid medical diseases caused by underactive thyroid glands. The
dataset used for the study on hypothyroid is taken from UCI repository. Classification of this thyroid
disease is a considerable task. An experimental study is carried out using rotation forest using features
selection methods to achieve better accuracy. An important step to gain good accuracy is a pre- processing
step, thus here two feature selection techniques are used. A filter method, Correlation features subset
selection and wrappers method has helped in removing irrelevant as well as useless features from the data
set. Fourteen different machine learning algorithms were tested on hypothyroid data set using rotation
forest which successfully turned out giving positively improved results
A guide to create a simple Java application and upload it to the Google Cloud Platform with Google App Engine. This presentation covers usage of persistence API with both Google Cloud SQL and Google Cloud Datastore.
Performance Tuning with JPA 2.1 and Hibernate (Geecon Prague 2015)Thorben Janssen
The Java Persistence API (JPA) is the standard way for Java EE applications to persist data in a database. The application server provides all required libraries and is so easy to use that you can learn it within a few hours. But that changes as soon as it gets more complex and the application needs to support a huge amount of data or if you want to guarantee very short response times.
These requirements can also be fulfilled by JPA and on top of that, there are several Hibernate specific features allowing even more optimizations. Some examples are selecting the right fetch strategy, using different caches and performing bulk operations. But using them efficiently requires far more knowledge.
During this talk, you will get an overview about these and other advanced features that can be used to meet challenging performance requirements. You should already have practical experience with JPA and Hibernate.
Hibernate Performance Tuning, presented on JEEConf 2012, Kiev, Ukraine.
Also see: http://branchandbound.net/blog/conferences/2012/05/jeeconf-tripreport/
Adaptation of presentation at http://www.slideshare.net/SanderMak/hibernate-performance-tuning
Hibernate ORM: Tips, Tricks, and Performance TechniquesBrett Meyer
DevNexus 2014
Out-of-the-box, Hibernate ORM offers limited overhead and decent throughput. Early-stage applications enjoy the convenience of ORM/JPA with great performance. However, scaling your application into an enterprise-level system introduces more demanding needs.
This talk will describe numerous tips and techniques to both increase Hibernate ORM performance, as well as decrease overhead. These include some basic tricks, such as mapping and fetching strategies. Entity enhancement instrumentation, third-party second level caching, Hibernate Search, and more complex considerations will also be discussed. The talk will include live demonstrations techniques and their before-and-after results.
Indian Biryani Hyderabadi Special is a 3 sentence document about Indian cuisine. It discusses a Hyderabadi specialty called biryani, a rice dish often seasoned with spices. The document was brought to you by J. Jayakrishnan and focuses on a regional version of biryani from Hyderabad, India.
Digital technology refers to the use of digital applications to create media online, including graphic design, video production and editing, games, sound editing, and web design. Creating a horror film requires digital technology for filming, video production software to edit the footage, and Photoshop to design packaging like DVD sleeves. YouTube is also a digital technology that allows global access to trailers uploaded online.
The document discusses a sunset. It talks about how the sun sets in the evening, painting the sky with beautiful shades of orange, pink, and purple. As night falls, the moon and stars emerge, marking the end of the day and the start of night.
This poem discusses the lack of peace that comes even after death. It notes that death comes silently to kiss us with cold lips, and that while one is born to die and be happy, it is sad to be reborn as a son of earth. The poem asks God to keep away the garish garland of immortality to curb the nomadic hellishness of souls.
Dunkin' Donuts takes a fan-centric approach to social media by listening to fans, learning what is important to them, engaging in two-way dialogue, and celebrating engaged fans. Dunkin' Donuts encourages user-generated content to foster engagement on its social media channels, which include large numbers of followers on Facebook, Twitter, Instagram, Google+, and Pinterest. The company creates contests that allow fans to become "stars" by sharing creative Halloween costumes or expressing extreme fandom for pumpkin flavored drinks and foods. This strategy supports Dunkin' Donuts' shift toward more visual and user-generated social media content.
Pre Sell / Condo For Sale in Manila - Sorrel ResidencesJocel Victorino
Ideally located along Sociego Street in Sampaloc, Manila, a mere 150 meters from the LRT2 Station of V. Mapa. Sorrel Residences condominium is highly accessible via major roads, highways, and PUVs along Ramon Magsaysay Boulevard, and is linked through roads and transportation networks to major cities and CBD’s such as Quezon City, Mandaluyong-San Juan, and Makati.
Each Veterans Day at precisely 11:11 am, the sun shines through the ellipses of the five pillars representing the five branches of the US military at this memorial, forming a perfect spotlight over a mosaic of the Great Seal of the United States. The memorial was designed by a local resident to honor the military, with the pillars staggered in height and ordered according to the Department of Defense's precedence of the Army, Marines, Navy, Air Force and Coast Guard.
This document analyzes 10 still frames from a 2:01 opening sequence from a student film called "The Identity Crisis". It explains how each frame advances the narrative or pays homage to techniques from other films. For example, one POV shot from inside a car's trunk references Quentin Tarantino's famous trunk shots. Another POV shows a character being punched from their perspective to build tension without endangering the camera. The analysis demonstrates how the opening uses cinematic conventions to immerse viewers and set up important plot points.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Hibernate ORM: Tips, Tricks, and Performance TechniquesBrett Meyer
DevNexus 2014
Out-of-the-box, Hibernate ORM offers limited overhead and decent throughput. Early-stage applications enjoy the convenience of ORM/JPA with great performance. However, scaling your application into an enterprise-level system introduces more demanding needs.
This talk will describe numerous tips and techniques to both increase Hibernate ORM performance, as well as decrease overhead. These include some basic tricks, such as mapping and fetching strategies. Entity enhancement instrumentation, third-party second level caching, Hibernate Search, and more complex considerations will also be discussed. The talk will include live demonstrations techniques and their before-and-after results.
Indian Biryani Hyderabadi Special is a 3 sentence document about Indian cuisine. It discusses a Hyderabadi specialty called biryani, a rice dish often seasoned with spices. The document was brought to you by J. Jayakrishnan and focuses on a regional version of biryani from Hyderabad, India.
Digital technology refers to the use of digital applications to create media online, including graphic design, video production and editing, games, sound editing, and web design. Creating a horror film requires digital technology for filming, video production software to edit the footage, and Photoshop to design packaging like DVD sleeves. YouTube is also a digital technology that allows global access to trailers uploaded online.
The document discusses a sunset. It talks about how the sun sets in the evening, painting the sky with beautiful shades of orange, pink, and purple. As night falls, the moon and stars emerge, marking the end of the day and the start of night.
This poem discusses the lack of peace that comes even after death. It notes that death comes silently to kiss us with cold lips, and that while one is born to die and be happy, it is sad to be reborn as a son of earth. The poem asks God to keep away the garish garland of immortality to curb the nomadic hellishness of souls.
Dunkin' Donuts takes a fan-centric approach to social media by listening to fans, learning what is important to them, engaging in two-way dialogue, and celebrating engaged fans. Dunkin' Donuts encourages user-generated content to foster engagement on its social media channels, which include large numbers of followers on Facebook, Twitter, Instagram, Google+, and Pinterest. The company creates contests that allow fans to become "stars" by sharing creative Halloween costumes or expressing extreme fandom for pumpkin flavored drinks and foods. This strategy supports Dunkin' Donuts' shift toward more visual and user-generated social media content.
Pre Sell / Condo For Sale in Manila - Sorrel ResidencesJocel Victorino
Ideally located along Sociego Street in Sampaloc, Manila, a mere 150 meters from the LRT2 Station of V. Mapa. Sorrel Residences condominium is highly accessible via major roads, highways, and PUVs along Ramon Magsaysay Boulevard, and is linked through roads and transportation networks to major cities and CBD’s such as Quezon City, Mandaluyong-San Juan, and Makati.
Each Veterans Day at precisely 11:11 am, the sun shines through the ellipses of the five pillars representing the five branches of the US military at this memorial, forming a perfect spotlight over a mosaic of the Great Seal of the United States. The memorial was designed by a local resident to honor the military, with the pillars staggered in height and ordered according to the Department of Defense's precedence of the Army, Marines, Navy, Air Force and Coast Guard.
This document analyzes 10 still frames from a 2:01 opening sequence from a student film called "The Identity Crisis". It explains how each frame advances the narrative or pays homage to techniques from other films. For example, one POV shot from inside a car's trunk references Quentin Tarantino's famous trunk shots. Another POV shows a character being punched from their perspective to build tension without endangering the camera. The analysis demonstrates how the opening uses cinematic conventions to immerse viewers and set up important plot points.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.