This document provides an overview of iPhone development for .NET developers. It discusses the tools needed like Xcode and the iOS SDK. It introduces Objective-C concepts like classes, methods, memory management using retain/release. It also covers view controllers, the model-view-controller pattern, and the iOS application lifecycle. The goal is to help .NET developers get started with iPhone development.
The document discusses JavaScript patterns. It begins by introducing the author and their motivation for learning patterns. It then covers essential patterns around scope, literals and constructors, functions, and code reuse. It discusses the single var pattern, constructor functions, private members, and classical versus prototypal inheritance. The document is an educational guide to common JavaScript patterns.
Rubinius - What Have You Done For Me Latelyevanphx
The document discusses the Rubinius programming language implementation. It describes Rubinius' philosophy of allowing Ruby code to extend the system, its compatibility with Ruby versions 1.8.7 and Rails frameworks, and its use of techniques like just-in-time compilation to machine code and sophisticated garbage collection. Additionally, it mentions several spin-off projects from Rubinius like RubySpec and FFI, and encourages developers to build tools that interface with Rubinius APIs.
This document compares procedural programming and object-oriented programming approaches to a shape rotation and sound playback problem. It shows how the OO approach using classes and inheritance can better handle changes to requirements by separating common behavior into a base class and allowing derived classes to override specific behaviors as needed. This reduces duplicated code and makes the solution more flexible and maintainable.
The document discusses accessibility testing at PayPal. It provides an overview of topics to be covered including what accessibility is, why it's needed, standards, common myths, frequent errors, and the need for a customized evaluation tool. It then goes into more detail on specific topics such as how to plan for and conduct accessibility testing, frameworks used, and how an automated testing tool was developed using a Maven plugin to integrate testing into their continuous integration process.
This document summarizes a white paper on a Selenium test automation framework integrated with HP Quality Center. The framework provides an overview of its architecture, components, script flow, and benefits. A case study demonstrates how the framework automates train route booking, with steps for login, request creation, form filling, and logout. The framework reduces script development/maintenance efforts and offers benefits like cost savings and integration with third-party tools.
The document discusses model-driven app development for iPhone and Android. It introduces some common issues in traditional software development like boring code, accidental complexity, and wrong levels of abstraction. It then presents model-driven development as an approach to address these issues by raising the level of abstraction and generating code from models. Domain-specific languages (DSLs) are presented as a tool for describing domains at a higher level of abstraction. The document demonstrates an example DSL for developing mobile apps and how concepts in the DSL like entities, data providers, views and actions can be mapped to generated code.
The document discusses JavaScript patterns. It begins by introducing the author and their motivation for learning patterns. It then covers essential patterns around scope, literals and constructors, functions, and code reuse. It discusses the single var pattern, constructor functions, private members, and classical versus prototypal inheritance. The document is an educational guide to common JavaScript patterns.
Rubinius - What Have You Done For Me Latelyevanphx
The document discusses the Rubinius programming language implementation. It describes Rubinius' philosophy of allowing Ruby code to extend the system, its compatibility with Ruby versions 1.8.7 and Rails frameworks, and its use of techniques like just-in-time compilation to machine code and sophisticated garbage collection. Additionally, it mentions several spin-off projects from Rubinius like RubySpec and FFI, and encourages developers to build tools that interface with Rubinius APIs.
This document compares procedural programming and object-oriented programming approaches to a shape rotation and sound playback problem. It shows how the OO approach using classes and inheritance can better handle changes to requirements by separating common behavior into a base class and allowing derived classes to override specific behaviors as needed. This reduces duplicated code and makes the solution more flexible and maintainable.
The document discusses accessibility testing at PayPal. It provides an overview of topics to be covered including what accessibility is, why it's needed, standards, common myths, frequent errors, and the need for a customized evaluation tool. It then goes into more detail on specific topics such as how to plan for and conduct accessibility testing, frameworks used, and how an automated testing tool was developed using a Maven plugin to integrate testing into their continuous integration process.
This document summarizes a white paper on a Selenium test automation framework integrated with HP Quality Center. The framework provides an overview of its architecture, components, script flow, and benefits. A case study demonstrates how the framework automates train route booking, with steps for login, request creation, form filling, and logout. The framework reduces script development/maintenance efforts and offers benefits like cost savings and integration with third-party tools.
The document discusses model-driven app development for iPhone and Android. It introduces some common issues in traditional software development like boring code, accidental complexity, and wrong levels of abstraction. It then presents model-driven development as an approach to address these issues by raising the level of abstraction and generating code from models. Domain-specific languages (DSLs) are presented as a tool for describing domains at a higher level of abstraction. The document demonstrates an example DSL for developing mobile apps and how concepts in the DSL like entities, data providers, views and actions can be mapped to generated code.
The document discusses MongoDB and its features. It covers getting started with MongoDB using the Ruby driver, using rich documents with complex objects and dynamic queries, map reduce for aggregation, indexing, GridFS for file storage, replication with replica sets, auto-sharding, pros and cons, common use cases, and provides links for additional resources.
The document discusses MongoDB, a document database that uses BSON (Binary JSON) as its data storage format. MongoDB does not enforce a schema and allows embedding rich data structures. It supports querying, indexing, replication, and scaling capabilities. The document also provides examples of using MongoDB from Ruby, including basic CRUD operations and queries.
Objective-C & iPhone for .NET DevelopersBen Scheirman
This document provides an introduction to developing iPhone applications for .NET developers. It covers the basics of Objective-C, the programming language used for iPhone development, including defining classes, methods, properties, memory management using retain/release, and the model-view-controller pattern. It also discusses Xcode, the integrated development environment, Interface Builder for building user interfaces, and Instruments for debugging.
Continuous Integration Testing for Plone Using HudsonEric Steele
The document discusses continuous integration and Hudson/Buildbot for automated testing. It describes concepts of continuous integration like maintaining a source repository, automating builds, making builds self-testing, and integrating with version control systems. Specifics of Hudson are covered, including installation, configuration of jobs/projects, triggers, build steps, and plugins. The document also provides details on code analysis with tools like zptlint, test coverage, and integrating buildout with Hudson for continuous integration of Plone projects.
Help implement BST- The code must follow the instruction below as well.pdfa2zmobiles
Help implement BST. The code must follow the instruction below as well as produce the
correct output when testing with the input file I'll provide at the end. Please fill-in the
TODO parts in the bst.cc code:
INSTRUCTIONS:
3. First, implement the BST (declared in bst.h) and use the unittest_bst() function to test it. DO
NOT CHANGE THIS CODE FOR YOUR SUBMISSION, as it will be used to test your code
against the answers (with different seed values).
4. Implement the DB and use the unittest_db() function to test it. DO NOT CHANGE THIS
CODE FOR YOUR SUBMISSION, as it will be used to test your code against the answers (with
different input files).
a) The student ID should be the base class's key member.
b) The student ID should be automatically assigned such that the ID/key should be n if the
student is the nth student to join the school. If the student later leaves (i.e., deleted from the
BST), the ID does NOT get reassigned to another student. Thus, the student ID of the last student
to join the school should reflect the TOTAL number of students that have joined this school
since its reception (regardless of whether some have left).
5. Test your code against the provided input and output files.
a) The provided answer for the BST unit test is in "unittest_ans_t100_s100.txt". The s100 refers
to the seed of 100 (-s 100), and t100 refers to the number of elements to add to the BST (-t 100).
b) The provided answer for the DB is in "students_1_ans.txt" for the "students_1.txt" input file.
6. Make sure your code has no memory leaks (using valgrind).
7. Your code should work beyond the provided unit tests. That is, even if it does work for all the
given tests, if the code has an identifiable bug (i.e., by reading the source code), points WILL be
deducted.
For example, if I were to change
unittest_bst(num_test, seed, cout, 5); ->
unittest_bst(num_test, seed, cout, 100);
it should still work.
BST.H
#ifndef BST_H_
#define BST_H_
#include <iostream>
using namespace std;
class Node {
private:
int key;
Node* parent;
Node* left;
Node* right;
public:
// Default constructor
Node();
// Constructor
Node(int in);
// Destructor
// a virtual constructor is required for inheritance
virtual ~Node();
// Add to parent of current node
void add_parent(Node* in);
// Add to left of current node
void add_left(Node* in);
// Add to right of current node
void add_right(Node* in);
// Get key
int get_key();
// Get parent node
Node* get_parent();
// Get left node
Node* get_left();
// Get right node
Node* get_right();
virtual void print_info(ostream& to);
};
class BST {
private:
Node* root;
// Walk the subtree from the given node
void inorder_walk(Node* in, ostream& to);
// Get the minimum node from the subtree of given node
Node* get_min(Node* in);
// Get the maximum node from the subtree of given node
Node* get_max(Node* in);
public:
// Constructor and Destructor
BST();
~BST();
// Modify tree
void insert_node(Node* in);
void delete_node(Node* out);
// Find nodes in the tree
Node* t.
This document discusses object models, metaprogramming, and dynamic programming in Ruby. It begins with an overview of getter and setter methods in different languages like Java, .NET, and Ruby. It then covers key aspects of metaprogramming in Ruby like classes always being open, everything being an object, and method calls having receivers. Specific metaprogramming techniques like class_eval, define_method, and method_missing are explained in detail through examples. The document concludes with discussions around eigenclasses, singleton methods, and how metaprogramming is used in Ruby on Rails for conventions like associations and validations.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
The document discusses MongoDB and its features. It covers getting started with MongoDB using the Ruby driver, using rich documents with complex objects and dynamic queries, map reduce for aggregation, indexing, GridFS for file storage, replication with replica sets, auto-sharding, pros and cons, common use cases, and provides links for additional resources.
The document discusses MongoDB, a document database that uses BSON (Binary JSON) as its data storage format. MongoDB does not enforce a schema and allows embedding rich data structures. It supports querying, indexing, replication, and scaling capabilities. The document also provides examples of using MongoDB from Ruby, including basic CRUD operations and queries.
Objective-C & iPhone for .NET DevelopersBen Scheirman
This document provides an introduction to developing iPhone applications for .NET developers. It covers the basics of Objective-C, the programming language used for iPhone development, including defining classes, methods, properties, memory management using retain/release, and the model-view-controller pattern. It also discusses Xcode, the integrated development environment, Interface Builder for building user interfaces, and Instruments for debugging.
Continuous Integration Testing for Plone Using HudsonEric Steele
The document discusses continuous integration and Hudson/Buildbot for automated testing. It describes concepts of continuous integration like maintaining a source repository, automating builds, making builds self-testing, and integrating with version control systems. Specifics of Hudson are covered, including installation, configuration of jobs/projects, triggers, build steps, and plugins. The document also provides details on code analysis with tools like zptlint, test coverage, and integrating buildout with Hudson for continuous integration of Plone projects.
Help implement BST- The code must follow the instruction below as well.pdfa2zmobiles
Help implement BST. The code must follow the instruction below as well as produce the
correct output when testing with the input file I'll provide at the end. Please fill-in the
TODO parts in the bst.cc code:
INSTRUCTIONS:
3. First, implement the BST (declared in bst.h) and use the unittest_bst() function to test it. DO
NOT CHANGE THIS CODE FOR YOUR SUBMISSION, as it will be used to test your code
against the answers (with different seed values).
4. Implement the DB and use the unittest_db() function to test it. DO NOT CHANGE THIS
CODE FOR YOUR SUBMISSION, as it will be used to test your code against the answers (with
different input files).
a) The student ID should be the base class's key member.
b) The student ID should be automatically assigned such that the ID/key should be n if the
student is the nth student to join the school. If the student later leaves (i.e., deleted from the
BST), the ID does NOT get reassigned to another student. Thus, the student ID of the last student
to join the school should reflect the TOTAL number of students that have joined this school
since its reception (regardless of whether some have left).
5. Test your code against the provided input and output files.
a) The provided answer for the BST unit test is in "unittest_ans_t100_s100.txt". The s100 refers
to the seed of 100 (-s 100), and t100 refers to the number of elements to add to the BST (-t 100).
b) The provided answer for the DB is in "students_1_ans.txt" for the "students_1.txt" input file.
6. Make sure your code has no memory leaks (using valgrind).
7. Your code should work beyond the provided unit tests. That is, even if it does work for all the
given tests, if the code has an identifiable bug (i.e., by reading the source code), points WILL be
deducted.
For example, if I were to change
unittest_bst(num_test, seed, cout, 5); ->
unittest_bst(num_test, seed, cout, 100);
it should still work.
BST.H
#ifndef BST_H_
#define BST_H_
#include <iostream>
using namespace std;
class Node {
private:
int key;
Node* parent;
Node* left;
Node* right;
public:
// Default constructor
Node();
// Constructor
Node(int in);
// Destructor
// a virtual constructor is required for inheritance
virtual ~Node();
// Add to parent of current node
void add_parent(Node* in);
// Add to left of current node
void add_left(Node* in);
// Add to right of current node
void add_right(Node* in);
// Get key
int get_key();
// Get parent node
Node* get_parent();
// Get left node
Node* get_left();
// Get right node
Node* get_right();
virtual void print_info(ostream& to);
};
class BST {
private:
Node* root;
// Walk the subtree from the given node
void inorder_walk(Node* in, ostream& to);
// Get the minimum node from the subtree of given node
Node* get_min(Node* in);
// Get the maximum node from the subtree of given node
Node* get_max(Node* in);
public:
// Constructor and Destructor
BST();
~BST();
// Modify tree
void insert_node(Node* in);
void delete_node(Node* out);
// Find nodes in the tree
Node* t.
This document discusses object models, metaprogramming, and dynamic programming in Ruby. It begins with an overview of getter and setter methods in different languages like Java, .NET, and Ruby. It then covers key aspects of metaprogramming in Ruby like classes always being open, everything being an object, and method calls having receivers. Specific metaprogramming techniques like class_eval, define_method, and method_missing are explained in detail through examples. The document concludes with discussions around eigenclasses, singleton methods, and how metaprogramming is used in Ruby on Rails for conventions like associations and validations.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
18. Objective-C Primer
Defining Methods
-(void)showLoadingText:(NSString *)text animated:(BOOL)animated;
Tuesday, September 28, 2010
19. Objective-C Primer
Defining Methods
Method name (selector)
-(void)showLoadingText:(NSString *)text animated:(BOOL)animated;
Tuesday, September 28, 2010
20. Objective-C Primer
Defining Methods
Method name (selector)
-(void)showLoadingText:(NSString *)text animated:(BOOL)animated;
Return Type
Tuesday, September 28, 2010
21. Objective-C Primer
Defining Methods
Method name (selector)
-(void)showLoadingText:(NSString *)text animated:(BOOL)animated;
Return Type
Instance method
Tuesday, September 28, 2010
22. Objective-C Primer
Defining Methods
Method name (selector)
-(void)showLoadingText:(NSString *)text animated:(BOOL)animated;
Return Type
Parameters
Instance method
Tuesday, September 28, 2010
23. Memory Management
No garbage collection on the iPhone
Retain / Release
Tuesday, September 28, 2010
57. Dot Syntax Dogma
Use dot syntax if you like it
Just be aware of what it's hiding
Tuesday, September 28, 2010
58. Xcode
Your IDE
Code completion
Interactive Debugger
Lacks good refactoring tools
Tuesday, September 28, 2010
59. Interface Builder
Drag-n-drop UI building
Layouts are defined in XIBs (XML representation).
Usually called "Nibs"
"Make connections" with classes defined in Xcode
variables --> UI components
UI events --> methods
Tuesday, September 28, 2010
60. Instruments
Find Memory Leaks
Analyze Memory Usage
Track down slow code
Tuesday, September 28, 2010
61. iOS SDK
Accelerate CoreMotion
AddressBook CoreTelephony
AudioToolbox CoreText
Your app
AVFoundation CoreVideo
UIKit CoreAudio GameKit
CoreFoundation CoreData iAd
CoreGraphics CoreLocation MapKit
CFNetwork StoreKit
Tuesday, September 28, 2010
63. The View Controller
Handles setup logic for a screen
Handles user input
Interacts with the model
Contains 1 or more views
Tuesday, September 28, 2010
64. The View
Visual representation
Drawing
Laying out subviews (autorotation)
May Handle touch events
Tuesday, September 28, 2010