Nodester is an open source platform that provides free Node.js hosting. It currently hosts around 2,000 apps and is built on Amazon EC2 instances. The main components are proxy.js which handles all HTTP and Websocket requests, and app.js which handles the REST API, CLI, and nodester.com site. The system utilizes chroot and Unionfs for sandboxing apps, and the roadmap includes separating out features, reorganizing the system layout, and potentially exploring alternative sandboxing methods like SELinux.
Nodester is an open source platform that provides free Node.js hosting. It currently hosts around 2,000 apps and is built on Amazon EC2 instances. The main components are proxy.js which handles all HTTP and Websocket requests, and app.js which handles the REST API, CLI, and nodester.com site. The roadmap includes separating out features, reorganizing the system layout, looking at alternative sandboxing, and potentially breaking components out to their own VMs.
This document contains instructions for installing and using the scTGIF R package for analyzing single-cell transcriptomic data, as well as a reference to the 2018 paper "Tabula Muris" by Stephen R. Quake. It includes the licensing information for a Togo picture gallery from DBCLS.
Incremental and parallel computation of structural graph summaries for evolvi...Till Blume
This document presents an incremental and parallel algorithm for computing structural graph summaries of evolving graphs. The algorithm incrementally updates graph summaries when the input graph changes, which is often faster than recomputing from scratch. The algorithm partitions the graph and computes summaries in parallel. Experimental results on real-world and benchmark graphs show the incremental algorithm outperforms batch computation even when 50% of the graph changes. The algorithm runs in linear time with respect to graph changes and degree.
This document discusses two topics: 1) It credits the Togo picture gallery by DBCLS as being licensed under a Creative Commons 2.1 license. 2) It presents a mathematical formula for minimizing the sum of squared distances between data matrices Xk and their low-rank approximations (W + Vk)Hk, where W, Hk, and Vk are parameter matrices to be estimated.
Mimblewimble on Ethereum talk @ Devcon5. A user can enter into the magical world by depositing ERC20 tokens to Ethereum 9¾ and then sending ERC20s privately using Mimblewimble spells. Also, the user can withdraw ERC20 tokens to the muggle world by submitting proof.
The document discusses a 6 channel IMU sensor that collects acceleration and gyroscope data from 12 sensors at 10 frames per second. It can be used as input to a 1x12 CNN network to classify body poses. The data is exported as a CSV file and is available for download from Sony's website.
Nodester is an open source platform that provides free Node.js hosting. It currently hosts around 2,000 apps and is built on Amazon EC2 instances. The main components are proxy.js which handles all HTTP and Websocket requests, and app.js which handles the REST API, CLI, and nodester.com site. The system utilizes chroot and Unionfs for sandboxing apps, and the roadmap includes separating out features, reorganizing the system layout, and potentially exploring alternative sandboxing methods like SELinux.
Nodester is an open source platform that provides free Node.js hosting. It currently hosts around 2,000 apps and is built on Amazon EC2 instances. The main components are proxy.js which handles all HTTP and Websocket requests, and app.js which handles the REST API, CLI, and nodester.com site. The roadmap includes separating out features, reorganizing the system layout, looking at alternative sandboxing, and potentially breaking components out to their own VMs.
This document contains instructions for installing and using the scTGIF R package for analyzing single-cell transcriptomic data, as well as a reference to the 2018 paper "Tabula Muris" by Stephen R. Quake. It includes the licensing information for a Togo picture gallery from DBCLS.
Incremental and parallel computation of structural graph summaries for evolvi...Till Blume
This document presents an incremental and parallel algorithm for computing structural graph summaries of evolving graphs. The algorithm incrementally updates graph summaries when the input graph changes, which is often faster than recomputing from scratch. The algorithm partitions the graph and computes summaries in parallel. Experimental results on real-world and benchmark graphs show the incremental algorithm outperforms batch computation even when 50% of the graph changes. The algorithm runs in linear time with respect to graph changes and degree.
This document discusses two topics: 1) It credits the Togo picture gallery by DBCLS as being licensed under a Creative Commons 2.1 license. 2) It presents a mathematical formula for minimizing the sum of squared distances between data matrices Xk and their low-rank approximations (W + Vk)Hk, where W, Hk, and Vk are parameter matrices to be estimated.
Mimblewimble on Ethereum talk @ Devcon5. A user can enter into the magical world by depositing ERC20 tokens to Ethereum 9¾ and then sending ERC20s privately using Mimblewimble spells. Also, the user can withdraw ERC20 tokens to the muggle world by submitting proof.
The document discusses a 6 channel IMU sensor that collects acceleration and gyroscope data from 12 sensors at 10 frames per second. It can be used as input to a 1x12 CNN network to classify body poses. The data is exported as a CSV file and is available for download from Sony's website.
Building a real time Tweet map with Flink in six weeksMatthias Kricke
In this talk we present OSTMap, a tool which was build by 6 students over the course of 6 weeks. Each student only has to do as little as 5-10h per week and no experience with BigData or the used frameworks. We also present the concept of geotemporal indicies for our use-case.
This document discusses using CircleCI to run Terraform plans and applies. It describes setting up CircleCI to run Terraform on code pushes to Github to automate infrastructure provisioning. The workflow involves CircleCI running Terraform plan on pushes, posting the plan to Slack, and allowing approval from Slack before running Terraform apply to provision resources.
This document discusses Terraform workspaces and how they can be used to implement infrastructure as code according to the 12 factor app principles. It introduces Terraform workspaces and how they are used to separate environments and state. Workspaces like dev, stg, and prd can be created and selected in Terraform to apply changes to different environments. The state file is stored in buckets named after the environment to separate infrastructure states. Workspaces help implement factor X of the 12 factor app principles for codebase portability between execution environments.
This document discusses functions and their domains and ranges. It provides examples of functions, including f(x)=x^2 and f(x,y)=x+y, and examines their domains and ranges. The document explores the concepts of co-domains and how functions map domains to ranges.
For beginner circle_ci_config_workflow_explanationhikarumiyazawa1
The document discusses CircleCI configuration and workflows for infrastructure as code using Terraform. It describes triggering Terraform plans on GitHub pushes which are approved in Slack before applying changes. It also mentions using CircleCI, Terraform, Route53, S3, and ECS to manage Meily's infrastructure.
Payment channels allow for off-chain transactions between two parties to enable trustless, high-volume, low-cost micropayments on the Bitcoin blockchain. The key aspects are: (1) a multi-signature wallet is set up and funded, (2) off-chain balance updates occur via time-locked transactions, (3) the final on-chain transaction closes the channel by broadcasting the final signed state. Hashed Timelock Contracts (HTLCs) extend this to enable payments across multiple channels by using hash preimages and timelocks to guarantee delivery or refunds. Bidirectional channels allow payments in both directions through commitment transactions signed by both parties.
Multi-Cloud Federated Kubernetes at CERNRicardo Rocha
This document summarizes CERN's use of multi-cloud federated Kubernetes to manage distributed computing resources. Some key points:
- CERN uses Kubernetes to manage over 210 clusters across 200+ sites and 700,000 CPU cores for high energy physics experiments.
- They federated Kubernetes to simplify monitoring and deployment across clusters handling periodic load spikes from conferences and reconstruction campaigns.
- CERN integrated their Condor batch system and RECAST analysis platform workloads using Kubernetes federation for uniform APIs, replication, and load balancing across sites.
AWS DEV DAY SEOUL 2017 Buliding Serverless Web App - 직방 Image ConverterSeok-joon Yun
This document discusses using Amazon Web Services (AWS) to build a serverless web application. It describes deploying an Express.js web framework application on AWS Lambda and API Gateway without a server. The application uses services like AWS Lambda, API Gateway, AWS RDS, AWS S3, and CloudFront. It provides steps for configuring the Express.js app to run on AWS Lambda and calling it through API Gateway.
Where in the world is Franz Kafka? | Will LaForest, ConfluentHostedbyConfluent
Apache Kafka is the de-facto standard for event streaming and creating data pipelines that can feed a variety of different tools. It is very common for the data to have geospatial characteristics but to date there has been relatively little work done around how to leverage this natively in Kafka. The common approach is to just dump all the data into some geospatial store or toolset and do retrospective analysis and queries. This of course loses all the advantages of handling it in realtime before it ever goes to an external tool. In this talk I will discuss the creation and demonstrate the usage of geospatial UDFs in ksqlDB. I will also talk through the advantages of doing geospatial processing directly in Apache Kafka.
Natron is an open-source compositing software similar to Adobe After Effects. It supports Windows, Mac, and Linux operating systems. Natron uses a node-based workflow and includes nodes for importing images, applying filters and effects, compositing layers, and exporting finished compositions. The document provides examples of using various node types in Natron to complete common visual effects and motion graphics tasks like adding shapes, adjusting colors, tracking motion, and rendering output.
Ronan Kerr: Exploring the Debris Disk Around Beta PictorisJeremyHeyl
The document summarizes research analyzing nitrogen abundance in the debris disk around Beta Pictoris. It finds that modeling the data as having three components - interstellar medium, circumstellar disk, and wider component possibly from exocomets - provides the best fit. This points to preferential production rather than depletion as the cause of carbon and oxygen excess in the system. Future work could examine other molecular abundances and test how well the proposed dual-origin solution explains other elements.
Single-Loop Software Architecture for JPEG 2000David Bařina
The document proposes a single-loop software architecture for JPEG 2000 encoding and decoding. It describes a processing unit that continuously consumes input and produces output, visiting each image sample only once to be cache-friendly. The unit is aware of image coordinates to handle borders and its configuration can be saved/restored. It can run in any direction, be SIMD vectorized, and run in parallel on independent image parts. Benchmark results show the proposed solution outperforms other libraries by processing images faster with less memory.
The document discusses using Git for version control in Visual Studio and integrating it with test-driven development. It provides commands for rebasing a development branch onto the master branch and then deleting the development branch. It also mentions using Git from the command line, Git GUI tools, integrating with issue trackers like Redmine and GitHub, and continuous integration tools.
The document discusses the benefits and challenges of proof-driven development using the Coq proof assistant. It describes how Coq can be used to formally prove properties about code during development. However, it also notes that Coq has limitations when dealing with large numbers, which can cause stack overflows. It also discusses using Coq to formally specify the MessagePack serialization format and prove properties about it.
This document provides an overview of a toy model for simulating particle collisions. It describes sampling particle data from experimental measurements to generate events. A jet finding algorithm is used to cluster particles into jets using FastJet. The current status indicates particle generation works as expected but jet finding results appear buggy. Next steps involve analyzing jet distributions and performance of the jet finder on simulated events without embedded jets. Possible extensions include jet fragmentation.
This document describes Program Evaluation and Review Technique (PERT) and its use in planning and scheduling a project. It provides activity details like predecessor tasks, optimistic, most probable and pessimistic durations. It then shows the steps to 1) draw the activity on arrow (AOA) network, 2) calculate the total project time using PERT, 3) determine the probability the project finishes within 50 and 44 weeks, and 4) find the project completion time with 80% probability.
This document provides information to draw a Program Evaluation and Review Technique (PERT) network and analyze a project. It includes activity information like optimistic, most likely, and pessimistic durations to calculate the expected duration, variance, and probability of completing within given timeframes, like having a 90% chance of finishing within the total time. It asks to: 1) Draw the PERT network, 2) Calculate the total project time, 3) Find the probability of completing within 25 and 20 weeks, and 4) Find the total time with a 90% probability.
Extreme JavaScript Minification and ObfuscationSergey Ilinsky
This document summarizes techniques for extreme minification and obfuscation of JavaScript code. It details steps like stripping comments and whitespace, replacing variable and member names with encoded values, and encoding keywords to reduce a 359kb file size down to 111kb while making the code unreadable. Benchmark results show this outperforms other common compilers in file size reduction but results in code that no longer runs properly. Compressing the minified file further saves an additional 7kb.
AutoLISP is a dialect of the LISP programming language built specially to use with AutoCAD and its derivatives. It is a subset of the LISP (List Processor) programming language, which is used in bids of artificial intelligence and expert systems. Many functions have been added to the LISP program in order to interface AutoLISP directly to AutoCAD, and you will see that some AutoCAD commands have been retained as AutoLISP functions. Flange Coupling is also a simple type of coupling than others. Here it consists of two flanges one keyed to the driving shaft and the other two the driven shaft. The two flanges are connected with the help of four or six bolts arranged in a concentric circle .In this thesis a flange coupling model is designed with simple programming language. Initially, transmitting power depending on the application is taken as the input for the generating various dimensions of the coupling.
Building a real time Tweet map with Flink in six weeksMatthias Kricke
In this talk we present OSTMap, a tool which was build by 6 students over the course of 6 weeks. Each student only has to do as little as 5-10h per week and no experience with BigData or the used frameworks. We also present the concept of geotemporal indicies for our use-case.
This document discusses using CircleCI to run Terraform plans and applies. It describes setting up CircleCI to run Terraform on code pushes to Github to automate infrastructure provisioning. The workflow involves CircleCI running Terraform plan on pushes, posting the plan to Slack, and allowing approval from Slack before running Terraform apply to provision resources.
This document discusses Terraform workspaces and how they can be used to implement infrastructure as code according to the 12 factor app principles. It introduces Terraform workspaces and how they are used to separate environments and state. Workspaces like dev, stg, and prd can be created and selected in Terraform to apply changes to different environments. The state file is stored in buckets named after the environment to separate infrastructure states. Workspaces help implement factor X of the 12 factor app principles for codebase portability between execution environments.
This document discusses functions and their domains and ranges. It provides examples of functions, including f(x)=x^2 and f(x,y)=x+y, and examines their domains and ranges. The document explores the concepts of co-domains and how functions map domains to ranges.
For beginner circle_ci_config_workflow_explanationhikarumiyazawa1
The document discusses CircleCI configuration and workflows for infrastructure as code using Terraform. It describes triggering Terraform plans on GitHub pushes which are approved in Slack before applying changes. It also mentions using CircleCI, Terraform, Route53, S3, and ECS to manage Meily's infrastructure.
Payment channels allow for off-chain transactions between two parties to enable trustless, high-volume, low-cost micropayments on the Bitcoin blockchain. The key aspects are: (1) a multi-signature wallet is set up and funded, (2) off-chain balance updates occur via time-locked transactions, (3) the final on-chain transaction closes the channel by broadcasting the final signed state. Hashed Timelock Contracts (HTLCs) extend this to enable payments across multiple channels by using hash preimages and timelocks to guarantee delivery or refunds. Bidirectional channels allow payments in both directions through commitment transactions signed by both parties.
Multi-Cloud Federated Kubernetes at CERNRicardo Rocha
This document summarizes CERN's use of multi-cloud federated Kubernetes to manage distributed computing resources. Some key points:
- CERN uses Kubernetes to manage over 210 clusters across 200+ sites and 700,000 CPU cores for high energy physics experiments.
- They federated Kubernetes to simplify monitoring and deployment across clusters handling periodic load spikes from conferences and reconstruction campaigns.
- CERN integrated their Condor batch system and RECAST analysis platform workloads using Kubernetes federation for uniform APIs, replication, and load balancing across sites.
AWS DEV DAY SEOUL 2017 Buliding Serverless Web App - 직방 Image ConverterSeok-joon Yun
This document discusses using Amazon Web Services (AWS) to build a serverless web application. It describes deploying an Express.js web framework application on AWS Lambda and API Gateway without a server. The application uses services like AWS Lambda, API Gateway, AWS RDS, AWS S3, and CloudFront. It provides steps for configuring the Express.js app to run on AWS Lambda and calling it through API Gateway.
Where in the world is Franz Kafka? | Will LaForest, ConfluentHostedbyConfluent
Apache Kafka is the de-facto standard for event streaming and creating data pipelines that can feed a variety of different tools. It is very common for the data to have geospatial characteristics but to date there has been relatively little work done around how to leverage this natively in Kafka. The common approach is to just dump all the data into some geospatial store or toolset and do retrospective analysis and queries. This of course loses all the advantages of handling it in realtime before it ever goes to an external tool. In this talk I will discuss the creation and demonstrate the usage of geospatial UDFs in ksqlDB. I will also talk through the advantages of doing geospatial processing directly in Apache Kafka.
Natron is an open-source compositing software similar to Adobe After Effects. It supports Windows, Mac, and Linux operating systems. Natron uses a node-based workflow and includes nodes for importing images, applying filters and effects, compositing layers, and exporting finished compositions. The document provides examples of using various node types in Natron to complete common visual effects and motion graphics tasks like adding shapes, adjusting colors, tracking motion, and rendering output.
Ronan Kerr: Exploring the Debris Disk Around Beta PictorisJeremyHeyl
The document summarizes research analyzing nitrogen abundance in the debris disk around Beta Pictoris. It finds that modeling the data as having three components - interstellar medium, circumstellar disk, and wider component possibly from exocomets - provides the best fit. This points to preferential production rather than depletion as the cause of carbon and oxygen excess in the system. Future work could examine other molecular abundances and test how well the proposed dual-origin solution explains other elements.
Single-Loop Software Architecture for JPEG 2000David Bařina
The document proposes a single-loop software architecture for JPEG 2000 encoding and decoding. It describes a processing unit that continuously consumes input and produces output, visiting each image sample only once to be cache-friendly. The unit is aware of image coordinates to handle borders and its configuration can be saved/restored. It can run in any direction, be SIMD vectorized, and run in parallel on independent image parts. Benchmark results show the proposed solution outperforms other libraries by processing images faster with less memory.
The document discusses using Git for version control in Visual Studio and integrating it with test-driven development. It provides commands for rebasing a development branch onto the master branch and then deleting the development branch. It also mentions using Git from the command line, Git GUI tools, integrating with issue trackers like Redmine and GitHub, and continuous integration tools.
The document discusses the benefits and challenges of proof-driven development using the Coq proof assistant. It describes how Coq can be used to formally prove properties about code during development. However, it also notes that Coq has limitations when dealing with large numbers, which can cause stack overflows. It also discusses using Coq to formally specify the MessagePack serialization format and prove properties about it.
This document provides an overview of a toy model for simulating particle collisions. It describes sampling particle data from experimental measurements to generate events. A jet finding algorithm is used to cluster particles into jets using FastJet. The current status indicates particle generation works as expected but jet finding results appear buggy. Next steps involve analyzing jet distributions and performance of the jet finder on simulated events without embedded jets. Possible extensions include jet fragmentation.
This document describes Program Evaluation and Review Technique (PERT) and its use in planning and scheduling a project. It provides activity details like predecessor tasks, optimistic, most probable and pessimistic durations. It then shows the steps to 1) draw the activity on arrow (AOA) network, 2) calculate the total project time using PERT, 3) determine the probability the project finishes within 50 and 44 weeks, and 4) find the project completion time with 80% probability.
This document provides information to draw a Program Evaluation and Review Technique (PERT) network and analyze a project. It includes activity information like optimistic, most likely, and pessimistic durations to calculate the expected duration, variance, and probability of completing within given timeframes, like having a 90% chance of finishing within the total time. It asks to: 1) Draw the PERT network, 2) Calculate the total project time, 3) Find the probability of completing within 25 and 20 weeks, and 4) Find the total time with a 90% probability.
Extreme JavaScript Minification and ObfuscationSergey Ilinsky
This document summarizes techniques for extreme minification and obfuscation of JavaScript code. It details steps like stripping comments and whitespace, replacing variable and member names with encoded values, and encoding keywords to reduce a 359kb file size down to 111kb while making the code unreadable. Benchmark results show this outperforms other common compilers in file size reduction but results in code that no longer runs properly. Compressing the minified file further saves an additional 7kb.
AutoLISP is a dialect of the LISP programming language built specially to use with AutoCAD and its derivatives. It is a subset of the LISP (List Processor) programming language, which is used in bids of artificial intelligence and expert systems. Many functions have been added to the LISP program in order to interface AutoLISP directly to AutoCAD, and you will see that some AutoCAD commands have been retained as AutoLISP functions. Flange Coupling is also a simple type of coupling than others. Here it consists of two flanges one keyed to the driving shaft and the other two the driven shaft. The two flanges are connected with the help of four or six bolts arranged in a concentric circle .In this thesis a flange coupling model is designed with simple programming language. Initially, transmitting power depending on the application is taken as the input for the generating various dimensions of the coupling.
The document describes a biolatency tool that traces block device I/O latency using eBPF. It discusses how the tool was originally written in the bcc framework using C/BPF, but has since been rewritten in the bpftrace framework using a simpler one-liner script. It provides examples of the bcc and bpftrace implementations of biolatency.
This document summarizes a LINE Developer meetup in Kyoto on load balancing techniques. It discusses LINE's private cloud "Verda" and the load balancing architecture used including L3, L4, and L7 load balancers. It also covers programming load balancers using eBPF and XDP to improve performance by handling traffic directly on the NIC. Load testing is discussed using tools like TRex to generate and analyze traffic.
Here is a bpftrace program to measure scheduler latency for ICMP echo requests:
#!/usr/local/bin/bpftrace
kprobe:icmp_send {
@start[tid] = nsecs;
}
kprobe:__netif_receive_skb_core {
@diff[tid] = hist(nsecs - @start[tid]);
delete(@start[tid]);
}
END {
print(@diff);
clear(@diff);
}
This traces the time between the icmp_send kernel function (when the packet is queued for transmit) and the __netif_receive_skb_core function (when the response packet is received). The
Learning Erlang (from a Prolog dropout's perspective)elliando dias
This document is a presentation by Kenji Rikitake given at the 1000speakers:4 conference on 26-APR-2008 about learning Erlang from the perspective of a former Prolog programmer. It discusses why Rikitake didn't like Prolog in the 1980s, why he is now interested in Erlang, some challenges in learning Erlang, examples of IPv6 string manipulation and parallel processing he will demonstrate, results from concurrency testing using Erlang's built-in parallel map function, and conclusions about Erlang and parallel programming.
re:Invent 2019 BPF Performance Analysis at NetflixBrendan Gregg
This document provides an overview of Brendan Gregg's presentation on BPF performance analysis at Netflix. It discusses:
- Why BPF is changing the Linux OS model to become more event-based and microkernel-like.
- The internals of BPF including its origins, instruction set, execution model, and how it is integrated into the Linux kernel.
- How BPF enables a new class of custom, efficient, and safe performance analysis tools for analyzing various Linux subsystems like CPUs, memory, disks, networking, applications, and the kernel.
- Examples of specific BPF-based performance analysis tools developed by Netflix, AWS, and others for analyzing tasks, scheduling, page faults
CloudNative Days Tokyo 2020での、lazypullに関する発表資料です。https://event.cloudnativedays.jp/cndt2020/talks/16
Stargz Snapshotterのリポジトリ:
https://github.com/containerd/stargz-snapshotter
Introduction to mago3D, an Open Source Based Digital Twin PlatformSANGHEE SHIN
This talk was given at the Busan Eco Delta City(Korea National Pilot Smart City) technical workshop held on 18th July. I talked about introduction and history of mago3D, some core technologies, real cases, and lessons learnt in this workshop.
The document provides information on how to build Android for various ARM chip boards including Allwinner A31, Rockchip RK3188, MediaTek MT6589, Freescale i.MX6Q, and TI OMAP5432. It lists the chips, development boards, and Android support for each. It then provides detailed setup instructions for building Android on the Rockchip RK3188 and MediaTek MT6589 boards, including getting the kernel source, building images, and writing to the devices. Setup for the Freescale board involves downloading official source and patching to the Android code.
Amazon SageMaker는 기계 학습을 위한 데이터와 알고리즘, 프레임워크를 빠르게 연결하에 손쉽게 ML 구축이 가능한 신규 클라우드 서비스입니다. 이번 시간에는 Amazon S3에 저장된 학습 데이터를 이용하여 가장 일반적으로 사용하는 알고리즘 몇 가지를 직접 실행해 보는 실습을 진행합니다. 이를 위해 유명한 오픈 소스 프레임워크인 TensorFlow와 Keras 그리고 Apache MXNet과 Gluon 등을 사용해 봅니다.
With the end of Moore's law and the budget energy limitations, there is a need for a change in computer architecture from general-purpose to domain specific architectures (DSAs) to improve the energy per operation efficiency. Furthermore, the main trend topics are evolving fast, even within a single year, and keeping up with these changes requires adaptability.
To tackle these issues DRACO aims at investigating DSAs onto heterogeneous reconfigurable platforms, that exploit reconfigurable fabric of Field Programmable Gate Arrays (FPGAs), developing domain specific architectural optimizations and adopting fast and evolvable solutions.
1st - Increasing the performance using SSE, AVX* and FMA extensions
2nd - BPF BCC tools for performance analysis
3rd - Insecurity of today's computers. Ring 2 firmware and UEFI, and why we wouldn't want them
4th - Comparison between the functionality of the best known Nginx distributions Nginx, OpenResty and Tengine
BKK16-211 Internet of Tiny Linux (io tl)- Status and ProgressLinaro
This document discusses methods for reducing the size of Linux kernels and user space binaries to make them suitable for small IoT applications. It describes how the Linux kernel is well-suited for IoT due to its large developer community and features, but can be bloated. Methods discussed to reduce kernel size include compiling out unused features, using Link Time Optimization (LTO), and trimming unused exported kernel symbols. For user space, it suggests statically compiled applications and shared libraries with minimal dependencies. The presentation provides size reduction numbers when applying these techniques and suggests areas for further work like code profiling and improved modularization.
Talk by Brendan Gregg for All Things Open 2018. "At over one thousand code commits per week, it's hard to keep up with Linux developments. This keynote will summarize recent Linux performance features,
for a wide audience: the KPTI patches for Meltdown, eBPF for performance observability and the new open source tools that use it, Kyber for disk I/O sc
heduling, BBR for TCP congestion control, and more. This is about exposure: knowing what exists, so you can learn and use it later when needed. Get the
most out of your systems with the latest Linux kernels and exciting features."
Similar to IBM Cloud Community Summit 2018:「Kubernetes in Muiticloudで戦うCloud Native時代」 by capsmalt (20)
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
8. 8
K8s E
F
/ -
G K
WorkerNodeMaster Node
Management Node
Management Node
Management Node
/ -
WorkerNode
S
EK
E .
WorkerNodeMaster Node
Management Node
Management Node
Management Node
WorkerNode
B A
SMN
/ -
27. 27
PdW hpl IBM c L AOSS
& (. J CK
mh- N )) R R 2 - N )) R R
bWIM
2 / 2 2 D E
& ( ( L J A MK
)GL JIJBK ) BLB G
E D A BG
J F L I J
/ 2
B J EBF L
& E M
ML F LB G G J
& N G
TC d f
II GG L )GL JIJBK
S & GL J LB G &MKT
& B L O Q & LK G
FI J FIEQ
& LK G )PIE J J
( I G EQLB K
) BLB G
/ i kn s bbC e
& BE
MG LB G
c
- N ab V
& )N GL LJ FK
I A . D
/
LB G E KL
JD G A
LK G KKBKL GL
fpjogi
Scdoglk T
I A
L PL
& E M JBN L
/ /
ne R a WR
bOC dBadU Dro tE
IA J
B JLQ
44. 44
IBM Cloud Private V3.1.x
OGdo Ran G S DaM
H A S d eG
E D s IB D eo KLR QPI
I vs agr
/( A A
IBM Z
R M
E ED D
B
ud tW
utvs p
/B D EC A )
ik K
D
hUa
ot a
Du Da
ba
AC Gl Go
B C8 B D
C B
B D
C C
D a
CI/CD
D s
Du
r mG
g lM J
So hG ) BD odmG
Do cDa
cniW
2
TGb
cnGPG
)
TGb
h i
)
fl C R Gvs
/ ( A 8DH
gk A OpenWhisk