This document discusses the parallels between the development of components in the computing and LED industries. It notes that in computing, demand for increased performance drove rapid development of CPU, memory, and other components. Similarly, to meet demands for new lighting designs and energy efficiency, the LED industry requires fast development of lenses, drivers, and other parts. The document argues this presents an opportunity to apply the virtual integration supply chain model used in computing to help standardize and accelerate LED component development.
Seizing Opportunities, Overcoming Productivity Challenges in the Virtually Co...Cognizant
By following a few simple rules, organizations can overcome the barriers to social and virtual ways of working, including concerns about distractions, personal detachment and business disruption.
Sean McDonald, Director of Communities and Conversations at Dell, about the strategies, viewpoints and initiatives Dell has undertaken to give both customers and employees a voice in the brand. Through the effective use of Web 2.0 technologies, Dell has enabled interactions that result in direct consumer feedback and decreased support costs.
The document discusses 7 ways that Android applications can be vulnerable, including intent hijacking, intent spoofing, sticky broadcast tampering, insecure storage of data, insecure network communication, SQL injection, and allowing applications to have promiscuous privileges. It provides descriptions and examples of each vulnerability and recommends ways to address the security issues, such as using explicit intents that require permissions, securing data storage, and limiting application privileges. The goal is to help developers avoid introducing vulnerabilities that could allow attackers to compromise user data or alter application behavior.
iStart - Unified Communications comes of ageHayden McCall
Three years ago iStart prophesised that unified communications was going
to be the next big thing. But three years, in the days before BYOD and
when the cloud was in its infancy, is a long time ago.
So where are we now? What is the business case for UC and what’s the best way
to turn it to competitive advantage? Where is return on investment and has the
technology finally caught up with the promise? Jonathan Cotton investigates...
El documento describe las tecnologías de la información y la comunicación (TIC), que se centran en la transmisión de mensajes e información a través de varios medios tecnológicos como la voz, las imágenes y los datos. Las TIC permiten almacenar, procesar y difundir información de manera interactiva, instantánea e interconectada para diversos fines de comunicación.
Seizing Opportunities, Overcoming Productivity Challenges in the Virtually Co...Cognizant
By following a few simple rules, organizations can overcome the barriers to social and virtual ways of working, including concerns about distractions, personal detachment and business disruption.
Sean McDonald, Director of Communities and Conversations at Dell, about the strategies, viewpoints and initiatives Dell has undertaken to give both customers and employees a voice in the brand. Through the effective use of Web 2.0 technologies, Dell has enabled interactions that result in direct consumer feedback and decreased support costs.
The document discusses 7 ways that Android applications can be vulnerable, including intent hijacking, intent spoofing, sticky broadcast tampering, insecure storage of data, insecure network communication, SQL injection, and allowing applications to have promiscuous privileges. It provides descriptions and examples of each vulnerability and recommends ways to address the security issues, such as using explicit intents that require permissions, securing data storage, and limiting application privileges. The goal is to help developers avoid introducing vulnerabilities that could allow attackers to compromise user data or alter application behavior.
iStart - Unified Communications comes of ageHayden McCall
Three years ago iStart prophesised that unified communications was going
to be the next big thing. But three years, in the days before BYOD and
when the cloud was in its infancy, is a long time ago.
So where are we now? What is the business case for UC and what’s the best way
to turn it to competitive advantage? Where is return on investment and has the
technology finally caught up with the promise? Jonathan Cotton investigates...
El documento describe las tecnologías de la información y la comunicación (TIC), que se centran en la transmisión de mensajes e información a través de varios medios tecnológicos como la voz, las imágenes y los datos. Las TIC permiten almacenar, procesar y difundir información de manera interactiva, instantánea e interconectada para diversos fines de comunicación.
SXSW - The Changing World of Software Delivery: Web, Mobile,and IoTKevin Rohling
The document discusses trends in software delivery driven by new technologies like mobile, IoT, and cloud services. It notes that 40% of humans are now on the internet via 3 billion smartphones. The rise of mobile and IoT is creating new platforms that build on previous ones like web. This is impacting software development practices, with tools becoming more productive through cloud services and open source, and teams getting smaller yet more global. Development practices are increasingly using agile and continuous delivery. The document predicts future trends will include new platforms like VR/AR, deeper hardware integration, and convergence of platforms.
Slides from a TED talk held at the Smart.ly conference in Washington D.C. in November 2019. The company covered is MENSALYTICS and offers automated rich meeting notes and strategic decision support based on artificial intelligence (AI) for business leaders.
This document discusses the concept of sustainable software and open source software. It defines sustainability as the ability to maintain a process or state over time. Open source is described as a development method that leverages distributed peer review and transparency. Commercial open source business models are discussed, with vendors providing services, support and packaging around software that is also freely available. Charts compare cost and revenue models of traditional proprietary software versus open source. The benefits of a diverse software ecosystem, like biodiversity in nature, are noted.
This document discusses the concept of sustainable software and open source software. It defines sustainability as the ability to maintain a process over time. Open source is described as a development method that leverages distributed peer review and transparency. Commercial open source business models are discussed, with vendors providing services, support and packaging around software that is also freely available. The costs and revenues of traditional proprietary versus open source models are compared. Community involvement is important for open source to be sustainable over the long run.
This is the presentation I gave at the International Informix Users (IIUG) group in 2011. The presentation gives an introduction and overview of the architectures used in interactive entertainment (Online Games, social, MMO). I regret having to remove discussions covering video production, and video delivery, as well as CDN. Time did not allow, and those topics were not of as much interest to the audience.
This document discusses the rise of the information center and Hitachi Data Systems' vision and strategy. It summarizes that HDS sees a major growth in digital data requiring new IT approaches, and that its blueprint is to create a common virtualized platform for all data, applications, and information. HDS claims its strategy can deliver significant cost savings and value to customers through virtualization, automation, cloud-readiness, and sustainability.
6 benefits of implementing Enterprise 2.0 collaboration software for businessesCynapse
Enterprise 2.0 refers to the use of social software platforms within companies to interconnect teams and their collective knowledge. It aims to harness the advantages of Web 2.0 technologies like social media behind company firewalls. Some key benefits include overcoming geographic and cultural barriers between diverse teams, fostering innovation by enabling free flow of ideas, creating a central knowledge base from communication, capturing tacit knowledge, and identifying experts within the organization.
The document summarizes M&A activity in the infrastructure software sector from 2011-2012. It notes that deal volume doubled from 2009 to 142 deals in 2011, driven by cloud computing adoption. However, the largest deals lacked the billion-dollar transactions of 2010. The top 5 deals ranged from $700M to $591M in value. Cloud computing remains the biggest trend, with Forrester forecasting the cloud market to grow over six-fold to $241B by 2020. Large vendors made numerous acquisitions to expand their cloud, virtualization, and data offerings.
This presentation on Open Source and Cloud Technologies was given by Vizuri SVP Joe Dickman at the 2012 Destination Marketing Technology Forum in Raleigh, NC. For more information please visit our website at www.vizuri.com or email solutions@vizuri.com.
Fast and Easy Analytics: - Tableau - Data Base Trends - Dbt06122013slidesEdgar Alejandro Villegas
The document discusses how big data analytics are becoming more accessible and easier to use for non-experts. It outlines several trends that are making analytics more pervasive, like self-service BI tools, automated decision making, mobile apps, and analytic clouds. These trends are breaking down barriers and allowing more users at various levels to access and make sense of big data. However, expertise will still be needed to grasp big data concepts and communicate findings. The document advocates for collaborating early in projects and focusing on solving specific business problems with big data rather than viewing it as large, complex initiatives.
Virtual desktop infrastructure (VDI) represents the future of enterprise desktop computing and brings with it the detachment of OSs and applications from physical endpoints—a compelling trend that promises greater flexibility, scalability, cost savings and security benefits. The movement also represents radical, and possibly painful, changes in market dynamics for providers of endpoint hardware, software and services.
Yankee Group analysts Phil Hochmuth and Zeus Kerravala dissect the future of VDI and discuss what the technology has to offer enterprises today.
In this slide deck I try to explore the meaning of the often misinterpreted sentence "You build it, you run it". Starting with its origin in a 2006 interview with Werner Vogels and a short description of the misinterpretation of that phrase that can be seen quite often these days in companies that try to pick up concepts like DevOps without really getting the idea behind it, I then start a bit longer journey.
It starts with the history and evolution of markets and IT. Based on that I dive deeper into the effects of uncertainty which these days is often predominant for companies facing narrow and highly dynamic markets. I try to approach from a financial point of view as well as from a risk management point of view (yes, even if we have become agile, managing risk and financial aspects have not gone away).
The basic result is that we need to go faster (in terms of cycle times) without compromising quality. I also add a quick litmus test to figure out where your own company currently is located as reality never is as simple as a slide deck - to avoid turning a thought model that should support reasoning into a dogma.
Having the task set and understanding that IT must support going faster without compromising quality, I look at DevOps as it targets exactly the same goal. After a short explanation of what DevOps actually means (we face a perfect confusion of ideas when talking about DevOps) and what the effects are if you do it seriously, I focus on the effects for the process organization.
The traditional process organization - while usually being set up nicely for cost efficiency - is very poor in terms of cycle times. In order to shorten cycle times those organization will eventually become cross-functional, autonomous teams with end-to-end responsibility. And while those teams have all skills and the full authority for all their activities, they also need to take over the full responsibility for their actions - their is no one left to blame ;)
And this naturally leads to "(You decide it,) you build it, you run it" which in the end is a required organizational prerequisite for going fast in a DevOps way.
There is a lot left out in the slides that would also be worth talking about (after all it is just a 60 min talk) and of course the voice track is missing, but I still hope that those slides are of some value for you.
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Rien van den Bosch
The document discusses the importance of digital strategy and technology for brand commerce. It covers topics like social media, mobile, analytics, cloud computing and their impact on business. It emphasizes the value of data, event data, master data management and operational backbones. It also discusses digital transformation strategies for different companies and the convergence of FedEx and UPS strategies. It highlights the benefits of platforms as a service, continuous deployment, automation and the value they provide to businesses.
The Power of Ace (Adoption, Change & Execution)Prakash Bagri
The document discusses different stages of customer adoption for new innovations over time. It describes how in the first few years, a company typically gains early adopters but then struggles in the third year when attempting rapid growth. Meetings are held where different groups blame each other for issues. The key is targeting the right customer and ensuring the product fulfills their needs through an integrated whole product of both hardware/software and services. Execution is essential for translating ideas into successful products.
The document discusses software project success rates and reasons for failure and success. It reports that in 2000, 23% of software projects were successful, 49% were challenged (completed but over budget or late), and 28% failed. Common reasons for failure included lack of project management and executive support, underestimating complexity, and ignoring changing requirements. Recipes for success included using smaller projects with shorter durations, more manageable scopes, and engaging users earlier through iterative development.
This document discusses the rationale for adopting continuous delivery practices in software development. It summarizes several studies that found high rates of project failures and benefits not being realized from traditional development approaches. Continuous delivery is presented as an approach that can help address these issues by focusing on rapid, reliable, and automated software releases. Case studies are provided of organizations like Google, Amazon, and HP that have successfully implemented continuous delivery at large scales. Adopting these practices is associated with benefits like increased throughput, reliability, innovation, and business performance.
The document summarizes the IT transformation efforts at Oak Ridge National Laboratory from 2006-2008. It discusses consolidating IT staff, application transformation, and cyber security revitalization to create a unified user experience with common interfaces for employees, customers, and collaborators. It highlights goals of making enterprise data easier to access, facilitating cross-discipline collaboration, and mining data to create knowledge and predictability in research and development. The summary also briefly outlines lessons learned around executive support, training, and adopting a unified architecture.
Identify Development Pains and Resolve Them with Idea FlowTechWell
With the explosion of new frameworks, a mountain of automation, and our applications distributed across hundreds of services in the cloud, the level of complexity in software development is growing at an insane pace. With increased complexity comes increased costs and risks. When diagnosing unexpected behavior can take days, weeks, or sometimes months, all while our release is on the line, our projects plunge into chaos. In the invisible world of software development, how do we identify what's causing our pain? How do we escape the chaos? Janelle Klein presents a novel approach to measuring the chaos, identifying the causes, and systematically driving improvement with a data-driven feedback loop. Rather than measuring the problems in the code, Janelle suggests measuring the "friction in Idea Flow", the time it takes a developer to diagnose and resolve unexpected confusion, which disrupts the flow of progress during development. With visibility of the symptoms, we can identify the cause—whether it's bad architecture, collaboration problems, or technical debt. Janelle discusses how to measure Idea Flow, why it matters, and the implications for our teams, our organizations, and our industry.
The document discusses how strategic virtualization, beginning with desktop/webbook virtualization, can transform an organization and allow IT to become a competitive advantage. It describes how Amerisure Insurance implemented a strategic virtualization roadmap that simplified their infrastructure and dramatically improved productivity, security, and cost savings. Key benefits included ubiquitous access, reduced total cost of ownership, improved quality of life for employees, a more agile architecture, and positioning the company for the future.
Timothy B. Jones discusses perspectives on innovation and enterprise computing. He observes trends showing more consumer technology innovation than enterprise and how this is disrupting businesses. Prosumers are bringing consumer tech into offices, undermining existing enterprise software. A new "LAMP stack" is enabling applications that enhance productivity at lower costs. This is leading to the emergence of "Enterprise 2.0" using web 2.0 technologies internally to improve collaboration and replace client-server architectures with more flexible applications. Early adopter organizations are seeing benefits, and target verticals include financial services, retail, consulting and more.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
More Related Content
Similar to Supplying LEDs as Consumer Electronics: Creating a $54 Billion Market with Enterprise Software
SXSW - The Changing World of Software Delivery: Web, Mobile,and IoTKevin Rohling
The document discusses trends in software delivery driven by new technologies like mobile, IoT, and cloud services. It notes that 40% of humans are now on the internet via 3 billion smartphones. The rise of mobile and IoT is creating new platforms that build on previous ones like web. This is impacting software development practices, with tools becoming more productive through cloud services and open source, and teams getting smaller yet more global. Development practices are increasingly using agile and continuous delivery. The document predicts future trends will include new platforms like VR/AR, deeper hardware integration, and convergence of platforms.
Slides from a TED talk held at the Smart.ly conference in Washington D.C. in November 2019. The company covered is MENSALYTICS and offers automated rich meeting notes and strategic decision support based on artificial intelligence (AI) for business leaders.
This document discusses the concept of sustainable software and open source software. It defines sustainability as the ability to maintain a process or state over time. Open source is described as a development method that leverages distributed peer review and transparency. Commercial open source business models are discussed, with vendors providing services, support and packaging around software that is also freely available. Charts compare cost and revenue models of traditional proprietary software versus open source. The benefits of a diverse software ecosystem, like biodiversity in nature, are noted.
This document discusses the concept of sustainable software and open source software. It defines sustainability as the ability to maintain a process over time. Open source is described as a development method that leverages distributed peer review and transparency. Commercial open source business models are discussed, with vendors providing services, support and packaging around software that is also freely available. The costs and revenues of traditional proprietary versus open source models are compared. Community involvement is important for open source to be sustainable over the long run.
This is the presentation I gave at the International Informix Users (IIUG) group in 2011. The presentation gives an introduction and overview of the architectures used in interactive entertainment (Online Games, social, MMO). I regret having to remove discussions covering video production, and video delivery, as well as CDN. Time did not allow, and those topics were not of as much interest to the audience.
This document discusses the rise of the information center and Hitachi Data Systems' vision and strategy. It summarizes that HDS sees a major growth in digital data requiring new IT approaches, and that its blueprint is to create a common virtualized platform for all data, applications, and information. HDS claims its strategy can deliver significant cost savings and value to customers through virtualization, automation, cloud-readiness, and sustainability.
6 benefits of implementing Enterprise 2.0 collaboration software for businessesCynapse
Enterprise 2.0 refers to the use of social software platforms within companies to interconnect teams and their collective knowledge. It aims to harness the advantages of Web 2.0 technologies like social media behind company firewalls. Some key benefits include overcoming geographic and cultural barriers between diverse teams, fostering innovation by enabling free flow of ideas, creating a central knowledge base from communication, capturing tacit knowledge, and identifying experts within the organization.
The document summarizes M&A activity in the infrastructure software sector from 2011-2012. It notes that deal volume doubled from 2009 to 142 deals in 2011, driven by cloud computing adoption. However, the largest deals lacked the billion-dollar transactions of 2010. The top 5 deals ranged from $700M to $591M in value. Cloud computing remains the biggest trend, with Forrester forecasting the cloud market to grow over six-fold to $241B by 2020. Large vendors made numerous acquisitions to expand their cloud, virtualization, and data offerings.
This presentation on Open Source and Cloud Technologies was given by Vizuri SVP Joe Dickman at the 2012 Destination Marketing Technology Forum in Raleigh, NC. For more information please visit our website at www.vizuri.com or email solutions@vizuri.com.
Fast and Easy Analytics: - Tableau - Data Base Trends - Dbt06122013slidesEdgar Alejandro Villegas
The document discusses how big data analytics are becoming more accessible and easier to use for non-experts. It outlines several trends that are making analytics more pervasive, like self-service BI tools, automated decision making, mobile apps, and analytic clouds. These trends are breaking down barriers and allowing more users at various levels to access and make sense of big data. However, expertise will still be needed to grasp big data concepts and communicate findings. The document advocates for collaborating early in projects and focusing on solving specific business problems with big data rather than viewing it as large, complex initiatives.
Virtual desktop infrastructure (VDI) represents the future of enterprise desktop computing and brings with it the detachment of OSs and applications from physical endpoints—a compelling trend that promises greater flexibility, scalability, cost savings and security benefits. The movement also represents radical, and possibly painful, changes in market dynamics for providers of endpoint hardware, software and services.
Yankee Group analysts Phil Hochmuth and Zeus Kerravala dissect the future of VDI and discuss what the technology has to offer enterprises today.
In this slide deck I try to explore the meaning of the often misinterpreted sentence "You build it, you run it". Starting with its origin in a 2006 interview with Werner Vogels and a short description of the misinterpretation of that phrase that can be seen quite often these days in companies that try to pick up concepts like DevOps without really getting the idea behind it, I then start a bit longer journey.
It starts with the history and evolution of markets and IT. Based on that I dive deeper into the effects of uncertainty which these days is often predominant for companies facing narrow and highly dynamic markets. I try to approach from a financial point of view as well as from a risk management point of view (yes, even if we have become agile, managing risk and financial aspects have not gone away).
The basic result is that we need to go faster (in terms of cycle times) without compromising quality. I also add a quick litmus test to figure out where your own company currently is located as reality never is as simple as a slide deck - to avoid turning a thought model that should support reasoning into a dogma.
Having the task set and understanding that IT must support going faster without compromising quality, I look at DevOps as it targets exactly the same goal. After a short explanation of what DevOps actually means (we face a perfect confusion of ideas when talking about DevOps) and what the effects are if you do it seriously, I focus on the effects for the process organization.
The traditional process organization - while usually being set up nicely for cost efficiency - is very poor in terms of cycle times. In order to shorten cycle times those organization will eventually become cross-functional, autonomous teams with end-to-end responsibility. And while those teams have all skills and the full authority for all their activities, they also need to take over the full responsibility for their actions - their is no one left to blame ;)
And this naturally leads to "(You decide it,) you build it, you run it" which in the end is a required organizational prerequisite for going fast in a DevOps way.
There is a lot left out in the slides that would also be worth talking about (after all it is just a 60 min talk) and of course the voice track is missing, but I still hope that those slides are of some value for you.
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Rien van den Bosch
The document discusses the importance of digital strategy and technology for brand commerce. It covers topics like social media, mobile, analytics, cloud computing and their impact on business. It emphasizes the value of data, event data, master data management and operational backbones. It also discusses digital transformation strategies for different companies and the convergence of FedEx and UPS strategies. It highlights the benefits of platforms as a service, continuous deployment, automation and the value they provide to businesses.
The Power of Ace (Adoption, Change & Execution)Prakash Bagri
The document discusses different stages of customer adoption for new innovations over time. It describes how in the first few years, a company typically gains early adopters but then struggles in the third year when attempting rapid growth. Meetings are held where different groups blame each other for issues. The key is targeting the right customer and ensuring the product fulfills their needs through an integrated whole product of both hardware/software and services. Execution is essential for translating ideas into successful products.
The document discusses software project success rates and reasons for failure and success. It reports that in 2000, 23% of software projects were successful, 49% were challenged (completed but over budget or late), and 28% failed. Common reasons for failure included lack of project management and executive support, underestimating complexity, and ignoring changing requirements. Recipes for success included using smaller projects with shorter durations, more manageable scopes, and engaging users earlier through iterative development.
This document discusses the rationale for adopting continuous delivery practices in software development. It summarizes several studies that found high rates of project failures and benefits not being realized from traditional development approaches. Continuous delivery is presented as an approach that can help address these issues by focusing on rapid, reliable, and automated software releases. Case studies are provided of organizations like Google, Amazon, and HP that have successfully implemented continuous delivery at large scales. Adopting these practices is associated with benefits like increased throughput, reliability, innovation, and business performance.
The document summarizes the IT transformation efforts at Oak Ridge National Laboratory from 2006-2008. It discusses consolidating IT staff, application transformation, and cyber security revitalization to create a unified user experience with common interfaces for employees, customers, and collaborators. It highlights goals of making enterprise data easier to access, facilitating cross-discipline collaboration, and mining data to create knowledge and predictability in research and development. The summary also briefly outlines lessons learned around executive support, training, and adopting a unified architecture.
Identify Development Pains and Resolve Them with Idea FlowTechWell
With the explosion of new frameworks, a mountain of automation, and our applications distributed across hundreds of services in the cloud, the level of complexity in software development is growing at an insane pace. With increased complexity comes increased costs and risks. When diagnosing unexpected behavior can take days, weeks, or sometimes months, all while our release is on the line, our projects plunge into chaos. In the invisible world of software development, how do we identify what's causing our pain? How do we escape the chaos? Janelle Klein presents a novel approach to measuring the chaos, identifying the causes, and systematically driving improvement with a data-driven feedback loop. Rather than measuring the problems in the code, Janelle suggests measuring the "friction in Idea Flow", the time it takes a developer to diagnose and resolve unexpected confusion, which disrupts the flow of progress during development. With visibility of the symptoms, we can identify the cause—whether it's bad architecture, collaboration problems, or technical debt. Janelle discusses how to measure Idea Flow, why it matters, and the implications for our teams, our organizations, and our industry.
The document discusses how strategic virtualization, beginning with desktop/webbook virtualization, can transform an organization and allow IT to become a competitive advantage. It describes how Amerisure Insurance implemented a strategic virtualization roadmap that simplified their infrastructure and dramatically improved productivity, security, and cost savings. Key benefits included ubiquitous access, reduced total cost of ownership, improved quality of life for employees, a more agile architecture, and positioning the company for the future.
Timothy B. Jones discusses perspectives on innovation and enterprise computing. He observes trends showing more consumer technology innovation than enterprise and how this is disrupting businesses. Prosumers are bringing consumer tech into offices, undermining existing enterprise software. A new "LAMP stack" is enabling applications that enhance productivity at lower costs. This is leading to the emergence of "Enterprise 2.0" using web 2.0 technologies internally to improve collaboration and replace client-server architectures with more flexible applications. Early adopter organizations are seeing benefits, and target verticals include financial services, retail, consulting and more.
Similar to Supplying LEDs as Consumer Electronics: Creating a $54 Billion Market with Enterprise Software (20)
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
3. Enables fast computation
Cheap to manufacture
Revolutionizes electronics and
humanity
The physical manipulation of electricity
for human applications (e.g. microwave
timer; cancer imaging; angry birds)
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
6. An IC that emits light
Faces similar market environment
as personal computing
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
7. Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
http://img.ledsmagazine.com/pdf/Lightingthe
Way.pdf
9. Fast technological development of
components
CPU:LED
Memory:Lens
Motherboard:PCB
Driver:Driver
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
10. High tech spawned by integrated circuit.
But not all have rapid component development
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
11. In computers, what
causes market
demand for rapid
product component
development?
Answer: Performance
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
12. Windows 3.0 Windows 95
Windows XP Windows Vista
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
13. Software = human application of
computers
Best software uses best computing
resources
Initial Demand for software by
consumers leads to rapid
computing
innovation/development for better
computing resources
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
16. Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
http://img.ledsmagazine.com/pdf/Lightingthe
Way.pdf
17. “Architectural. This application is
used for the illumination of
building structures, with the artistic
integration of light source and
architectural elements.
Architectural lighting can be both
functional and decorative. In
addition, architectural lighting can
be applied both outdoors and
indoors.”
“Hospitality. This lighting
application includes general
lighting for hotels, bars and
restaurants. The hospitality
application is often focused on
decorative lighting and spans an
entire spectrum from mood
lighting to orientational lighting.”
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
http://img.ledsmagazine.com/pdf/Lightingthe
Way.pdf
18. Enables greater creativity and
more project competitiveness
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
22. Explains the parallel component
specializations between LEDs and
computing
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
23. Easy for lights to meet Energy
Requirements of Projects.
Minimal savings rate between competing
products.
Hard for lights to meet Design
Requirements.
(color temperature, CRI,
angular output,
transmission efficiency,
etc.)
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
26. DELL Innovation: build business
around best parts; efficiency =
productivity = profit
Virtual Integration
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
27. “As a small start-up, Dell couldn’t
afford to create every piece of the
value chain. But more to the point,
why should we want to? We
concluded we’d be better off
leveraging the investments others
have made and focusing on
delivering solutions and systems to
customers.” – Michael Dell
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
28. Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
http://hbr.org/1998/03/the-power-of-virtual-integration-an-interview-with-dell-computers-
michael-dell/ar/1
29. “In the computer industry, inventory
can actually be a pretty massive risk
because if the cost of materials goes
down 50% a year and you have two
or three months of inventory versus
11 days, you’ve got a big cost
disadvantage. And you’re
vulnerable to product transitions,
when you can get stuck with
obsolete inventory.” – Michael Dell
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
30. Build-to-order model (“direct
business model”) eliminates virtually
all inventory
Savings on supply purchases
Reduces risk from obsolescence
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
31. SKUs Volume/SKU Cost (total) Inventory (% Inventory ($)
(total) volume)
1 1,000,000 $10 100,000 (10%) $1,000,000
(1,000,000) ($10,000,000)
1,000 5,000 (500,000) $10 10,000 (2%) $100,000
($5,000,000)
Half the production volume, but efficiency yields $900,000 in savings
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
32. 4Q11 4Q11 Market 4Q10 4Q10 Market 4Q11-4Q10
Company Shipments Share (%) Shipments Share (%) Growth (%)
HP 14,712,266 16.0 17,554,181 18.8 -16.2
Lenovo 12,931,136 14.0 10,516,772 11.3 23.0
Dell 11,633,880 12.6 10,796,317 11.6 7.8
Acer Group 9,823,214 10.7 12,043,606 12.9 -18.4
Asus 6,243,118 6.8 5,180,913 5.5 20.5
Others 36,827,666 40.0 37,358,786 40.0 -1.4
Total 92,171,280 100.0 93,450,575 100.0 -1.4
Preliminary Worldwide PC Vendor Unit Shipment Estimates for 4Q11 (Units)
Confidential Information of Joseph Hazani
http://www.gartner.com/it/page.jsp?id=18935 (joseph@ledperformanceconsultant.com)
23
33. Value in creating consumer
electronic supply chain for
Lighting Industry
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
34. Dell’s SCM facilitated consumer demand for greater
computer performance through increasing the
obsolescence rate
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
35. 4 4
1 1
Lighting Lighting
OEM OEM
3 3
2 2
Light
Diffusers Dist/Rep Plastics Dist/Rep
two parallel supply chains for a product combined
increases distribution channels for each input
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
36. 7
8 2 supply inputs
9 ~10 (2.5x) distribution outputs
Lighting
OEM 6
4 5
Diffusers Lighting
Dist/Rep
OEM
10
Reverse distribution
2
1 3
Plastics
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
37. Increased supply management
means faster product
development (greater “velocity”)
Faster product development
means faster consumer feedback
mechanism: faster obsolescence
rate
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
38. Market Momentum is Exponential
600
500 y = 2.0697e0.7771x
439 R² = 0.9979
400
Distribution Outputs
300
216 Expon. (Distribution
200 Outputs)
100 105
50
0 4 10 23
1 2 3 4 5 6 7
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
40. To remain competitive, market will
reward greater momentum: scaling
with more inputs & outputs
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
41. Conflicting supply-chains cause
friction (decreasing momentum)
Therefore, component competition
will be based on best consolidation
efforts
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
43. LED Energy Savings is a Red Herring
LEDs are Performance-based
electronics (“Consumer
Electronics”)
Value in increasing market
momentum for consumer
electronics (see: Dell)
Value in enterprise software
solutions that increases market
momentum
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)
44. Opportunity for Enterprise
Software (assessed at 5% of annual
market costs):
1. Now: $25 Million
2. 2016: $250 Million
3. 2020: $400 Million
Confidential Information of Joseph Hazani
(joseph@ledperformanceconsultant.com)