This document provides an introduction to programming, including definitions of key concepts such as programs, programming languages, and different types of programming languages. It defines a program as a set of instructions that tells a computer how to perform a task. Programming languages provide a communication link between humans and computers and are defined by their syntax and semantics. Programming languages can be low-level like machine language and assembly language, which are close to hardware, or high-level languages which are more abstract and portable. The document discusses advantages and disadvantages of different language types and provides a brief history of programming language development.
CHF Lesson 2 - Software and Software Categories.pdfROWELL MARQUINA
Software is the collection of data, programs, procedures, routines and instructions that tell a computer or electronic device how to run, work and execute specific tasks.
System software is a program intended to ensure that the computer's hardware and applications installed to it are running smoothly and efficiently.
Application software is a type of computer program that performs a specific personal, educational, or business function.
SOFTWARE DISTRIBUTION MODELS
SOFTWARE INSTALLATION MODELS
DSA Lesson 2 - Algorithm and Flowcharting.pdfROWELL MARQUINA
An algorithm refers to a series of well-defined instructions on how to accomplish a task or solve a specific problem.
Giving directions on how to get to somebody’s house is an algorithm.
The steps on how to change a light bulb is an algorithm.
The steps to compute the for average is also an algorithm.
In creating an algorithm, it is very important to determine the exact goal or expected product first. The goal or expected product of the algorithm is called OUTPUT.
After determining the output, the next step is to identify the necessary materials or elements needed to accomplish the task. The elements needed for the program is called INPUT.
If the input and output are already identified, it is time to list the steps needed to accomplish the task. The steps needed to accomplish the task is referred to as the PROCESS.
CHF Lesson 2 - Software and Software Categories.pdfROWELL MARQUINA
Software is the collection of data, programs, procedures, routines and instructions that tell a computer or electronic device how to run, work and execute specific tasks.
System software is a program intended to ensure that the computer's hardware and applications installed to it are running smoothly and efficiently.
Application software is a type of computer program that performs a specific personal, educational, or business function.
SOFTWARE DISTRIBUTION MODELS
SOFTWARE INSTALLATION MODELS
DSA Lesson 2 - Algorithm and Flowcharting.pdfROWELL MARQUINA
An algorithm refers to a series of well-defined instructions on how to accomplish a task or solve a specific problem.
Giving directions on how to get to somebody’s house is an algorithm.
The steps on how to change a light bulb is an algorithm.
The steps to compute the for average is also an algorithm.
In creating an algorithm, it is very important to determine the exact goal or expected product first. The goal or expected product of the algorithm is called OUTPUT.
After determining the output, the next step is to identify the necessary materials or elements needed to accomplish the task. The elements needed for the program is called INPUT.
If the input and output are already identified, it is time to list the steps needed to accomplish the task. The steps needed to accomplish the task is referred to as the PROCESS.
Plummer block, Computer Aided Machine Drawing (CAMD) of VTU Syllabus prepared by Hareesha N Gowda, Asst. Prof, Dayananda Sagar College of Engg, Blore. Please write to hareeshang@gmail.com for suggestions and criticisms.
How Do You Build Software? Software Engineering Practices of an Agile DeveloperLemi Orhan Ergin
These are the slides of my latest talk about agile software engineering practices in Etohum's Software Developers Day. In my talk, I am trying to figure out how to build software by obeying the rules of the nature of software development.
No Silver Bullet - Essence and Accidents of Software EngineeringAditi Abhang
”There is no single development, in either technology or in management technique, that by itself promises even one order of magnitude improvement in productivity, in reliability, in simplicity.”
Visual programming (pemrograman visual) adalah pendekatan dalam pemrograman komputer yang memungkinkan pengguna untuk membuat program melalui antarmuka grafis yang intuitif dan mudah digunakan. Dalam pemrograman visual, pengguna menggambar diagram atau ikon yang merepresentasikan operasi atau fungsi yang ingin dilakukan oleh program, lalu menghubungkannya dengan garis atau panah untuk membentuk alur logika.
Pemrograman visual memiliki beberapa keuntungan dibandingkan dengan pemrograman teks tradisional. Pertama, pemrograman visual lebih mudah dipelajari oleh pemula karena antarmuka grafis yang intuitif. Kedua, pemrograman visual dapat membantu pengguna memvisualisasikan alur program secara keseluruhan, sehingga memudahkan pengguna untuk memahami bagaimana program bekerja. Ketiga, pemrograman visual dapat mempercepat proses pengembangan program karena menghilangkan kebutuhan untuk mengetik kode secara manual.
Contoh dari bahasa pemrograman visual termasuk Scratch, Blockly, dan LabVIEW.
Plummer block, Computer Aided Machine Drawing (CAMD) of VTU Syllabus prepared by Hareesha N Gowda, Asst. Prof, Dayananda Sagar College of Engg, Blore. Please write to hareeshang@gmail.com for suggestions and criticisms.
How Do You Build Software? Software Engineering Practices of an Agile DeveloperLemi Orhan Ergin
These are the slides of my latest talk about agile software engineering practices in Etohum's Software Developers Day. In my talk, I am trying to figure out how to build software by obeying the rules of the nature of software development.
No Silver Bullet - Essence and Accidents of Software EngineeringAditi Abhang
”There is no single development, in either technology or in management technique, that by itself promises even one order of magnitude improvement in productivity, in reliability, in simplicity.”
Visual programming (pemrograman visual) adalah pendekatan dalam pemrograman komputer yang memungkinkan pengguna untuk membuat program melalui antarmuka grafis yang intuitif dan mudah digunakan. Dalam pemrograman visual, pengguna menggambar diagram atau ikon yang merepresentasikan operasi atau fungsi yang ingin dilakukan oleh program, lalu menghubungkannya dengan garis atau panah untuk membentuk alur logika.
Pemrograman visual memiliki beberapa keuntungan dibandingkan dengan pemrograman teks tradisional. Pertama, pemrograman visual lebih mudah dipelajari oleh pemula karena antarmuka grafis yang intuitif. Kedua, pemrograman visual dapat membantu pengguna memvisualisasikan alur program secara keseluruhan, sehingga memudahkan pengguna untuk memahami bagaimana program bekerja. Ketiga, pemrograman visual dapat mempercepat proses pengembangan program karena menghilangkan kebutuhan untuk mengetik kode secara manual.
Contoh dari bahasa pemrograman visual termasuk Scratch, Blockly, dan LabVIEW.
This was my presentation at a workshop organized by the Universal Service Provision Fund (USPF). The theme of the event was "Workshop on Information and communication technology adoption, utilization and sustainability", South-South zone 2019.
Software is a set of programs, which is designed to perform a well-defined function. A program is a sequence of instructions written to solve a particular problem.
understand the concept of formulas in Excel.
learn the basic syntax for creating formulas.
practice using common functions
apply formulas to solve real-world problems or analyze
provided datasets.
understand the concept of formulas in Excel.
learn the basic syntax for creating formulas.
practice using common functions
apply formulas to solve real-world problems or analyze
provided datasets.
PURPOSE OF EXCEL FORMULA
Automate Calculations
Formulas replace manual calculations, making your spreadsheet dynamic and responsive to changes in input data.
Data Analysis
Formulas enable you to extract insights from raw data, such as finding averages, identifying trends, or comparing values.
Decision Making
Formulas can use conditional logic to help you make
data-driven decisions.
Operators refers to symbols that indicate the arithmetic operation to be performed in a formula.
Cell References also known as “cell address” is a component of the excel formula that indicates the location of data within the spreadsheet.
Functions are predefined formulas in Excel that perform specific calculations which streamlines complex operations.
Relative references are cell references in formulas that adjust automatically when you copy or fill the formula into other cells.
An absolute reference is a cell reference in an Excel formula that remains fixed when the formula is copied or filled into other cells.
A function requires syntax which refers to the exact way a function must be written to perform properly.
The SUM function adds values from individual cells, cell ranges, multiple cell ranges or its combination.
The SUMIF function is used to compute for the sum of numbers inside a specified range that satisfies specific conditions.
The SUMIFS function, one of the Excel functions that adds all the numbers that meet multiple criteria.
The COUNT function calculates the total number of cells that contain numerical values, including numbers found inside the given list of inputs.
The COUNTIF function is used to count numbers of values within a specified range that satisfies specific criteria.
The COUNTIFS function is function in Excel that tallies the number of cells within a specified range that meet one or more specified conditions.
HCI Lesson 2 - Components of Human-Computer Interaction (HCI).pdfROWELL MARQUINA
At the end of the lesson, students will be able to:
understand the components of human-computer interaction,
explain different types of interaction styles,
evaluate the evolving scope of HCI.
Interface in HCI
An interface is the point of contact and communication between a human user and a computer system. It consists of the hardware and software elements that enable a user to input commands or data, receive outputs, and interact with the system to accomplish their goals.
Types of Interfaces in HCI
Graphical User Interfaces (GUIs): These are the most common today, featuring visual elements like windows, icons, menus, and pointers (WIMP). They are intuitive and generally easier to learn.
Command-Line Interfaces (CLIs): Primarily text-based. Users give commands through typed instructions. While less intuitive initially, they can be powerful for experienced users.
Voice User Interfaces (VUIs): Enable interaction via spoken commands and may offer speech-based output. Think of systems like Siri or Alexa.
Natural User Interfaces (NUIs): Aim to create more seamless interaction through gestures, touch, or even body movement recognition (e.g., some gaming systems).
Tangible User Interfaces (TUIs): Involve physical objects or environments as a way to control or manipulate digital information.
Key Roles of an Interface in HCI
Input: Allows users to provide commands, data, or instructions to the system (keyboard, mouse, microphone, touchscreens, etc.).
Output: How the system presents information back to the user (monitors, speakers, visual feedback, haptic responses, etc.).
Facilitation: Interfaces bridge the gap between how humans think and how computers operate, aiding in task completion.
Good HCI Interface Design
Intuitive: Easy to understand and use, even for novice users.
Efficient: Allows users to accomplish tasks quickly with minimal errors.
Responsive: Provides timely feedback to user actions.
Aesthetic: Visually pleasing and aligns with the overall system design.
Context in HCI
Context refers to the circumstances or environment within which an interaction between a user and a computer system takes place. It encompasses a wide range of factors that can influence how a user experiences and interacts with technology.
Key Types of Context in HCI
Physical Context:
Location (home, office, outdoors)
Ambient conditions (noise, lighting, temperature)
Devices being used (desktop, smartphone, wearable tech)
Social Context:
Presence of others (working solo or collaboratively)
Social roles and relationships (e.g., teacher and student)
Cultural norms
Task Context:
The user's goals and intentions
The steps involved in completing a task
The tools or resources available
Temporal Context:
Time of day
Duration of interaction
Interruptions or distractions
Informational Context:
Data the user is working with
Previous interactions with the system
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdfROWELL MARQUINA
At the end of the lesson, students will be able to:
define Human-Computer Interaction (HCI),
identify the core focus areas of Human-Computer Interaction,
explain User-Centered Design and its importance.
DS Lesson 2 - Subsets, Supersets and Power Set.pdfROWELL MARQUINA
At the end of the session, students will be able to:
define the terms subsets and supersets;
identify subsets and superset
explain the concept of a power set and its notation.
find the power set of a given finite set.
According to Jerry Durlak, privacy is a fundamental aspect of human existence that encompasses four distinct components referred to as rights (solitude, anonymity, intimacy, reserve). These rights can be categorized into two.
The first category comprises three rights that an individual can employ to restrict access to individuals seeking personal information.
The second category refers to the rights that an individual can utilize to manage the quantity and significance of personal information disclosed.
Philosophers struggle with the task of precisely defining privacy. Discussions concerning privacy mostly focus on the concept of access, which refers to either being physically close to a person or having knowledge about that person.
A conflict arises between the individual’s right to limit access to oneself and the external parties’ right to obtain access, involving their desires, rights, and obligations.
Intellectual Property Rights (IPRs) are rights established to safeguard moral and economic entitlements of an individual or group for their original ideas, inventions, or creative expressions.
Intellectual Property (IP) is composed of creations, including but not limited to inventions, literary and artistic works, designs, symbols, names, pictures, computer code, etc.
Before the acknowledgment of intellectual properties, only tangible and material properties were given value and protection by the state. The intrinsic value of intangible properties such as ideas, inventions, and creative expressions was only later recognized because of their ability to satisfy the user.
ITSP Lesson 1 - Ethics and Ethical Theories.pdfROWELL MARQUINA
Ethics originated from the Greek word "ethos," meaning "way of living." It is a branch of philosophy that deals with the study how people behave especially in social situations.
Ethics is a set of firmly established principles that determine the distinction between morally correct and incorrect actions.
ITSP Lesson 1 - Ethics and Ethical Theories.pdfROWELL MARQUINA
Ethics originated from the Greek word "ethos," meaning "way of living." It is a branch of philosophy that deals with the study how people behave especially in social situations.
It is founded on logical reasons behind our moral choices.
Ethics is a set of firmly established principles that determine the distinction between morally correct and incorrect actions.
It revolves around concepts such as human rights, responsibilities, societal welfare, fairness, justice, and certain virtues.
ETHICAL PRINCIPLES:
Beneficence is an ethical principle which focuses on taking actions that will benefit or “do good” to other people.
It can be classified as kindness, charity, compassion, or mercy towards other people.
Nonmaleficence is the ethical principle of avoiding causing intentional harm toward another human being.
The principle asserts that causing harm to others, even for the greater good, is unacceptable.
Autonomy refers to the ethical principle that acknowledges people’s right to make choices for themselves based on their values and beliefs.
Justice is an ethical principle that emphasizes on the significance of equal treatment for all individuals, irrespective of their social status or position.
Utilitarianism is an ethical theory that places the ethical value of an action based on its consequences.
In utilitarianism, moral judgments and actions are determined by their ability to produce the most favorable outcomes while immoral decisions and actions are characterized by their tendency to yield unpleasant consequences.
Deontology is an ethical theory that states that adherence to a universally accepted set of rules determines what is morally right or wrong.
Actions that follow the developed set of rules can be seen as moral, but actions that go against them is considered immoral.
The rights-based ethical theory refers to the standards set for evaluating the rightness or wrongness of an action or decision based on how it respects a person's rights.
Any actions or decisions that violates the rights of an individual is considered an immoral act.
Virtue-based ethics pertains to an ethical theory in which the determination of moral correctness is based on an examination of the qualities and attributes associated with a morally upright and dignified individual.
Actions that adhere to the qualities determined by society are considered moral acts, while actions that do not adhere to the said qualities are considered immoral.
Animation Lesson 4 - Tools and Equipment in Animation.pdfROWELL MARQUINA
familiarize with the tools, equipment, and paraphernalia used in animation,
appreciate the benefit of proper maintenance of tools, equipment, and paraphernalia;
identify common malfunctions in tools, equipment, and paraphernalia;
discuss the guidelines in proper use and maintenance of tools, equipment, and paraphernalia; and
demonstrate the procedures in accomplishing forms (job order slips, requisition slips, borrower’s slips, and incident reports).
DSA Lesson 1 - Introduction to Data Structures.pdfROWELL MARQUINA
Data is a set of discrete or continuous values that convey information by representing quantity, quality, fact, statistics, or other basic units of meaning, or simply sequences of symbols that can be formally understood.
Data Structure is a branch of computer Science that deals with how data can be stored, organized, and retrieved in the most efficient way possible.
There are six operations involving Data Structures:
▪ Searching
▪ Insertion
▪ Deletion
▪ Sorting
▪ Merging
▪ Updating
Primitive Data Structures is the most elementary kind of data used in programming language composed of character, number, and Boolean.
There are eight types of primitive data structures:
▪ byte
▪ short
▪ int
▪ long
▪ float
▪ double
▪ char
▪ boolean
Non-Primitive Data Structures are objects or instances constructed by the programmer rather than defined by the programming language.
There are five types of Linear Data Structures:
▪ Array
▪ Stack
▪ Queue
▪ Linked List
▪ Hash Tables
There are Two Types of
Non-Linear Data Structures:
▪ Tree Data Structure
▪ Graph Data Structure
A conditional statement in Python programming is a type of statement that compares the values of two or more operands.
An operand refers to the data that is used by the program either for comparison, manipulation, or mathematical operation. An operand can be:
▪ a value inputted by the user
▪ a value set by the programmer inside the program
The results of the comparison using a conditional statement can result to either a TRUE or FALSE response.
▪ The TRUE response signifies that the values of operands are equal to one another or it is within the range provided by one of the operands.
▪ The FALSE response indicates that the values of operands are not equal to one another or it is outside the range provided by one of the operands.
Animation Lesson 3 - Occupational Health and Safety Procedures.pdfROWELL MARQUINA
discuss what is hazard and risk,
classify the types of workplace hazards,
define occupational health and safety procedures,
Identify the methods implemented by the company in controlling the hazards.
Animation Lesson 2 - Environment and Market (Updated).pdfROWELL MARQUINA
discuss what environment and market;
identify industries that employs animators;
identify the market players and their roles;
know how to identify customer’s profile;
make use of consumer analysis to identify customer’s needs and wants;
conduct consumer/market analysis.
enumerate animation studio products and services;
Animation Lesson 3 - Occupational Health and Safety Procedures.pdfROWELL MARQUINA
discuss what is hazard and risk,
classify the types of workplace hazards,
define occupational health and safety procedures,
Identify the methods implemented by the company in controlling the hazards.
Personal Entrepreneurial Competencies (PECs).pdfROWELL MARQUINA
define PECS;
discuss what is characteristics, skill, and lifestyle;
enumerate the personal characteristics that an aspiring animator must possess;
itemize the skills required in pursuing a career in animation; and
align individual traits, characteristics, attributes, and skills to that of and an animation practitioner.
After going through this module, you are expected to:
1. identify industries that employs animators;
2. enumerate products and services that an animation studio can offer;
3. know how to identify customer’s profile;
4. make use of consumer analysis to identify customer’s needs and wants; and
5. conduct consumer/market analysis.
1.discuss what is a Scanner class;
2.know how to import and make use of the Scanner class;
3.select the appropriate input methods in accommodating user’s input/s; and
4.create a program that will require input/s from the user.
At the end of the session, you will be able to:
1.define data and data type;
2.categorize data according to classifications;
3.discuss what is a variable and its importance; and
4.declare and initialize variables and use it in a Java program.
At the end of the session, you will be able to:
1. differentiate print and println from one another;
2. display text on screen using print and println;
3. discuss what is a comment in Java and what it is used in a program; and
4. demonstrate how to display comments on a Java program;
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
3. WHAT IS A PROGRAM?
A program refers to a set
of commands that
provide instructions to a
computer on how to
perform a specific task.
IMAGE SOURCE: https://beginnersbook.com/wp-content/uploads/2019/07/Java_program_simple_interest.jpg
4. WHAT IS A PROGRAM?
A program can instruct the
computer to:
▪ display message on screen
▪ get input from users
▪ perform arithmetic operations
▪ compare values
▪ perform iterations
IMAGE SOURCE: https://beginnersbook.com/wp-content/uploads/2019/07/Java_program_simple_interest.jpg
6. WHAT IS A PROGRAMMING LANGUAGE?
A programming language is an
artificial language developed to
provide a communication link
between humans and computers.
IMAGE SOURCE: https://miro.medium.com/v2/resize:fit:820/1*v5NRqLcyXIVNaG5KLjKIQA.png
Like a formal language, a
programming language is defined
by its two components: syntax
(form) and semantics (meaning).
7. WHAT IS A PROGRAMMING LANGUAGE?
Syntax refers to the principle
that guides how a specific
instruction is written.
IMAGE SOURCE: https://cs.lmu.edu/~ray/images/ast.png
It details the rules on how
symbols, punctuations,
and words are used in a
programming language to
write a command.
8. WHAT IS A PROGRAMMING LANGUAGE?
Semantics refers to an
analytical system that conveys
or defines the meaning of a
written instruction in a
program.
IMAGE SOURCE: https://www.baeldung.com/wp-content/uploads/sites/4/2022/10/Lexic2.png
It is used to generate and
validate meanings of a
piece of code.
10. TYPES OF PROGRAMMING LANGUAGE
Programming Language
can be classified into two
generations:
▪ Low Level Language
▪ High Level Language
IMAGE SOURCE: https://miro.medium.com/v2/resize:fit:624/1*icGwCEFBJTjIPcslHeL1Eg.png
12. LOW LEVEL LANGUAGE
Low Level Language is a type
of programming language
that is machine dependent
and provides little to no
abstraction in the interface
between programmers and
the machine.
IMAGE SOURCE: https://www.deviantart.com/findingnull/art/Binary-GIF-871009093
13. HIGH-LEVEL LANGUAGE
A High-Level Language is a user-
friendly programming language that
allows programmers to write their
programs using natural language.
IMAGE SOURCE: https://beginnersbook.com/wp-content/uploads/2019/07/Java_program_simple_interest.jpg
Since High-Level Language is
independent of the computer
hardware architecture, the syntax is
created in a form that can be easily
read and understood by humans.
15. MACHINE LANGUAGE
Machine Language is a type of
low-level programming
language where the
instructions are written using
binary code.
A binary code refers to a string
of 1s (high voltage) and 0s (low
or no voltage).
IMAGE SOURCE: https://www.dspguide.com/graphics/T_4_3.gif
16. MACHINE LANGUAGE
To understand binary coding,
consider the use of 7–segment
LED Display.
IMAGE SOURCE: https://www.cs.mtsu.edu/~xyang/images/computer-language-types.png
The zero represents a situation
where there is no voltage that
entered the circuit or an “off”
state while one represents an
“on” state where a high voltage
entered the circuit.
19. ASSEMBLY LANGUAGE
Assembly Language is a type of low-
level programming language that uses
mnemonics to act as an intermediary
interface between human and
computers.
IMAGE SOURCE:
https://isaaccomputerscience.org/api/v3.5.0/api/images/content/computer_science/computer_systems/progr
amming_languages/figures/isaac_cs_sys_proglang_simulator_display_if.png
Mnemonics refers to a string of
letters that represents a shortened
version of the instruction.
21. ASSEMBLY LANGUAGE
An assembler is needed to make the computer understand the
codes written by the programmer. Assembler is a program that
converts a predefined language to machine language so that
the computer will understand what an abstracted code means.
IMAGE SOURCE: https://i.stack.imgur.com/ZF4p5.jpg
22. ADVANTAGES OF LOW-LEVEL LANGUAGE
▪ The instructions are executed quickly since
there is minimal need for translation between
languages.
▪ The instructions require very small amount of
space in the memory.
▪ It offers a high level of security since the
program is written in a language that is
difficult to modify because of its complexity.
23. DISADVANTAGES OF LOW-LEVEL LANGUAGE
▪ It is very difficult to code using binary code.
▪ It is difficult to debug and maintain.
▪ Programs written in low-level languages are not portable
since they are written for specific specific computers.
25. HIGH-LEVEL LANGUAGE
Procedural Language is a high-level programming
language where the program is executed using a sequence
or a strict series of steps.
Object-Oriented Language is a high-level programming
language where the program is executed based on the
interaction of functions between objects.
26. ADVANTAGES OF HIGH-LEVEL LANGUAGE
▪ High-Level Languages are easy to understand
because it uses English language.
▪ Programs written using High-Level Languages
are portable meaning they can be used in
other computers aside from the computer
where the codes are written.
▪ Programs written in High-Level languages are
easier to debug and maintain.
27. DISADVANTAGES OF HIGH-LEVEL LANGUAGE
▪ Instructions written using High-Level Language
programs takes longer time to process
because of the translation process from
human language to machine language.
▪ Programs written in high-level language
consumes a larger amount of memory
compared to Lower-Level programs because
of the interpreters, compilers, and other
processes needed for ease of translation.
30. INTRODUCTION TO
PROGRAMMING
MR. ROWELL L. MARQUINA
Professional Lecturer,
Polytechnic University of the Philippines
Email Address:
rowell.marquina001@deped.gov.ph
sirrowellmarquina@gmail.com
rmarquina@mitis.edu.ph