This sample offers insights of how qubit superpositions and entanglements are possible and how these are represented in statevectors, blockspheres and amplitudes when statevector representations are not possible
This is quantum single qubit gate operations: The Pauli Gates: X-Gate,Y & Z-Gates , The Hadamard Gate, The P-gate,The I, S and T-gates and The General U-gate
This is a simple quantum circuit simulator example in Qsikit. This was run using Anaconda and Jupyter Notebook. This example demonstrates the first level of quantum circuit design, code and run in a notebook.
This document demonstrates various quantum neural network architectures implemented using the Qiskit Machine Learning library. It shows how to construct OpflowQNN, TwoLayerQNN, CircuitQNN models and perform forward and backward passes on random inputs. It also explores using different backends like statevector simulator and qasm simulator, and different outputs like samples, probabilities or parity functions.
Yurii Shevtsov "V8 + libuv = Node.js. Under the hood"OdessaJS Conf
Node.js uses the V8 JavaScript engine and the libuv library. V8 compiles JavaScript to machine code for high performance, while libuv provides asynchronous I/O capabilities. Node.js initializes V8, wraps libuv, and provides a module system to load code, with modules defined as functions that export values. Native modules can extend Node.js using NAN or the newer N-API for direct access to V8 from C/C++ code.
This document discusses using JavaScript to modify JavaScript code. It introduces AST (Abstract Syntax Tree) and how it can be used to parse, find, replace and print code. It provides examples of using tools like jscodeshift and recast to make transformations like converting React classes or formatting code. Key challenges discussed are parsing code, finding and replacing nodes in the AST, and printing modified code back out.
This document discusses the event loop in Node.js, which allows JavaScript to perform non-blocking I/O operations and asynchronous code. It explains that the event loop handles pending callbacks, timers, and incoming connections in different phases. Common asynchronous functions like setTimeout(), setImmediate(), and process.nextTick() are explained in terms of how they interact with the event loop. Finally, some common misconceptions about the event loop and asynchronous operations in Node.js are addressed.
This is quantum single qubit gate operations: The Pauli Gates: X-Gate,Y & Z-Gates , The Hadamard Gate, The P-gate,The I, S and T-gates and The General U-gate
This is a simple quantum circuit simulator example in Qsikit. This was run using Anaconda and Jupyter Notebook. This example demonstrates the first level of quantum circuit design, code and run in a notebook.
This document demonstrates various quantum neural network architectures implemented using the Qiskit Machine Learning library. It shows how to construct OpflowQNN, TwoLayerQNN, CircuitQNN models and perform forward and backward passes on random inputs. It also explores using different backends like statevector simulator and qasm simulator, and different outputs like samples, probabilities or parity functions.
Yurii Shevtsov "V8 + libuv = Node.js. Under the hood"OdessaJS Conf
Node.js uses the V8 JavaScript engine and the libuv library. V8 compiles JavaScript to machine code for high performance, while libuv provides asynchronous I/O capabilities. Node.js initializes V8, wraps libuv, and provides a module system to load code, with modules defined as functions that export values. Native modules can extend Node.js using NAN or the newer N-API for direct access to V8 from C/C++ code.
This document discusses using JavaScript to modify JavaScript code. It introduces AST (Abstract Syntax Tree) and how it can be used to parse, find, replace and print code. It provides examples of using tools like jscodeshift and recast to make transformations like converting React classes or formatting code. Key challenges discussed are parsing code, finding and replacing nodes in the AST, and printing modified code back out.
This document discusses the event loop in Node.js, which allows JavaScript to perform non-blocking I/O operations and asynchronous code. It explains that the event loop handles pending callbacks, timers, and incoming connections in different phases. Common asynchronous functions like setTimeout(), setImmediate(), and process.nextTick() are explained in terms of how they interact with the event loop. Finally, some common misconceptions about the event loop and asynchronous operations in Node.js are addressed.
This document discusses cocos2d and some of its features. It mentions cocos2d version 1.0.0 rc and provides contact information for the developer. It also briefly describes CCSprite, CCNode, OpenGL drawing, reordering child nodes, vertexZ values, and setting the projection to 2D. Actions like CCMoveTo and sequences are mentioned. Tiled map support, vertexZ, and layers are covered.
In this webinar, Michael DeSa will provide you with a detailed overviwe of Alert Handlers with Kapacitor. An AlertNode can trigger an event of varying severity levels, and pass the event to alert handlers. Different event handlers can be configured for each AlertNode. Some handlers like Email, HipChat, Sensu, Slack, OpsGenie, VictorOps, PagerDuty, Telegram and Talk have a configuration option 'global' that indicates that all alerts implicitly use the handler.
This document defines a SafeMath contract and an ERC223Token contract that inherits from SafeMath. SafeMath contains functions for safely performing math operations to prevent overflows. ERC223Token implements an ERC223 compliant token with functions for transferring tokens, checking balances, and getting token details. It uses the SafeMath functions for math operations and emits a Transfer event during token transfers.
This document provides instructions for creating composite functions using a TI-Nspire calculator. It shows how to input a linear function, compose it with quadratic functions, and modify the original linear function by adding 1. The keystrokes demonstrate composing a linear function f(x)=x with quadratic functions and altering f(x) to f(x)+1.
This document summarizes key aspects of how JavaScript works behind the scenes. It explains that JavaScript code is executed through an execution context stack, with each function call creating a new context on the stack. Each context contains a variable object and scope chain. It also discusses how function scope is determined by the scope chain and how 'this' is determined based on how a function is called. The document concludes by explaining closures and how functions can remember variables from the scope they were defined in.
This document provides an introduction and overview of NS2, a network simulator. It discusses what network simulation is and the architecture of NS2. It also provides sample NS2 input scripts written in Tcl that define nodes, links, and events. Sample output from NS2 simulations include packet trace files and NAM trace files that can be visualized. The document describes how to learn and use Tcl to write NS2 scripts, run simulations, extract data, and plot results. It also gives examples of basic Tcl commands and programming constructs like variables, control flow, arrays, and procedures.
This document discusses binding variables between C++ and OTcl in NS2 simulations. It describes creating a C++ class with a variable and binding it to an OTcl variable using the bind() function in the C++ constructor. This allows modifying the variable from either domain. The document provides an example of binding a C++ variable "count_" to the OTcl variable "ocount_", creating an OTcl object, and verifying it can get and set the shared variable from OTcl or by changing it in C++.
This document provides an introduction to the network simulator NS-2 and its scripting language OTcl. It discusses basics of OTcl like classes, objects, and methods. It provides examples of creating classes and objects in OTcl. It also explains the structure of an NS-2 simulation including creating the event scheduler, topology, sending data using UDP/TCP, and tracing outputs. Suggested readings on OTcl and NS-2 tutorials are provided at the end.
The document contains 3 C++ programs:
1. A program that takes user input for a height and prints an hourglass pattern of that height using asterisks.
2. A program that takes user input for a number of asterisks and prints a diamond pattern of that size.
3. A program that takes the same user input as #2 and prints a pattern resembling the flag of Nepal by stacking 4 diamond patterns on top of each other.
This document provides an introduction to the scripting languages AWK and GNUPlot. It discusses basics of AWK including its structure and examples of using AWK to parse text files and extract fields. It also covers basics of GNUPlot including how to generate different plot types from data files and customize plots. Finally, it provides examples of using AWK to analyze network simulation trace files generated by NS-2 to calculate packet statistics and average delay.
The document shows code for incrementing a counter stored in a file. It reads the current count from "count.txt", converts it to an integer, increments it by 1, and writes it back to the file. It uses locking to prevent multiple processes from writing to the file concurrently.
This document provides an overview of Rubinius, an implementation of the Ruby programming language that uses Just-In-Time (JIT) compilation. It discusses key aspects of Rubinius including its virtual machines, garbage collectors, bytecode compilers, core library, primitives systems, JIT compilers, and use of Rubyspec for testing. It also briefly describes the compacting generational garbage collector, inline caching, call counting, and debugging and profiling capabilities. The document encourages contributing to Rubinius and shares an example commit adding POSIX safety checks to the Process module.
function* - ES6, generators, and all that (JSRomandie meetup, February 2014)Igalia
By Andy Wingo.
Andy will talk about forthcoming iterator and generator in JS:
1. Generator and interator seen from a JS developer perspective. What it is, why should I care?
2. Generator and iteragtor seen by a JS engine developer perspective. What does it imply in term for C++, performance consideration, how different is it from what exists already...
3. What does it means to implement new features in V8 (question driven)
This document provides an overview of ReactiveX (Rx), which is an API for asynchronous programming using observable streams. It discusses key Rx concepts like Observables, which represent sets of values over time that can be subscribed to; Operators, which allow transforming, combining, and manipulating observable streams; and Subjects, which act as both Observable and Observer and are useful for multicasting streams. The document provides examples of using Rx in autocomplete applications and discusses Schedulers, which define the execution context for asynchronous operations in Rx. Overall, the document serves as a high-level introduction to the reactive programming paradigm and Rx library.
Exploring Color Spaces with Gesture Tracking and Smart Bulbs (Distill 2014)Daniel Luxemburg
The document discusses exploring different color spaces like RGB, HSL, and HSV by tracking hand gestures with a Leap Motion controller and controlling LIFX smart bulbs. Code examples are provided in Ruby and JavaScript to discover LIFX bulbs, map hand position data to color values, and set the bulb colors. The goal is to enable new ways of interacting with technology through gesture control and different representations of color.
New and delete are a thing of the past, with the new features in C++14 and beyond (such as smart pointers and move semantics) memory management is easier and safer. Learn how to use the new constructs of C++14 and beyond to create, move, and free objects in a safer and more efficient manner.
The rule of three (also known as the Law of The Big Three or The Big Three) is a rule of thumb in C++ that claims that if a class defines one of the following it should probably explicitly define all three: Copy constructor, Copy assignment operator, Destructor
The document contains code snippets for various sorting and searching algorithms including bubble sort, insertion sort, selection sort, and linear search. It also includes code to find the sum and largest value of arrays, determine angle type, and solve quadratic equations.
Richard Fridrich: Třesení stromem v JavaScriptuDevelcz
This document discusses tree shaking, which is a technique used in JavaScript module bundlers like Webpack to remove unused code from bundles. It shows how Babel and Webpack can be used together for tree shaking. Specifically, it demonstrates configuring Babel and Webpack to remove an unused function called square from the output bundle.
This is my personal notes related to quantum computing, collected as part of my study. It offers quantum circuits, quantum algorithms, matrix operations, Kronecker, dot products, derivation of Pauli's X, Y , Z gates , preparation of Bell state using Hadamard and CNOT, and finally defines the six quantum states for a qubit
This document discusses cocos2d and some of its features. It mentions cocos2d version 1.0.0 rc and provides contact information for the developer. It also briefly describes CCSprite, CCNode, OpenGL drawing, reordering child nodes, vertexZ values, and setting the projection to 2D. Actions like CCMoveTo and sequences are mentioned. Tiled map support, vertexZ, and layers are covered.
In this webinar, Michael DeSa will provide you with a detailed overviwe of Alert Handlers with Kapacitor. An AlertNode can trigger an event of varying severity levels, and pass the event to alert handlers. Different event handlers can be configured for each AlertNode. Some handlers like Email, HipChat, Sensu, Slack, OpsGenie, VictorOps, PagerDuty, Telegram and Talk have a configuration option 'global' that indicates that all alerts implicitly use the handler.
This document defines a SafeMath contract and an ERC223Token contract that inherits from SafeMath. SafeMath contains functions for safely performing math operations to prevent overflows. ERC223Token implements an ERC223 compliant token with functions for transferring tokens, checking balances, and getting token details. It uses the SafeMath functions for math operations and emits a Transfer event during token transfers.
This document provides instructions for creating composite functions using a TI-Nspire calculator. It shows how to input a linear function, compose it with quadratic functions, and modify the original linear function by adding 1. The keystrokes demonstrate composing a linear function f(x)=x with quadratic functions and altering f(x) to f(x)+1.
This document summarizes key aspects of how JavaScript works behind the scenes. It explains that JavaScript code is executed through an execution context stack, with each function call creating a new context on the stack. Each context contains a variable object and scope chain. It also discusses how function scope is determined by the scope chain and how 'this' is determined based on how a function is called. The document concludes by explaining closures and how functions can remember variables from the scope they were defined in.
This document provides an introduction and overview of NS2, a network simulator. It discusses what network simulation is and the architecture of NS2. It also provides sample NS2 input scripts written in Tcl that define nodes, links, and events. Sample output from NS2 simulations include packet trace files and NAM trace files that can be visualized. The document describes how to learn and use Tcl to write NS2 scripts, run simulations, extract data, and plot results. It also gives examples of basic Tcl commands and programming constructs like variables, control flow, arrays, and procedures.
This document discusses binding variables between C++ and OTcl in NS2 simulations. It describes creating a C++ class with a variable and binding it to an OTcl variable using the bind() function in the C++ constructor. This allows modifying the variable from either domain. The document provides an example of binding a C++ variable "count_" to the OTcl variable "ocount_", creating an OTcl object, and verifying it can get and set the shared variable from OTcl or by changing it in C++.
This document provides an introduction to the network simulator NS-2 and its scripting language OTcl. It discusses basics of OTcl like classes, objects, and methods. It provides examples of creating classes and objects in OTcl. It also explains the structure of an NS-2 simulation including creating the event scheduler, topology, sending data using UDP/TCP, and tracing outputs. Suggested readings on OTcl and NS-2 tutorials are provided at the end.
The document contains 3 C++ programs:
1. A program that takes user input for a height and prints an hourglass pattern of that height using asterisks.
2. A program that takes user input for a number of asterisks and prints a diamond pattern of that size.
3. A program that takes the same user input as #2 and prints a pattern resembling the flag of Nepal by stacking 4 diamond patterns on top of each other.
This document provides an introduction to the scripting languages AWK and GNUPlot. It discusses basics of AWK including its structure and examples of using AWK to parse text files and extract fields. It also covers basics of GNUPlot including how to generate different plot types from data files and customize plots. Finally, it provides examples of using AWK to analyze network simulation trace files generated by NS-2 to calculate packet statistics and average delay.
The document shows code for incrementing a counter stored in a file. It reads the current count from "count.txt", converts it to an integer, increments it by 1, and writes it back to the file. It uses locking to prevent multiple processes from writing to the file concurrently.
This document provides an overview of Rubinius, an implementation of the Ruby programming language that uses Just-In-Time (JIT) compilation. It discusses key aspects of Rubinius including its virtual machines, garbage collectors, bytecode compilers, core library, primitives systems, JIT compilers, and use of Rubyspec for testing. It also briefly describes the compacting generational garbage collector, inline caching, call counting, and debugging and profiling capabilities. The document encourages contributing to Rubinius and shares an example commit adding POSIX safety checks to the Process module.
function* - ES6, generators, and all that (JSRomandie meetup, February 2014)Igalia
By Andy Wingo.
Andy will talk about forthcoming iterator and generator in JS:
1. Generator and interator seen from a JS developer perspective. What it is, why should I care?
2. Generator and iteragtor seen by a JS engine developer perspective. What does it imply in term for C++, performance consideration, how different is it from what exists already...
3. What does it means to implement new features in V8 (question driven)
This document provides an overview of ReactiveX (Rx), which is an API for asynchronous programming using observable streams. It discusses key Rx concepts like Observables, which represent sets of values over time that can be subscribed to; Operators, which allow transforming, combining, and manipulating observable streams; and Subjects, which act as both Observable and Observer and are useful for multicasting streams. The document provides examples of using Rx in autocomplete applications and discusses Schedulers, which define the execution context for asynchronous operations in Rx. Overall, the document serves as a high-level introduction to the reactive programming paradigm and Rx library.
Exploring Color Spaces with Gesture Tracking and Smart Bulbs (Distill 2014)Daniel Luxemburg
The document discusses exploring different color spaces like RGB, HSL, and HSV by tracking hand gestures with a Leap Motion controller and controlling LIFX smart bulbs. Code examples are provided in Ruby and JavaScript to discover LIFX bulbs, map hand position data to color values, and set the bulb colors. The goal is to enable new ways of interacting with technology through gesture control and different representations of color.
New and delete are a thing of the past, with the new features in C++14 and beyond (such as smart pointers and move semantics) memory management is easier and safer. Learn how to use the new constructs of C++14 and beyond to create, move, and free objects in a safer and more efficient manner.
The rule of three (also known as the Law of The Big Three or The Big Three) is a rule of thumb in C++ that claims that if a class defines one of the following it should probably explicitly define all three: Copy constructor, Copy assignment operator, Destructor
The document contains code snippets for various sorting and searching algorithms including bubble sort, insertion sort, selection sort, and linear search. It also includes code to find the sum and largest value of arrays, determine angle type, and solve quadratic equations.
Richard Fridrich: Třesení stromem v JavaScriptuDevelcz
This document discusses tree shaking, which is a technique used in JavaScript module bundlers like Webpack to remove unused code from bundles. It shows how Babel and Webpack can be used together for tree shaking. Specifically, it demonstrates configuring Babel and Webpack to remove an unused function called square from the output bundle.
This is my personal notes related to quantum computing, collected as part of my study. It offers quantum circuits, quantum algorithms, matrix operations, Kronecker, dot products, derivation of Pauli's X, Y , Z gates , preparation of Bell state using Hadamard and CNOT, and finally defines the six quantum states for a qubit
Hybrid quantum classical neural networks with pytorch and qiskitVijayananda Mohire
We explore how a classical neural network can be partially quantized to create a hybrid quantum-classical neural network, that seeks to classify images of two types of hand drawn digits (0 or 1) from MNIST dataset
This is my second version of the quantum notes collected as part of my study.
This organizes content from various open source for study and reference only.
The Ring programming language version 1.4 book - Part 21 of 30Mahmoud Samir Fayed
This document provides information about low level functions in Ring that interface with C and the Ring virtual machine. It discusses the callgc() function to manually call the garbage collector, the varptr() function to get a pointer to a C variable, the space() function to allocate memory, nullpointer() to pass a null pointer, object2pointer() and pointer2object() to convert between Ring objects and C pointers, ptrcmp() to compare pointers, and functions like ringvm_cfunctionslist() to get lists of C functions and ringvm_functionslist() to get a list of Ring functions from the bytecode. These low level functions provide interfaces between Ring and C to integrate Ring with C libraries and code.
The document describes the design and implementation of a seven segment counter on an FPGA. It includes the implementation of a prescaler, debouncing circuit, binary coded decimal (BCD) counter, and seven segment decoder. The prescaler was initially generating a warning about excessive skew, which was resolved by adding a clock buffer to the prescaler output. The design components are instantiated and connected in the top level system counter entity.
The Ring programming language version 1.5.2 book - Part 74 of 181Mahmoud Samir Fayed
This document provides information about low level functions in Ring that allow interaction with C code and pointers. It describes the following functions:
- callgc() forces garbage collection to free temporary variables
- varptr() gets a C pointer for a Ring variable
- space() allocates memory and returns a string pointer
- nullpointer() returns a NULL pointer for optional parameters
- object2pointer() gets a C pointer for a Ring list or object
- pointer2object() converts a C pointer back to a Ring list or object
- ptrcmp() compares two C pointers
It also briefly mentions ringvm functions for getting information about the runtime environment like loaded classes, functions, memory usage and more.
Miller Lee discusses C++ Accelerated Massive Parallelism (C++ AMP) which provides a simpler programming model for GPU computing compared to CUDA and OpenCL. C++ AMP models GPU data as C++ containers and kernels as C++ lambdas. The MCW C++ AMP (CLAMP) compiler translates C++ AMP code to OpenCL, generating OpenCL C code for the device and host code for execution. While C++ AMP code is more concise than OpenCL, its performance depends on the compiler and runtime support.
This document provides a quick reference to VBScript concepts and syntax. It includes examples of how to connect to computers and retrieve objects, query for services and processes using WMI, open and read/write to text files, create dictionary objects, use conditional statements and loops, work with arrays and functions/subroutines, and automate Microsoft Office applications like Excel, Word, Access and Outlook. It also provides tips on sending output and setting defaults for the cscript and wscript hosts.
HSA enables more efficient compilation of high-level programming interfaces like OpenACC and C++AMP. For OpenACC, HSA provides flexibility in implementing data transfers and optimizing nested parallel loops. For C++AMP, HSA allows efficient compilation from an even higher level interface where GPU data and kernels are modeled as C++ containers and lambdas, without needing to specify data transfers. Overall, HSA aims to reduce boilerplate code for heterogeneous programming and provide better portability across devices.
How to add an optimization for C# to RyuJITEgor Bogatov
This document discusses various ways to optimize C# code by adding custom optimizations to the JIT compiler. It begins by explaining how to morph the intermediate representation (IR) tree during JIT compilation to optimize expressions like dividing by a constant. It then covers implementing range check elimination, loop optimizations like invariant code hoisting, and ideas for optimizations not yet implemented like loop unrolling and deletion. The goal is to explore how to most easily add optimizations by modifying phases in the JIT compiler.
The Ring programming language version 1.3 book - Part 59 of 88Mahmoud Samir Fayed
The document provides details about printing the final intermediate code generated after executing a Ring program.
It begins by showing the output of running a test Ring program and printing the bytecode. This includes the byte code instructions, operation codes, program counter, data, and other details.
It then shows sections of the large intermediate code output, including function and method definitions, variable assignments, calls between functions, and other low-level operations.
The document explains that the output provides a detailed view of the final bytecode generated from the Ring source code after it has been executed by the Ring virtual machine. This allows viewing and understanding the low-level operations performed during program execution.
PID Tuning using Ziegler Nicholas - MATLAB ApproachWaleed El-Badry
This is an unreleased lab for undergraduate Mechatronics students to know how to practice Ziegler Nicholas method to find the PID factors using MATLAB.
This document contains 17 programming problems and their solutions involving object oriented programming concepts like classes, objects, functions, arrays, pointers etc. The problems cover basic concepts like calculating factorial, checking prime number, Fibonacci series, arithmetic operations using menus. More advanced concepts covered include sorting, searching, function overloading, complex numbers, class/object concepts like constructors, destructors and member functions to maintain student records.
This document contains 17 programming problems and their solutions involving object oriented programming concepts like classes, objects, functions, arrays, pointers etc. The problems cover basic concepts like calculating factorial, checking prime number, Fibonacci series, arithmetic operations using menus, finding largest element in array. More advanced concepts covered are bubble sort, selection sort, function overloading to calculate area of shapes, complex number addition using friend functions, student record management using classes. Overall, the document aims to provide practice on common OOP concepts through solving different programming problems.
Virtual machines are used for very different tasks. Personally I have been using VirtualBox for many
years to test software and simply study various Linux distributions. And now, after years of using the
tool and encountering unexpected behavior every now and then, I've decided to make use of my
experience in analysis of open-source projects and check the source code of Oracle VM Virtual Box.
VirtualBox is
PVS-Studio team experience: checking various open source projects, or mistake...Andrey Karpov
To let the world know about our product, we check open-source projects. By the moment we have checked 245 projects. A side effect: we found 9574 errors and notified the authors about them.
The document discusses high performance websites, introducing xDebug profiling, Kcachegrind, and JMeter. It provides instructions for installing necessary software on a virtual machine, including Apache, xDebug, JMeter, and Kcachegrind. The document then demonstrates how to use these tools to optimize website performance, including profiling a sample extension in TYPO3, identifying optimization opportunities, and implementing caching. Finally, it shows how to test website performance using JMeter, including building test plans, recording tests, distributed testing on Amazon EC2, and analyzing results.
The document discusses performance myths and optimizations in Scala code. It begins with an example of calculating Fibonacci numbers on a 68040 processor and how branch prediction strategies can impact performance. Benchmark results are shown comparing immutable and mutable implementations of a calculator, with the immutable version being much slower. Tools for measuring performance like JMH, Java Flight Recorder and Java Mission Control are also introduced. The document cautions that performance can depend heavily on context and benchmarks only show tools, not decisions that should be made based on numbers.
NexGen Solutions for cloud platforms, powered by GenQAIVijayananda Mohire
This is our next generation solutions powered by emerging technologies like AI, quantum computing, Blockchain, quantum cryptography etc. We have various offers that can help improved productivity, help automate and improve ease of doing business. We offer cloud based solutions and have a Hub to interface major cloud platforms.
This is our project work at our startup for Data Science. This is part of our internal training and focused on data management for AI, ML and Generative AI apps
This is our contributions to the Data Science projects, as developed in our startup. These are part of partner trainings and in-house design and development and testing of the course material and concepts in Data Science and Engineering. It covers Data ingestion, data wrangling, feature engineering, data analysis, data storage, data extraction, querying data, formatting and visualizing data for various dashboards.Data is prepared for accurate ML model predictions and Generative AI apps
Considering the need and demand for high quality digital platforms that can help clients to get the most of the newer technology, we have proposed an IT Hub that allows for rapid on boarding of clients to various modules on a need basis, allowing them to subscribe to modules they need only. We have various modules.
This document offers a high level overview of our IT Hub that offers various modules allowing for clients to onboard faster and get the benefits of a large set of vendor products, tools, IDE related to AI, Quantum and Generative AI technologies.
This is my hands-on projects in quantum technologies. These are few of the key projects that I worked with that demonstrates my skills in using various concepts, tools, IDE and deriving the solutions by using quantum principles like superposition, and entanglement along with quantum circuits in realizing the concepts
Azure Quantum Workspace for developing Q# based quantum circuitsVijayananda Mohire
This document provides steps to develop quantum circuits using Q# on Azure Quantum. It instructs the user to create an Azure subscription, log into the Azure portal, create a Quantum Workspace, and provision storage. It then explains how to define Q# operations, simulate them locally using %simulate, connect to the Azure Quantum workspace with %azure.connect, specify an execution target with %azure.target, submit jobs with %azure.submit, check job status with %azure.status, retrieve outputs with %azure.output, and view all jobs with %azure.jobs. An example quantum random number generation program written in Q# is provided.
This is my journey taken from year 2012 on wards, after graduation in my MS with major in AI. I have taken various certification courses, trainings, hands-on labs; few key ones are from Google, and Microsoft.
Agricultural and allied industries play a vital role in the progress of a nation and sustainable economic growth. Farmers play a vital role in this progress. Their hard work and efforts need to be praised and possibly offer them various tools and digital assets that can automate some of their various repetitive tasks such as back office operations, crop monitoring, and post-harvesting routines that might divert the attention of farmers from their core job.
We, at Bhadale IT have developed various products and services that are revolutionary and can offer effective solutions with our industrial partnerships with digital technology leaders like Intel and Microsoft. We have drafted this solution brief to illustrate our products and service offerings for the agricultural industry. We can tailor make highly customized solutions to meet individual project and farmer needs that can include use of various technologies like artificial intelligence, machine learning, data science and related machinery like drones and geo-spatial datasets and various information that can offer precise farming techniques and use of technology in improving production, improvised use of fertilizers, organic farming and reduced crop loss due to rodents, insects and regional diseases.
The focus of this solution is for farmers to adopt and migrate to digital cloud platform to Microsoft Azure that can boost quality and quantity of crop production and improve their supply chain and offer faster and mature downstream business operations.
This is our cloud offerings based on our partnership and relationship with Intel and Microsoft. We offer highly optimized Intel motherboards, memory, and software stack that is best suited for Azure cloud platform and can handle various types of models (IaaS, PaaS, SaaS) and Azure workloads in the public or private cloud.
Explore the fundamentals of GitHub Copilot and its potential to enhance productivity and foster innovation for both individual developers and businesses. Discover how to implement it within your organization and unleash its power for your own projects.
In this learning path, you'll:
Gain a comprehensive understanding of the distinctions between GitHub Copilot for Individuals, GitHub Copilot for Business, and GitHub Copilot X.
Explore various use cases for GitHub Copilot for Business, including real-life examples showcasing how customers have leveraged it to boost their productivity.
Receive step-by-step instructions on enabling GitHub Copilot for Individuals and GitHub Copilot for Business, ensuring a seamless integration into your workflows.
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsVijayananda Mohire
This journey provides learners with a thorough exploration of ChatGPT, starting with an introduction to large language models and their capabilities, the series progresses through practical applications, advanced techniques, industry impacts, and important ethical considerations. Each course aims to equip learners with an in-depth understanding of the model, its functionality, and its wide-ranging applications.
Red Hat Enterprise Linux (RHEL) and Hybrid Cloud Infrastructure. Products that are developed for multi-cloud hybrid platform enabling seamless integration and portability of workloads across Red Hat and partner Infrastructure, public and private clouds.
Learners will be exposed to the foundations of Red Hat, Red Hat Enterprise Linux (RHEL) portfolio including Hybrid Cloud Infrastructure, how to identify target customers, distinguish Red Hat solutions from the competition, review key use cases, align to the sales conversation framework for positioning the solutions, and much more!
Upon completing this learning path, learners will receive the Red Hat Sales Specialist - Red Hat Enterprise Linux accreditation and be prepared to advance to the Red Hat Sales Specialist - Red Hat Enterprise Linux II learning path
This is my annual learning at Red Hat related to accreditation and courses at Red Hat partner training portal.
Learners will be exposed to the foundations of Red Hat, Red Hat Enterprise Linux (RHEL) portfolio including Hybrid Cloud Infrastructure, how to identify target customers, distinguish Red Hat solutions from the competition, review key use cases, align to the sales conversation framework for positioning the solutions, and much more!
Generative AI is a cutting-edge technology that will transform nearly every business function, ranging from content creation and product design, to improving customer experience and marketing new ideas. While the benefits of Generative AI are immense, the technology has its limitations and poses some ethical considerations. In this Journey, learners of all levels will develop a shared understanding of what Generative AI is, the guardrails for use and identify of how to use, build and experiment with the technology in a responsible manner. Learners will also develop skills for leading through this disruption with empathy, while cultivating the human skills to sustain the transformation
The document provides a transcript for Vijayananda Mohire that includes their legal name, username, contact email, a list of 130+ modules completed on the Microsoft learning platform totaling over 130 hours, and descriptions of each module completed including titles, descriptions, and durations.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Infrastructure Challenges in Scaling RAG with Custom AI models
Multi qubit entanglement
1. In [2]: import numpy as np
import math
# Importing standard Qiskit libraries
from qiskit import QuantumCircuit, transpile, Aer, IBMQ, assemble
from qiskit.tools.jupyter import *
from qiskit.visualization import *
from ibm_quantum_widgets import *
from math import pi
# Loading your IBM Quantum account(s)
provider = IBMQ.load_account()
In [3]: qc = QuantumCircuit(3)
# Apply H-gate to each qubit:
for qubit in range(3):
qc.h(qubit)
# See the circuit:
qc.draw()
In [4]: # Let's see the result
svsim = Aer.get_backend('aer_simulator')
qc.save_statevector()
qobj = assemble(qc)
final_state = svsim.run(qobj).result().get_statevector()
# In Jupyter Notebooks we can display this nicely using Latex.
# If not using Jupyter Notebooks you may need to remove the
# array_to_latex function and use print(final_state) instead.
from qiskit.visualization import array_to_latex
array_to_latex(final_state, prefix="text{Statevector} = ")
ibmqfactory.load_account:WARNING:2021-07-10 11:47:42,489: Credentials
are already in use. The existing account in the session will be repla
ced.
Out[3]:
Out[4]:
Statevector = [ ]
1
8
√
1
8
√
1
8
√
1
8
√
1
8
√
1
8
√
1
8
√
1
8
√
Multi-Qubit_Entanglement https://notebooks.quantum-computing.ibm.com/user/60e12d043ea3ef2d...
1 of 6 7/10/2021, 6:37 PM
2. In [5]: qc = QuantumCircuit(2)
qc.h(0)
qc.x(1)
qc.draw()
In [6]: usim = Aer.get_backend('aer_simulator')
qc.save_unitary()
qobj = assemble(qc)
unitary = usim.run(qobj).result().get_unitary()
In [7]: # In Jupyter Notebooks we can display this nicely using Latex.
# If not using Jupyter Notebooks you may need to remove the
# array_to_latex function and use print(unitary) instead.
from qiskit.visualization import array_to_latex
array_to_latex(unitary, prefix="text{Circuit = }n")
In [8]: qc = QuantumCircuit(2)
qc.x(1)
qc.draw()
Out[5]:
Out[7]:
Circuit =
⎡
⎣
⎢
⎢
⎢
⎢
⎢
⎢
⎢
0
0
1
2
√
1
2
√
0
0
1
2
√
− 1
2
√
1
2
√
1
2
√
0
0
1
2
√
− 1
2
√
0
0
⎤
⎦
⎥
⎥
⎥
⎥
⎥
⎥
⎥
Out[8]:
Multi-Qubit_Entanglement https://notebooks.quantum-computing.ibm.com/user/60e12d043ea3ef2d...
2 of 6 7/10/2021, 6:37 PM
3. In [9]: # Simulate the unitary
usim = Aer.get_backend('aer_simulator')
qc.save_unitary()
qobj = assemble(qc)
unitary = usim.run(qobj).result().get_unitary()
# Display the results:
array_to_latex(unitary, prefix="text{Circuit = } ")
In [10]: qc = QuantumCircuit(2)
# Apply CNOT
qc.cx(0,1)
# See the circuit:
qc.draw()
In [11]: qc = QuantumCircuit(2)
# Apply H-gate to the first:
qc.h(0)
qc.draw()
In [12]: # Let's see the result:
svsim = Aer.get_backend('aer_simulator')
qc.save_statevector()
qobj = assemble(qc)
final_state = svsim.run(qobj).result().get_statevector()
# Print the statevector neatly:
array_to_latex(final_state, prefix="text{Statevector = }")
Out[9]:
Circuit =
⎡
⎣
⎢
⎢
⎢
0
0
1
0
0
0
0
1
1
0
0
0
0
1
0
0
⎤
⎦
⎥
⎥
⎥
Out[10]:
Out[11]:
Out[12]:
Statevector = [ ]
1
2
√
1
2
√
0 0
Multi-Qubit_Entanglement https://notebooks.quantum-computing.ibm.com/user/60e12d043ea3ef2d...
3 of 6 7/10/2021, 6:37 PM
4. In [13]: qc = QuantumCircuit(2)
# Apply H-gate to the first:
qc.h(0)
# Apply a CNOT:
qc.cx(0,1)
qc.draw()
In [14]: # Let's get the result:
# 2 qubits have values, 00, 01, 10, 11, these have been subjected to ab
ove gates
qc.save_statevector()
qobj = assemble(qc)
result = svsim.run(qobj).result()
# Print the statevector neatly:
final_state = result.get_statevector()
array_to_latex(final_state, prefix="text{Statevector = }")
#00 and 11 have only values, as see in statevector output
In [15]: plot_histogram(result.get_counts())
Out[13]:
Out[14]:
Statevector = [ ]
1
2
√
0 0 1
2
√
Out[15]:
Multi-Qubit_Entanglement https://notebooks.quantum-computing.ibm.com/user/60e12d043ea3ef2d...
4 of 6 7/10/2021, 6:37 PM
5. In [16]: # Plot the Real and Imaginary parts of the statevector of the 2 qubits,
in this case, img part is zero so no pillars in second plot
from qiskit.visualization import plot_state_city
plot_state_city(final_state)
In [17]: from qiskit.visualization import plot_state_qsphere
plot_state_qsphere(final_state)
Out[16]:
/opt/conda/lib/python3.8/site-packages/qiskit/visualization/state_vis
ualization.py:705: MatplotlibDeprecationWarning:
The M attribute was deprecated in Matplotlib 3.4 and will be removed
two minor releases later. Use self.axes.M instead.
xs, ys, _ = proj3d.proj_transform(xs3d, ys3d, zs3d, renderer.M)
Out[17]:
Multi-Qubit_Entanglement https://notebooks.quantum-computing.ibm.com/user/60e12d043ea3ef2d...
5 of 6 7/10/2021, 6:37 PM
6. In [ ]: # Executed by Bhadale IT, in IBM Quantum Lab for multi-bit state repres
entation
#superposition state representation using amplitude
Multi-Qubit_Entanglement https://notebooks.quantum-computing.ibm.com/user/60e12d043ea3ef2d...
6 of 6 7/10/2021, 6:37 PM