This presentation is one of the series of publications which is introduced by cyber•Fund to provide an overview of the best speaker topics we’ve hosted at our meetups.
Information about the company cyber•Fund
We are investing and developing blockchain projects which can fundamentally change the world we live in for the better. We are creating an economy of robots and people's self-expression. More about our work you can learn from the following resources:
Our projects:
cyber•Fund - analytics and development of blockchain systems
Golos.io - media blockchain platform
Satoshi•Fund - the first fund investing in crypto assets
Cyberstudio.io - assistance in conducting ICO
We are waiting for you in our communities:
Blog:
https://blog.cyber.fund/
Email Newsletter:
http://company.cyber.fund/#newsletter
Social networks:
https://golos.io/@cyberfund
https://steemit.com/@cyberfund
https://twitter.com/cyberfundio
https://www.reddit.com/r/cyber_Fund/
https://www.facebook.com/cyberfund - the official page of cyber•Fund
https://www.facebook.com/blockchainmeetups/ - the official page of cyber•Events (Blockchain meetups, conferences, reports)
https://www.slideshare.net/CyberFund-Official
For developers:
https://t.me/CyberFundDev - telegram chat for blockchain developers
https://github.com/cyberFund - our repository on Github with open source software
https://github.com/cyberFund/Library - library of knowledge on the blockchain
Kubernetes network policies can be bypassed through several methods, including excessive privileges that allow editing labels, creating pods in allowed namespaces, or insecure kubelet configurations. Monitoring for suspicious role bindings, host mounts, and static pod paths as well as enforcing CIS benchmarks can help mitigate these risks. Detection tools like Falco and prevention tools like OPA, admission controllers, and pod security policies can also help prevent network policy bypass.
This document discusses network security and policies in Kubernetes. It provides 3 use cases of applying network policies to control communication between pods. It also discusses limitations of current network policy implementation and promising technologies being developed, such as Cilium, that can provide more flexible policy enforcement that is not dependent on IP addresses. The key takeaway is that while network policies can whitelist communication, the implementation has limitations and security needs to keep pace with the dynamic nature of containers and Kubernetes.
Title: Contemporary source control for Pharo
Speaker: Max Leske
Wed, August 20, 2:30pm – 3:00pm
Video Part1: https://www.youtube.com/watch?v=fa9Zpxyt_no
Video Part2: https://www.youtube.com/watch?v=vpag70LmGrY
Description
Abstract: SVN [1], Mercurial [2] and Git [3] probably are the predominant source control systems used for open source software. Each of these systems brings many tools to the table to visualize meta data, search for versions and content and, most importantly, manage versions and changes to versionable entities. Unfortunately for us, Pharo does not natively support any of these systems which makes access for newcomers harder and inhibits our sharing abilities.
In this talk I want to:
- show what support for different source control systems can do for us
- present the work that is being done on integrating Git into Pharo
- discuss how this work will enable the integration of arbitrary source control systems into Pharo
- touch upon the future of Monticello and Metacello in Pharo
[1] http://subversion.apache.org
[2] http://mercurial.selenic.com
[3] http://git-scm.com
Bio: Max Leske is a master student of University of Bern and working with netstyle.ch
Real time analytics with Netty, Storm, KafkaTrieu Nguyen
This document discusses a real-time analytics architecture using Netty, Apache Kafka, and Storm. It includes an overview of the system architecture with Netty handling HTTP logging and producing to Apache Kafka for stream data storage. Storm analytics clusters then consume from Kafka topics to perform analytics functions like tokenization, parsing, aggregation, and saving results to Redis and a data warehouse.
This document summarizes several new and upcoming HTTP specifications and technologies, including:
1. HTTPbis which splits the HTTP specification into seven modular specs to improve understandability.
2. Header i18n which aims to fix internationalization issues in HTTP header fields.
3. Stale cache controls which allow serving stale cached content to hide latency or when problems occur.
4. Prefer which lets clients request an empty response, like for POST/PUT APIs.
This document discusses building a social network from scratch using microservices and Kubernetes. It outlines the technologies used in the DOF HUNT stack including Golang and Python for backends, Flutter for mobile, MySQL and MongoDB for databases, Elasticsearch for search, Redis for caching, NATS for messaging, and Linkerd for service mesh. It also covers monitoring and tracing with OpenCensus and Jaeger, and logging with Fluentd and Elasticsearch. Clean architecture is employed with modules separated into transport, handler, repository, and storage layers to allow easy transition between monolith and microservices.
This presentation is one of the series of publications which is introduced by cyber•Fund to provide an overview of the best speaker topics we’ve hosted at our meetups.
Information about the company cyber•Fund
We are investing and developing blockchain projects which can fundamentally change the world we live in for the better. We are creating an economy of robots and people's self-expression. More about our work you can learn from the following resources:
Our projects:
cyber•Fund - analytics and development of blockchain systems
Golos.io - media blockchain platform
Satoshi•Fund - the first fund investing in crypto assets
Cyberstudio.io - assistance in conducting ICO
We are waiting for you in our communities:
Blog:
https://blog.cyber.fund/
Email Newsletter:
http://company.cyber.fund/#newsletter
Social networks:
https://golos.io/@cyberfund
https://steemit.com/@cyberfund
https://twitter.com/cyberfundio
https://www.reddit.com/r/cyber_Fund/
https://www.facebook.com/cyberfund - the official page of cyber•Fund
https://www.facebook.com/blockchainmeetups/ - the official page of cyber•Events (Blockchain meetups, conferences, reports)
https://www.slideshare.net/CyberFund-Official
For developers:
https://t.me/CyberFundDev - telegram chat for blockchain developers
https://github.com/cyberFund - our repository on Github with open source software
https://github.com/cyberFund/Library - library of knowledge on the blockchain
Kubernetes network policies can be bypassed through several methods, including excessive privileges that allow editing labels, creating pods in allowed namespaces, or insecure kubelet configurations. Monitoring for suspicious role bindings, host mounts, and static pod paths as well as enforcing CIS benchmarks can help mitigate these risks. Detection tools like Falco and prevention tools like OPA, admission controllers, and pod security policies can also help prevent network policy bypass.
This document discusses network security and policies in Kubernetes. It provides 3 use cases of applying network policies to control communication between pods. It also discusses limitations of current network policy implementation and promising technologies being developed, such as Cilium, that can provide more flexible policy enforcement that is not dependent on IP addresses. The key takeaway is that while network policies can whitelist communication, the implementation has limitations and security needs to keep pace with the dynamic nature of containers and Kubernetes.
Title: Contemporary source control for Pharo
Speaker: Max Leske
Wed, August 20, 2:30pm – 3:00pm
Video Part1: https://www.youtube.com/watch?v=fa9Zpxyt_no
Video Part2: https://www.youtube.com/watch?v=vpag70LmGrY
Description
Abstract: SVN [1], Mercurial [2] and Git [3] probably are the predominant source control systems used for open source software. Each of these systems brings many tools to the table to visualize meta data, search for versions and content and, most importantly, manage versions and changes to versionable entities. Unfortunately for us, Pharo does not natively support any of these systems which makes access for newcomers harder and inhibits our sharing abilities.
In this talk I want to:
- show what support for different source control systems can do for us
- present the work that is being done on integrating Git into Pharo
- discuss how this work will enable the integration of arbitrary source control systems into Pharo
- touch upon the future of Monticello and Metacello in Pharo
[1] http://subversion.apache.org
[2] http://mercurial.selenic.com
[3] http://git-scm.com
Bio: Max Leske is a master student of University of Bern and working with netstyle.ch
Real time analytics with Netty, Storm, KafkaTrieu Nguyen
This document discusses a real-time analytics architecture using Netty, Apache Kafka, and Storm. It includes an overview of the system architecture with Netty handling HTTP logging and producing to Apache Kafka for stream data storage. Storm analytics clusters then consume from Kafka topics to perform analytics functions like tokenization, parsing, aggregation, and saving results to Redis and a data warehouse.
This document summarizes several new and upcoming HTTP specifications and technologies, including:
1. HTTPbis which splits the HTTP specification into seven modular specs to improve understandability.
2. Header i18n which aims to fix internationalization issues in HTTP header fields.
3. Stale cache controls which allow serving stale cached content to hide latency or when problems occur.
4. Prefer which lets clients request an empty response, like for POST/PUT APIs.
This document discusses building a social network from scratch using microservices and Kubernetes. It outlines the technologies used in the DOF HUNT stack including Golang and Python for backends, Flutter for mobile, MySQL and MongoDB for databases, Elasticsearch for search, Redis for caching, NATS for messaging, and Linkerd for service mesh. It also covers monitoring and tracing with OpenCensus and Jaeger, and logging with Fluentd and Elasticsearch. Clean architecture is employed with modules separated into transport, handler, repository, and storage layers to allow easy transition between monolith and microservices.
This document provides an overview of the post-Merge Flashbots architecture and how it opens up opportunities for block building and other activities on Ethereum. It discusses the separation of block proposers and block builders through a builder network and specification. It also covers mev-boost, the prototype block building marketplace, and poses open research questions around decentralization, censorship resistance, and monitoring the builder market.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
JDO 2019: What you should be aware of before setting up kubernetes on premise...PROIDEA
Kubernetes is trendy. There are tons of presentations on how companies saved lots of money by migrating to Kubernetes. Kubernetes is mostly advertised as a cloud service, but there are companies that can't or don't want to migrate their services to the cloud. For them there are solutions to set up Kubernetes on premise. Before you decide to visit that land, I must warn you: there are demons waiting for you, demons that nobody speaks about in public...
The Lightning Network aims to solve Bitcoin's problems of slow payments, high transaction costs, and poor scalability. It allows for instant, very low-cost payments between nodes by conducting transactions off-blockchain through payment channels. There are currently three main implementations of Lightning that have achieved compatibility. The network functions as a layer on top of Bitcoin through defined BOLT protocols, forming a decentralized network of payment channels between nodes.
Modern cloud-native applications are incredibly complex systems. Keeping the systems healthy and meeting SLAs for our customers is crucial for long-term success. In this session, we will dive into the three pillars of observability - metrics, logs, tracing - the foundation of successful troubleshooting in distributed systems. You'll learn the gotchas and pitfalls of rolling out the OpenTelemetry stack on Kubernetes to effectively collect all your signals without worrying about a vendor lock in. Additionally we will replace parts of the Prometheus stack to scrape metrics with OpenTelemetry collector and operator.
MeeGo 1.2 architecture update document provides the following information in 3 sentences:
The document discusses changes and updates to the MeeGo 1.2 security architecture, including re-evaluating access control solutions like SELinux and sandboxing with Linux containers. It also outlines replacements for the PIM storage frameworks like replacing Tracker storage with Evolution Data Server and replacing Buteo sync with SyncEvolution. Key subsystems discussed include the security architecture, PIM storage, data synchronization, and application frameworks.
2018 jPrime Deconstructing and Evolving REST SecurityDavid Blevins
The learning curve for security is severe and unforgiving. Specifications promise infinite flexibility, habitually give old concepts new names, are riddled with extensions, and almost seem designed to deliberately confuse. For a back-end REST developer, choking all this down for the first time is mission impossible. With an aggressive distaste for fancy terminology, this session delves into OAuth 2.0 as it pertains to REST and shows how it falls into two camps: stateful and stateless. We then detail a competing Amazon-style approach called HTTP Signatures, ideal for B2B scenarios and similar to what is use to secure all Amazon AWS API calls. Each approach will be explored analyzing the architectural differences, with a heavy focus on the wire, showing actual HTTP messages and enough detail to have you thinking, "I could write this myself."
As a bonus at the end, well peak into a new IETF Internet Draft launched this year that combines JWT and HTTP Signatures into the perfect two-factor system that could provide a one-stop shop for business as well as mobile REST scenarios. Come to this session if you want to go from novice to expert with a bit of humor, a big picture perspective and wire-level detail.
Cutting the Kubernetes Monorepo in pieces – never learnt more about gitStefan Schimanski
Kubernetes uses a monorepo approach for development and testing. For Golang vendoring by 3rdparties we publish subdirectories as separate Github repositories (like k8s.io/client-go, k8s.io/apimachinery, k8s.io/api, etc.) continuously every night, while keeping all history, all Github merge commits and while rewriting commits with Godep-save updates to express dependencies. Sounds easy? It's not! Implementing this was the best learning experience of git and git internals and the topic of this talk.
The RestFS is an experimental project to develop an open-source distributed filesystem for large environments. It is designed to scale up from a single server to thousand of nodes and delivering a high availability storage system with special features for high i/o performance and network optimization for work better in WAN environment.
RSK (rootstock) - The first open-source smart contract platform build on top ...Eugene Pavlenko
RSK is the first open-source smart contract platform built on top of the Bitcoin network. It allows for faster transactions and better scalability than Bitcoin, with transaction speeds of 100-300 TPS compared to Bitcoin's 3-5 TPS. RSK expands Bitcoin's functionality by enabling smart contracts and other applications like tokens, financial derivatives, and decentralized organizations. It uses a 2-layer blockchain with merged mining and a 2-way peg to Bitcoin to maintain the security of the Bitcoin network. RSK's mainnet launched in January 2018 and development is ongoing.
1) Boba Network has developed L2TGeth, a modified version of Geth that allows Ethereum smart contracts to interact with external APIs and computing resources through a technique called Turing Hybrid Compute.
2) With Turing Hybrid Compute, smart contracts can call external APIs to retrieve random numbers, pricing data, and other information and incorporate the results into transactions. This overcomes limitations of the EVM like a lack of floating point numbers.
3) L2TGeth works by intercepting API calls from smart contracts, executing them off-chain, and submitting the transaction with the API response to Ethereum. Only the sequencer directly calls APIs, and the results are stored on-chain for
This document provides an overview and update on the Metasploit Framework. Some key points:
- 229 new modules were added since September 2015. Over 800 pull requests were merged from 176 unique authors with 4765 total commits.
- Rex is being broken up into smaller components. New msfconsole commands and a reorganization of the tools directory were introduced.
- New modules, payloads, and exploits were added for platforms like Linux, Windows, Android and mainframes. Module documentation is now in markdown.
- Features added include tools for downloading Microsoft patches, a portable POSIX payload called Mettle, and improved Meterpreter functionality like XOR obfuscation and new extensions.
Kubernetes - Why It's Cool & Why It MaatersBob Reselman
This document provides an overview of Kubernetes concepts including nodes, pods, deployments, services, and ingress. It explains that Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. The presentation will demonstrate these concepts in action on Google Cloud and cover containers fundamentals.
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
Richard Bullington-McGuire presented this talk on PKI enabling web applications for the DoD at the 2009 MIL-OSS conference:
http://www.mil-oss.org/
It is a case study that shares some of the challenges and solutions surrounding the implementation of the Forge.mil system.
This repository retrieves EML files from LTER sites and analyzes and stores EML file data. It contains Python code for EML file analysis and has undergone code simplification. The repository has not seen recent activity, with the last commit occurring 5 months ago.
What I learned about IoT Security ... and why it's so hard!Christoph Engelbert
The document discusses some of the challenges of IoT security and provides recommendations. It notes that IoT security is difficult because devices often lack secure boot processes, have undocumented backdoors, and debugging can be done over unencrypted network connections. It recommends hiring engineers trained in security, prioritizing security over features, performing regular penetration testing, and providing indicators if a device becomes hacked. However, it acknowledges that no security is impossible to break, so the focus should be on choosing important battles.
Speakers: Joost & Milo (Albert Heijn)
Genre & level: Backend, Junior
Joost and Milo from Albert Heijn join us to talk about how they implemented Kubernetes.
C++ CoreHard Autumn 2018. Создание пакетов для открытых библиотек через conan...corehard_by
Использование сторонних библиотек в языке C++ никогда не было простым - необходимо было правильно собрать их, имея дело с различными системами сборки, но с появлением пакетного менеджера conan.io процесс стал намного проще, так что теперь осталось только сделать пакеты для нужным библиотек, и в этом поможет команда bincrafter-ов.
This document provides an overview of the post-Merge Flashbots architecture and how it opens up opportunities for block building and other activities on Ethereum. It discusses the separation of block proposers and block builders through a builder network and specification. It also covers mev-boost, the prototype block building marketplace, and poses open research questions around decentralization, censorship resistance, and monitoring the builder market.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
JDO 2019: What you should be aware of before setting up kubernetes on premise...PROIDEA
Kubernetes is trendy. There are tons of presentations on how companies saved lots of money by migrating to Kubernetes. Kubernetes is mostly advertised as a cloud service, but there are companies that can't or don't want to migrate their services to the cloud. For them there are solutions to set up Kubernetes on premise. Before you decide to visit that land, I must warn you: there are demons waiting for you, demons that nobody speaks about in public...
The Lightning Network aims to solve Bitcoin's problems of slow payments, high transaction costs, and poor scalability. It allows for instant, very low-cost payments between nodes by conducting transactions off-blockchain through payment channels. There are currently three main implementations of Lightning that have achieved compatibility. The network functions as a layer on top of Bitcoin through defined BOLT protocols, forming a decentralized network of payment channels between nodes.
Modern cloud-native applications are incredibly complex systems. Keeping the systems healthy and meeting SLAs for our customers is crucial for long-term success. In this session, we will dive into the three pillars of observability - metrics, logs, tracing - the foundation of successful troubleshooting in distributed systems. You'll learn the gotchas and pitfalls of rolling out the OpenTelemetry stack on Kubernetes to effectively collect all your signals without worrying about a vendor lock in. Additionally we will replace parts of the Prometheus stack to scrape metrics with OpenTelemetry collector and operator.
MeeGo 1.2 architecture update document provides the following information in 3 sentences:
The document discusses changes and updates to the MeeGo 1.2 security architecture, including re-evaluating access control solutions like SELinux and sandboxing with Linux containers. It also outlines replacements for the PIM storage frameworks like replacing Tracker storage with Evolution Data Server and replacing Buteo sync with SyncEvolution. Key subsystems discussed include the security architecture, PIM storage, data synchronization, and application frameworks.
2018 jPrime Deconstructing and Evolving REST SecurityDavid Blevins
The learning curve for security is severe and unforgiving. Specifications promise infinite flexibility, habitually give old concepts new names, are riddled with extensions, and almost seem designed to deliberately confuse. For a back-end REST developer, choking all this down for the first time is mission impossible. With an aggressive distaste for fancy terminology, this session delves into OAuth 2.0 as it pertains to REST and shows how it falls into two camps: stateful and stateless. We then detail a competing Amazon-style approach called HTTP Signatures, ideal for B2B scenarios and similar to what is use to secure all Amazon AWS API calls. Each approach will be explored analyzing the architectural differences, with a heavy focus on the wire, showing actual HTTP messages and enough detail to have you thinking, "I could write this myself."
As a bonus at the end, well peak into a new IETF Internet Draft launched this year that combines JWT and HTTP Signatures into the perfect two-factor system that could provide a one-stop shop for business as well as mobile REST scenarios. Come to this session if you want to go from novice to expert with a bit of humor, a big picture perspective and wire-level detail.
Cutting the Kubernetes Monorepo in pieces – never learnt more about gitStefan Schimanski
Kubernetes uses a monorepo approach for development and testing. For Golang vendoring by 3rdparties we publish subdirectories as separate Github repositories (like k8s.io/client-go, k8s.io/apimachinery, k8s.io/api, etc.) continuously every night, while keeping all history, all Github merge commits and while rewriting commits with Godep-save updates to express dependencies. Sounds easy? It's not! Implementing this was the best learning experience of git and git internals and the topic of this talk.
The RestFS is an experimental project to develop an open-source distributed filesystem for large environments. It is designed to scale up from a single server to thousand of nodes and delivering a high availability storage system with special features for high i/o performance and network optimization for work better in WAN environment.
RSK (rootstock) - The first open-source smart contract platform build on top ...Eugene Pavlenko
RSK is the first open-source smart contract platform built on top of the Bitcoin network. It allows for faster transactions and better scalability than Bitcoin, with transaction speeds of 100-300 TPS compared to Bitcoin's 3-5 TPS. RSK expands Bitcoin's functionality by enabling smart contracts and other applications like tokens, financial derivatives, and decentralized organizations. It uses a 2-layer blockchain with merged mining and a 2-way peg to Bitcoin to maintain the security of the Bitcoin network. RSK's mainnet launched in January 2018 and development is ongoing.
1) Boba Network has developed L2TGeth, a modified version of Geth that allows Ethereum smart contracts to interact with external APIs and computing resources through a technique called Turing Hybrid Compute.
2) With Turing Hybrid Compute, smart contracts can call external APIs to retrieve random numbers, pricing data, and other information and incorporate the results into transactions. This overcomes limitations of the EVM like a lack of floating point numbers.
3) L2TGeth works by intercepting API calls from smart contracts, executing them off-chain, and submitting the transaction with the API response to Ethereum. Only the sequencer directly calls APIs, and the results are stored on-chain for
This document provides an overview and update on the Metasploit Framework. Some key points:
- 229 new modules were added since September 2015. Over 800 pull requests were merged from 176 unique authors with 4765 total commits.
- Rex is being broken up into smaller components. New msfconsole commands and a reorganization of the tools directory were introduced.
- New modules, payloads, and exploits were added for platforms like Linux, Windows, Android and mainframes. Module documentation is now in markdown.
- Features added include tools for downloading Microsoft patches, a portable POSIX payload called Mettle, and improved Meterpreter functionality like XOR obfuscation and new extensions.
Kubernetes - Why It's Cool & Why It MaatersBob Reselman
This document provides an overview of Kubernetes concepts including nodes, pods, deployments, services, and ingress. It explains that Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. The presentation will demonstrate these concepts in action on Google Cloud and cover containers fundamentals.
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
Richard Bullington-McGuire presented this talk on PKI enabling web applications for the DoD at the 2009 MIL-OSS conference:
http://www.mil-oss.org/
It is a case study that shares some of the challenges and solutions surrounding the implementation of the Forge.mil system.
This repository retrieves EML files from LTER sites and analyzes and stores EML file data. It contains Python code for EML file analysis and has undergone code simplification. The repository has not seen recent activity, with the last commit occurring 5 months ago.
What I learned about IoT Security ... and why it's so hard!Christoph Engelbert
The document discusses some of the challenges of IoT security and provides recommendations. It notes that IoT security is difficult because devices often lack secure boot processes, have undocumented backdoors, and debugging can be done over unencrypted network connections. It recommends hiring engineers trained in security, prioritizing security over features, performing regular penetration testing, and providing indicators if a device becomes hacked. However, it acknowledges that no security is impossible to break, so the focus should be on choosing important battles.
Speakers: Joost & Milo (Albert Heijn)
Genre & level: Backend, Junior
Joost and Milo from Albert Heijn join us to talk about how they implemented Kubernetes.
Similar to Ядро мультикроптовалютного кошелька Multy (20)
C++ CoreHard Autumn 2018. Создание пакетов для открытых библиотек через conan...corehard_by
Использование сторонних библиотек в языке C++ никогда не было простым - необходимо было правильно собрать их, имея дело с различными системами сборки, но с появлением пакетного менеджера conan.io процесс стал намного проще, так что теперь осталось только сделать пакеты для нужным библиотек, и в этом поможет команда bincrafter-ов.
C++ CoreHard Autumn 2018. Actors vs CSP vs Tasks vs ... - Евгений Охотниковcorehard_by
На предыдущих конференциях C++ CoreHard автор доклада рассказывал про Модель Акторов и опыт ее использования в C++. Но Модель Акторов -- это далеко не единственный способ борьбы со сложностью при работе с многопоточностью. Давайте попробуем поговорить о том, что еще можно применить и как это может выглядеть в C++.
C++ CoreHard Autumn 2018. Знай свое "железо": иерархия памяти - Александр Титовcorehard_by
Если вам важна скорость работы ваших программ, то вы обязаны понимать, как работает ваше "железо". Современный процессор -- это сложное устройство, многие механизмы которого могут неочевидным образом влиять на скорость исполнения вашего кода. В докладе дается обзорное представление основных структур современного процессора и подробно рассматривается работа иерархии памяти. Будут освещены следующие темы: организация кэш-памяти, принцип локальности, предподкачка данных, нежелательное общее владение данными, а также программные техники для эффективной работы с памятью.
C++ CoreHard Autumn 2018. Информационная безопасность и разработка ПО - Евген...corehard_by
Информационная безопасность все больше из отдельной сферы плавно перетекает в разработку ПО. А значит «обычным» программистам приходится понимать те требования и терминологию, которые специалисты по безопасности уже давно знают и используют. CWE, CERT, MISRA, SAST– для «обычных» программистов это непонятные аббревиатуры. Поэтому в обзорном докладе мы попробуем рассказать простым языком об этих понятиях так, чтобы все разработчики начали уверенно ориентироваться в этой теме.
C++ CoreHard Autumn 2018. Заглядываем под капот «Поясов по C++» - Илья Шишковcorehard_by
Вот уже более двух лет мы создаём онлайн-специализацию по С++ на платформе Coursera. Её цель — обучить языку C++ с нуля до уровня, достаточного для решения практических задач, с которыми приходилось сталкиваться авторам в своей практике. В своём докладе я расскажу, как мы создаём наши онлайн-курсы, и уделю особое внимание техническим проблемам, которые нам пришлось решить в процессе создания автоматической системы проверки программ студентов.
C++ CoreHard Autumn 2018. Ускорение сборки C++ проектов, способы и последстви...corehard_by
В докладе обсуждаются способы улучшения времени сборки C++ проектов, опыт полученный в ходе ускорения сборки клиента и тулов World Of Tanks. Также описывается эффект, который они оказывают на организацию кодобазы (как позитивный, так и негативный) и затраты, которые необходимы для поддержки этих решений, т.к. не все они бесплатны. Методики, описываемые в докладе: ускорение линковки (Incremental Linking, Fastlink), ускорение компиляции(Include what you use, использование precompiled headers).
C++ CoreHard Autumn 2018. Метаклассы: воплощаем мечты в реальность - Сергей С...corehard_by
Доклад посвящён вопросам реализации пропозала Герба Саттера PR0707 (метаклассы в С++) за пределами компилятор - в виде отдельной утилиты. Будет продемонстрированы варианты использования метаклассов в реальной жизни, затронуты вопросы их реализации на базе Clang Frontend, а также возможные перспективы развития технологии и методики.
C++ CoreHard Autumn 2018. Что не умеет оптимизировать компилятор - Александр ...corehard_by
Все мы знаем, что компиляторы в настоящее время достаточно умные. И нам как программистам зачастую не нужно думать о каких-то незначительных оптимизациях - мы полагаемся на оптимизации компилятора. Что ж, настало время выяснить, действительно ли настолько компиляторы умны и узнать, в каких местах программист всё же (может быть) умнее.
C++ CoreHard Autumn 2018. Кодогенерация C++ кроссплатформенно. Продолжение - ...corehard_by
В докладе будет рассмотрена генерация кода при компиляции различных языковых конструкций, как простых, так и сложных, на различных платформах, как общераспространённых x86/x64, так и тех, которым уделяется меньше внимания: ARM, AVR. Также будут встречаться примеры для совсем экзотических процессоров вроде PowerPC и даже MicroBlaze. Основной упор будет делаться не на обработку данных, а именно на сопоставление различных конструкций кода с инструкциями целевых платформ.
C++ CoreHard Autumn 2018. Concurrency and Parallelism in C++17 and C++20/23 -...corehard_by
What do threads, atomic variables, mutexes, and conditional variables have in common? They are the basic building blocks of any concurrent application in C++, which are even for the experienced C++ programmers a big challenge. This massively changed with C++17 and change even more with C++20/23. What did we get with C++17, what can we hope for with C++20/23? With C++17, most of the standard template library algorithms are available in sequential, parallel, and vectorised variants. With the upcoming standards, we can look forward to executors, transactional memory, significantly improved futures and coroutines. To make it short. These are just the highlights from the concurrent and parallel perspective. Thus there is the hope that in the future C++ abstractions such as executors, transactional memory, futures and coroutines are used and that threads, atomic variables, mutexes and condition variables are just implementation details.
C++ CoreHard Autumn 2018. Обработка списков на C++ в функциональном стиле - В...corehard_by
Язык C++, претерпев долгую эволюцию, обрёл ряд черт, характерных для функциональной парадигмы: функции стали полноправными объектами, над которыми могут выполняться операции, а аппарат шаблонов позволяет проводить вычисления на типах на этапе компиляции. Математический фундамент этих двух главных аспектов составляют, соответственно, ламбда-исчисление и теория категорий. Расширение языка этими средствами способствовало реализации на языке C++ ряда инструментов, известных из функционального программирования. Некоторые из этих реализаций вошли в стандартную библиотеку (std::function, std::bind), другие - в сторонние библиотеки, в том числе в коллекцию библиотек Boost (functional, hana). Важную роль в арсенале функционального программирования играют операции свёртки и развёртки, которые очевиднее всего определяются для списков, но также естественным образом обобщаются на другие индуктивные и коиндуктивные структуры данных. Например, суммирование списка чисел можно представить себе как свёртку списка по операции сложения, а построение списка простых множителей заданного целого числа - как развёртку. Обобщения свёртки и развёртки известны как анаморфизмы и катаморфизмы. Также в функциональном программировании находит применение понятие гиломорфизма - композиция развёртки некоторого объекта в коллекцию с последующей свёрткой её в новый объект. В докладе продемонстрировано, что свёртки, развёртки и их композиции допускают довольно простую реализацию на языке C++.
C++ Corehard Autumn 2018. Обучаем на Python, применяем на C++ - Павел Филоновcorehard_by
Доклад посвящен часто используемому шаблону в моих проектах по анализу данных, когда обучение и настройка моделей происходят с использованием python, а вот их запуск в промышленное использование на языке C++. Предлагается рассмотреть несколько учебных примеров реализации такого подхода, от простой линейной регрессии до обработки изображений с помощью нейронных сетей.
C++ CoreHard Autumn 2018. Asynchronous programming with ranges - Ivan Čukićcorehard_by
This talk will be about the design and implementation of a reactive programming model inspired by ranges that allows easy implementation of asynchronous and distributed software systems by writing code that looks like a sequence of ordinary range transformations like filter, transform, etc. This programming model will be demonstrated along with the implementation of a simple asynchronous web service where the whole system logic is defined as a chain of range transformations.
C++ CoreHard Autumn 2018. Debug C++ Without Running - Anastasia Kazakovacorehard_by
The document discusses how an IDE can help debug tricky C++ code without running it by leveraging tools to understand macros, types, templates, and overloads. It describes how an IDE could show the step-by-step substitution of macros, substitute typedefs one step at a time, debug template instantiations and constant expressions, explain overload resolution, and profile includes to optimize header usage. The presenter argues that tools are needed to make powerful C++ abstractions more accessible.
C++ CoreHard Autumn 2018. Полезный constexpr - Антон Полухинcorehard_by
В C++11 добавили новое ключевое слово - constexpr. Выглядит оно весьма невзрачно, да и на первый взгляд кажется, что смысла в нём маловато... Для чего же оно нужно, какие у него есть тайные супер способности и какую роль оно сыграет в дальнейшем развитии языка C++ - обо всём об этом мы и поговорим.
C++ CoreHard Autumn 2018. Text Formatting For a Future Range-Based Standard L...corehard_by
This document discusses range-based text formatting and proposes replacing existing approaches with a range-based solution. It suggests representing text as ranges and using range algorithms and functions for concatenation and formatting. This would allow treating different string types uniformly and flexibly while avoiding issues with current formatting methods like iostream manipulation and format strings. The document provides examples of formatting numbers and dates as ranges and constructing containers like std::string from multiple ranges.
Исключительная модель памяти. Алексей Ткаченко ➠ CoreHard Autumn 2019corehard_by
Память в компьютере - это не только гигабайты оперативной памяти в слоте, но и занятная абстракция. В докладе мы рассмотрим, как можно эту абстракцию использовать необычным образом для моделирования других абстракций - регистровых файлов периферийных устройств. Доклад будет полезен не только embedded-разработчикам, но и, возможно, заставит переосмыслить свой взгляд на память.
Как помочь и как помешать компилятору. Андрей Олейников ➠ CoreHard Autumn 2019corehard_by
Как правило, можно положиться на то, что компилятор оптимизирует результирующий бинарный файл так, чтобы она работала максимально быстро. Но компилятор не знает на каких данных и на каком железе программа будет запущена. Плюс хотелось бы, чтобы компиляция занимала приемлемое время. Из-за этого результат может оказаться субоптимальным. Предлагаю на примерах для LLVM посмотреть как можно подсказать компилятору как оптимизировать программу и сделать результат лучше или хуже.
Мы напишем простейший веб-сервис из клиента и сервера на C++. На этом C++ часть закончится, и пойдет настройка окружения и инфраструктуры. Мы обеспечим детерминируемость сборки и прогона тестов. Облегчим последующее обновление зависимых библиотек. Автоматизируем статические проверки, верификацию кода, прогон тестов. Обеспечим доступность сервиса, настроим инфраструктуру, сбалансируем нагрузку, добавим автоматическое и ручное масштабирование. И под конец мы настроим continious delivery таким образом, что код будет на продакшене через 5 минут после реквеста, при этом даже невалидные изменения и ошибки программиста не смогут повлиять на его работу.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Всем привет, добрый вечер,
Меня зовут Василий и я CTO проекта Multy - мульти-блокчен кошелек
Открытость, безопасность, отсутствие доверия к кому бы то ни было
Исходники : проверить что же мы на самом деле мы делаем с вашими средствами
Полоникс
Поиск данных в блокчейне (BlockCypher)
Пользователь скачивает приложение, открывает его, заводит новый кошелек.
Энтропия => seed-phrase (BIP39) => приватный ключ\адрес для данного кошелька (BIP44). Индексы, имя кошелька и адрес - на сервер.
Поступили средства: нода => микро-сервис => BE logic => push (или WS) => client
Отправка транзакции: transaction fee => UTXO (или nonce) => TX, sign, serialize => BE => микро-сервис => node (BE отслеживает статус TX, история TX)
C++11:
unique_ptr, range-based-for-loops, thread-safe static, RVO, NRVO, copy-elision, move semantics
braced_initialization, auto, tuple - tests
Warning: some issues with ANdroid NDK, like missing std::to_string()
CMake: modern, simple, cross-platform, good Android integration, Ok iOS integration
leetal/ios-cmake
Some work required for iOS - Framework
Goolgle test:
~76K - google-test
C-API: no binary compatibility issues, simple integration with other languages
ЖЭСТАЧАЙШЭ
Argument checks
Verifying IN\OUT objects validity
Error handling
Exceptions handling: Exception to error
Seed
mnemonic (BIP39)
Blockchains implementation
BinaryData, BigInt,
strings, memory handling
Hashing, ec_keys
Exception
Base classes
~450 Test cases
Gathering test cases from blockchain reference implementations and from real world
~ 10 SHA3 validity test cases
API + internals ~14.5K
No TX parsing & validating, no nodes API support, no persistency & stuff
Bitcoin: partial support no P2PSH address, no segwit, no multi-sig
Ethereum: no smart-contract API invocations
Facade:
address validation,
coin types (BIP44),
object factory
Restoring account from export format
BIP44 extended key generationn
Private keys
Parallel tree for public keys
1..2^31 - 1 wallets && addresses
There is additional level for address keys, but it wouldn’t fit here.
Address,
Storage for keys
Blockchains are different, very different
UTXO, nonce,
# of inputs and outputs
Investigation: reference implementation, docs, build guides, set up guides, faucets
Test cases: from reference implementation
Most difficult parts:
private\public keys import export and signing
Transactions
Protocol stuff, forks are much easier !!!