Conclusiones de los y las participantes en el "Encuentro nacional para evaluar el programa Juventud en Acción" sobre la sesión que se realizó sobre competencias.
1. ¿Cómo trabajamos el proceso Youthpass?
2. ¿Qué competencias tienen los acompañadores / creadores de oportunidades de aprendizaje/guías/soportes/apoyos?
3. ¿Damos el "power to the people"?¿Lo hacemos igual en todas las acciones?
4. Compromisos
ventajas y desventajas de la tecnología en la contaminación ambientalJhazmin Javier Alpelima
El documento describe los principales aspectos de seguridad e higiene industrial en el lugar de trabajo. Explica que las condiciones físicas inadecuadas pueden afectar negativamente la productividad a pesar de los esfuerzos de una empresa. También destaca que tanto los gerentes como los empleados deben prestar más atención a los peligros para la salud a largo plazo, no solo a los accidentes. Además, explica que el estrés laboral puede afectar la salud, productividad y satisfacción de los empleados si se some
World Tourism Organization Annual Report 2012 (Chafik YAHOU
UNWTO generates market knowledge, promotes competitive and sustainable tourism policies and instruments, fosters tourism education and training, and works to make tourism an effective tool for development through technical assistance projects in over 100 countries around the world.
Convocatoria carteles de resultados de investigación xxii sccfe 2014 Facultad...Mario Tejada
El comité organizador invita a los estudiantes del sexto semestre de las Licenciaturas en Enfermería y Trabajo Social, a participar en la presentación de trabajos de investigación en la modalidad cartel.
Este documento describe un sistema digital de control de velocidad para una turbina de vapor de 350 MW. El sistema mide la velocidad de la turbina continuamente y controla las válvulas de admisión de vapor para mantener la velocidad constante de acuerdo con la velocidad ajustada. El sistema permite seleccionar diferentes curvas de aceleración y velocidades objetivo durante el arranque y operación de la turbina para mantener estable la generación de energía eléctrica. El control digital elimina los elementos mecánicos del sistema tradicional,
Este documento relata a viagem de uma gota de água através de um curso de água. A gota começa sua jornada nas montanhas e passa por diferentes paisagens como ribeiros, riachos, rios e planaltos, observando as mudanças no meio envolvente. Após uma longa viagem cheia de perigos, a gota se junta a outras gotas no estuário, contente por encontrar suas "irmãs" e completar sua jornada.
Este documento describe la región de Mindo en Ecuador, incluyendo su clima, flora y fauna. Mindo es una parroquia ubicada a 80 km de Quito con unos 2,500 habitantes. Tiene un clima cálido todo el año entre 15-24°C, aunque se torna más seco entre junio y noviembre. La región alberga una gran diversidad de plantas, aves, mamíferos, peces, anfibios y reptiles, debido a que incluye dos áreas endémicas para aves. El documento recomi
Conclusiones de los y las participantes en el "Encuentro nacional para evaluar el programa Juventud en Acción" sobre la sesión que se realizó sobre competencias.
1. ¿Cómo trabajamos el proceso Youthpass?
2. ¿Qué competencias tienen los acompañadores / creadores de oportunidades de aprendizaje/guías/soportes/apoyos?
3. ¿Damos el "power to the people"?¿Lo hacemos igual en todas las acciones?
4. Compromisos
ventajas y desventajas de la tecnología en la contaminación ambientalJhazmin Javier Alpelima
El documento describe los principales aspectos de seguridad e higiene industrial en el lugar de trabajo. Explica que las condiciones físicas inadecuadas pueden afectar negativamente la productividad a pesar de los esfuerzos de una empresa. También destaca que tanto los gerentes como los empleados deben prestar más atención a los peligros para la salud a largo plazo, no solo a los accidentes. Además, explica que el estrés laboral puede afectar la salud, productividad y satisfacción de los empleados si se some
World Tourism Organization Annual Report 2012 (Chafik YAHOU
UNWTO generates market knowledge, promotes competitive and sustainable tourism policies and instruments, fosters tourism education and training, and works to make tourism an effective tool for development through technical assistance projects in over 100 countries around the world.
Convocatoria carteles de resultados de investigación xxii sccfe 2014 Facultad...Mario Tejada
El comité organizador invita a los estudiantes del sexto semestre de las Licenciaturas en Enfermería y Trabajo Social, a participar en la presentación de trabajos de investigación en la modalidad cartel.
Este documento describe un sistema digital de control de velocidad para una turbina de vapor de 350 MW. El sistema mide la velocidad de la turbina continuamente y controla las válvulas de admisión de vapor para mantener la velocidad constante de acuerdo con la velocidad ajustada. El sistema permite seleccionar diferentes curvas de aceleración y velocidades objetivo durante el arranque y operación de la turbina para mantener estable la generación de energía eléctrica. El control digital elimina los elementos mecánicos del sistema tradicional,
Este documento relata a viagem de uma gota de água através de um curso de água. A gota começa sua jornada nas montanhas e passa por diferentes paisagens como ribeiros, riachos, rios e planaltos, observando as mudanças no meio envolvente. Após uma longa viagem cheia de perigos, a gota se junta a outras gotas no estuário, contente por encontrar suas "irmãs" e completar sua jornada.
Este documento describe la región de Mindo en Ecuador, incluyendo su clima, flora y fauna. Mindo es una parroquia ubicada a 80 km de Quito con unos 2,500 habitantes. Tiene un clima cálido todo el año entre 15-24°C, aunque se torna más seco entre junio y noviembre. La región alberga una gran diversidad de plantas, aves, mamíferos, peces, anfibios y reptiles, debido a que incluye dos áreas endémicas para aves. El documento recomi
O documento descreve as etapas do ciclo celular, incluindo a duplicação do DNA na fase S, a divisão do núcleo na mitose e a divisão do citoplasma na citocinese, resultando em duas células-filhas geneticamente idênticas à célula original.
El documento discute varios temas relacionados con el uso de Internet, incluyendo la importancia del respeto a los demás, la libertad de expresión, y la necesidad de ser cuidadosos con la información que se publica. También enfatiza la importancia de aprender a usar Internet de manera responsable y siguiendo las normas de la "netiqueta".
Este documento describe la isla de Tenerife. Explica que Tenerife es la isla más grande y poblada del archipiélago canario español, con una superficie de 2,034 km2 y casi 900,000 habitantes. También describe la geología volcánica de la isla, incluida la formación del macizo central del Teide, el punto más alto de España. Además, resume los diferentes paisajes de la isla, como las costas accidentadas, valles fértiles y bosques de laurisilva.
O documento discute a definição de saúde pela ONU e como a saúde funciona em países desenvolvidos, na União Europeia, em Portugal, e em países em desenvolvimento. Ele também discute como a saúde influencia a qualidade de vida e fatores que influenciam a saúde.
El documento presenta el plan de estudios para el área de matemáticas para sexto grado. El plan incluye cinco metas generales como resolver problemas con fracciones, números racionales positivos, aproximaciones, porcentajes y distinguir cuando se requiere un cálculo exacto o una estimación. Cada meta incluye saberes conceptuales, procedimentales y actitudinales así como productos de evaluación. El plan también describe los recursos y software educativos a utilizar.
O documento descreve a divisão regional oficial do Brasil feita pelo IBGE, que divide o país em cinco grandes regiões considerando fronteiras estaduais, porém as diferenças regionais nem sempre coincidem com esses limites. São elas: Região Norte, Região Nordeste, Região Sudeste, Região Centro-Oeste e Região Sul.
En esta exposicion describimos la segunda parte del libro " ESCUCHAR PARA APRENDER"", allio notamo , no lectura, si no frases alucibas a lo que nunca nosotros notamos...." NO SOLO ES OIR SI NO ESCUHAR Y ENTENDER"" , esperamos que sientan agusto con nuestra ilustracion....SUPERFINANCIEROS
Projeto matrix e a filosofia - roteiro para leitura analítica - padrão de res...Vitoria Cancelli
O documento apresenta um roteiro de leitura analítica sobre o filme Matrix e a filosofia. O roteiro contém perguntas sobre significados de termos como Matrix, Neo e Morfeu na mitologia grega, além de questões sobre elementos de tecnologia da informação e literatura presentes no filme.
El documento presenta información sobre el programa de medicina humana de la Universidad de Ciencias Aplicadas y Ambientales U.D.C.A. El título otorgado es de Médico Cirujano. La carrera dura 6 años divididos en 12 semestres. El decano de la facultad de medicina es el Dr. Juan Carlos Morales Ruíz. La misión se centra en formar profesionales integrales en medicina con competencias para desempeñarse como líderes en el cuidado de la salud humana con enfoque ecosistémico.
1) A Salina de Uyuni na Bolívia é o maior deserto de sal do mundo e o maior espelho natural, cobrindo uma área de 12.000 quilômetros quadrados.
2) Quando chove, uma fina camada de água sobre a superfície de sal cria um espetáculo natural, refletindo a luz e fazendo com que pareça que se está caminhando no céu.
3) Além de ser um importante destino turístico, a Salina de Uyuni é utilizada por satélites para calibração e contém grandes
As características hereditárias transmitem-se através dos cromossomas, metade dos quais são fornecidos pelo pai e metade pela mãe. Os cromossomas sexuais determinam o sexo, sendo XX para fêmeas e XY para machos. Os genes situados nos cromossomas controlam as características e podem ser dominantes ou recessivos.
Este trabalho não foi objeto de qualquer correção!
Foi postado tal e qual como foi enviado por o(s) autor(es).
O mérito (se for caso disso) é exclusivo dele(s)!
(Trabalho do ano letivo de 2013/2014)
Este documento describe las comunidades de aprendizaje y los entornos personales de aprendizaje. Las comunidades de aprendizaje se construyen a través de redes personales de aprendizaje que permiten a las personas interactuar y aprender de y con otros. Los entornos personales de aprendizaje surgen de la necesidad de estar actualizado e involucran la gestión de fuentes de aprendizaje informal a través de Internet. Estos entornos requieren competencias como buscar, filtrar, publicar, compartir, colaborar, transformar y valorar
El documento describe la evolución del teléfono desde su invención hasta la actualidad, incluyendo su transformación de un dispositivo fijo a uno móvil con capacidades avanzadas como cámara, video, música e internet. También discute las tecnologías como el reconocimiento de voz que hacen los teléfonos más accesibles para personas con discapacidades visuales u auditivas.
O documento descreve a divisão regional oficial do Brasil feita pelo IBGE, que divide o país em cinco grandes regiões considerando fronteiras estaduais, porém as diferenças regionais nem sempre coincidem com esses limites. São elas: Região Norte, Região Nordeste, Região Sudeste, Região Centro-Oeste e Região Sul.
La ciudad de Lebu en Chile se centra en la pesca, el turismo y el entretenimiento. La pesca sigue siendo una de las principales fuentes de empleo, mientras que las atracciones turísticas incluyen playas, una gran caverna natural y un faro histórico. Los deportes como el surf y eventos como la búsqueda anual del tesoro de Benavides también atraen a visitantes.
Este documento resume las características principales de los agujeros negros. Se describen como concentraciones de materia de altísima densidad con un campo gravitatorio tan fuerte que ni siquiera la luz puede escapar. Cuanto más materia cae en un agujero negro, mayor será su masa y atracción gravitatoria. El punto de no retorno es el límite más allá del cual la gravedad es tan intensa que nada puede escapar del agujero negro.
Este documento presenta el plan de evaluación para un curso de Finanzas e Impuestos. Incluye diferentes actividades evaluativas como discusiones, socializaciones de conocimientos, exposiciones, talleres, pruebas orales y la creación de un blog/portafolio digital con tres avances. Detalla las fechas de cada actividad evaluativa y su ponderación en el curso.
Este documento apresenta os principais meios de transporte de energia em Portugal, incluindo condutas, oleodutos, cabos de alta tensão e gasodutos. Discute as características, vantagens e desvantagens destes métodos, concluindo que apesar dos seus custos iniciais elevados, eles fornecem transporte seguro e econômico de combustíveis e energia.
The document summarizes surveillance practices in Pakistan. It discusses how the Pakistani government justifies widespread communications surveillance as necessary for counterterrorism, though this surveillance has expanded beyond targeted measures and been abused. The report reveals that in 2013 the ISI sought to implement a mass surveillance system to intercept undersea cables and gain access to 660 gigabytes per second of communications data. It also describes how Pakistan cooperates extensively with international surveillance by foreign intelligence agencies like the NSA.
Unpatched Security Flaws Openly Solicited by US NavyWaqas Amir
The US Navy is seeking information from qualified vendors to develop exploit products that integrate with commonly used cyber security frameworks. The Navy requires access to vulnerability intelligence, exploit reports, and operational exploit binaries affecting widely used commercial software. Vendors must be rated at CMMI Level 3 and provide a minimum of 10 unique exploit reports and binaries over a one year period. Responses are requested to provide company and technical capability information by June 18, 2015. This notice is to gather information only and is not a solicitation for proposals.
O documento descreve as etapas do ciclo celular, incluindo a duplicação do DNA na fase S, a divisão do núcleo na mitose e a divisão do citoplasma na citocinese, resultando em duas células-filhas geneticamente idênticas à célula original.
El documento discute varios temas relacionados con el uso de Internet, incluyendo la importancia del respeto a los demás, la libertad de expresión, y la necesidad de ser cuidadosos con la información que se publica. También enfatiza la importancia de aprender a usar Internet de manera responsable y siguiendo las normas de la "netiqueta".
Este documento describe la isla de Tenerife. Explica que Tenerife es la isla más grande y poblada del archipiélago canario español, con una superficie de 2,034 km2 y casi 900,000 habitantes. También describe la geología volcánica de la isla, incluida la formación del macizo central del Teide, el punto más alto de España. Además, resume los diferentes paisajes de la isla, como las costas accidentadas, valles fértiles y bosques de laurisilva.
O documento discute a definição de saúde pela ONU e como a saúde funciona em países desenvolvidos, na União Europeia, em Portugal, e em países em desenvolvimento. Ele também discute como a saúde influencia a qualidade de vida e fatores que influenciam a saúde.
El documento presenta el plan de estudios para el área de matemáticas para sexto grado. El plan incluye cinco metas generales como resolver problemas con fracciones, números racionales positivos, aproximaciones, porcentajes y distinguir cuando se requiere un cálculo exacto o una estimación. Cada meta incluye saberes conceptuales, procedimentales y actitudinales así como productos de evaluación. El plan también describe los recursos y software educativos a utilizar.
O documento descreve a divisão regional oficial do Brasil feita pelo IBGE, que divide o país em cinco grandes regiões considerando fronteiras estaduais, porém as diferenças regionais nem sempre coincidem com esses limites. São elas: Região Norte, Região Nordeste, Região Sudeste, Região Centro-Oeste e Região Sul.
En esta exposicion describimos la segunda parte del libro " ESCUCHAR PARA APRENDER"", allio notamo , no lectura, si no frases alucibas a lo que nunca nosotros notamos...." NO SOLO ES OIR SI NO ESCUHAR Y ENTENDER"" , esperamos que sientan agusto con nuestra ilustracion....SUPERFINANCIEROS
Projeto matrix e a filosofia - roteiro para leitura analítica - padrão de res...Vitoria Cancelli
O documento apresenta um roteiro de leitura analítica sobre o filme Matrix e a filosofia. O roteiro contém perguntas sobre significados de termos como Matrix, Neo e Morfeu na mitologia grega, além de questões sobre elementos de tecnologia da informação e literatura presentes no filme.
El documento presenta información sobre el programa de medicina humana de la Universidad de Ciencias Aplicadas y Ambientales U.D.C.A. El título otorgado es de Médico Cirujano. La carrera dura 6 años divididos en 12 semestres. El decano de la facultad de medicina es el Dr. Juan Carlos Morales Ruíz. La misión se centra en formar profesionales integrales en medicina con competencias para desempeñarse como líderes en el cuidado de la salud humana con enfoque ecosistémico.
1) A Salina de Uyuni na Bolívia é o maior deserto de sal do mundo e o maior espelho natural, cobrindo uma área de 12.000 quilômetros quadrados.
2) Quando chove, uma fina camada de água sobre a superfície de sal cria um espetáculo natural, refletindo a luz e fazendo com que pareça que se está caminhando no céu.
3) Além de ser um importante destino turístico, a Salina de Uyuni é utilizada por satélites para calibração e contém grandes
As características hereditárias transmitem-se através dos cromossomas, metade dos quais são fornecidos pelo pai e metade pela mãe. Os cromossomas sexuais determinam o sexo, sendo XX para fêmeas e XY para machos. Os genes situados nos cromossomas controlam as características e podem ser dominantes ou recessivos.
Este trabalho não foi objeto de qualquer correção!
Foi postado tal e qual como foi enviado por o(s) autor(es).
O mérito (se for caso disso) é exclusivo dele(s)!
(Trabalho do ano letivo de 2013/2014)
Este documento describe las comunidades de aprendizaje y los entornos personales de aprendizaje. Las comunidades de aprendizaje se construyen a través de redes personales de aprendizaje que permiten a las personas interactuar y aprender de y con otros. Los entornos personales de aprendizaje surgen de la necesidad de estar actualizado e involucran la gestión de fuentes de aprendizaje informal a través de Internet. Estos entornos requieren competencias como buscar, filtrar, publicar, compartir, colaborar, transformar y valorar
El documento describe la evolución del teléfono desde su invención hasta la actualidad, incluyendo su transformación de un dispositivo fijo a uno móvil con capacidades avanzadas como cámara, video, música e internet. También discute las tecnologías como el reconocimiento de voz que hacen los teléfonos más accesibles para personas con discapacidades visuales u auditivas.
O documento descreve a divisão regional oficial do Brasil feita pelo IBGE, que divide o país em cinco grandes regiões considerando fronteiras estaduais, porém as diferenças regionais nem sempre coincidem com esses limites. São elas: Região Norte, Região Nordeste, Região Sudeste, Região Centro-Oeste e Região Sul.
La ciudad de Lebu en Chile se centra en la pesca, el turismo y el entretenimiento. La pesca sigue siendo una de las principales fuentes de empleo, mientras que las atracciones turísticas incluyen playas, una gran caverna natural y un faro histórico. Los deportes como el surf y eventos como la búsqueda anual del tesoro de Benavides también atraen a visitantes.
Este documento resume las características principales de los agujeros negros. Se describen como concentraciones de materia de altísima densidad con un campo gravitatorio tan fuerte que ni siquiera la luz puede escapar. Cuanto más materia cae en un agujero negro, mayor será su masa y atracción gravitatoria. El punto de no retorno es el límite más allá del cual la gravedad es tan intensa que nada puede escapar del agujero negro.
Este documento presenta el plan de evaluación para un curso de Finanzas e Impuestos. Incluye diferentes actividades evaluativas como discusiones, socializaciones de conocimientos, exposiciones, talleres, pruebas orales y la creación de un blog/portafolio digital con tres avances. Detalla las fechas de cada actividad evaluativa y su ponderación en el curso.
Este documento apresenta os principais meios de transporte de energia em Portugal, incluindo condutas, oleodutos, cabos de alta tensão e gasodutos. Discute as características, vantagens e desvantagens destes métodos, concluindo que apesar dos seus custos iniciais elevados, eles fornecem transporte seguro e econômico de combustíveis e energia.
The document summarizes surveillance practices in Pakistan. It discusses how the Pakistani government justifies widespread communications surveillance as necessary for counterterrorism, though this surveillance has expanded beyond targeted measures and been abused. The report reveals that in 2013 the ISI sought to implement a mass surveillance system to intercept undersea cables and gain access to 660 gigabytes per second of communications data. It also describes how Pakistan cooperates extensively with international surveillance by foreign intelligence agencies like the NSA.
Unpatched Security Flaws Openly Solicited by US NavyWaqas Amir
The US Navy is seeking information from qualified vendors to develop exploit products that integrate with commonly used cyber security frameworks. The Navy requires access to vulnerability intelligence, exploit reports, and operational exploit binaries affecting widely used commercial software. Vendors must be rated at CMMI Level 3 and provide a minimum of 10 unique exploit reports and binaries over a one year period. Responses are requested to provide company and technical capability information by June 18, 2015. This notice is to gather information only and is not a solicitation for proposals.
Police can Grab cell phone records without Warrant, Rules CourtWaqas Amir
This document summarizes a court case involving Quartavius Davis who was convicted of several counts of armed robbery and gun charges. The key issue on appeal was whether cell phone records obtained from Davis's cellular provider, MetroPCS, violated his Fourth Amendment rights. The records included historical cell tower location information showing the cell towers used for Davis's calls during the period where the robberies occurred. While the records did not precisely locate Davis, they placed his phone near the robbery locations. The court held that obtaining the records did not require a warrant and did not violate Davis's Fourth Amendment rights. It affirmed Davis's convictions.
Boeing 787s can lose control while flying due to Software bug: ReportWaqas Amir
This glitch can abruptly shut-off all electrical power of the plane during mid-air causing the flyers to lose control of the flight | Full Store: http://goo.gl/bTpkyc
Big brother-exposed-r2 k-handbook-on-surveillance-webWaqas Amir
This document summarizes the history of South Africa's intelligence structures and their monitoring of political activists. It describes how the State Security Agency was initially given a broad mandate to conduct political intelligence gathering in the 2000s, leading to scandals where the SSA spied on lawful political opponents. In 2013, a new law was passed limiting the SSA's mandate to exclude monitoring lawful political activity, advocacy, protest or dissent. However, cases discussed in the document suggest the SSA may still be monitoring some activist movements.
Reserchers show how medical robots can be hacked during surgeryWaqas Amir
This document analyzes cybersecurity threats against teleoperated surgical robots like the Raven II system. The researchers identify several possible attacks, including intention manipulation, intention modification, and hijacking attacks. They experimentally evaluate vulnerabilities and demonstrate the ability to maliciously control robot functions or override surgeon commands. The researchers also find attacks can abuse the emergency stop mechanism. They propose initial steps to increase security but note more work is needed given the risks of disrupted surgical procedures if systems are compromised.
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportWaqas Amir
The Internet Watch Foundation (IWF) works to remove criminal online content, especially child sexual abuse imagery. In 2014, IWF:
- Increased its analyst team and began proactively searching for abuse content, finding 45% more reports than 2013.
- Processed over 74,000 reports and removed over 141,000 URLs globally.
- Worked closely with UK and international law enforcement and partner organizations to more effectively combat online child abuse.
- Continued developing new tools and services to further its mission of eliminating child sexual abuse imagery online.
Robert Sherman, the Manager of Privacy and Public Policy at Facebook, testified before the Senate subcommittee about Facebook's use of facial recognition technology in its tag suggestions feature. He explained that tag suggestions uses the photos and tags users have voluntarily provided on Facebook to automate the tagging process for new photos uploaded by analyzing similarities between photos people are already tagged in. Sherman emphasized that users have transparency and control over the use of their data and images through privacy tools and settings on Facebook.
Android App Used by Hackers in Sex Extortion CampaignsWaqas Amir
The document discusses a new mobile sextortion modus operandi used by criminal gangs in East Asia. It involves convincing victims to install Android malware that steals their contact lists and personal data. This information is then used to blackmail victims by threatening to share embarrassing material with their friends and family unless a ransom is paid. Four main Android malware families have been used for this purpose, undergoing various revisions to improve functionality. Money mules and online drop zones play a key role in receiving stolen funds and data. The criminal operations have links to ethnic Chinese individuals in South Korea and involve collaboration between malware developers and distributors.
Facebook's revised policies_and_terms_v1.2Waqas Amir
Facebook tracks users even when they log out from their social media account - The site also tracks individuals who do not even have a Facebook account | More
Adiós gps darpa working on alternative position tracking technologyWaqas Amir
The U.S government’s Defence Advanced Research Projects Agency (DARPA) has prioritized the development of a more dependable and efficient real-time location tracking technology due to the incompetence of GPS in specific situations | More: http://goo.gl/fWcqxh
Study reveals we are being tracked by our smartphones --- every 3 minutesWaqas Amir
This document summarizes a study that evaluated the effectiveness of providing smartphone users with an app permission manager and privacy nudges about how their apps access sensitive data. The study found that giving users access to a permission manager helped many review and restrict app permissions, but the effectiveness was significantly enhanced when privacy nudges were also provided to raise awareness of how apps access location, contacts, and other private data. The nudges prompted almost all users to further review permissions and led over half to make more restrictive changes to permissions.
Stingray Mobile Phone Surveillance Details to be unveiled.. Orders NY CourtWaqas Amir
New York Civil Liberties Union (NYCLU), in one of its cases a judge ordered the Erie County Sheriff’s Office to disclose data to public regarding the department’s use of Stingrays | More:
FBI Admits Using Stingray Devices to Disrupt Phone Service.Waqas Amir
Unsealed Document Exposes FBI - Bureau admits using Stingray Devices to Disrupt Phone Service | More @ https://www.hackread.com/fbi-admits-using-stingray-devices-to-disrupt-phone-service/
DARPA Wants to Monitor The Arctic, offers $4 Million For An Unmanned Surveill...Waqas Amir
Ice melting in the Arctic has been the leading issue in strategic plans of almost all government leaders in Northern Hemisphere.. More @ https://www.hackread.com/darpa-wants-to-use-unmanned-surveillance-system-to-monitor-the-arctic/
Nsa hiding undetectable spyware in hard drives worldwideWaqas Amir
The US National Security Agency (NSA) hid undetectable spying software within the hard drives of computers, be it of any make, says a Moscow-based cyber security researcher and software maker.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!