This document is a screenshot of an online map that allows users to view satellite images and add locations and categories. The map displays tools to measure distances, edit maps, add places, and select from various categories to tag locations. In the top left, users can translate the interface into different languages and access additional tools, help documents, and a forum.
Dokumen ini memberikan panduan lengkap tentang penggunaan fitur-fitur pengolah kata digital untuk menyusun dokumen akademik seperti bab-bab, daftar isi, daftar gambar, daftar tabel, penomoran halaman, dan lainnya. Dokumen ini juga menjelaskan cara membuat label dan nomor otomatis pada caption gambar dan tabel serta menyertakannya dalam daftar gambar dan tabel.
Pertemuan ke 2 - Pemanfaatan Pustaka DigitalFitritasari
Dokumen tersebut memberikan ringkasan singkat tentang beberapa sumber daya pustaka digital yang dapat dimanfaatkan untuk penelitian ilmiah seperti Digital Library UIN SGD, Jurnal UIN SGD, Garuda, Perpustakaan Nasional, Proquest, Scimago Jr, dan beberapa tips menulis makalah ilmiah.
Pertemuan ke 1 - Etika Menulis Karya Ilmiah dan Pemanfaatan BlogFitritasari
Dokumen tersebut merupakan silabus mata kuliah Digital Academics Writing yang membahas tentang etika menulis karya ilmiah, pemanfaatan blog, dan tugas besar berupa makalah atau proposal. Silabus ini mencakup materi seperti prinsip-prinsip etika menulis, jenis-jenis dokumen karya ilmiah, cara menghindari plagiarisme, dan cara membuat serta memanfaatkan blog. Mahasiswa diwajibkan membuat makalah atau proposal sesuai dengan
Pertemuan ke 4 - Bimbingan Penulisan Makalah untuk Mahasiswa Angkatan 2016Fitritasari
Dokumen tersebut merangkum materi pertemuan keempat tentang pemanfaatan perangkat lunak pengolah kata dan blog dalam penulisan akademik. Materi tersebut mencakup studi literatur, penulisan makalah dengan sitasi dan daftar pustaka menggunakan Ms. Word dan Mendeley, serta publikasi hasil tulisan di blog melalui blogger.com. Diberikan pula contoh sumber referensi dan cara mencari paper melalui mesin pencari serta perpustakaan
This document is a screenshot of an online map that allows users to view satellite images and add locations and categories. The map displays tools to measure distances, edit maps, add places, and select from various categories to tag locations. In the top left, users can translate the interface into different languages and access additional tools, help documents, and a forum.
Dokumen ini memberikan panduan lengkap tentang penggunaan fitur-fitur pengolah kata digital untuk menyusun dokumen akademik seperti bab-bab, daftar isi, daftar gambar, daftar tabel, penomoran halaman, dan lainnya. Dokumen ini juga menjelaskan cara membuat label dan nomor otomatis pada caption gambar dan tabel serta menyertakannya dalam daftar gambar dan tabel.
Pertemuan ke 2 - Pemanfaatan Pustaka DigitalFitritasari
Dokumen tersebut memberikan ringkasan singkat tentang beberapa sumber daya pustaka digital yang dapat dimanfaatkan untuk penelitian ilmiah seperti Digital Library UIN SGD, Jurnal UIN SGD, Garuda, Perpustakaan Nasional, Proquest, Scimago Jr, dan beberapa tips menulis makalah ilmiah.
Pertemuan ke 1 - Etika Menulis Karya Ilmiah dan Pemanfaatan BlogFitritasari
Dokumen tersebut merupakan silabus mata kuliah Digital Academics Writing yang membahas tentang etika menulis karya ilmiah, pemanfaatan blog, dan tugas besar berupa makalah atau proposal. Silabus ini mencakup materi seperti prinsip-prinsip etika menulis, jenis-jenis dokumen karya ilmiah, cara menghindari plagiarisme, dan cara membuat serta memanfaatkan blog. Mahasiswa diwajibkan membuat makalah atau proposal sesuai dengan
Pertemuan ke 4 - Bimbingan Penulisan Makalah untuk Mahasiswa Angkatan 2016Fitritasari
Dokumen tersebut merangkum materi pertemuan keempat tentang pemanfaatan perangkat lunak pengolah kata dan blog dalam penulisan akademik. Materi tersebut mencakup studi literatur, penulisan makalah dengan sitasi dan daftar pustaka menggunakan Ms. Word dan Mendeley, serta publikasi hasil tulisan di blog melalui blogger.com. Diberikan pula contoh sumber referensi dan cara mencari paper melalui mesin pencari serta perpustakaan
Pertemuan ke 5 – Plagiarism Checker (April 2018)Fitritasari
Dokumen tersebut memberikan panduan singkat tentang proses penggunaan plagiarism checker di turnitin.com untuk dosen dan mahasiswa, mulai dari instruktur yang membuat kelas dan tugas, menambahkan mahasiswa, hingga mahasiswa yang mengunggah dokumen dan instruktur melihat hasil deteksi plagiarisme.
Pertemuan ke 3 – Pemanfaatan Perangkat Lunak Pengolah Kata - Ms.Word (April 2...Fitritasari
Dokumen tersebut memberikan penjelasan mengenai berbagai fitur pengolah kata Microsoft Word yang dapat dimanfaatkan untuk menulis dokumen akademik seperti nomor halaman, daftar isi, daftar gambar dan tabel, catatan kaki, tabel, serta kutipan dan referensi. Di antaranya cara membuat struktur halaman dengan nomor halaman, membuat daftar isi otomatis, menambahkan caption pada gambar dan membuat daftar gambar, serta menyus
Pertemuan ke 1 - Etika Menulis Karya Ilmiah (April 2018)Fitritasari
Ringkasan dokumen tersebut adalah sebagai berikut:
1. Dokumen tersebut membahas tentang etika menulis karya ilmiah dan plagiarisme.
2. Terdapat sanksi bagi mahasiswa yang melakukan plagiarisme seperti teguran, peringatan tertulis, hingga pemberhentian dari status mahasiswa.
3. Mahasiswa diwajibkan untuk membuat paper atau proposal penelitian untuk dijadikan bahan plagiarisme checker.
Pertemuan ke 6 - Plagiarism Checking (Turnitin)Fitritasari
Instructor creates a class and assignment on Turnitin.com. Students receive emails to set up accounts, create passwords, and join the virtual class. Students then upload their documents to Turnitin, which allows the instructor to view similarity reports checking for plagiarism. The process outlines the steps for instructors to set up an assignment and class, and for students to join, submit documents, and check for plagiarism using Turnitin.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Pertemuan ke 5 – Plagiarism Checker (April 2018)Fitritasari
Dokumen tersebut memberikan panduan singkat tentang proses penggunaan plagiarism checker di turnitin.com untuk dosen dan mahasiswa, mulai dari instruktur yang membuat kelas dan tugas, menambahkan mahasiswa, hingga mahasiswa yang mengunggah dokumen dan instruktur melihat hasil deteksi plagiarisme.
Pertemuan ke 3 – Pemanfaatan Perangkat Lunak Pengolah Kata - Ms.Word (April 2...Fitritasari
Dokumen tersebut memberikan penjelasan mengenai berbagai fitur pengolah kata Microsoft Word yang dapat dimanfaatkan untuk menulis dokumen akademik seperti nomor halaman, daftar isi, daftar gambar dan tabel, catatan kaki, tabel, serta kutipan dan referensi. Di antaranya cara membuat struktur halaman dengan nomor halaman, membuat daftar isi otomatis, menambahkan caption pada gambar dan membuat daftar gambar, serta menyus
Pertemuan ke 1 - Etika Menulis Karya Ilmiah (April 2018)Fitritasari
Ringkasan dokumen tersebut adalah sebagai berikut:
1. Dokumen tersebut membahas tentang etika menulis karya ilmiah dan plagiarisme.
2. Terdapat sanksi bagi mahasiswa yang melakukan plagiarisme seperti teguran, peringatan tertulis, hingga pemberhentian dari status mahasiswa.
3. Mahasiswa diwajibkan untuk membuat paper atau proposal penelitian untuk dijadikan bahan plagiarisme checker.
Pertemuan ke 6 - Plagiarism Checking (Turnitin)Fitritasari
Instructor creates a class and assignment on Turnitin.com. Students receive emails to set up accounts, create passwords, and join the virtual class. Students then upload their documents to Turnitin, which allows the instructor to view similarity reports checking for plagiarism. The process outlines the steps for instructors to set up an assignment and class, and for students to join, submit documents, and check for plagiarism using Turnitin.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology