If you self-identify as Not Technical, this session is for you. This session will start with a very big-picture, plain-English review of how Drupal thinks and move from there to a discussions of pros and cons for using Drupal. Come ready to share your questions and insights from the real world. Drupal is a tool and it’s only successful if it works for you. Don’t be shy about not being technical. Be proud!
This document provides information about resources for learning and enjoying technology including websites for moodle, manuals, social bookmarking, chat platforms, and projects. It also mentions tools like JClic and Cho Oyu as well as information about who they are as a community and comparing different technology approaches. Photos are included as visual representations of learning, enjoying, and community.
Google is more than just a search engine. It offers a variety of applications for communication, internet browsing, chatting, sending and receiving emails, and exploring the world through Google Earth. The document encourages people to use Google to find answers before asking silly questions. It includes links to Creative Commons licensed images used in each slide of the accompanying presentation about Google's applications and services.
The progress and challenge of OpenStreetMap in East AsiaDennis Raylin Chen
I talk in Hong Kong Open Source Conference 2017, a brief introduction of OpenStreetMap, and the Challenge of localization, especially in East Asia.
我在香港開源年會簡介開放街圖,以及在地化的挑戰,特別是在東亞這一帶。
If you self-identify as Not Technical, this session is for you. This session will start with a very big-picture, plain-English review of how Drupal thinks and move from there to a discussions of pros and cons for using Drupal. Come ready to share your questions and insights from the real world. Drupal is a tool and it’s only successful if it works for you. Don’t be shy about not being technical. Be proud!
This document provides information about resources for learning and enjoying technology including websites for moodle, manuals, social bookmarking, chat platforms, and projects. It also mentions tools like JClic and Cho Oyu as well as information about who they are as a community and comparing different technology approaches. Photos are included as visual representations of learning, enjoying, and community.
Google is more than just a search engine. It offers a variety of applications for communication, internet browsing, chatting, sending and receiving emails, and exploring the world through Google Earth. The document encourages people to use Google to find answers before asking silly questions. It includes links to Creative Commons licensed images used in each slide of the accompanying presentation about Google's applications and services.
The progress and challenge of OpenStreetMap in East AsiaDennis Raylin Chen
I talk in Hong Kong Open Source Conference 2017, a brief introduction of OpenStreetMap, and the Challenge of localization, especially in East Asia.
我在香港開源年會簡介開放街圖,以及在地化的挑戰,特別是在東亞這一帶。
The document appears to be a collection of links to Flickr photos and YouTube videos about tourist destinations and attractions in Malaysia. There are over 25 links presented without descriptions to images showing places like the Petronas Twin Towers in Kuala Lumpur, beaches on Perhentian Island, caves in Mulu National Park, Mount Kinabalu, and Sipadan Island known for diving. The links provide visual resources about the natural landscapes and cultural sites that make Malaysia a popular tourist destination in Southeast Asia.
Deusto tech minería de opiniones y análisis de sentimientosJuan Sixto
The document describes the process of classifying a hotel review using a probabilistic classifier that was previously trained. The review is analyzed by tokenizing, part-of-speech tagging, lemmatization, and sentiment analysis. Attributes are then created from the processed review before being classified as positive or negative.
This document summarizes and identifies the key components of a computer system. It describes the power supply, motherboard, CPU, RAM, fan, network interface card, video adapter, hard disk drive, optical drive, floppy drive, various cables, case panels, monitor, keyboard, mouse, USB port, Ethernet port, wireless antenna, and power cord - explaining briefly what each component is and its basic function within the computer.
The document describes several Christmas and New Year's traditions in Greece. On Samothrace Island, families gather on Christmas Day to grill and eat souvla, large chunks of pork seasoned with oregano and salt. In Epirus for New Year's Eve, families bake vasilopita cake or rice-filled pie with lamb and hide a coin for good luck. On New Year's Day in Greece, people break a pomegranate at their doorway to bring good fortune for the new year. The author believes Christmas traditions in Greece offer fabulous and delicious celebrations.
This document provides an overview of an emergency first aid at work training course. The objectives of the course are to teach students the basic skills and knowledge to demonstrate they can work as an emergency first aider in the workplace. Key topics covered include the priorities of first aid (airway, breathing, circulation), how to conduct primary and secondary surveys of a casualty, basic life support including CPR, how to relieve choking, treating unconsciousness, head injuries, and more. Upon completion of the course, students will be working toward the 'Emergency First Aid at Work' qualification.
George is a 10-year-old boy who lives in Alexandroupolis, Greece with his parents and younger brother John. He attends the 5th class at the Piramatic School and enjoys swimming, football, volleyball, and reading in his free time. George wishes everyone a Merry Christmas and a Happy New Year.
We deliver BI services in nearshore mode to companies in Western Europe, neutralizing common issues with offshore initiatives, but retaining the cost advantages. Combined with Western management, a key focus on BI and a wide network of national on-site experts we can deliver quality in return for a low investment. Assignments can range from a Data Warehouse project up to an end-user front-end support team.
This document describes and identifies the key components that make up a computer system. It includes the power supply, motherboard, CPU, RAM, fan, network interface card, video adapter, hard disk drive, optical drive, floppy drive, various cables, case panels, monitor, keyboard, mouse, USB ports, Ethernet port, wireless antenna, and power cord. The components work together to power the system and allow processing, data storage, and input/output functionality.
This document describes and identifies the key components that make up a computer system. It provides images and brief descriptions of the power supply, motherboard, CPU, fan, RAM, NIC, wireless NIC, video adapter, hard disk drive, optical drive, floppy drive, various cables, case panels, monitor, keyboard, mouse, USB port, Ethernet port, wireless antenna, and power cord. All of these parts work together to power on the system and allow processing and input/output of data.
This document discusses open source data integration and provides information about ETL conversions and exports, data interfaces and crunching, and why custom coding may not be needed. It includes links to the Pentaho data integration tool and Gigasquid Software, and credits multiple Flickr photo sources.
This document discusses leveraging technology to engage students in learning. It emphasizes that the goal is not just integrating technology for its own sake or "fixing" curriculum, but seeing opportunities with a fresh perspective and "lighting up learners". True engagement involves immersion, deeper understanding, better retention and successful application of knowledge. The document explores what motivates and engages learners through authentic tasks, choice, collaboration and allowing some risk-taking. While technology is not the goal, it can enhance engagement by allowing global collaboration and accessing current information.
This document discusses leveraging technology to engage students in learning. It emphasizes that the goal is not just integrating technology for its own sake or "fixing" curriculum, but seeing opportunities with a fresh perspective and "lighting up learners". True engagement involves immersion, deeper understanding, better retention and successful application of knowledge. The document explores what motivates and engages learners through authentic tasks, choice, collaboration and allowing some risk-taking. While technology is not the goal, it can enhance engagement by allowing global collaboration and access to expertise.
This is the presentation file that accompanies my conference keynote session on maximizing a professional learning network with interactive technologies.
This document provides a comprehensive list of online tools and resources for building a personal learning network (PLN) including social networks, blogs, wikis, microblogs, RSS feeds, collaborative workspaces, presentations, photo sharing, discussions and more. It also lists specific PLN groups on sites like LinkedIn, Facebook, Ning and Second Life and invites the reader to join the author's own PLN through following her blogs, wiki and social media accounts.
Amir Shevat, Slack, @ashevat
As product managers and founders we know failing can be a good learning experience – and that is true, unless you fail because of something common or stupid that could have been avoided by simple methodologies. Many times we simply make irrational product decisions that prevent us from actually running valuable experiments. Avoiding common mistakes and taking better product decisions, by using easy hacks, could make or break your product and startup. In this session we will go over a few common product failures, as well as demonstrate simple methods and tricks to avoid these failures.
The document appears to be a collection of links to Flickr photos and YouTube videos about tourist destinations and attractions in Malaysia. There are over 25 links presented without descriptions to images showing places like the Petronas Twin Towers in Kuala Lumpur, beaches on Perhentian Island, caves in Mulu National Park, Mount Kinabalu, and Sipadan Island known for diving. The links provide visual resources about the natural landscapes and cultural sites that make Malaysia a popular tourist destination in Southeast Asia.
Deusto tech minería de opiniones y análisis de sentimientosJuan Sixto
The document describes the process of classifying a hotel review using a probabilistic classifier that was previously trained. The review is analyzed by tokenizing, part-of-speech tagging, lemmatization, and sentiment analysis. Attributes are then created from the processed review before being classified as positive or negative.
This document summarizes and identifies the key components of a computer system. It describes the power supply, motherboard, CPU, RAM, fan, network interface card, video adapter, hard disk drive, optical drive, floppy drive, various cables, case panels, monitor, keyboard, mouse, USB port, Ethernet port, wireless antenna, and power cord - explaining briefly what each component is and its basic function within the computer.
The document describes several Christmas and New Year's traditions in Greece. On Samothrace Island, families gather on Christmas Day to grill and eat souvla, large chunks of pork seasoned with oregano and salt. In Epirus for New Year's Eve, families bake vasilopita cake or rice-filled pie with lamb and hide a coin for good luck. On New Year's Day in Greece, people break a pomegranate at their doorway to bring good fortune for the new year. The author believes Christmas traditions in Greece offer fabulous and delicious celebrations.
This document provides an overview of an emergency first aid at work training course. The objectives of the course are to teach students the basic skills and knowledge to demonstrate they can work as an emergency first aider in the workplace. Key topics covered include the priorities of first aid (airway, breathing, circulation), how to conduct primary and secondary surveys of a casualty, basic life support including CPR, how to relieve choking, treating unconsciousness, head injuries, and more. Upon completion of the course, students will be working toward the 'Emergency First Aid at Work' qualification.
George is a 10-year-old boy who lives in Alexandroupolis, Greece with his parents and younger brother John. He attends the 5th class at the Piramatic School and enjoys swimming, football, volleyball, and reading in his free time. George wishes everyone a Merry Christmas and a Happy New Year.
We deliver BI services in nearshore mode to companies in Western Europe, neutralizing common issues with offshore initiatives, but retaining the cost advantages. Combined with Western management, a key focus on BI and a wide network of national on-site experts we can deliver quality in return for a low investment. Assignments can range from a Data Warehouse project up to an end-user front-end support team.
This document describes and identifies the key components that make up a computer system. It includes the power supply, motherboard, CPU, RAM, fan, network interface card, video adapter, hard disk drive, optical drive, floppy drive, various cables, case panels, monitor, keyboard, mouse, USB ports, Ethernet port, wireless antenna, and power cord. The components work together to power the system and allow processing, data storage, and input/output functionality.
This document describes and identifies the key components that make up a computer system. It provides images and brief descriptions of the power supply, motherboard, CPU, fan, RAM, NIC, wireless NIC, video adapter, hard disk drive, optical drive, floppy drive, various cables, case panels, monitor, keyboard, mouse, USB port, Ethernet port, wireless antenna, and power cord. All of these parts work together to power on the system and allow processing and input/output of data.
This document discusses open source data integration and provides information about ETL conversions and exports, data interfaces and crunching, and why custom coding may not be needed. It includes links to the Pentaho data integration tool and Gigasquid Software, and credits multiple Flickr photo sources.
This document discusses leveraging technology to engage students in learning. It emphasizes that the goal is not just integrating technology for its own sake or "fixing" curriculum, but seeing opportunities with a fresh perspective and "lighting up learners". True engagement involves immersion, deeper understanding, better retention and successful application of knowledge. The document explores what motivates and engages learners through authentic tasks, choice, collaboration and allowing some risk-taking. While technology is not the goal, it can enhance engagement by allowing global collaboration and accessing current information.
This document discusses leveraging technology to engage students in learning. It emphasizes that the goal is not just integrating technology for its own sake or "fixing" curriculum, but seeing opportunities with a fresh perspective and "lighting up learners". True engagement involves immersion, deeper understanding, better retention and successful application of knowledge. The document explores what motivates and engages learners through authentic tasks, choice, collaboration and allowing some risk-taking. While technology is not the goal, it can enhance engagement by allowing global collaboration and access to expertise.
This is the presentation file that accompanies my conference keynote session on maximizing a professional learning network with interactive technologies.
This document provides a comprehensive list of online tools and resources for building a personal learning network (PLN) including social networks, blogs, wikis, microblogs, RSS feeds, collaborative workspaces, presentations, photo sharing, discussions and more. It also lists specific PLN groups on sites like LinkedIn, Facebook, Ning and Second Life and invites the reader to join the author's own PLN through following her blogs, wiki and social media accounts.
Amir Shevat, Slack, @ashevat
As product managers and founders we know failing can be a good learning experience – and that is true, unless you fail because of something common or stupid that could have been avoided by simple methodologies. Many times we simply make irrational product decisions that prevent us from actually running valuable experiments. Avoiding common mistakes and taking better product decisions, by using easy hacks, could make or break your product and startup. In this session we will go over a few common product failures, as well as demonstrate simple methods and tricks to avoid these failures.
This document discusses various topics related to technology including memes, genes, human-computer interaction, augmented reality, transhumanism, biotechnology, open source, and the role of libraries. It emphasizes that while the speed of technological creation has increased, our understanding has not kept pace. It concludes by questioning what we will do with our creative abilities - destroy the world, light the way for others, or help others light their own candles.
Maximising Your SERP Potential - Enhance your listings with Rich Snippets Peter Handley
The document discusses how to maximize search engine results page (SERP) potential by enhancing website listings with rich snippets. It explains what rich snippets are, why they are important for increasing click-through rates, and how to implement different types of rich snippets like reviews, recipes, and videos using microdata, microformats, or RDFa. Tools for testing rich snippets are also recommended.
BBC Backstage Web Horizon 2007 PresentationIan Forrester
The document discusses the evolution of the internet and web technologies. It summarizes that Web 2.0 emphasizes user collaboration and sharing through social media sites, wikis, and other tools. It also discusses key concepts in web development like collective intelligence, the architecture of participation, and how the internet has transitioned to being a platform for applications. Emerging technologies on the horizon are predicted to include improved data portability, identity management, and real-time communication capabilities.
Curso sobre Marketing Viral e Redes Sociais no Sinapro DF - Sindicato das Agencias de Publicidade. 24 e 25 de julho de 2009. Parte 2/3 - Sites e Ferramentas, etc.
A lot of product development projects suck. Most of the time because of a missing purpose and a clear focus on what is really important. Impact Mapping can help to create such a purpose and to focus on the capabilities that are in context with the business goals.
Tech Tools for the classroom. Includes Professional Development Sources, Organization, Teacher Tools, Classroom Tools, Teacher Websites, Student Websites, and Educational Games
What Do We Keep and What Do We Throw AwayDean Shareski
This document provides an agenda for the ABEL Summer Institute taking place from August 22-24, 2011. It includes the name of the organizer, Dean Shareski, and links to his website, blog, and social media profiles. A number of quotes and images are included on topics related to education such as embracing change, social learning, and the roles of teachers and learners. The document suggests considering which current roles to eliminate and moving from control to freedom. It also addresses issues like abundance versus scarcity of information and attention.
Plugging in: Leveraging Technology For EngagementShelley Paul
This document discusses leveraging technology for student engagement in learning. It emphasizes that the focus should be on instructional design rather than just integrating technology for its own sake. Effective engagement comes from providing students with choice, novelty, authentic tasks that allow them to create content and learn in a way that connects to the real world. When combined with digital tools, this can help students feel motivated and immersed in their learning through a sense of autonomy, mastery, and purpose.
This document discusses digital scholarship and creating a reputable digital footprint. It addresses three dimensions of digital scholarship: presence, identity, and reputation. It encourages establishing an online presence through blogging and social media to engage in public and community collaboration. It also addresses issues like managing information, open versus closed systems, and cultivating networks. The overall message is that a digital identity and network can enhance research dissemination and engagement.
The document discusses how to incorporate user experience (UX) design principles into agile development processes. It recommends conducting quick user interviews to understand user needs, creating low-fidelity prototypes to test early with users, and iterating the prototypes based on user feedback to refine the design. Conducting rapid and frequent user testing is important to iteratively improve the design and ensure it meets user needs. Adopting an agile mindset of frequent collaboration, iteration and user feedback is key for meaningful UX work.
Similar to Enable tweet-geolocation and don’t drive ERTs crazy! (20)
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
Enable tweet-geolocation and don’t drive ERTs crazy!
1. Enable tweet-geolocation and don’t drive ERTs crazy!
Improving situational awareness using Twitter
Juan Sixto, Oscar Peña, Bernhard Klein and Diego López-de-Ipiña
DeustoTech−Deusto Institute of Technology, University of Deusto
SMERST 2013. University of Warwick, Coventry UK
3. Motivations
● SABESS Project
● Social Networks provide high
availability compared to traditional
communication services.
● People usually tend to post more
often than alerting ERTs.
● Easy to automate the incoming
data (programmatic analysis)
http://www.flickr.com/photos/wiertz/8553028974
4. Why Twitter ?
Advantages
● Very popular communication tool
(>175M/day tweets and 200M users)
● De-facto tool for broadcasting news
● Real-time information
Drawbacks
● Short posts (140 characters max)
● Much noise in the Twitterverse
http://www.flickr.com/photos/usnavy/8154906115/
5. Extracting relevant information
● What?
● Incidents filtered by
keywords + context
● Where?
● User profile's location
● Geo-tagged tweets
● NER System
(Named Entity Recognition)
http://www.flickr.com/photos/rosauraochoa/3283888598/
8. Noise Reduction
● Slang Cleaner
● Stop Words
● Hashtags
● URLs
Oh My God, being woken up to a car on #fire
right outside my window, only in #Springfield!.
ttp://bitly.com/16KWmdM
● Mentions
http://www.flickr.com/photos/rarebeasts/4468517649/
15. Results
● NER Tool
Comparison
● Geo-location API
Comparison
http://www.flickr.com/photos/rosasay/4675053765/
16. Conclusions and Future Work
● Other Social Networks
● Improve Conversation
Graphs
● Increase Accuracy
http://www.flickr.com/photos/usnavy/8612336419
17. References
F. Abel, C. Hauff, G. J. Houben, R. Stronkman, and K. Tao. Semantics+ filtering+ search=
twitcident. exploring information in social web streams. In Proceedings of the 23rd ACM conference
on Hypertext and social media, pages 285–294, 2012.
S. Paradesi. Geotagging tweets using their content. In Proceedings of the Twenty-Fourth Interna-
tional Florida Artificial Intelligence Research Society Conference, 2011.
Jie Yin, A. Lampert, M. Cameron, B. Robinson, and R. Power. Using social media to enhance
emergency situation awareness. Intelligent Systems, IEEE, 27(6):52–59, December 2012.
A. Ritter, S. Clark, and O. Etzioni. Named entity recognition in tweets: an experimental study.
In Proceedings of the Conference on Empirical Methods in Natural Language Processing, pages
1524–1534, 2011.
http://www.flickr.com/photos/usnavy/8612336419
18. Enable tweet-geolocation and don’t drive ERTs crazy!
Improving situational awareness using Twitter
Juan Sixto Cesteros
jsixto@deusto.es
@JuanSixtoC
Juan Sixto, Oscar Peña, Bernhard Klein and Diego López-de-Ipiña
DeustoTech−Deusto Institute of Technology, University of Deusto
SMERST 2013. University of Warwick, Coventry UK
19. Enable tweet-geolocation and don’t drive ERTs crazy!
Improving situational awareness using Twitter
All rights of images are reserved by the original owners*,
the rest of the content is licensed under a
Creative Commons by-sa 3.0 license.
*See references in each slide