4 minutes long "lighting talk" on augmented reality application that plays with CD/LP booklets of INSANIA rock band. Highlighting problems with teaching people how to interact with objects in a digitally augmented environment.
Este documento describe diferentes métodos de investigación. Explica que un método de investigación es el procedimiento utilizado por un investigador para adquirir conocimiento. Luego describe los principales métodos como el método científico, métodos inductivo y deductivo, métodos analítico y sintético, método comparativo, método dialéctico y método cuantitativo. Cada método se utiliza para examinar fenómenos de manera sistemática y obtener conclusiones válidas.
Istanbul is Turkey's economic center, with a population of over 13 million in 2011 that is projected to reach 16 million by 2020. The economy relies heavily on manufacturing, though business services are emerging as the main driver of growth. Between 2006-2011, GDP grew at an average of 9.2% annually while unemployment remained around 11.8%. Household incomes and expenditures differ from the rest of Turkey, with Istanbul residents spending a lower portion of budgets on food and higher amounts on housing and transportation due to typically higher incomes in the city.
Este documento contiene la información de un trabajo realizado por la alumna Natali Cardenas Ramos para la facultad de Ingeniería de Sistemas Ofimática. El trabajo contiene 20 secciones que explican cómo configurar diferentes aspectos de un sistema operativo Windows como la configuración de energía, la barra de tareas, el explorador, fecha y hora, actualizaciones, ejecución de programas, correo electrónico, compresión de archivos, asignación de unidades, instalación de impresoras y reproducción automática de dispositivos extraíbles.
The Retargeting Series: Foundational 3-Audience RetargetingSearch Scientists
Engage with the most qualified part of your sales funnel with this retargeting strategy. BOFU Retargeting involves hitting the bottom of your sales funnel, and serving them an offer to make it a no-brainer to convert.
Multimedia adalah interaksi antara berbagai media seperti teks, gambar, suara, animasi dan video. Aplikasi multimedia meliputi pendidikan, hiburan, medis dan arsitektur. Perangkat keras yang dibutuhkan antara lain kartu suara, speaker dan mikrofon. Unsur-unsur multimedia mencakup teks, suara, gambar statis, animasi dan video. Perangkat lunak seperti Authorware digunakan untuk membuat program multimedia. Virtual reality menggunakan perangkat seperti sar
Este documento describe diferentes métodos de investigación. Explica que un método de investigación es el procedimiento utilizado por un investigador para adquirir conocimiento. Luego describe los principales métodos como el método científico, métodos inductivo y deductivo, métodos analítico y sintético, método comparativo, método dialéctico y método cuantitativo. Cada método se utiliza para examinar fenómenos de manera sistemática y obtener conclusiones válidas.
Istanbul is Turkey's economic center, with a population of over 13 million in 2011 that is projected to reach 16 million by 2020. The economy relies heavily on manufacturing, though business services are emerging as the main driver of growth. Between 2006-2011, GDP grew at an average of 9.2% annually while unemployment remained around 11.8%. Household incomes and expenditures differ from the rest of Turkey, with Istanbul residents spending a lower portion of budgets on food and higher amounts on housing and transportation due to typically higher incomes in the city.
Este documento contiene la información de un trabajo realizado por la alumna Natali Cardenas Ramos para la facultad de Ingeniería de Sistemas Ofimática. El trabajo contiene 20 secciones que explican cómo configurar diferentes aspectos de un sistema operativo Windows como la configuración de energía, la barra de tareas, el explorador, fecha y hora, actualizaciones, ejecución de programas, correo electrónico, compresión de archivos, asignación de unidades, instalación de impresoras y reproducción automática de dispositivos extraíbles.
The Retargeting Series: Foundational 3-Audience RetargetingSearch Scientists
Engage with the most qualified part of your sales funnel with this retargeting strategy. BOFU Retargeting involves hitting the bottom of your sales funnel, and serving them an offer to make it a no-brainer to convert.
Multimedia adalah interaksi antara berbagai media seperti teks, gambar, suara, animasi dan video. Aplikasi multimedia meliputi pendidikan, hiburan, medis dan arsitektur. Perangkat keras yang dibutuhkan antara lain kartu suara, speaker dan mikrofon. Unsur-unsur multimedia mencakup teks, suara, gambar statis, animasi dan video. Perangkat lunak seperti Authorware digunakan untuk membuat program multimedia. Virtual reality menggunakan perangkat seperti sar
The document discusses the American rock band Bon Jovi, formed in 1983 in New Jersey by lead singer Jon Bon Jovi. It mentions the band's first single "We Weren't Born to Follow" from their album "The Circle", which ironically was the last song the band composed for that album. It also references the lyrics from Bon Jovi's song "Always".
Dokumen tersebut membahas tentang pengertian software, jenis-jenis software berdasarkan fungsi, bahasa pemrograman, dan klasifikasi software berdasarkan cara mendapatkan hak pemakaiannya.
Teknologi informasi dan jaringan komputer yang semakin meningkat telah menyebabkan peningkatan kejahatan komputer. Ancaman keamanan komputer meliputi serangan fisik, sintaktik, semantik, virus, trojan, dan hacker. Untuk mencegahnya diperlukan pengamanan fisik, akses, data, komunikasi, serta penerapan prinsip-prinsip keamanan.
Dokumen tersebut membahas tentang jaringan komputer, mulai dari definisi, tujuan, manfaat, jangkauan (LAN, MAN, WAN), jenis LAN (peer to peer, client server), komponen LAN (hardware dan software), dan protokol jaringan komputer.
This document discusses global economic trends and their implications for international business. It outlines several key global trends, including persistent slow global growth, uncertainty in major economies, and growing dynamism in emerging markets. Emerging markets are fueling much of the global economic growth. China is the largest emerging market and consumer market. The document also discusses the rise of the global middle class, particularly in emerging markets, and how this growing middle class presents opportunities for multinational businesses.
The document provides information on 14 luxury hotel openings anticipated for 2014. The hotels will be located in diverse locations around the world and will range from 87 to 434 rooms. Many will incorporate green designs and utilize local materials and styles. Amenities will include spas, pools, restaurants and meeting spaces. Architectural styles will include Spanish Revival, Venetian, and traditional designs with modern luxuries.
Este documento describe los pasos para realizar varias tareas de administración de sistemas en Windows, incluyendo la conexión a escritorios remotos, la creación de usuarios y grupos, el control parental, la administración de discos, y la configuración de directivas de seguridad. Explica cómo establecer conexiones remotas entre máquinas, crear y administrar usuarios y grupos, establecer restricciones y límites de tiempo para cuentas de usuario, administrar unidades y particiones de disco, y configurar complejidad de contraseñ
Symbolism originated in late 19th century France as an art movement that sought to express personal emotions and visions through non-naturalistic styles and mystical symbolism rather than a literal depiction of reality. Key characteristics of Symbolism included the use of symbolic subjects and metaphors over realistic representations to express themes of love, death, and the soul. Major Symbolist artists included Gustave Moreau, Odilon Redon, and Pierre Puvis de Chavannes who painted emotionally evocative works influenced by dreams, mythology, and mysticism. Symbolism had a significant impact on later artistic movements like Expressionism and Surrealism that also emphasized inner experience over outer reality.
Down the Rabbit Hole, Into the Fallopian Tree, and Through the Vaginal Tunnel...Chris Olson
This document is an academic paper that analyzes female sexuality and coming of age themes in the films Spirited Away, Pan's Labyrinth, and Coraline. It discusses how these films contain elements that reference classic fairy tales like Alice in Wonderland, including tunnels to other worlds, talking animals, frightening authority figures, and a young girl's journey of discovery. Specifically, it explores how the films depict themes of sexual awakening, relationships with older male figures, forbidden rooms and doorways representing sexuality, the role of "other mothers", and the impact of body image issues on female sexuality.
Gangstas, Thugs, Vikings and Drivers: Depictions of Masculinity and the Sear...Chris Olson
A look at how masculinity is depicted in the films of Nicolas Winding Refn. I argue that while the characters in Refn's films appear to conform to or embody traditional notions of dominant masculinity, they actually present a subversion of traditional gender norms.
Este documento describe la endoftalmitis infecciosa postraumática. Explica que es una complicación rara pero grave de los traumatismos oculares, con una incidencia del 3.4% en heridas abiertas del globo ocular. Los factores que afectan su evolución incluyen el tipo de herida, microorganismo causal, presencia o ausencia de C.E.I.O. y tiempo hasta el tratamiento. También describe los diferentes tipos de endoftalmitis y factores de riesgo asociados a la endoftalmitis
Culture turkey as an illustration- 2013-cavusgilobdogan
This document provides an overview of cultural insights that are essential for international business. It discusses what culture is, including national culture and other cultural influences. It examines cultural differences that can impact areas like human resource management and entrepreneurship. Specific details are provided on Turkish culture, including cultural metaphors, expressions, and challenges around press freedom. Resources for learning more about Turkish culture, travel, and business are also listed.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
The document discusses the American rock band Bon Jovi, formed in 1983 in New Jersey by lead singer Jon Bon Jovi. It mentions the band's first single "We Weren't Born to Follow" from their album "The Circle", which ironically was the last song the band composed for that album. It also references the lyrics from Bon Jovi's song "Always".
Dokumen tersebut membahas tentang pengertian software, jenis-jenis software berdasarkan fungsi, bahasa pemrograman, dan klasifikasi software berdasarkan cara mendapatkan hak pemakaiannya.
Teknologi informasi dan jaringan komputer yang semakin meningkat telah menyebabkan peningkatan kejahatan komputer. Ancaman keamanan komputer meliputi serangan fisik, sintaktik, semantik, virus, trojan, dan hacker. Untuk mencegahnya diperlukan pengamanan fisik, akses, data, komunikasi, serta penerapan prinsip-prinsip keamanan.
Dokumen tersebut membahas tentang jaringan komputer, mulai dari definisi, tujuan, manfaat, jangkauan (LAN, MAN, WAN), jenis LAN (peer to peer, client server), komponen LAN (hardware dan software), dan protokol jaringan komputer.
This document discusses global economic trends and their implications for international business. It outlines several key global trends, including persistent slow global growth, uncertainty in major economies, and growing dynamism in emerging markets. Emerging markets are fueling much of the global economic growth. China is the largest emerging market and consumer market. The document also discusses the rise of the global middle class, particularly in emerging markets, and how this growing middle class presents opportunities for multinational businesses.
The document provides information on 14 luxury hotel openings anticipated for 2014. The hotels will be located in diverse locations around the world and will range from 87 to 434 rooms. Many will incorporate green designs and utilize local materials and styles. Amenities will include spas, pools, restaurants and meeting spaces. Architectural styles will include Spanish Revival, Venetian, and traditional designs with modern luxuries.
Este documento describe los pasos para realizar varias tareas de administración de sistemas en Windows, incluyendo la conexión a escritorios remotos, la creación de usuarios y grupos, el control parental, la administración de discos, y la configuración de directivas de seguridad. Explica cómo establecer conexiones remotas entre máquinas, crear y administrar usuarios y grupos, establecer restricciones y límites de tiempo para cuentas de usuario, administrar unidades y particiones de disco, y configurar complejidad de contraseñ
Symbolism originated in late 19th century France as an art movement that sought to express personal emotions and visions through non-naturalistic styles and mystical symbolism rather than a literal depiction of reality. Key characteristics of Symbolism included the use of symbolic subjects and metaphors over realistic representations to express themes of love, death, and the soul. Major Symbolist artists included Gustave Moreau, Odilon Redon, and Pierre Puvis de Chavannes who painted emotionally evocative works influenced by dreams, mythology, and mysticism. Symbolism had a significant impact on later artistic movements like Expressionism and Surrealism that also emphasized inner experience over outer reality.
Down the Rabbit Hole, Into the Fallopian Tree, and Through the Vaginal Tunnel...Chris Olson
This document is an academic paper that analyzes female sexuality and coming of age themes in the films Spirited Away, Pan's Labyrinth, and Coraline. It discusses how these films contain elements that reference classic fairy tales like Alice in Wonderland, including tunnels to other worlds, talking animals, frightening authority figures, and a young girl's journey of discovery. Specifically, it explores how the films depict themes of sexual awakening, relationships with older male figures, forbidden rooms and doorways representing sexuality, the role of "other mothers", and the impact of body image issues on female sexuality.
Gangstas, Thugs, Vikings and Drivers: Depictions of Masculinity and the Sear...Chris Olson
A look at how masculinity is depicted in the films of Nicolas Winding Refn. I argue that while the characters in Refn's films appear to conform to or embody traditional notions of dominant masculinity, they actually present a subversion of traditional gender norms.
Este documento describe la endoftalmitis infecciosa postraumática. Explica que es una complicación rara pero grave de los traumatismos oculares, con una incidencia del 3.4% en heridas abiertas del globo ocular. Los factores que afectan su evolución incluyen el tipo de herida, microorganismo causal, presencia o ausencia de C.E.I.O. y tiempo hasta el tratamiento. También describe los diferentes tipos de endoftalmitis y factores de riesgo asociados a la endoftalmitis
Culture turkey as an illustration- 2013-cavusgilobdogan
This document provides an overview of cultural insights that are essential for international business. It discusses what culture is, including national culture and other cultural influences. It examines cultural differences that can impact areas like human resource management and entrepreneurship. Specific details are provided on Turkish culture, including cultural metaphors, expressions, and challenges around press freedom. Resources for learning more about Turkish culture, travel, and business are also listed.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
1. Augmented
reality
playing with CD/LP booklets
Michal Karm Babacek
tutor: RNDr. Bc. Jon´aˇs NicktTwisp ˇSevˇc´ık
Faculty of Informatics, Masaryk University
2014-06-20
ver.: git commit 0d8d1b6, 2014-06-20, by Karm, karm@email.cz
3. Augmented reality
Michal Karm
Babacek
What is it good for?
Technologies
References
Mission
• + Figuring out what to do with AR
• + Drawing attention to INSANIA band
• + Observing people’s reactions
• – Won’t do anything without CD/booklet
3 / 5
4. Augmented reality
Michal Karm
Babacek
What is it good for?
Technologies
References
Tech — Android +
• Qualcomm Vuforia
• Scale-Invariant Feature Transform (SIFT)
• OpenGL ES 2.0
• Java — JNI — C (++ )
• Blender
• Facebook SDK
4 / 5
5. Augmented reality
Michal Karm
Babacek
What is it good for?
Technologies
References
References & Credits
• Head model — CerFriBar, Blend Swap
• Icons, pictures etc. — Insania
• Audio — Insania
• Math — Vuforia
INSANIA App goo.gl/TQZkQs
Vuforia vuforia.com
Android — OpenGL ES 2.0 goo.gl/c6W49O
Blend Swap blendswap.com
5 / 5