Internet has permeated to every sphere of our lives. Facebook and WhatsApp have pervaded to every sphere of our lives.
Hoevver, the generation 1950s and earlier have to a lrge extent been unable to grapple with the complexities of this new medium.
Internet Safety for Elder Adults and Beginners is a quick step guide to such adults, to both simplify and yet make them aware of the consequences of their action.
The idea is not to create fear of the monster, but to get them relate the safety precautions to what they would take in offline world.
Would appreciate your suggestions. This is a crowd sourced effort and I am thankful to the contributors.
The Morality of Code - Glen Goodwin, SAS Institute, inc.NodejsFoundation
The act of writing code seems pretty innocuous. But what if it isn't? What if the code we write was being used in the wrong ways to hurt, to destroy, to exploit? What are the moral implications we should be considering as we hack away late into the night? How do we do the right thing in a world of software patents, privacy concerns, open source, and technological anarchy? Are we asking ourselves the right questions to find our own personal moral guidelines for writing code or are we just hoping for the best? This talk aims to not give anyone the answers but instead focus on the questions so that each of us can come to our own answers for ourselves.
Recommendations for the adoption of libre software in the public sector in So...Juan Pablo Puentes
"Recommendations for the adoption of libre software in the public sector in South America", Juan Pablo Puentes Vargas. Thesis for the LLM in Law and Technology at Tilburg University.
Internet has permeated to every sphere of our lives. Facebook and WhatsApp have pervaded to every sphere of our lives.
Hoevver, the generation 1950s and earlier have to a lrge extent been unable to grapple with the complexities of this new medium.
Internet Safety for Elder Adults and Beginners is a quick step guide to such adults, to both simplify and yet make them aware of the consequences of their action.
The idea is not to create fear of the monster, but to get them relate the safety precautions to what they would take in offline world.
Would appreciate your suggestions. This is a crowd sourced effort and I am thankful to the contributors.
The Morality of Code - Glen Goodwin, SAS Institute, inc.NodejsFoundation
The act of writing code seems pretty innocuous. But what if it isn't? What if the code we write was being used in the wrong ways to hurt, to destroy, to exploit? What are the moral implications we should be considering as we hack away late into the night? How do we do the right thing in a world of software patents, privacy concerns, open source, and technological anarchy? Are we asking ourselves the right questions to find our own personal moral guidelines for writing code or are we just hoping for the best? This talk aims to not give anyone the answers but instead focus on the questions so that each of us can come to our own answers for ourselves.
Recommendations for the adoption of libre software in the public sector in So...Juan Pablo Puentes
"Recommendations for the adoption of libre software in the public sector in South America", Juan Pablo Puentes Vargas. Thesis for the LLM in Law and Technology at Tilburg University.
Introduction to Software Licensing is a powerpoint presentation that I made up to raise our company\'s awareness about the use of proprietary software and the laws involve in it.
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
1. I do NOT release these program so that you "the end-user" can benefit from it in
the term of using software or any other of these releases without buying the
required licenses. R@1n, however, believe that everyone should have the option
to test and backup their program and be able to run it without any problems.
Further, I do NOT in any way condone the spreading of this program, in other
words I do NOT spread the releases to any websites, P2P networks or any other
public available location. I urge that this releases should not be spread like
that at all.
I R@1n has nothing to do with the distribution of these program, it is all done
by third parties. As such, and according to the laws where the individuals of i
reside, it is not my responsibility what others decides to do with these
releases. However, let it be said quite clearly:
"I DO NOT in any way condone the selling or redistribution of these program,
this was NEVER my intention."
R@1n does NOT take any responsibility of computer-loss or any data-errors that
may occur from using these program. Keep in mind that you are using a third
party solution to something we did not develop in the first place.
Do note that the usage of these program are legal in most countries outside the
United States, IF and ONLY IF you own a full copy of the program - then you may
use these program for backup purposes, and only that. It remains to be seen how
affected you are of the End User License Agreements (EULAs). They can't
supersede domestic laws, remember that.
According to the "DMCA ACT" in the Unites States, you have no rights to
circumvent a copy protection. Beware, they will punish you harder than if you
stole the shrinkwrapped software in a mall. Though R@1n's base of operation does
not reside in the Unites States, and thus I am NOT bound to the US legislations
like:
* No Electronic Theft Act
* Digital Millenium Copyright Act
* The Patriot Act
* "other US legislations"
You should ALWAYS buy the software that you do use.
This Software NOT encourage piracy, which is an act UNLAWFUL, as well as being a
lack of respect towards those who dedicate time and effort to the development of
applications.
I do not assume liability for incorrect use, that is NOT dedicated to a vision
for informational or educational study. With this I can tell you that I dedicate
myself to NOT piracy in any way, I care only to share and study all forms of
system and evasion.
I disagree, in any form, software piracy and are NOT responsible for a eventale
inappropriate or illegal use.
By using these program you automatically agree to the written agreement above,
and thus the responsibility regarding whatever you are affected by any EULAs is
with YOU and YOU only.
Thanks to: QAD, xinso, Hotbird64, nonosense, Nosferati87, Mikmik38, Cynecx,
heldigard, Daz, Alphawaves for the various source codes and the work!
Here are thanked all the people who have supported the development in all its
forms:
- Miky70
2. - Zanna
- Kabino
- Metalx
- GiorgioneMix90
Thanks for the translation:
- roonney (Português)
Thank you very much.
By R@1n.