The document provides an agenda for a Rascal Codefest event on March 3, 2010. It lists the presenters and provides an outline of the topics to be covered, including lightning introductions, a coding game, analysis, visualization, transformations, disclaimers, and an introduction to using Rascal.
Annotating with Annotations - DPC UnConRafael Dohms
What exactly are annotations? How can they change the way you code and make life simpler? Annotations allow you to implement new functionality into code using "notes" this allows you to easily maintain your own architecture but benefit from external tools. Let's look at how annotations are used today in PHP and how we can develop our own solutions based on the existing libraries.
Annotating with Annotations - ForumPHP 2012Rafael Dohms
What exactly are annotations? How can they change the way you code and make life simpler? Annotations allow you to implement new functionality into code using "notes" this allows you to easily maintain your own architecture but benefit from external tools. Let's look at how annotations are used today in PHP and how we can develop our own solutions based on the existing libraries.
The document discusses exploiting vulnerabilities in Adobe JavaScript and PDF files. It describes several exploits that take advantage of bugs in built-in functions/methods to trigger errors like stack overflows or memory corruption. Examples of exploited functions include customDictionaryOpen(), GetAnnots(), and getIcon(). Links are provided to exploits that can achieve code execution on vulnerable Adobe Reader versions.
Annotating with Annotations - PHPBenelux June/2012Rafael Dohms
What exactly are annotations? How can they change the way you code and make life simpler? Annotations allow you to implement new functionality into code using "notes" this allows you to easily maintain your own architecture but benefit from external tools. Let's look at how annotations are used today in PHP and how we can develop our own solutions based on the existing libraries.
Evgen Terpil "OCR in the Wild World of Social Media"Fwdays
За день користувачі соціальних мереж постять десятки мільйонів різних картинок. За статистикою кожна третя містить текст. Це може бути і свіжий веселий мем і звичайне селфі в футболці, яке містить напис та фото обкладинки нової книжки з невеликим рев'ю. Всі ці картинки можуть містити згадки різних брендів. Тому задача розпізнавання текстів на зображеннях і їх подальший аналіз дуже цікава для social media listening'а. Ми поговоримо про поточні SOTA підходи та як невеликими зусиллями натренувати власну модель для розпізнавання.
Website: https://fwdays.com/en/event/data-science-fwdays-2019/review/ocr-in-the-wild-world-of-social-media
This document discusses named entity recognition (NER) tasks and benchmarks for evaluating NER tools. It provides a brief history of NER benchmarks including CoNLL 2003/2005, ACE 2004-2007, TAC 2009, and ETAPE 2012. It also summarizes several standalone and web-based NER tools. The document outlines two human-annotated NER benchmarks, WEKEX 2011 and ISWC 2011, that were used to evaluate various NER tools and measure inter-annotator agreement. Finally, it introduces the NERD framework which aims to standardize and improve NER by developing an ontology, REST API, and linking NER extractions to Linked Open Data.
Eclipse Virgo presentation at OSGi Users' Forum UK (27 Apr 2010)mfrancis
Virgo is an open source dynamic enterprise application platform based on SpringSource dm Server 2.0. It aims to provide a better OSGi platform and enable easier migration of Java EE applications. Virgo solves problems with managing OSGi bundles and using existing libraries. It provisions applications from repositories and provides extensive diagnostics. Users can get started by downloading Virgo, dropping applications into its pickup directory, and exploring its documentation. The project is currently working to rename components, complete IP scrutiny, and release an initial baseline version.
Annotating with Annotations - DPC UnConRafael Dohms
What exactly are annotations? How can they change the way you code and make life simpler? Annotations allow you to implement new functionality into code using "notes" this allows you to easily maintain your own architecture but benefit from external tools. Let's look at how annotations are used today in PHP and how we can develop our own solutions based on the existing libraries.
Annotating with Annotations - ForumPHP 2012Rafael Dohms
What exactly are annotations? How can they change the way you code and make life simpler? Annotations allow you to implement new functionality into code using "notes" this allows you to easily maintain your own architecture but benefit from external tools. Let's look at how annotations are used today in PHP and how we can develop our own solutions based on the existing libraries.
The document discusses exploiting vulnerabilities in Adobe JavaScript and PDF files. It describes several exploits that take advantage of bugs in built-in functions/methods to trigger errors like stack overflows or memory corruption. Examples of exploited functions include customDictionaryOpen(), GetAnnots(), and getIcon(). Links are provided to exploits that can achieve code execution on vulnerable Adobe Reader versions.
Annotating with Annotations - PHPBenelux June/2012Rafael Dohms
What exactly are annotations? How can they change the way you code and make life simpler? Annotations allow you to implement new functionality into code using "notes" this allows you to easily maintain your own architecture but benefit from external tools. Let's look at how annotations are used today in PHP and how we can develop our own solutions based on the existing libraries.
Evgen Terpil "OCR in the Wild World of Social Media"Fwdays
За день користувачі соціальних мереж постять десятки мільйонів різних картинок. За статистикою кожна третя містить текст. Це може бути і свіжий веселий мем і звичайне селфі в футболці, яке містить напис та фото обкладинки нової книжки з невеликим рев'ю. Всі ці картинки можуть містити згадки різних брендів. Тому задача розпізнавання текстів на зображеннях і їх подальший аналіз дуже цікава для social media listening'а. Ми поговоримо про поточні SOTA підходи та як невеликими зусиллями натренувати власну модель для розпізнавання.
Website: https://fwdays.com/en/event/data-science-fwdays-2019/review/ocr-in-the-wild-world-of-social-media
This document discusses named entity recognition (NER) tasks and benchmarks for evaluating NER tools. It provides a brief history of NER benchmarks including CoNLL 2003/2005, ACE 2004-2007, TAC 2009, and ETAPE 2012. It also summarizes several standalone and web-based NER tools. The document outlines two human-annotated NER benchmarks, WEKEX 2011 and ISWC 2011, that were used to evaluate various NER tools and measure inter-annotator agreement. Finally, it introduces the NERD framework which aims to standardize and improve NER by developing an ontology, REST API, and linking NER extractions to Linked Open Data.
Eclipse Virgo presentation at OSGi Users' Forum UK (27 Apr 2010)mfrancis
Virgo is an open source dynamic enterprise application platform based on SpringSource dm Server 2.0. It aims to provide a better OSGi platform and enable easier migration of Java EE applications. Virgo solves problems with managing OSGi bundles and using existing libraries. It provisions applications from repositories and provides extensive diagnostics. Users can get started by downloading Virgo, dropping applications into its pickup directory, and exploring its documentation. The project is currently working to rename components, complete IP scrutiny, and release an initial baseline version.
These slides accompanied my presentation about my research process called "demo-driven research". The presentation was first held at Hasso Platner Institute on 2007-11-28.
pangeanic hybrid syntax-based approach to machine translation for Japanese, brief history of machine translation, productivity gains with machine translation
Computing for Human Experience and WellnessAmit Sheth
Talk at Venture Panel in Nov. 2005. Since this very early start, the ideas have substantially matured: a more recent version is at: http://www.slideshare.net/knoesis/computing-for-human-experience-v3
This document summarizes a presentation about the IzPack open source installation framework. It discusses IzPack's history and growth over time, from its initial creation in a student dorm room to becoming an industry-backed project. Key features of IzPack are highlighted, such as its cross-platform compatibility. The positioning of IzPack as complementing other installation technologies is described. Thoughts on open source software models and community management are also provided.
Scientific and Grid Workflow Management (SGS09)Cesare Pautasso
This document provides an introduction to scientific and grid workflows. It discusses how workflow management systems coordinate multiple distributed computational jobs on grid resources. These systems feature visual programming environments that allow scientists to model workflows as networks of analytical steps involving tasks like database access, data analysis, and computationally intensive jobs submitted to clusters or grids. The document then surveys selected workflow management tools and outlines current research trends in scientific and grid workflows.
Timothy Ng is the F# Lead at Microsoft Corporation. The document summarizes F#'s approach to parallelism and concurrency through tools like Visual F#, libraries like Parallel LINQ and Rx, and language features in F# like immutability and asynchronous workflows. It discusses challenges of shared state, code locality, I/O parallelism, and scaling to multiple machines that F# addresses through techniques like immutability, asynchronous workflows using async {...}, and agent-based programming. The summary concludes that F# with .NET 4.0 makes parallelism and asynchrony simple, powerful, and productive for both current and future use.
This document discusses the importance of metadata from a search engine perspective. It outlines how search engines have evolved to make use of metadata over time, from directly extracting metadata to enhance search results, to being able to search metadata directly and provide direct answers to queries. The document also notes that metadata adoption on the web has increased over time, with around 31% of webpages and 5% of domains now containing some metadata, primarily in the form of RDFa. Metadata allows search engines to better understand and organize content to provide more relevant search results.
The document discusses embracing concurrency for simpler code. It notes that hardware is becoming massively concurrent, providing an opportunity. While concurrency is viewed as hard, the fundamental problem may be lack of proper tools. Imperative languages often overlook concurrency as a core concept. A variety of desktop and media applications could benefit from a concurrent approach. The document advocates using concurrent components that communicate via messages while keeping data private. It also discusses software transactional memory and different perspectives in APIs for concurrent systems. Finally, it presents examples of using pipelines and graphlines as part of a concurrency domain specific language.
Invited Talk on "Semantic Model-driven Engineering" at the Microsoft Research Software Summit 2011, Paris, France, April 13-15, 2011; View video at http://research.microsoft.com/apps/video/default.aspx?id=150058
CREDITS / REFERENCE:
===================
http://www.themechrome.net/Images/Original/aaa.jpg http://activatedrinks.com/#/press http://www.webmedia-solutions.com/web-development-blog/wp-content/uploads/2009/01/web-2-0-logos.gif http://yiku.co/wp-content/uploads/2011/01/67bf1bb2g94361366956f690.jpg http://sixrevisions.com/web_design/the-evolution-of-web-design/ http://www.148apps.com/wp-content/uploads/2011/02/rdio.jpg http://www.desktopexchange.com/gallery/Widescreen-Wallpaper/evolution_1280x768 http://www.blogcdn.com/www.engadget.com/media/2010/12/bmw-connected-ios-app.jpg http://cdn.synthtopia.com/wp-content/uploads/2010/10/moog-filtatron.jpg http://venturebeat.files.wordpress.com/2011/09/gazelle-iphone-app.jpg http://phonerpt.com/wp-content/uploads/iOS-game-Cut-the-Rope-iPhone-iPad.jpg http://www.techtickle.com/wp-content/uploads/2010/11/facebook-app-iphone.jpg http://www.artofflightmovie.com/ http://makenetbg.com/wp-content/uploads/2011/06/servicios-makenet1.jpg http://charliecowan.files.wordpress.com/2011/08/noticeboard.jpg http://www.elipseagency.com/agency.html http://www.nikebetterworld.com/ http://2.bp.blogspot.com/_dCJEsq5nTZA/TJfyIHC87QI/AAAAAAAAAR4/S1hz8ltJY6U/s1600/Bel+Air+Split.jpg http://www.moodsofnorway.com/#/home http://www.ozoneeleven.com/wp-content/uploads/2010/05/Iron-Man-I-II_06.jpg http://www.netmagazine.com/opinions/mobile-apps-must-die http://www.mobileawesomeness.com http://upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Web_2.0_Map.svg/800px-Web_2.0_Map.svg.png http://www.devirtuoso.com/2009/05/html-vs-flash-websites-which-is-better/ http://www.webdesignshock.com/wp-content/uploads/2011/08/responsive00.jpg http://www.ri.gov/img/responsive/banner.jpg
slide related marks or contents are owned by individuals, or their related entities. This slide is neither endorsed by nor affiliated with any of these entities :)
Pangeanic presentation at Japan Translation Federation, detailing history of MT, productivity gains with MT at LSPs, data from Autodesk and CSA, description of PangeaMT system
Embracing concurrency for fun utility and simpler codekamaelian
The document discusses embracing concurrency for simpler code. It notes that hardware is becoming more concurrent, but most programming languages and tools treat concurrency as difficult. The Kamaelia project aims to make concurrency easy and usable for novice and advanced developers alike through fundamental control structures and messaging between components. Examples shown include using pipelines, graphlines, servers, and backplanes to build concurrent applications in a simple way.
Rajat Pashine is seeking a position in digital signal processing. He has a Master's degree in electrical engineering from Missouri University of Science and Technology with a GPA of 3.8/4.0 and a Bachelor's degree in electronics and instrumentation from India. His areas of interest include algorithm development, speech/audio processing, and image processing. He has experience with research assistantships involving signal processing and control systems as well as teaching assistantships teaching labs.
Is Advanced Verification for FPGA based Logic neededchiportal
The document discusses the need for advanced verification in FPGA-based logic design. It argues that FPGAs have similar complexity issues as ASICs for high-quality applications. While FPGAs allow for reprogramming, current FPGA verification relies on manual testing and debugging which has long cycle times and lacks visibility into test quality. The document proposes a new coverage-driven verification methodology using constrained random testing to improve productivity, quality, and certification. It demonstrates this methodology and discusses how it can find more bugs than manual testing while being less expensive.
Semantically-aware Networks and Services for Training and Knowledge Managemen...Gilbert Paquette
This document discusses semantically-aware networks and services for training and knowledge management. It describes software developed at CICE/LICEF for building ontologies and semantically referencing resources to enable semantic search and personalized recommendations. The TELOS system uses competency descriptors and comparison methods to power rules-based recommender agents that are integrated into learning scenarios to provide adaptive assistance to users. Future work is aimed at experimental validation, improving group recommendations, automation, and integrating other recommendation methods.
Richard Guidorizzi, Program Manager at DARPA's Information Innovation Office, gave a presentation at the DARPA Cyber Colloquium in Arlington, VA on November 7, 2011 about moving beyond passwords for authentication. The presentation discussed the unintended consequences of passwords, showing how many passwords were cracked in the Defcon 2010 Password Hacking Contest. It explained that passwords will always be problematic due to issues like people reusing the same passwords or choosing weak passwords based on patterns on the keyboard. The presentation explored using biometrics and behavioral analytics as more secure alternatives to passwords that can uniquely identify individuals. It announced an upcoming Active Authentication program seeking new authentication technologies.
UX and Business Analysts - Stop the MadnessAndrew Hinton
The document discusses problems with how software is typically designed and calls for a more user-centered approach. It argues that most software focuses too much on features rather than the user experience. In contrast, the app iA Writer is highlighted as an example of software designed to be enjoyable to use for its target users. The document calls for involving users more directly in the design process through techniques like personas and scenarios to help ensure software meets user needs and motivations.
The document discusses challenges related to software operation knowledge (SOK) integration. It describes how SOK data can be collected from various sources and used to improve software processes. However, challenges exist around visualizing and analyzing large amounts of technical and usage data, aligning business and technical metrics, handling big and real-time data, and addressing errors at different levels of software. The document advocates for continuous refinement of SOK integration objectives and requirements to optimize results.
These slides accompanied my presentation about my research process called "demo-driven research". The presentation was first held at Hasso Platner Institute on 2007-11-28.
pangeanic hybrid syntax-based approach to machine translation for Japanese, brief history of machine translation, productivity gains with machine translation
Computing for Human Experience and WellnessAmit Sheth
Talk at Venture Panel in Nov. 2005. Since this very early start, the ideas have substantially matured: a more recent version is at: http://www.slideshare.net/knoesis/computing-for-human-experience-v3
This document summarizes a presentation about the IzPack open source installation framework. It discusses IzPack's history and growth over time, from its initial creation in a student dorm room to becoming an industry-backed project. Key features of IzPack are highlighted, such as its cross-platform compatibility. The positioning of IzPack as complementing other installation technologies is described. Thoughts on open source software models and community management are also provided.
Scientific and Grid Workflow Management (SGS09)Cesare Pautasso
This document provides an introduction to scientific and grid workflows. It discusses how workflow management systems coordinate multiple distributed computational jobs on grid resources. These systems feature visual programming environments that allow scientists to model workflows as networks of analytical steps involving tasks like database access, data analysis, and computationally intensive jobs submitted to clusters or grids. The document then surveys selected workflow management tools and outlines current research trends in scientific and grid workflows.
Timothy Ng is the F# Lead at Microsoft Corporation. The document summarizes F#'s approach to parallelism and concurrency through tools like Visual F#, libraries like Parallel LINQ and Rx, and language features in F# like immutability and asynchronous workflows. It discusses challenges of shared state, code locality, I/O parallelism, and scaling to multiple machines that F# addresses through techniques like immutability, asynchronous workflows using async {...}, and agent-based programming. The summary concludes that F# with .NET 4.0 makes parallelism and asynchrony simple, powerful, and productive for both current and future use.
This document discusses the importance of metadata from a search engine perspective. It outlines how search engines have evolved to make use of metadata over time, from directly extracting metadata to enhance search results, to being able to search metadata directly and provide direct answers to queries. The document also notes that metadata adoption on the web has increased over time, with around 31% of webpages and 5% of domains now containing some metadata, primarily in the form of RDFa. Metadata allows search engines to better understand and organize content to provide more relevant search results.
The document discusses embracing concurrency for simpler code. It notes that hardware is becoming massively concurrent, providing an opportunity. While concurrency is viewed as hard, the fundamental problem may be lack of proper tools. Imperative languages often overlook concurrency as a core concept. A variety of desktop and media applications could benefit from a concurrent approach. The document advocates using concurrent components that communicate via messages while keeping data private. It also discusses software transactional memory and different perspectives in APIs for concurrent systems. Finally, it presents examples of using pipelines and graphlines as part of a concurrency domain specific language.
Invited Talk on "Semantic Model-driven Engineering" at the Microsoft Research Software Summit 2011, Paris, France, April 13-15, 2011; View video at http://research.microsoft.com/apps/video/default.aspx?id=150058
CREDITS / REFERENCE:
===================
http://www.themechrome.net/Images/Original/aaa.jpg http://activatedrinks.com/#/press http://www.webmedia-solutions.com/web-development-blog/wp-content/uploads/2009/01/web-2-0-logos.gif http://yiku.co/wp-content/uploads/2011/01/67bf1bb2g94361366956f690.jpg http://sixrevisions.com/web_design/the-evolution-of-web-design/ http://www.148apps.com/wp-content/uploads/2011/02/rdio.jpg http://www.desktopexchange.com/gallery/Widescreen-Wallpaper/evolution_1280x768 http://www.blogcdn.com/www.engadget.com/media/2010/12/bmw-connected-ios-app.jpg http://cdn.synthtopia.com/wp-content/uploads/2010/10/moog-filtatron.jpg http://venturebeat.files.wordpress.com/2011/09/gazelle-iphone-app.jpg http://phonerpt.com/wp-content/uploads/iOS-game-Cut-the-Rope-iPhone-iPad.jpg http://www.techtickle.com/wp-content/uploads/2010/11/facebook-app-iphone.jpg http://www.artofflightmovie.com/ http://makenetbg.com/wp-content/uploads/2011/06/servicios-makenet1.jpg http://charliecowan.files.wordpress.com/2011/08/noticeboard.jpg http://www.elipseagency.com/agency.html http://www.nikebetterworld.com/ http://2.bp.blogspot.com/_dCJEsq5nTZA/TJfyIHC87QI/AAAAAAAAAR4/S1hz8ltJY6U/s1600/Bel+Air+Split.jpg http://www.moodsofnorway.com/#/home http://www.ozoneeleven.com/wp-content/uploads/2010/05/Iron-Man-I-II_06.jpg http://www.netmagazine.com/opinions/mobile-apps-must-die http://www.mobileawesomeness.com http://upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Web_2.0_Map.svg/800px-Web_2.0_Map.svg.png http://www.devirtuoso.com/2009/05/html-vs-flash-websites-which-is-better/ http://www.webdesignshock.com/wp-content/uploads/2011/08/responsive00.jpg http://www.ri.gov/img/responsive/banner.jpg
slide related marks or contents are owned by individuals, or their related entities. This slide is neither endorsed by nor affiliated with any of these entities :)
Pangeanic presentation at Japan Translation Federation, detailing history of MT, productivity gains with MT at LSPs, data from Autodesk and CSA, description of PangeaMT system
Embracing concurrency for fun utility and simpler codekamaelian
The document discusses embracing concurrency for simpler code. It notes that hardware is becoming more concurrent, but most programming languages and tools treat concurrency as difficult. The Kamaelia project aims to make concurrency easy and usable for novice and advanced developers alike through fundamental control structures and messaging between components. Examples shown include using pipelines, graphlines, servers, and backplanes to build concurrent applications in a simple way.
Rajat Pashine is seeking a position in digital signal processing. He has a Master's degree in electrical engineering from Missouri University of Science and Technology with a GPA of 3.8/4.0 and a Bachelor's degree in electronics and instrumentation from India. His areas of interest include algorithm development, speech/audio processing, and image processing. He has experience with research assistantships involving signal processing and control systems as well as teaching assistantships teaching labs.
Is Advanced Verification for FPGA based Logic neededchiportal
The document discusses the need for advanced verification in FPGA-based logic design. It argues that FPGAs have similar complexity issues as ASICs for high-quality applications. While FPGAs allow for reprogramming, current FPGA verification relies on manual testing and debugging which has long cycle times and lacks visibility into test quality. The document proposes a new coverage-driven verification methodology using constrained random testing to improve productivity, quality, and certification. It demonstrates this methodology and discusses how it can find more bugs than manual testing while being less expensive.
Semantically-aware Networks and Services for Training and Knowledge Managemen...Gilbert Paquette
This document discusses semantically-aware networks and services for training and knowledge management. It describes software developed at CICE/LICEF for building ontologies and semantically referencing resources to enable semantic search and personalized recommendations. The TELOS system uses competency descriptors and comparison methods to power rules-based recommender agents that are integrated into learning scenarios to provide adaptive assistance to users. Future work is aimed at experimental validation, improving group recommendations, automation, and integrating other recommendation methods.
Richard Guidorizzi, Program Manager at DARPA's Information Innovation Office, gave a presentation at the DARPA Cyber Colloquium in Arlington, VA on November 7, 2011 about moving beyond passwords for authentication. The presentation discussed the unintended consequences of passwords, showing how many passwords were cracked in the Defcon 2010 Password Hacking Contest. It explained that passwords will always be problematic due to issues like people reusing the same passwords or choosing weak passwords based on patterns on the keyboard. The presentation explored using biometrics and behavioral analytics as more secure alternatives to passwords that can uniquely identify individuals. It announced an upcoming Active Authentication program seeking new authentication technologies.
UX and Business Analysts - Stop the MadnessAndrew Hinton
The document discusses problems with how software is typically designed and calls for a more user-centered approach. It argues that most software focuses too much on features rather than the user experience. In contrast, the app iA Writer is highlighted as an example of software designed to be enjoyable to use for its target users. The document calls for involving users more directly in the design process through techniques like personas and scenarios to help ensure software meets user needs and motivations.
The document discusses challenges related to software operation knowledge (SOK) integration. It describes how SOK data can be collected from various sources and used to improve software processes. However, challenges exist around visualizing and analyzing large amounts of technical and usage data, aligning business and technical metrics, handling big and real-time data, and addressing errors at different levels of software. The document advocates for continuous refinement of SOK integration objectives and requirements to optimize results.
This document discusses software engineering and improving how people build software systems. It mentions requirements, testing, and deployment as key parts of the software engineering process. The rest of the document focuses on end-user programming with spreadsheets, noting that spreadsheets are widely used in business and often form the basis for important decisions, but they can contain errors if they lack documentation or are used by multiple people over many years. The document describes research interviewing spreadsheet users to understand frustrations and likes, then developing tools to help users understand and diagnose spreadsheets based on feedback from real users in practice.
The top 10 security issues in web applicationsDevnology
The top 10 security issues in web applications are:
1. Injection flaws such as SQL, OS, and LDAP injection.
2. Cross-site scripting (XSS) vulnerabilities that allow attackers to execute scripts in a victim's browser.
3. Broken authentication and session management, such as not logging users out properly or exposing session IDs.
4. Insecure direct object references where users can directly access files without authorization checks.
5. Cross-site request forgery (CSRF) that tricks a user into performing actions they did not intend.
6. Security misconfiguration of web or application servers.
7. Insecure cryptographic storage of passwords or sensitive data.
8
The document discusses smartcards and RFID tags, explaining that they provide more secure authentication than passwords but are still vulnerable to hacking through logical attacks targeting flaws in cryptographic algorithms, key management, or security protocols, or through physical attacks manipulating the hardware. It also provides examples of attacks that have broken proprietary crypto systems in smartcards and weaknesses like default keys that have enabled attacks on key management.
(1) The document provides instructions for installing the CounterClockwise plugin for Eclipse to get an IDE for Clojure development. (2) It describes how to create and load Clojure files and launch a REPL for evaluation. (3) The document includes exercises on Clojure basics like functions, macros, and functional programming techniques as well as examples for implementing macros.
Presentation introducing LISP, looking at the history and concepts behind this powerfull programming language.
Presentation by Tijs van der Storm for the sept 2012 Devnology meetup at the Mirabeau offices in Amsterdam
Devnology Back to School: Empirical Evidence on Modeling in Software DevelopmentDevnology
Modeling is a common part of modern day software engineering practice. Little scientific evidence is known about how models are made and how they help in producing better software. In this talk Michel Chaudron presents highlights from a decade of research that he has performed in the area of software modeling using UML. Topics that will be addressed: What is the state of UML modeling in practice? What are effective techniques for assessing the quality of UML models? How do engineers look at UML models? Do UML models actually help in creating better software?
Devnology Back to School IV - Agility en ArchitectuurDevnology
The document discusses whether agility and architecture can coexist. It notes there is tension between adaptation (agile) and anticipation (architecture). However, the conflict depends on context, including the semantics of architecture, scope, life cycle stage, role, documentation needs, and methods used. Not all design requires architecture. With the right context, agility and architecture can be balanced.
Devnology Back to School III : Software impactDevnology
Michiel van Genuchten talk on software impact, based on a series of columns in IEEE Software discussing the impact on software and analysis of size and volume of software.
Introduction to Software Evolution: The Software VolcanoDevnology
The document discusses software evolution and maintenance. It notes that as software ages, more resources are spent on maintenance and enhancements rather than new projects. The "software volcano" refers to the estimated 750 gigalines of COBOL code and 900 gigalines of C code worldwide, containing an estimated 35 gigabugs. Issues with software maintenance include increasing complexity over time, lack of testing and documentation, and difficulty adapting to changing business needs. Solutions include refactoring, automated testing, knowledge management, and adopting frameworks like ITIL.
GenPro is a genetic programming framework that allows programs to be represented as grids of "cells", where each cell contains a method call. It uses genetic algorithms such as crossover and mutation to evolve programs. The document discusses GenPro's program representations, how solutions are evaluated and bred, challenges in the framework, and ideas for future extensions such as loop support and stateful objects.
Spoofax: ontwikkeling van domeinspecifieke talen in EclipseDevnology
The Spoofax Language Workbench provides tools for defining domain-specific languages (DSLs) with specialized syntax, semantics, and editor services. It offers declarative syntax definition with SDF, model transformations, static analysis for error checking, and semantic services for editors like content completion and error marking. Spoofax aims to make implementing these DSL features cheaply and integrates language development and use into the Eclipse IDE.
This document discusses augmented reality (AR) and describes how to set up an AR experience using the GDDF format. It includes details on loading dimensions, refreshing experiences over time or distance, and defines the required GDDF elements like locations, assets, features and overlays. Instructions are provided on tools for exploring AR on Android and iPhone as well as a POST request format for refreshing experiences. The goal is to get readers interested in designing their own AR dimensions.
The document discusses unit testing for Silverlight applications. It provides an overview of model-view-viewmodel (MVVM) patterns, and examples of writing unit tests for a Silverlight application using the StatLight testing framework. Examples include tests for view models, models, and data services using common unit testing assertions and attributes.
mobl: Een DSL voor mobiele applicatieontwikkelingDevnology
This document discusses mobile application development using MOBL, a domain-specific language for building mobile web applications. It provides examples of building user interfaces, adding scripting capabilities, modeling and querying data, and integrating with native device APIs like geolocation using higher-order controls. Future directions are mentioned like adaptive UIs, offline support, and hybrid web/native applications. Code samples demonstrate creating a tip calculator, scripting functions, modeling task data, and accessing local storage on a device.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Mind map of terminologies used in context of Generative AI
Rascal Devnology Code Fest
1. Rascal Codefest
Woensdag 3 maart 2010
Jurgen Vinju
&& Tijs van der Storm
&& Bas Basten
&& Jeroen van den Bos
&& Mark Hills
Thursday, March 4, 2010
2. Installation art
go ah
ea d!
Eclipse Galileo 3.5 for RCP/Plugin developers
32-bit version (yes, also on 64-bit machine)
32-bit Java run-time (JRE >= version 1.5)
Install plugins
http://download.eclipse.org/technology/imp/updates
IMP run-time & IMP analysis features
http://www.meta-environment.org/updates
Rascal feature
Thursday, March 4, 2010
3. Exam
ple o p
en so
urce
Java
proje
ct
http://www.rascal-mpl.org/releases/Prefuse.zip
http://www.prefuse.org
Thursday, March 4, 2010
4. Rascal Team
Paul Jurgen Tijs Bob
Klint Vinju v/d Storm Fuhrer
IBM
A
INRI I/INR
IA
CW
Arnold Bert
Bas Emilie Mark Jeroen
Lankamp Lisser
Basten Balland Hills van den Bos
Thursday, March 4, 2010
5. Codefest
Lightning intro
Coding Game
Ana
lysis
analysis !!
zatio n!!
visualization Visuali
transformation No Generat
ion to day
Disclaimers/Advertisements oday
sin gt
oPar
N
Thursday, March 4, 2010
6. Meta Software
(Static)
s Program
A nalysiDead code detection Tra
Goto elimination nsfor
matio
Slicing/Dependence Dialect transformation
Metrics Aspect weaving
Reverse engineering DSL compilers
Verification API migration
Architecture recovery Model-to-code
Code-to-model ...
...
Thursday, March 4, 2010
7. Challenges
Diversity
languages, dialects, frameworks, api, ...
Multi-disciplinary
parsing, static analysis, transformation, ...
Efficiency versus precision
trade-off must be programmable
Thursday, March 4, 2010
9. So, Rascal is a domain specific language
for
source code
analysis
and
transformation
and
visualization
and
generation
and
nothing less
(and nothing more)
Thursday, March 4, 2010
10. Use
File extension: .rsc
Open “Rascal Persective”
Use “New Rascal Project” wizard
Use “New Rascal File” wizard
Context-menu on Rascal projects
Start Console
Thursday, March 4, 2010
13. Modules
module path::to::Examples
import IO;
public int fac(int n) {
if (n == 0) {
return 1;
}
return n * fac(n - 1);
}
Thursday, March 4, 2010
14. From coding to declaring
list[int] even(int max) {
list[int] result = [];
for (int i <- [0..max]) {
if (i % 2 == 0) {
result += i;
}
}
return result;
}
Thursday, March 4, 2010
15. From coding to declaring
list[int] even(int max) {
list[int] result = [];
for (int i <- [0..max], i%2 == 0) {
result += i;
}
return result;
}
Thursday, March 4, 2010
16. From coding to declaring
list[int] even(int max) {
result = [];
for (i <- [0..max], i%2 == 0) {
result += i;
}
return result;
}
Thursday, March 4, 2010
17. From coding to declaring
list[int] even(int max) {
return for (i <- [0..max], i%2 == 0)
append i;
}
Thursday, March 4, 2010
18. From coding to declaring
list[int] even(int max) {
return [i | i <- [0..max], i%2 == 0];
}
Thursday, March 4, 2010
19. Immutable values
WYSIWYG values (“1”:1, “2”:2)
true, false name(“Y.T.”)
1, 2, 3, ... <1,2>, <1,2,1.0>
1.0, 1.1, 1.11111111 {<1,2>,2,1>}
[1,2,3] Nest any way you
like
{1,2,3}
Thursday, March 4, 2010
20. Types
value
list[void]: []
list[int]: [1] int str list[value] ...
list[value]: [1, “1”]
set[int]: {1}
set[value]: {1,”1”} void
Thursday, March 4, 2010
21. Sub-types
value
list[value]
real
int list[real]
list[int]
bool
“A sub-type is a sub-set”
Thursday, March 4, 2010
22. Trees and Data
node myNode = “person”(“Y.T”, 18);
data Person = person(str name, int age)
| person(str first, str last);
Person YT = person(“Y.T”, 18);
Person MC = person(“Hiro”, “Protagonist”);
Thursday, March 4, 2010
23. Trees and Data
node myNode = “person”(“Y.T”, 18);
data Person = person(str name, int age)
| person(str first, str last);
node
Person YT = person(“Y.T”, 18);
Person MC = person(“Hiro”, “Protagonist”);
Person
Thursday, March 4, 2010
24. Switch
bool isPerson(node t) {
switch (t)
case person(_,_) : return true;
case person(_,_,_) : return true;
default: return false;
}
}
Thursday, March 4, 2010
25. Visit
set[Person] personTrafo(set[Person] s) {
return visit(s) {
case person(str f, str l) =>
person(“<l>,<f>”, 0)
case person(str f, str l) : {
name = “<l>, <f>”;
println(name);
insert name;
}
}
}
Thursday, March 4, 2010
26. Booleans & Patterns
true && false, true || false, !true
true ==> false, true <==> false
all( i <- [2,4,6,8], i % 2 == 0)
int i := x
<int i, int j> := <1,”2”>
person(str name) <- {person(“x”)}
/<word:[a-z]+>/ <- [“123”,”abc”]
Thursday, March 4, 2010
28. Unfi
Concrete Syntax nish
ed
import lang::ansiC::CompilationUnit
...
visit(s) {
case `if(!<expr>) <stat1> else <stat2>` =>
`if(<expr>) <stat2> else <stat1>`
}
Thursday, March 4, 2010
29. Finally! Coding
Warm-up
Analyze & visualize a Java project
Extension Pie Chart / Histogram
Make a word cloud for Java code
Compute deepest inherited classes
Visualize a type hierarchy
Visualize source code metrics
Thursday, March 4, 2010
30. Warm-up
1 + 1, 4 / 2, 2 * int a := b
2
<a,b> = <1,2>;
int a = 1;
if (1 > 2) println
b = 2; (“x”);
import Set; int fac(int n)
{ if (n == 0 )
max({1,2,3}) return 1; return n
* f(n - 1); }
{ i | i <-
[0..100]} prime numbers?
Thursday, March 4, 2010
40. Metrics
construct a view with a box for each class:
classes: rel[loc,Entity] x = fact@types;
height is #methods: facts@declaredMethods
width is #fields: facts@declaredFields
color is #implemented interface, less is red, more is blue.
use loc.length
fillColor(Color c)
colorRange([...],color(“red”),color(“blue”);
use pack([width(x),height(x)],[...])
Thursday, March 4, 2010
41. Thank you!
http://www.rascal-mpl.org
Feedback is welcome
Look out for more alpha releases:
static (type) checker
concrete syntax features
IDE generation ! s"rce!
Read
Cases
DSL implementation
Tip: h
ttp://www
Refactoring implementation .eclip
se.or
g/imp
...
Thursday, March 4, 2010