Self-Learning Systems for Cyber SecurityKim Hammar
- The document describes using reinforcement learning to model network security as a Markov game and learn security strategies through self-play.
- The network infrastructure is modeled as a graph and the interactions between an attacker and defender are framed as a partially observable, zero-sum Markov game.
- Reinforcement learning is used to approximate optimal policies for both players by representing their policies with neural networks and optimizing rewards over many episodes of self-play without human intervention.
Kim Hammar & Konstantin Sozinov - Distributed LSTM training - Predicting Huma...Kim Hammar
Presentation of a end-to-end pipeline for distributed LSTM training of a HAR model and on-edge inference using an android application. Hadoop User Group Meetup in Stockholm, January 9, 2018
The document discusses utilizing spatiotemporal data from IoT devices in Redis. It proposes using a technique called "ST-coding" to encode location and timestamp data into a single code. This addresses two problems: 1) ST range queries were slow due to searching many keys; and 2) data insertion was inefficient due to load concentration on a single Redis server. By splitting the ST-code into a "PRE-code" and "SUF-code", ST range queries can be performed on a single key, avoiding use of the slow KEYS command. This improves query performance and distributes load across Redis servers.
Real-Time Spatiotemporal Data Utilization For Future Mobility Services: Atsus...Redis Labs
This document discusses utilizing spatiotemporal data for future mobility services. It proposes using Redis to store and query this type of data. The key challenges are performing fast range queries over location and time, and efficiently distributing data insertion load across multiple Redis servers. The document proposes addressing this by encoding location, time and ID as a single "ST-code", and splitting it to query a prefix while avoiding expensive Redis KEYS commands. This allows fast ST range queries in a single Redis command. However, it notes load concentration during data insertion still needs to be addressed.
This document discusses WebRTC and provides information about its capabilities and implementations. It covers topics like how WebRTC enables real-time communication directly in the browser between computers, mobile devices, and Internet of Things devices using APIs for audio/video streaming and peer-to-peer data sharing without plugins. It also discusses how WebRTC uses UDP and works around issues like NAT traversal using STUN, TURN, and ICE to establish connections.
Traditional carriers' transport networks consist of vertically-integrated devices with vendor-proprietary interfaces, that causes "vendor lock in" environment and interferes with adopting software based control and configuration for carriers' transport networks. NTT Communications are trying to adopt disaggregation approach for them to transform our operations by integrating commoditized multi-vendor components and SDN technology.
In this presentation, we will talk about our expectations for disaggregated transport networks and its controller architecture with multiple SDN controllers including open source software. Furthermore, we will show our internal evaluation result of disaggregated transport network feasibility and discuss future development plans.
How changing mobile and media technologies is changing the way we create inno...Osaka University
ACCV 2014 Keynote Slides. See http://www.accv2014.org/
Title: How Changing Mobile and Media Technologies is Changing The Way We Create Innovations
According to Schumpeter's definition of "Innovation," all the innovation instances are combinations of technologies that already exist. In that context, this talk covers the combination of progress of mobile network technologies and media understanding technologies. When the first mobile phones of 2nd Generation came out, people thought it was only for speech communication and texting. Then the phones got cameras, GPS. accelerometers, near filed communication devices together with fat communication pipes, people in all walks of life started using mobile phones in various opportunities. It is noteworthy that the progress of media understanding applications remarkably creates big data in a way of virtuous cycle by service and technology developments. This talk also highlights big-data driven service developments and API strategies for mobile innovations as well as technologies.
Self-Learning Systems for Cyber SecurityKim Hammar
- The document describes using reinforcement learning to model network security as a Markov game and learn security strategies through self-play.
- The network infrastructure is modeled as a graph and the interactions between an attacker and defender are framed as a partially observable, zero-sum Markov game.
- Reinforcement learning is used to approximate optimal policies for both players by representing their policies with neural networks and optimizing rewards over many episodes of self-play without human intervention.
Kim Hammar & Konstantin Sozinov - Distributed LSTM training - Predicting Huma...Kim Hammar
Presentation of a end-to-end pipeline for distributed LSTM training of a HAR model and on-edge inference using an android application. Hadoop User Group Meetup in Stockholm, January 9, 2018
The document discusses utilizing spatiotemporal data from IoT devices in Redis. It proposes using a technique called "ST-coding" to encode location and timestamp data into a single code. This addresses two problems: 1) ST range queries were slow due to searching many keys; and 2) data insertion was inefficient due to load concentration on a single Redis server. By splitting the ST-code into a "PRE-code" and "SUF-code", ST range queries can be performed on a single key, avoiding use of the slow KEYS command. This improves query performance and distributes load across Redis servers.
Real-Time Spatiotemporal Data Utilization For Future Mobility Services: Atsus...Redis Labs
This document discusses utilizing spatiotemporal data for future mobility services. It proposes using Redis to store and query this type of data. The key challenges are performing fast range queries over location and time, and efficiently distributing data insertion load across multiple Redis servers. The document proposes addressing this by encoding location, time and ID as a single "ST-code", and splitting it to query a prefix while avoiding expensive Redis KEYS commands. This allows fast ST range queries in a single Redis command. However, it notes load concentration during data insertion still needs to be addressed.
This document discusses WebRTC and provides information about its capabilities and implementations. It covers topics like how WebRTC enables real-time communication directly in the browser between computers, mobile devices, and Internet of Things devices using APIs for audio/video streaming and peer-to-peer data sharing without plugins. It also discusses how WebRTC uses UDP and works around issues like NAT traversal using STUN, TURN, and ICE to establish connections.
Traditional carriers' transport networks consist of vertically-integrated devices with vendor-proprietary interfaces, that causes "vendor lock in" environment and interferes with adopting software based control and configuration for carriers' transport networks. NTT Communications are trying to adopt disaggregation approach for them to transform our operations by integrating commoditized multi-vendor components and SDN technology.
In this presentation, we will talk about our expectations for disaggregated transport networks and its controller architecture with multiple SDN controllers including open source software. Furthermore, we will show our internal evaluation result of disaggregated transport network feasibility and discuss future development plans.
How changing mobile and media technologies is changing the way we create inno...Osaka University
ACCV 2014 Keynote Slides. See http://www.accv2014.org/
Title: How Changing Mobile and Media Technologies is Changing The Way We Create Innovations
According to Schumpeter's definition of "Innovation," all the innovation instances are combinations of technologies that already exist. In that context, this talk covers the combination of progress of mobile network technologies and media understanding technologies. When the first mobile phones of 2nd Generation came out, people thought it was only for speech communication and texting. Then the phones got cameras, GPS. accelerometers, near filed communication devices together with fat communication pipes, people in all walks of life started using mobile phones in various opportunities. It is noteworthy that the progress of media understanding applications remarkably creates big data in a way of virtuous cycle by service and technology developments. This talk also highlights big-data driven service developments and API strategies for mobile innovations as well as technologies.
The document discusses how innovative IoT technologies can reshape society in Myanmar. It presents on the current infrastructure challenges in Myanmar and how IoT can enable condition-based maintenance over time-based maintenance. Examples are given of potential IoT applications like smart homes and smart waste management. The general flow of IoT services involving sensors, data collectors, storage and visualization is also outlined. Finally, the presentation demonstrates real-time indoor monitoring and equipment anomaly detection as examples of emerging IoT business trends.
This is the presentation I use as a support for a nine-hour talk to future IoT project leaders. Several dimensions are addressed: functionalities, technologies (devices, embedded software, positioning, communications, etc.), project management, ecosystem structure, etc.
This document summarizes a joint research project between JPRS and several Japanese ISPs to enhance DNS resiliency. The goals were to install DNS servers in multiple regions of Japan to distribute query load and ensure continuity of DNS services during natural disasters. ISPs configured their networks to direct queries to local DNS nodes hosted by JPRS within their networks. Evaluation found queries shifted towards local nodes, response times improved, and Internet services remained available within ISP networks even when other DNS sites were unreachable, demonstrating increased DNS resiliency.
This slide was for CLOUDEXPO 2017 in NYC. Consists of two part, One is for introducing existing WebRTC - IoT use cases. Another is conceptual consideration of Edge Computing scenario which leveraging WebRTC technology.
Keynote presentation at Day 2 Telecoms Europe 5G Conference. Describing, my view of the 5G standalone deployment dynamics, best timing and what benefits to customers and ourselves (MNOs) to expect. I genuinely believe that to have a successful 5G Core SA deployment we need to learn from New IT cloud native transformation journeys.
The document discusses wireless mesh networks and their importance for industrial IoT applications. It describes how smart mesh networks can reliably gather real-time data from connected devices located anywhere, which is a missing link for industrial IoT. Examples of mesh network attributes and performance data from an existing mesh installation are provided to illustrate the capabilities of smart mesh technology. Finally, it introduces Microsoft Azure Smart Mesh, which combines Dust Networks' mesh networking hardware and software with Azure IoT services to provide an integrated solution for connecting industrial assets to the cloud.
Transport SDN & OpenDaylight Use Cases in KoreaJustin Park
- The document summarizes a presentation on Transport SDN and use cases in Korea. It introduces the speaker and their research team working on Transport SDN. It describes problems with current transport networks and requirements for SDN solutions. It provides an overview of the OpenDaylight platform and how it is being used to develop a Transport SDN controller in Korea called Calamari. It briefly describes implementations with MPLS-TP and testbeds involving multiple vendors. It outlines use cases at two Korean telecom companies, SKT and KT, and concludes with future plans to expand the SDN research.
This document contains the program for a forum on smart government. The program includes two presentations and discussion sessions. The first presentation from 10:05-10:40 will be on Korea's smart government promotion plan by Gwonseon Bujang from the Korea Agency for Digital Opportunity and Promotion. The second presentation from 11:00-11:40 will be on current smart devices and recommendations for electronic government by Gyuho Kim Bubujang from CEWIT Korea, followed by a question and answer session. There will also be a lunch break from 12:00-13:00.
1) Fog computing is an extension of cloud computing that processes data closer to the edge of the network, such as at factory equipment, power poles, or vehicles. It aims to improve efficiency and reduce data transportation costs compared to cloud computing alone.
2) Fog computing involves fog nodes that are located between end devices and the cloud. Fog nodes can perform tasks like data analysis, storage, and sharing results with the cloud and other nodes. This helps process time-sensitive data locally for applications involving the internet of things.
3) Fog computing provides advantages over cloud computing like lower latency, better support for mobility and real-time interactions, local data processing for privacy and efficiency, and ability to handle
This document describes a software project for an automated help care center with message storage capabilities. The software allows users to call an emergency number and provide location information via speech recognition, then sends their call to the appropriate emergency services. It also includes a database to store service provider and location information, DTMF decoding circuits to receive calls, and a message storage system to save voice messages when users are unavailable.
IRJET - Accident Monitoring and Rescue SystemIRJET Journal
This document describes a proposed accident monitoring and rescue system using IoT technologies. The system uses sensors like an accelerometer and GPS module embedded on a CC3200 microcontroller board to detect if an accident occurs. If a hard impact is detected by a change in acceleration beyond a threshold, the GPS location, temperature readings, and accelerometer values would be sent as an SMS using cloud services like Twilio to alert emergency contacts and services. The goal is to help rescue victims and reduce response times in the event of a road accident.
- The document contains statistics and charts about the growth of internet and mobile networks in Japan from 2010 to 2017. It shows increasing trends in the number of broadband and mobile subscribers, and growth of download and upload traffic volumes. It also includes charts on internet exchange points and capacity of networks in the Asia Pacific region over time.
This training report summarizes an 8-week external training program at MASS Technologies LLC focusing on vehicle tracking systems. The training covered introducing the trainee to the company and its activities, installing GPS devices, upgrading tracking systems, troubleshooting issues, office tasks like data entry, updating systems, and maintaining GPS devices. The trainee learned about three main types of vehicle trackers, completed weekly tasks in areas like installations and repairs, and concluded that the hands-on experience improved their skills and understanding of engineering concepts.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2022/09/covid-19-safe-distancing-measures-in-public-spaces-with-edge-ai-a-presentation-from-the-government-technology-agency-of-singapore/
Ebi Jose, Senior Systems Engineer at GovTech, the Government Technology Agency of Singapore, presents the “COVID-19 Safe Distancing Measures in Public Spaces with Edge AI” tutorial at the May 2022 Embedded Vision Summit.
Whether in indoor environments, such as supermarkets, museums and offices, or outdoor environments, such as parks, maintaining safe social distancing has been a priority during the COVID-19 pandemic. In this talk, Jose presents GovTech’s work developing cloud-connected edge AI solutions that count the number of people present in outdoor and indoor spaces, providing facility operators with real-time information that allows them to manage spaces to enable social distancing.
Jose provides an overview of the system architecture, hardware, algorithms, software and backend monitoring elements of GovTech's solution, highlighting differences in how it addresses indoor vs. outdoor spaces. He also presents results from deployments of GovTech’s solution.
The document discusses how innovative IoT technologies can reshape society in Myanmar. It presents on the current infrastructure challenges in Myanmar and how IoT can enable condition-based maintenance over time-based maintenance. Examples are given of potential IoT applications like smart homes and smart waste management. The general flow of IoT services involving sensors, data collectors, storage and visualization is also outlined. Finally, the presentation demonstrates real-time indoor monitoring and equipment anomaly detection as examples of emerging IoT business trends.
This is the presentation I use as a support for a nine-hour talk to future IoT project leaders. Several dimensions are addressed: functionalities, technologies (devices, embedded software, positioning, communications, etc.), project management, ecosystem structure, etc.
This document summarizes a joint research project between JPRS and several Japanese ISPs to enhance DNS resiliency. The goals were to install DNS servers in multiple regions of Japan to distribute query load and ensure continuity of DNS services during natural disasters. ISPs configured their networks to direct queries to local DNS nodes hosted by JPRS within their networks. Evaluation found queries shifted towards local nodes, response times improved, and Internet services remained available within ISP networks even when other DNS sites were unreachable, demonstrating increased DNS resiliency.
This slide was for CLOUDEXPO 2017 in NYC. Consists of two part, One is for introducing existing WebRTC - IoT use cases. Another is conceptual consideration of Edge Computing scenario which leveraging WebRTC technology.
Keynote presentation at Day 2 Telecoms Europe 5G Conference. Describing, my view of the 5G standalone deployment dynamics, best timing and what benefits to customers and ourselves (MNOs) to expect. I genuinely believe that to have a successful 5G Core SA deployment we need to learn from New IT cloud native transformation journeys.
The document discusses wireless mesh networks and their importance for industrial IoT applications. It describes how smart mesh networks can reliably gather real-time data from connected devices located anywhere, which is a missing link for industrial IoT. Examples of mesh network attributes and performance data from an existing mesh installation are provided to illustrate the capabilities of smart mesh technology. Finally, it introduces Microsoft Azure Smart Mesh, which combines Dust Networks' mesh networking hardware and software with Azure IoT services to provide an integrated solution for connecting industrial assets to the cloud.
Transport SDN & OpenDaylight Use Cases in KoreaJustin Park
- The document summarizes a presentation on Transport SDN and use cases in Korea. It introduces the speaker and their research team working on Transport SDN. It describes problems with current transport networks and requirements for SDN solutions. It provides an overview of the OpenDaylight platform and how it is being used to develop a Transport SDN controller in Korea called Calamari. It briefly describes implementations with MPLS-TP and testbeds involving multiple vendors. It outlines use cases at two Korean telecom companies, SKT and KT, and concludes with future plans to expand the SDN research.
This document contains the program for a forum on smart government. The program includes two presentations and discussion sessions. The first presentation from 10:05-10:40 will be on Korea's smart government promotion plan by Gwonseon Bujang from the Korea Agency for Digital Opportunity and Promotion. The second presentation from 11:00-11:40 will be on current smart devices and recommendations for electronic government by Gyuho Kim Bubujang from CEWIT Korea, followed by a question and answer session. There will also be a lunch break from 12:00-13:00.
1) Fog computing is an extension of cloud computing that processes data closer to the edge of the network, such as at factory equipment, power poles, or vehicles. It aims to improve efficiency and reduce data transportation costs compared to cloud computing alone.
2) Fog computing involves fog nodes that are located between end devices and the cloud. Fog nodes can perform tasks like data analysis, storage, and sharing results with the cloud and other nodes. This helps process time-sensitive data locally for applications involving the internet of things.
3) Fog computing provides advantages over cloud computing like lower latency, better support for mobility and real-time interactions, local data processing for privacy and efficiency, and ability to handle
This document describes a software project for an automated help care center with message storage capabilities. The software allows users to call an emergency number and provide location information via speech recognition, then sends their call to the appropriate emergency services. It also includes a database to store service provider and location information, DTMF decoding circuits to receive calls, and a message storage system to save voice messages when users are unavailable.
IRJET - Accident Monitoring and Rescue SystemIRJET Journal
This document describes a proposed accident monitoring and rescue system using IoT technologies. The system uses sensors like an accelerometer and GPS module embedded on a CC3200 microcontroller board to detect if an accident occurs. If a hard impact is detected by a change in acceleration beyond a threshold, the GPS location, temperature readings, and accelerometer values would be sent as an SMS using cloud services like Twilio to alert emergency contacts and services. The goal is to help rescue victims and reduce response times in the event of a road accident.
- The document contains statistics and charts about the growth of internet and mobile networks in Japan from 2010 to 2017. It shows increasing trends in the number of broadband and mobile subscribers, and growth of download and upload traffic volumes. It also includes charts on internet exchange points and capacity of networks in the Asia Pacific region over time.
This training report summarizes an 8-week external training program at MASS Technologies LLC focusing on vehicle tracking systems. The training covered introducing the trainee to the company and its activities, installing GPS devices, upgrading tracking systems, troubleshooting issues, office tasks like data entry, updating systems, and maintaining GPS devices. The trainee learned about three main types of vehicle trackers, completed weekly tasks in areas like installations and repairs, and concluded that the hands-on experience improved their skills and understanding of engineering concepts.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2022/09/covid-19-safe-distancing-measures-in-public-spaces-with-edge-ai-a-presentation-from-the-government-technology-agency-of-singapore/
Ebi Jose, Senior Systems Engineer at GovTech, the Government Technology Agency of Singapore, presents the “COVID-19 Safe Distancing Measures in Public Spaces with Edge AI” tutorial at the May 2022 Embedded Vision Summit.
Whether in indoor environments, such as supermarkets, museums and offices, or outdoor environments, such as parks, maintaining safe social distancing has been a priority during the COVID-19 pandemic. In this talk, Jose presents GovTech’s work developing cloud-connected edge AI solutions that count the number of people present in outdoor and indoor spaces, providing facility operators with real-time information that allows them to manage spaces to enable social distancing.
Jose provides an overview of the system architecture, hardware, algorithms, software and backend monitoring elements of GovTech's solution, highlighting differences in how it addresses indoor vs. outdoor spaces. He also presents results from deployments of GovTech’s solution.
Similar to Redisconf19: Real-time spatiotemporal data utilization for future mobility services (20)
Enhanced Screen Flows UI/UX using SLDS with Tom KittPeter Caitens
Join us for an engaging session led by Flow Champion, Tom Kitt. This session will dive into a technique of enhancing the user interfaces and user experiences within Screen Flows using the Salesforce Lightning Design System (SLDS). This technique uses Native functionality, with No Apex Code, No Custom Components and No Managed Packages required.
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
Consistent toolbox talks are critical for maintaining workplace safety, as they provide regular opportunities to address specific hazards and reinforce safe practices.
These brief, focused sessions ensure that safety is a continual conversation rather than a one-time event, which helps keep safety protocols fresh in employees' minds. Studies have shown that shorter, more frequent training sessions are more effective for retention and behavior change compared to longer, infrequent sessions.
Engaging workers regularly, toolbox talks promote a culture of safety, empower employees to voice concerns, and ultimately reduce the likelihood of accidents and injuries on site.
The traditional method of conducting safety talks with paper documents and lengthy meetings is not only time-consuming but also less effective. Manual tracking of attendance and compliance is prone to errors and inconsistencies, leading to gaps in safety communication and potential non-compliance with OSHA regulations. Switching to a digital solution like Safelyio offers significant advantages.
Safelyio automates the delivery and documentation of safety talks, ensuring consistency and accessibility. The microlearning approach breaks down complex safety protocols into manageable, bite-sized pieces, making it easier for employees to absorb and retain information.
This method minimizes disruptions to work schedules, eliminates the hassle of paperwork, and ensures that all safety communications are tracked and recorded accurately. Ultimately, using a digital platform like Safelyio enhances engagement, compliance, and overall safety performance on site. https://safelyio.com/
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESanfaltahir1010
Image: Include an image that represents the concept of precision, such as a AI helix or a futuristic healthcare
setting.
Objective: Provide a foundational understanding of precision medicine and its departure from traditional
approaches
Role of theory: Discuss how genomics, the study of an organism's complete set of AI ,
plays a crucial role in precision medicine.
Customizing treatment plans: Highlight how genetic information is used to customize
treatment plans based on an individual's genetic makeup.
Examples: Provide real-world examples of successful application of AI such as genetic
therapies or targeted treatments.
Importance of molecular diagnostics: Explain the role of molecular diagnostics in identifying
molecular and genetic markers associated with diseases.
Biomarker testing: Showcase how biomarker testing aids in creating personalized treatment plans.
Content:
• Ethical issues: Examine ethical concerns related to precision medicine, such as privacy, consent, and
potential misuse of genetic information.
• Regulations and guidelines: Present examples of ethical guidelines and regulations in place to safeguard
patient rights.
• Visuals: Include images or icons representing ethical considerations.
Content:
• Ethical issues: Examine ethical concerns related to precision medicine, such as privacy, consent, and
potential misuse of genetic information.
• Regulations and guidelines: Present examples of ethical guidelines and regulations in place to safeguard
patient rights.
• Visuals: Include images or icons representing ethical considerations.
Content:
• Ethical issues: Examine ethical concerns related to precision medicine, such as privacy, consent, and
potential misuse of genetic information.
• Regulations and guidelines: Present examples of ethical guidelines and regulations in place to safeguard
patient rights.
• Visuals: Include images or icons representing ethical considerations.
Real-world case study: Present a detailed case study showcasing the success of precision
medicine in a specific medical scenario.
Patient's journey: Discuss the patient's journey, treatment plan, and outcomes.
Impact: Emphasize the transformative effect of precision medicine on the individual's
health.
Objective: Ground the presentation in a real-world example, highlighting the practical
application and success of precision medicine.
Data challenges: Address the challenges associated with managing large sets of patient data in precision
medicine.
Technological solutions: Discuss technological innovations and solutions for handling and analyzing vast
datasets.
Visuals: Include graphics representing data management challenges and technological solutions.
Objective: Acknowledge the data-related challenges in precision medicine and highlight innovative solutions.
Data challenges: Address the challenges associated with managing large sets of patient data in precision
medicine.
Technological solutions: Discuss technological innovations and solutions
Measures in SQL (SIGMOD 2024, Santiago, Chile)Julian Hyde
SQL has attained widespread adoption, but Business Intelligence tools still use their own higher level languages based upon a multidimensional paradigm. Composable calculations are what is missing from SQL, and we propose a new kind of column, called a measure, that attaches a calculation to a table. Like regular tables, tables with measures are composable and closed when used in queries.
SQL-with-measures has the power, conciseness and reusability of multidimensional languages but retains SQL semantics. Measure invocations can be expanded in place to simple, clear SQL.
To define the evaluation semantics for measures, we introduce context-sensitive expressions (a way to evaluate multidimensional expressions that is consistent with existing SQL semantics), a concept called evaluation context, and several operations for setting and modifying the evaluation context.
A talk at SIGMOD, June 9–15, 2024, Santiago, Chile
Authors: Julian Hyde (Google) and John Fremlin (Google)
https://doi.org/10.1145/3626246.3653374
UI5con 2024 - Bring Your Own Design SystemPeter Muessig
How do you combine the OpenUI5/SAPUI5 programming model with a design system that makes its controls available as Web Components? Since OpenUI5/SAPUI5 1.120, the framework supports the integration of any Web Components. This makes it possible, for example, to natively embed own Web Components of your design system which are created with Stencil. The integration embeds the Web Components in a way that they can be used naturally in XMLViews, like with standard UI5 controls, and can be bound with data binding. Learn how you can also make use of the Web Components base class in OpenUI5/SAPUI5 to also integrate your Web Components and get inspired by the solution to generate a custom UI5 library providing the Web Components control wrappers for the native ones.
Odoo releases a new update every year. The latest version, Odoo 17, came out in October 2023. It brought many improvements to the user interface and user experience, along with new features in modules like accounting, marketing, manufacturing, websites, and more.
The Odoo 17 update has been a hot topic among startups, mid-sized businesses, large enterprises, and Odoo developers aiming to grow their businesses. Since it is now already the first quarter of 2024, you must have a clear idea of what Odoo 17 entails and what it can offer your business if you are still not aware of it.
This blog covers the features and functionalities. Explore the entire blog and get in touch with expert Odoo ERP consultants to leverage Odoo 17 and its features for your business too.
An Overview of Odoo ERP
Odoo ERP was first released as OpenERP software in February 2005. It is a suite of business applications used for ERP, CRM, eCommerce, websites, and project management. Ten years ago, the Odoo Enterprise edition was launched to help fund the Odoo Community version.
When you compare Odoo Community and Enterprise, the Enterprise edition offers exclusive features like mobile app access, Odoo Studio customisation, Odoo hosting, and unlimited functional support.
Today, Odoo is a well-known name used by companies of all sizes across various industries, including manufacturing, retail, accounting, marketing, healthcare, IT consulting, and R&D.
The latest version, Odoo 17, has been available since October 2023. Key highlights of this update include:
Enhanced user experience with improvements to the command bar, faster backend page loading, and multiple dashboard views.
Instant report generation, credit limit alerts for sales and invoices, separate OCR settings for invoice creation, and an auto-complete feature for forms in the accounting module.
Improved image handling and global attribute changes for mailing lists in email marketing.
A default auto-signature option and a refuse-to-sign option in HR modules.
Options to divide and merge manufacturing orders, track the status of manufacturing orders, and more in the MRP module.
Dark mode in Odoo 17.
Now that the Odoo 17 announcement is official, let’s look at what’s new in Odoo 17!
What is Odoo ERP 17?
Odoo 17 is the latest version of one of the world’s leading open-source enterprise ERPs. This version has come up with significant improvements explained here in this blog. Also, this new version aims to introduce features that enhance time-saving, efficiency, and productivity for users across various organisations.
Odoo 17, released at the Odoo Experience 2023, brought notable improvements to the user interface and added new functionalities with enhancements in performance, accessibility, data analysis, and management, further expanding its reach in the market.
Using Query Store in Azure PostgreSQL to Understand Query PerformanceGrant Fritchey
Microsoft has added an excellent new extension in PostgreSQL on their Azure Platform. This session, presented at Posette 2024, covers what Query Store is and the types of information you can get out of it.
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid
IBM watsonx Code Assistant for Z, our latest Generative AI-assisted mainframe application modernization solution. Mainframe (IBM Z) application modernization is a topic that every mainframe client is addressing to various degrees today, driven largely from digital transformation. With generative AI comes the opportunity to reimagine the mainframe application modernization experience. Infusing generative AI will enable speed and trust, help de-risk, and lower total costs associated with heavy-lifting application modernization initiatives. This document provides an overview of the IBM watsonx Code Assistant for Z which uses the power of generative AI to make it easier for developers to selectively modernize COBOL business services while maintaining mainframe qualities of service.
14 th Edition of International conference on computer visionShulagnaSarkar2
About the event
14th Edition of International conference on computer vision
Computer conferences organized by ScienceFather group. ScienceFather takes the privilege to invite speakers participants students delegates and exhibitors from across the globe to its International Conference on computer conferences to be held in the Various Beautiful cites of the world. computer conferences are a discussion of common Inventions-related issues and additionally trade information share proof thoughts and insight into advanced developments in the science inventions service system. New technology may create many materials and devices with a vast range of applications such as in Science medicine electronics biomaterials energy production and consumer products.
Nomination are Open!! Don't Miss it
Visit: computer.scifat.com
Award Nomination: https://x-i.me/ishnom
Conference Submission: https://x-i.me/anicon
For Enquiry: Computer@scifat.com
The Rising Future of CPaaS in the Middle East 2024Yara Milbes
Explore "The Rising Future of CPaaS in the Middle East in 2024" with this comprehensive PPT presentation. Discover how Communication Platforms as a Service (CPaaS) is transforming communication across various sectors in the Middle East.
Malibou Pitch Deck For Its €3M Seed Roundsjcobrien
French start-up Malibou raised a €3 million Seed Round to develop its payroll and human resources
management platform for VSEs and SMEs. The financing round was led by investors Breega, Y Combinator, and FCVC.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Drona Infotech is a premier mobile app development company in Noida, providing cutting-edge solutions for businesses.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
Most important New features of Oracle 23c for DBAs and Developers. You can get more idea from my youtube channel video from https://youtu.be/XvL5WtaC20A
Thank you Mr.chairman for your kind introduction, and all the organizers that worked out for the conference preparation.
It’s such an honor to be here.
I hope this session will help developers who are struggling with data utilization for real-time services.
So, the title of this session is real-time spatiotemporal data utilization for future mobility services.
Allow me to briefly introduce myself.
I’m Atsushi Isomura from Tokyo, Japan. I know it’s hard to pronounce, so just call me SUSHI.
I work for NTT, a Japanese telecommunications company that manage most of the telephone lines in Japan
with 280 thousand workers all over the world. We also work on cloud technology and big data analysis.
Right now, I’m working on in-memory storage technology that deal with Spatio-temporal data.
In my free time, I make apps, play games mainly Nintendo Switch, and play baseball.
Also, I love to drive cars, and I desire driving without traffic jam.
In Japan, the land area is very small, but there are too many running cars.
This is what makes driving very boring, and this is one of the big problem that I want to solve by Spatio-Temporal data processing.
So, today’s talk will proceed in this order.
The links of the sample codes and slides will be shown at the end of my presentation.
Let’s start off by talking about the motivation.
As you know, recently, IoT devices such as connected vehicles, wearable devices, and drones are spreading everywhere.
The number of these devices will keep increasing more and more.
It is expected that connected vehicles will reach 5.4 hundred million in the world,
and wearable devices will reach 3.2 hundred million in the world.
Well, we all know that.
However, compared to the ordinary IoT “sensors” inside factories and buildings,
what do you think is the difference about these IoT devices?
From the point of data management we think that there are two main differences.
The first difference is that they MOVE every moment.
Compared to the non-moving “sensors” inside factories and buildings, data collected from these devices differ in latitude, longitude, and time.
This type of data is what we call Spatio-Temporal Data.
You can see here that, even if the device ID is the same, latitude, longitude, and time changes every moment.
In this talk, Spatio-temporal will be abbreviated as ST since it’s too long for me to speak.
The second difference is that the density of the devices changes by location and time.
In this image I’m showing how vehicles move from the suburbs to metropolis depending on time.
For example, during the daytime, vehicles tend to gather in the metropolis for work and shopping and the density of metropolis becomes high.
On the other hand, the density of suburb becomes low.
However, during the night, these vehicles go home in the suburbs and the density becomes opposite compared to daytime.
Let’s take a look at some of the future mobility services that will take place in the next few years.
One example is “Nearby car crash alert”.
Let’s assume that someone crashed near our conference center.
The cars running nearby want to know what’s happening in real-time, but vehicles running far from this area don’t need to know it.
So, we need to send an alert and information just to the nearby running cars.
To realize this application, we need to find all cars that are running near the crash at current time.
Let’s take a look at another example.
People waiting for taxis will use their smart phones to send their location and time simultaneously.
Also, information of events, traffic jams, etc will be acquired.
In the future, taxis will pick up passengers by calculating the optimal route automatically based on the collected ST-data.
How about drone package delivery?
Many companies will start this service for a more flexible delivery.
If the user wants to send a package to somewhere now, the system needs to find the nearest drone available with no packages.
This service also deals with ST-data since we need to search drones that keep moving.
So, the important features of these IoT devices that we need to consider are
They move, and
The density Changes by location and time
Also the future services related to these devices require
real-time response of ST-data and ST-data search.
Well, what’s so difficult about realizing these services?
As I said in the beginning, bunch of ST-data are sent from a massive number of devices every second in real-time.
It is estimated that over 20 million records will be sent from cars in one second in Japan in year 2024.
At the same time, future mobility applications require ST-range query which means to search by the range of longitude, latitude, and time, in real-time.
We defined that the requirement for insertion is less than 10ms for each data and search is less than 100ms for each query.
And, in addition, the data store needs to consider the density changes of IoT devices.
Here, we found a problem that there is no matured technology that could satisfy all requirements.
So, we started off by choosing the appropriate data store.
To satisfy our requirements, we searched for a data store that has “blazingly fast performance”, “geo features”, and “secondary indexing”.
And, by watching the speaker from lyft at RedisConf, we found out that “Geohash-encoding” & “Sorted-set” could realize ST-data management in redis.
So, of course we selected redis as our data store.
So now, let’s think how we can utilize ST-data inside redis.
First, here are some of the Geo-related commands and Sorted-set-related commands that could be used for ST-data management.
For instance, GEOADD could be used to apply the information of latitude and longitude as the score of sorted-set.
Also, ZADD could be used to apply any value for the score of sorted-set.
When searching data of sorted-set, we can use ZRANGEBYSCORE command.
OK, so as I mentioned before, redis utilizes the Geohash coding algorithm for the geo-related commands.
What’s geohash?
We usually talk about location as a 2-dimensional data of longitude and latitude.
Well, geohash is a coding algorithm that could transform this 2-dimensional data into a 1-dimensional code by using Morton-curve or some people call Z-curve.
If we want to encode the x and y of San Francisco, we first split the earth into 4 blocks.
The first two bits will be “10” in this case.
The next two bits will be “01”, then the next two bits will be “10”.
This bit interleaving process is repeated until it reaches the precision that you want to express.
So, the shorter the code is, the wider the area becomes.
In opposition, the longer the code is, the narrower the area becomes.
This 1-dimensional code enables faster data insertion and it matches redis’s simple data structure of Key-value store.
There’s another useful feature about Geohash.
This Geohash code could be used for range query of longitude and latitude by matching the prefix.
As shown in this image, the range query of the red box can be expressed as matching the prefix of “10”
In the same manner, the purple box and the orange box can be expressed by adding digits to “10”.
As a result, one-dimensional prefix match of geohash could substitute two-dimensional range query of latitude and longitude.
So let’s review the requirements of insert data and search query.
We want to insert ST-data that consists of longitude, latitude, time, and value.
For example, x is 37 degrees, y is -122 degrees which is San Francisco, and time is … now. With the value of something like 30km/h.
Then we want to search a ST-range query that requires the data corresponding to a particular prefix match of GEOHASH and a particular range of TIMESTAMP.
This query can find data that is inside a certain location and time period.
In this situation, we came up of two possible key-value design for redis.
First design pattern is applying Timestamp as the key, and Geohash as the score of sorted set.
The redis commands that can be used for inserting are ZADD and GEOADD.
If we use ZADD, the Geohash score needs to be calculated beforehand.
Second design is applying Geohash as the key, and Timestamp as the score of sorted set.
The command that can be used for inserting is ZADD.
We thought that these are the two main key-value design that we can generally prepare in Redis.
Next, we needed to find how we can search by range query for these two patterns.
As I said in the requirements, a prefix GEOHASH and a range of TIMESTAMP must be searched.
If we use the first pattern, we need to submit ZRANGEBYSCORE command for each Timestamp-key that needs to be searched.
For example, searching Timestamp range of 10 minutes means to search 600 Timestamp-keys.
For the second pattern, we first need to submit KEYS command to acquire all GEOHASH keys that has a particular prefix.
Afterwards, we need to submit ZRANGEBYSCORE command for each Geohash-key that needs to be searched.
As you can easily imagine, the second pattern will not help us out.
It is too slow since it requires the dangerous “KEYS” command for searching the list of keys that match a particular prefix.
In addition, these two patterns require too many keys to search.
This leads to slow performance as shown in the table here.
Pattern 1 takes 1.3 second and Pattern2 takes more than 500 seconds for 1 range query.
So we thought, “ok let’s reduce the keys to search” for design pattern 1.
But wait!
We have to think about a different problem that is still left.
If we suppose that
tons of vehicles send data continuously and
applications require data of current time and
multiple redis-servers are available,
what will happen?
Here is the answer.
No matter where the cars are running, all of them will send data consisted of “current time”.
On the other hand, mobility applications search for data that relates with “current time”.
If redis1 has the current “timestamp key”, all of the work load concentrates to this machine.
Other redis servers will be in a idle state which is very inefficient for the entire system.
Even if the time changes, the current timestamp key moves to a different redis server.
This causes the same problem of “load concentration” again and again.
Here is an example of the CPU usage when conducting ST-data insert using 24 redis-servers.
The horizontal axis of this graph is time, and the vertical axis of the upper half represent CPU usage of User and System.
The lower half represent the Idle percentage of CPU.
You can see that the work load concentrates temporarily to a particular redis-server as a spike.
This graph demonstrates that the key-value design with “current timestamp as key” cannot use CPU resource efficiently.
Let’s review the problems that we need to solve.
St-range query is slow because searching too many keys, or using the “KEYS” command.
ST-data insert is inefficient due to load concentration
So now, let me introduce our proposal to solve the problems.
First of all, I have introduced “geohash” encoding in the beginning.
In several technical papers, there is an another encoding algorithm proposed called ST-code.
This is a 1-dimensional code that is calculated by applying morton-curve to 3-dimensional value of latitude, longitude, “and time”.
First, we define the minimum timestamp and maximum timestamp that you will deal with.
Then, depending on current time, we divide timestamp in half repeatedly just like geohash.
The bit array of ST-code will be a repeat of x, y, t and so on.
So, the shorter the code is, the wider the area and longer the time period becomes.
In opposition, the longer the code is, the narrower the area and shorter the time period becomes.
By using this code, a range query of longitude, latitude, and time can be replaced with prefix match.
We asked ourselves, “how can we insert and search this ST-code without the need of using the dangerous KEYS command?”
Here is our approach.
First, we split the ST-code in two parts, “PRE-code” and “SUF-code”.
This simply means the prefix part and the suffix part.
The PRE-code that express the WIDE st-range is stored as the Key of a sorted set.
Then the SUF-code that express the NARROW st-range is stored as the Score of a sorted set.
We used ZADD to realize this key-value design.
This design patter enables range query of GEOHASH and TIMESTAMP only in one command.
When using the ZRANGEBYSCORE command, the Key can be defined by calculating the PRE-code that express the range of GEOHASH and TIMESTAMP.
The minimum and the maximum range of the Score can also be calculated from GEOHASH and TIMESTAMP.
The “s” and “q” should be considered beforehand depending of what kind of query you are planning to submit.
So, the range query became very fast by one command and the problem is solved!
Well, we solved the first problem by ST-code by searching only 1 key, andby using the ZRANGEBYSCORE command.
However, the second problem is not solved yet.
We cannot forget about this load concentration even if we use ST-code as the key of sorted set.
So, this is our second proposal “Limited Node Distribution”
The basic idea of limited node distribution is to select “multiple nodes” based on the hashed value of ST-code which express a particular location and time.
The data insert is conducted to “one” of the selected nodes,
and data search is conducted to “all” of the selected nodes.
Let’s say that the number of selected nodes is 2.
In this example, the destination of ST-data obtained near San Francisco at 7:00 AM goes to either this node or this node.
From here, the insert node is decided randomly, in this case, let’s choose this node.
By this method, insert goes to “one” of the selected nodes.
The combination of the selected nodes differ every time, like this.
So, the insertion can be conducted by avoiding load concentration.
When searching data obtained near San Francisco from 7:00AM to 7:01AM,
the search goes to this node and this node which is “all” of the selected nodes.
Also the search is efficiently conducted not to all nodes but only to the selected nodes.
So now, the two problems are solved by applying ST-code and Limited node distribution.
The architecture overview including ST-code and Limited node distribution is shown here.
In brief, the insert and search starts by calculating ST-code and splitting ST-code into PRE-code and SUF-code.
From the hashed value of PRE-code, insert or search node number is calculated.
Insert is only conducted to “one” of the selected nodes, and search is conducted to “all” of the selected nodes.
I understand that it’s a little complicated so please ask me questions later if you feel any misunderstandings.
Next I’ll introduce the performance.
We conducted an experiment to compare these two methods that I’ve already introduced.
One is the ST-key method which is the proposal, and the other is the Time-key method with the Timestamp as Key and Geohash as the Score.
Here are the experimental conditions.
Each data size is 10KB and we prepared 24 redis server nodes. The number of “selected nodes” for
our proposed method is 8.
We created test data-set based on the longitude and latitude acquired from NY taxi open data.
To make it real, we applied “Current Timestamp” during the experiment as time.
The search of range query requires 15minutes in time range and 3 square kilometer for area.
The data-set that we used are sparse or dense depending on the area.
So, there are a lot of data near Manhattan, but less data in the suburbs.
This data-set is very real, so it could simulate the concentration of cars running in New York.
The system configuration in detail is listed here.
Total of 8 physical machines were prepared for redis-client, and 4 physical machines were prepared for the redis-server.
The specification of server machines had 256GB of memory, but other specifications are not so special or powerful.
We used Jedis for the interface to redis, and the version of redis was 5.0.3.
This is the result of the insert performance.
The graphs here indicate that the insert performance was 13 times better in throughput and 12 times better in turn around time for each record.
Throughput reached over 76000 records in one second, and the TAT was 3.3 ms per one record.
This improvement was mainly due to the efficient usage in CPU resource.
Again, the horizontal axis of this graph is time, and the vertical axis of the upper half represent CPU usage of User and System.
The lower half represent the Idle percentage of CPU.
The ST-key method proved that we can fully use CPU resource and the processing load is distributed to all redis-servers equally.
As mentioned before, Time-key method could not use CPU resource efficiently due to load concentration.
Next is the result of the search performance.
The graphs here indicate that the search performance was 5 times better in throughput and 5 times better in turn around time for each query.
Throughput reached over 3500 queries in one second, and the TAT was 70 ms per one query.
This improvement was mainly due to the efficient search conducted by 1 command per 1 query.
The ST-key method proved that the search performance is better compared to Time-Key method with less CPU usage.
I will summarize the result.
The combination of blazingly fast redis and ST-key method satisfied all of our requirements at once.
Insert was 3.3ms per record and it satisfied the turn around time of 10ms requirement.
Also search was 70ms per query and it satisfied the turn around time of 100ms requirement.
So now, let’s move on to the sample code and Demo.
The codes that I will explain from now is uploaded on Github under the account of sushi-boy.
This is how we first coded the ST-code generation.
For each dimension of longitude, latitude, and time, you have to calculate the “0, 1” bit by dividing it by 2 again and again.
This coding algorithm had no problem, however, you can obviously see that there are too many if statements and of course it was very slow.
So, we made a different one.
The new Faster ST-code generator looks like this.
The idea is basically based on bit operation.
The bits of each dimension is calculated before hand,
and the bit interleaving process is conducted afterwards.
By reducing the number of if statements, it became much faster than the naïve one.
This code is also uploaded in the link I will show later.
So here, let me explain how to do a simple insert and search using ST-code.
The sample program on github assumes that the system is a simple client-server architecture.
Since I wrote it in Python, it uses PyPIredis for connection.
First, “data insert” can be conducted by using the st_insert.py.
Just simply execute the python file and it will insert value by applying PRE CODE as key, and SUF CODE as score by ZADD command.
The console will look like this. It will show the generated ST CODE, PRE CODE, and SUF CODE based on the latitude, longitude, and time input.
The program will submit ZADD command by python API to redis.
Next, “data search” can be conducted by using the st_search.py.
Again, simply execute the python file and it will search value by applying PRE CODE as key and SUF CODE based on the range of latitude, longitude, and time.
The program will submit ZRANGEBYSCORE command by python API to redis.
You will be able to acquire the value that matches the query.