This document discusses strategies for leveraging software disclosures into licensable technologies. It covers determining whether software qualifies for copyright protection, capturing relevant disclosure information, evaluating decision criteria like license requirements and compatibility, determining appropriate marketing strategies like passive hosting online or active targeted outreach, deciding between exclusive or non-exclusive licensing, and preparing principal investigators to advocate for their technologies. The overall aim is to commercialize laboratory software through copyright licensing.
The document discusses the future of customer service and experience. It notes that customer experience goes beyond just customer service by being a full, end-to-end experience from first hearing about a company to receiving a purchased product. It also discusses how customer experience will be a key factor for various industries like retail, government, healthcare and finance. The retail sector in particular will be dominated by customer experience as customers have more choices and ways to access those choices through different channels.
Benefit vs[1][1][2][1]. risk in children's exposure to radiation for medical ...Prunariu Ludmila
The document discusses the benefits and risks of medical radiation exposure in children. It finds that chest X-rays were the most common radiological exam performed on children in hospitals, even when over 50% provided no diagnostic benefit. The absorbed radiation doses for children were three to four times higher than reference values. Improving hospital protocols could help optimize exams and lower unnecessary radiation exposure for patients.
The document discusses disaster preparedness and response strategies for earthquakes in Sikkim, India. It emphasizes the importance of understanding the local terrain and vulnerabilities, effective community communication and alert systems, immediate rescue and evacuation assistance from local NGOs, identifying and supporting vulnerable groups, ensuring immediate needs are met, organizing and communicating data to stakeholders, designing support for trauma, establishing temporary shelters, and facilitating the return to normal life through rebuilding and mitigation efforts. The document provides an overview of many important factors to consider after an earthquake to save lives and support communities.
Technology Transfer Social Media Tools You Can Use to Promote Commercializationasauers
Learn how others are using LinkedIn, Wikipedia, Twitter, Google, Facebook, Crowd Sourcing, Collective IP, GitHub, and other tools to accomplish tech transfer without the logistical burdens that were needed in the past. The session will include brief overviews of several tools and how they are being applied, and a chance for attendees to share best practices with others.
This document discusses using Wikipedia entries to promote laboratory software by providing analytics, ranking high in searches, allowing rapid modification, and satisfying notability requirements by citing scholarly articles. It notes that laboratory software is well-suited for Wikipedia entries. It also provides guidance on creating an account, ensuring neutral point of view, and using existing entries as templates.
This document provides instructions for creating an electronic circuit housed inside a paper model house. It includes the following steps:
1. Descriptions of the circuit components - battery, resistor, LED, transistor, LDR, and wires.
2. Illustrated steps for assembling the circuit outside the house model by connecting the components with soldered wires.
3. Instructions for cutting and folding the development net to form the house shape, and adding design details to the exterior.
4. Placement of the assembled circuit inside the house by feeding the LDR through the roof and attaching it and the battery in position.
5. Final assembly of the house using double-sided tape on the glue
The document discusses software protection strategies used by government-owned, contractor-operated (GOCO) national laboratories. It provides examples of successful software programs at Los Alamos National Laboratory and Idaho National Laboratory that are sustained through licensing strategies. The document also discusses federal agencies' increasing use of cloud computing and highlights some examples. Open source software licensing strategies and a patent dispute between Apple and Samsung are briefly mentioned.
The document discusses the future of customer service and experience. It notes that customer experience goes beyond just customer service by being a full, end-to-end experience from first hearing about a company to receiving a purchased product. It also discusses how customer experience will be a key factor for various industries like retail, government, healthcare and finance. The retail sector in particular will be dominated by customer experience as customers have more choices and ways to access those choices through different channels.
Benefit vs[1][1][2][1]. risk in children's exposure to radiation for medical ...Prunariu Ludmila
The document discusses the benefits and risks of medical radiation exposure in children. It finds that chest X-rays were the most common radiological exam performed on children in hospitals, even when over 50% provided no diagnostic benefit. The absorbed radiation doses for children were three to four times higher than reference values. Improving hospital protocols could help optimize exams and lower unnecessary radiation exposure for patients.
The document discusses disaster preparedness and response strategies for earthquakes in Sikkim, India. It emphasizes the importance of understanding the local terrain and vulnerabilities, effective community communication and alert systems, immediate rescue and evacuation assistance from local NGOs, identifying and supporting vulnerable groups, ensuring immediate needs are met, organizing and communicating data to stakeholders, designing support for trauma, establishing temporary shelters, and facilitating the return to normal life through rebuilding and mitigation efforts. The document provides an overview of many important factors to consider after an earthquake to save lives and support communities.
Technology Transfer Social Media Tools You Can Use to Promote Commercializationasauers
Learn how others are using LinkedIn, Wikipedia, Twitter, Google, Facebook, Crowd Sourcing, Collective IP, GitHub, and other tools to accomplish tech transfer without the logistical burdens that were needed in the past. The session will include brief overviews of several tools and how they are being applied, and a chance for attendees to share best practices with others.
This document discusses using Wikipedia entries to promote laboratory software by providing analytics, ranking high in searches, allowing rapid modification, and satisfying notability requirements by citing scholarly articles. It notes that laboratory software is well-suited for Wikipedia entries. It also provides guidance on creating an account, ensuring neutral point of view, and using existing entries as templates.
This document provides instructions for creating an electronic circuit housed inside a paper model house. It includes the following steps:
1. Descriptions of the circuit components - battery, resistor, LED, transistor, LDR, and wires.
2. Illustrated steps for assembling the circuit outside the house model by connecting the components with soldered wires.
3. Instructions for cutting and folding the development net to form the house shape, and adding design details to the exterior.
4. Placement of the assembled circuit inside the house by feeding the LDR through the roof and attaching it and the battery in position.
5. Final assembly of the house using double-sided tape on the glue
The document discusses software protection strategies used by government-owned, contractor-operated (GOCO) national laboratories. It provides examples of successful software programs at Los Alamos National Laboratory and Idaho National Laboratory that are sustained through licensing strategies. The document also discusses federal agencies' increasing use of cloud computing and highlights some examples. Open source software licensing strategies and a patent dispute between Apple and Samsung are briefly mentioned.
This case study examines the San Francisco Performing Arts Library & Museum's (SFPALM) decision to migrate from Windows to open source software. SFPALM needed to license its unlicensed Windows server, outsource some services, and save money. It decided to use Red Hat Linux for its operating system, Samba for file/print sharing, Astaro Security Linux for firewall/VPN, qMail for email, Apache for web hosting, and maintain its legacy database on a Linux server. This saved $2,800 compared to purchasing Windows licenses and keeping outsourced services. The presentation discusses open source strengths like lower costs, security, and stability, as well as challenges like difficulty of deployment and lack
Riak Use Cases : Dissecting The Solutions To Hard ProblemsAndy Gross
This document summarizes a presentation on using Riak to solve hard distributed systems problems. It discusses Riak's key features and tradeoffs in consistency and data model. It then provides examples of how companies like Comcast, Yammer, and Github use Riak for high availability and low latency applications like user metadata storage, notifications, and as a document store. The presentation emphasizes that choosing the right database requires understanding your problem and tradeoffs in consistency, availability and data model. It also highlights how Riak and Erlang help enable high availability, low latency and operational simplicity through features like Bitcask storage, fault tolerance and lightweight threading.
Apache or GPL? MIT or BSD? These are just some of the licenses that attach to open source software. Do you know the important distinctions between them?
Is Exascale the End of the Line for Commodity Networks?Scott Pakin
Scott Pakin argues that commodity networks are viable for exascale supercomputers for several reasons:
1) Commodity networks worked well for petascale systems like Roadrunner, the first system to reach 1 petaflop/s using InfiniBand networking.
2) Commodity networks are significantly cheaper than custom networks, leaving more funds for processors and other parts.
3) Metrics like LINPACK, used for Top500 rankings, do not adequately measure a system's ability to run real applications at exascale since they involve limited data movement.
4) The issues with commodity networks in HPC are known, unlike potential problems with novel custom networks, and the academic and industry communities work
Best practice recommendations for utilizing open source software (from a lega...Rogue Wave Software
Presented at Sensors Expo and Conference 2015, this session covers: Trends in open source software (OSS); The open source audit and license identification; Developing an OSS process and policy; Compliance; and Legal implications.
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Splunk
IT Operations Use Case: Jennifer Green, R&D Scientist, Los Alamos National Security, LLC.
IT Operations Overview: Jon Rooney, Director, Developer Marketing, Splunk
This document provides an overview of a webinar on bringing open source software to government agencies. It introduces the speakers and discusses how the New York State Senate adopted an open source content management system (Drupal) to build its website. This allowed the Senate to avoid license fees, collaborate with other government entities, and release code and data to the public. The benefits of open source discussed include cost savings, innovation, reduced vendor lock-in, and leveraging community-built software.
The document summarizes a debate on open source versus proprietary software. It discusses definitions of open source software, popular open source licenses, and advantages of open source such as customizability, security, and lower costs. Open source is gaining adoption in government and enterprise due to benefits like avoiding vendor lock-in, lower costs, and higher quality from community contributions. Surveys find increasing enterprise adoption rates, with over 50% of new software to be open source in the next 5 years. Microsoft is also increasingly supporting open source.
This document provides an overview of Los Alamos National Laboratory's (LANL) efforts to build a private cloud called Infrastructure on Demand (IoD). The IoD allows LANL to address challenges around slow provisioning, limited resources, and the need to retire unsupported platforms by enabling self-service provisioning of virtual servers. Key components of IoD include a web portal, Microsoft SharePoint, VMware vCloud Director for resource consumption, and VMware vShield for security. IoD aims to reduce the number of physical servers and associated data center needs while improving provisioning times and availability during disasters.
SolarWinds Log & Event Manager vs Splunk. What's the Difference?SolarWinds
This document compares the log management solutions SolarWinds Log & Event Manager (LEM) and Splunk. It outlines key advantages of LEM over Splunk such as node-based licensing, in-memory event correlation, advanced visual search tools, and active response capabilities. The document also provides details on LEM features like log collection, compliance reporting, real-time event correlation, and USB monitoring and prevention. IT professionals praise LEM's ease of use and ability to expose threats and prevent business damage. Resources for downloading a free trial and getting support are listed.
This document discusses Interac Association/Acxsys Corporation and how Josh Diakun uses Splunk. It provides the following information:
- Interac Association was formed in 1984 and operates the Inter-Member Network, providing services like Interac Cash and Debit. Acxsys Corporation was founded in 1996 and provides management services to Interac Association.
- Before Splunk, Josh faced challenges like slow incident response, a lack of single visibility across infrastructure, and stress due to unclear root causes. Splunk helped address these by consolidating logs and providing faster investigations.
- Josh built several apps with Splunk like ones for enterprise storage, security analysis, and application monitoring to help various business units with control
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...Amazon Web Services
(Presented by CA Technologies) There are a lot of mainframes still out there, with a lot of data to back up and archive. CA Technologies (CA) is the largest mainframe software provider in the world. This session provides an overview and demo of CA’s Cloud Storage for System z solution used for mainframe storage backup to the AWS cloud. Traditional mainframe storage solutions are expensive and complex. For IT Directors, VPs of IT, VPs of Storage, and Storage Administrators, this session discusses how CA has partnered with AWS and Riverbed to provide an innovative solution that provides a low cost and secure solution for efficient backup and recovery of critical mainframe data.
You see a demo of Chorus managing data flow from the mainframe to the cloud using the Riverbed Whitewater appliance. You also hear from a demanding customer, Mark Behrje, Sr. Director Global Information Services, CA Technologies, about how they implemented quickly, how much they’ve reduced their backup TCO, and lessons learned.
The document discusses open source tools and provides an overview of their classes, history, and definition. It describes open source tools as a decentralized form of software production where source code is freely available and modifiable by anyone under the same sharing terms. The document lists classes of open source tools like messaging, business intelligence, and content management tools. It also briefly outlines the history of open source from the 1960s to today and references standards bodies like ISO and frameworks like ITIL.
Folt - Open TMS - A presentation for universitiesKlemens Waldhör
This document provides an overview of the Open Translation Memory System (OpenTMS) project. It discusses the goals of developing an open-source translation memory system, the requirements and architecture of OpenTMS, and the current status of its implementation including programming languages used and available downloads. The document also outlines possible contributions to further developing OpenTMS.
Merit Event - Open Your Mind To Open Source Softwaremeritnorthwest
This presentation provides an overview of open source software, including its definition, history, benefits, myths, and examples of use in business, government, and standards. Key points covered include the open source definition of free redistribution and source code integrity, its origins in the free software movement started by Richard Stallman, and benefits like collaboration and bug fixing. Examples are given of open source server and client applications as well as demonstration of Plone and GNU/Open Office. Adoption of open source in sectors like government, healthcare and business is also discussed.
Mark Logic Digital Publishing Summit, KelloggDave Kellogg
Slides from my presentation at the Mark Logic Digital Publishing Summit at The Plaza Hotel in NYC on 12/10/09. Topics include trends re-shaping the media and software information infrastructure.
This document outlines a Kali Linux course that covers 13 topics for beginners to learn penetration testing. The course introduces Kali Linux and teaches how to download, install, and understand the interface. It covers basic commands, directory structure, user types, file permissions, and installing packages. Hands-on tutorials are provided for phishing, data hiding, keylogging, and network scanning tools. The course concludes by teaching basic Bash scripting.
Erlang is a general-purpose programming language and runtime environment with built-in support for concurrency, distribution and fault tolerance. It was developed in 1986 at Ericsson for developing telecommunications systems. Some key features of Erlang include simplicity, managing concurrency and failure through lightweight processes, and a mature community. While setup can be complex and it lacks static types, Erlang excels at handling concurrency robustly. Major companies like WhatsApp use Erlang for its reliability in large distributed systems.
This presentation by Sam Ip, an associate in Osler’s Technology Group, details key considerations for emerging and high growth companies regarding OSS.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
More Related Content
Similar to Leveraging software disclosures into licensable technologies
This case study examines the San Francisco Performing Arts Library & Museum's (SFPALM) decision to migrate from Windows to open source software. SFPALM needed to license its unlicensed Windows server, outsource some services, and save money. It decided to use Red Hat Linux for its operating system, Samba for file/print sharing, Astaro Security Linux for firewall/VPN, qMail for email, Apache for web hosting, and maintain its legacy database on a Linux server. This saved $2,800 compared to purchasing Windows licenses and keeping outsourced services. The presentation discusses open source strengths like lower costs, security, and stability, as well as challenges like difficulty of deployment and lack
Riak Use Cases : Dissecting The Solutions To Hard ProblemsAndy Gross
This document summarizes a presentation on using Riak to solve hard distributed systems problems. It discusses Riak's key features and tradeoffs in consistency and data model. It then provides examples of how companies like Comcast, Yammer, and Github use Riak for high availability and low latency applications like user metadata storage, notifications, and as a document store. The presentation emphasizes that choosing the right database requires understanding your problem and tradeoffs in consistency, availability and data model. It also highlights how Riak and Erlang help enable high availability, low latency and operational simplicity through features like Bitcask storage, fault tolerance and lightweight threading.
Apache or GPL? MIT or BSD? These are just some of the licenses that attach to open source software. Do you know the important distinctions between them?
Is Exascale the End of the Line for Commodity Networks?Scott Pakin
Scott Pakin argues that commodity networks are viable for exascale supercomputers for several reasons:
1) Commodity networks worked well for petascale systems like Roadrunner, the first system to reach 1 petaflop/s using InfiniBand networking.
2) Commodity networks are significantly cheaper than custom networks, leaving more funds for processors and other parts.
3) Metrics like LINPACK, used for Top500 rankings, do not adequately measure a system's ability to run real applications at exascale since they involve limited data movement.
4) The issues with commodity networks in HPC are known, unlike potential problems with novel custom networks, and the academic and industry communities work
Best practice recommendations for utilizing open source software (from a lega...Rogue Wave Software
Presented at Sensors Expo and Conference 2015, this session covers: Trends in open source software (OSS); The open source audit and license identification; Developing an OSS process and policy; Compliance; and Legal implications.
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Splunk
IT Operations Use Case: Jennifer Green, R&D Scientist, Los Alamos National Security, LLC.
IT Operations Overview: Jon Rooney, Director, Developer Marketing, Splunk
This document provides an overview of a webinar on bringing open source software to government agencies. It introduces the speakers and discusses how the New York State Senate adopted an open source content management system (Drupal) to build its website. This allowed the Senate to avoid license fees, collaborate with other government entities, and release code and data to the public. The benefits of open source discussed include cost savings, innovation, reduced vendor lock-in, and leveraging community-built software.
The document summarizes a debate on open source versus proprietary software. It discusses definitions of open source software, popular open source licenses, and advantages of open source such as customizability, security, and lower costs. Open source is gaining adoption in government and enterprise due to benefits like avoiding vendor lock-in, lower costs, and higher quality from community contributions. Surveys find increasing enterprise adoption rates, with over 50% of new software to be open source in the next 5 years. Microsoft is also increasingly supporting open source.
This document provides an overview of Los Alamos National Laboratory's (LANL) efforts to build a private cloud called Infrastructure on Demand (IoD). The IoD allows LANL to address challenges around slow provisioning, limited resources, and the need to retire unsupported platforms by enabling self-service provisioning of virtual servers. Key components of IoD include a web portal, Microsoft SharePoint, VMware vCloud Director for resource consumption, and VMware vShield for security. IoD aims to reduce the number of physical servers and associated data center needs while improving provisioning times and availability during disasters.
SolarWinds Log & Event Manager vs Splunk. What's the Difference?SolarWinds
This document compares the log management solutions SolarWinds Log & Event Manager (LEM) and Splunk. It outlines key advantages of LEM over Splunk such as node-based licensing, in-memory event correlation, advanced visual search tools, and active response capabilities. The document also provides details on LEM features like log collection, compliance reporting, real-time event correlation, and USB monitoring and prevention. IT professionals praise LEM's ease of use and ability to expose threats and prevent business damage. Resources for downloading a free trial and getting support are listed.
This document discusses Interac Association/Acxsys Corporation and how Josh Diakun uses Splunk. It provides the following information:
- Interac Association was formed in 1984 and operates the Inter-Member Network, providing services like Interac Cash and Debit. Acxsys Corporation was founded in 1996 and provides management services to Interac Association.
- Before Splunk, Josh faced challenges like slow incident response, a lack of single visibility across infrastructure, and stress due to unclear root causes. Splunk helped address these by consolidating logs and providing faster investigations.
- Josh built several apps with Splunk like ones for enterprise storage, security analysis, and application monitoring to help various business units with control
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...Amazon Web Services
(Presented by CA Technologies) There are a lot of mainframes still out there, with a lot of data to back up and archive. CA Technologies (CA) is the largest mainframe software provider in the world. This session provides an overview and demo of CA’s Cloud Storage for System z solution used for mainframe storage backup to the AWS cloud. Traditional mainframe storage solutions are expensive and complex. For IT Directors, VPs of IT, VPs of Storage, and Storage Administrators, this session discusses how CA has partnered with AWS and Riverbed to provide an innovative solution that provides a low cost and secure solution for efficient backup and recovery of critical mainframe data.
You see a demo of Chorus managing data flow from the mainframe to the cloud using the Riverbed Whitewater appliance. You also hear from a demanding customer, Mark Behrje, Sr. Director Global Information Services, CA Technologies, about how they implemented quickly, how much they’ve reduced their backup TCO, and lessons learned.
The document discusses open source tools and provides an overview of their classes, history, and definition. It describes open source tools as a decentralized form of software production where source code is freely available and modifiable by anyone under the same sharing terms. The document lists classes of open source tools like messaging, business intelligence, and content management tools. It also briefly outlines the history of open source from the 1960s to today and references standards bodies like ISO and frameworks like ITIL.
Folt - Open TMS - A presentation for universitiesKlemens Waldhör
This document provides an overview of the Open Translation Memory System (OpenTMS) project. It discusses the goals of developing an open-source translation memory system, the requirements and architecture of OpenTMS, and the current status of its implementation including programming languages used and available downloads. The document also outlines possible contributions to further developing OpenTMS.
Merit Event - Open Your Mind To Open Source Softwaremeritnorthwest
This presentation provides an overview of open source software, including its definition, history, benefits, myths, and examples of use in business, government, and standards. Key points covered include the open source definition of free redistribution and source code integrity, its origins in the free software movement started by Richard Stallman, and benefits like collaboration and bug fixing. Examples are given of open source server and client applications as well as demonstration of Plone and GNU/Open Office. Adoption of open source in sectors like government, healthcare and business is also discussed.
Mark Logic Digital Publishing Summit, KelloggDave Kellogg
Slides from my presentation at the Mark Logic Digital Publishing Summit at The Plaza Hotel in NYC on 12/10/09. Topics include trends re-shaping the media and software information infrastructure.
This document outlines a Kali Linux course that covers 13 topics for beginners to learn penetration testing. The course introduces Kali Linux and teaches how to download, install, and understand the interface. It covers basic commands, directory structure, user types, file permissions, and installing packages. Hands-on tutorials are provided for phishing, data hiding, keylogging, and network scanning tools. The course concludes by teaching basic Bash scripting.
Erlang is a general-purpose programming language and runtime environment with built-in support for concurrency, distribution and fault tolerance. It was developed in 1986 at Ericsson for developing telecommunications systems. Some key features of Erlang include simplicity, managing concurrency and failure through lightweight processes, and a mature community. While setup can be complex and it lacks static types, Erlang excels at handling concurrency robustly. Major companies like WhatsApp use Erlang for its reliability in large distributed systems.
This presentation by Sam Ip, an associate in Osler’s Technology Group, details key considerations for emerging and high growth companies regarding OSS.
Similar to Leveraging software disclosures into licensable technologies (20)
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Leveraging software disclosures into licensable technologies
1. LA-UR 11-04994
Leveraging Software Disclosures
into Licensable Technologies
Aaron G. Sauers
Technology Transfer Division
Los Alamos National Laboratory
UNCLASSIFIED Slide 1
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
2. LA-UR 11-04994
Agenda
What is a copyright?
Copyright Disclosure information capture
Decision criteria
Diligence: License compatibility
Should we license?
Passive marketing
Active marketing
Exclusive / Multiple non-exclusive
Exclusive licensing
Preparing principal investigators
UNCLASSIFIED Slide 2
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
3. LA-UR 11-04994
What is a Copyright?
Copyright protection subsists….in original works of authorship
fixed in any tangible medium of expression …..otherwise
communicated, either directly or with the aid of a machine or
device. (17 U.S.C. §102)
• Applicable for:
— Software
— Schematics/drawings
— Firmware
— Publications (technical/journal articles, etc.)
UNCLASSIFIED Slide 3
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
4. LA-UR 11-04994
Copyright Disclosure Information Capture
Abstract (functionality)
• Why was this developed? Is this not available commercially? What does it do?
• Technology Maturity (is there a Graphic User Interface?)
Authorship
• Internal Authors? Collaboration across internal divisions?
• External Authors?
— Commercial, Open Source, Collaboration across National Laboratories?
• Intended Distribution? (Policy versus Practical Considerations)
— Controlled?
— Open?
• Open Source? (GPL, LGPL, BSD, etc.)
• Publicly Available?
• Assert Copyright as a Gov. Owned Contractor Operated (GOCO) lab?
— Open Source Software?
— Commercial?
UNCLASSIFIED Slide 4
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
5. LA-UR 11-04994
Decision Criteria
Are there pre-existing License Requirements?
• Open Source Software? (GPL, LGPL, BSD, etc.?)
• 3rd Party Contributions?
— Royalty Sharing Agreement in place?
• Are there reach-through license requirements stemming from the
compiler?
• Multi-Lab Collaboration Incorporating GOGOs?
— Is there an IP Management Agreement?
— Partnership intermediary?
• Are There Related Patents?
UNCLASSIFIED Slide 5
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
6. LA-UR 11-04994
Diligence: License Compatibility
http://www.dwheeler.com/essays/floss-license-slide.html
UNCLASSIFIED Slide 6
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
7. LA-UR 11-04994
License Compatibility (continued)
Take note of the compiler(s) your PIs are using
• Compilers turn human-readable (source) code into executable (target) code
• Most compilers combine portions of certain header files and runtime libraries with
the compiled program. As a result, the compiled code is technically a derivative
work of the compiler
• Take care to read the license language associated with any compilers that were
used
There are several popular GPL open source compilers
• Target code produced using an open source compiler could inherit a viral license
• Some of these open source compilers, such as G95, contain exceptions that allow
you to propagate derivative works in cases that would otherwise violate the terms
of the GPL license: e.g. GCC Runtime Library Exception, GNU Classpath, etc.
Some commercial compilers contain reach-through requirements
• Absoft requires execution of an “Absoft Runtime Redistribution License” prior to
distribution of compressed works
UNCLASSIFIED Slide 7
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
8. LA-UR 11-04994
Should we License?
Market Value
• Smaller cost of protection of copyright versus patent; thus, multiple
non-exclusive agreements often make good business sense
• The smaller capital outlay required for software makes arms-
length, transactional management of codes a viable
commercialization option, whereas patents are almost always
strategic
Laboratory Brand Recognition
Can we Build a Laboratory Capability?
Can we Bring an Author or Division into the TT Network?
• Author self-selection helps
UNCLASSIFIED Slide 8
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
9. LA-UR 11-04994
Passive Marketing
Hosted on LANL webpage
Minimal effort— Title, Abstract,
Tracking Number
Meets Fairness Of Opportunity
(FOO) Requirements
Gives authors a place to direct
colleagues to demonstrate their
code developments
TT receives 20-30 inquiries
annually as a result of this
passive marketing
UNCLASSIFIED Slide 9
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
10. LA-UR 11-04994
Active Marketing
Moderate effort— a
more targeted
approach to marketing
May be technology-
specific or a broad
capability description
for Sponsored
Research (CRADA or
WFO opportunity)
Serves as a nice pre-
phone call marketing
element
UNCLASSIFIED Slide 10
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
11. LA-UR 11-04994
Exclusive / Multiple Non-exclusive
For reduced-functionality
executable codes
Best suited for mature, user-
friendly software
Facilitates collection of basic
market information
Builds a user community to
promote software adoption
Easily builds brand
recognition with hassle-free
download For Executables Only
UNCLASSIFIED Slide 11
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
12. LA-UR 11-04994
Commercialization Workshop
Strategic licensing
Appropriate for
exclusive licensing in
defined fields of use
Best suited for portfolios
of technologies including
software
UNCLASSIFIED Slide 12
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
13. LA-UR 11-04994
Prepare your Principal Investigators
The PI is the strongest advocate for the technology. By preparing
software authors prior to presentations and publications, you leverage
word-of-mouth marketing within the author’s peer groups
This can help you find technical champions within potential licensees’
organizations (in some cases they will even reach out to TT)
UNCLASSIFIED Slide 13
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
14. Questions?
Aaron G. Sauers
Technology Transfer
Los Alamos National Laboratory
505-665-0132
asauers@lanl.gov
UNCLASSIFIED Slide 14
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
Wednesday, September 28, 2011
Editor's Notes
Approximately 25 minutes per presentation, then Q&A.
Less mature codes may need additional development by means of WFO or CRADA