A presentation for the Future of Networking session at the 2014 Cyber Summit by Jason Zurawski, Science Engagement Engineer, ESnet (Lawrence Berkeley National Laboratory).
Creating a Big Data Machine Learning Platform in CaliforniaLarry Smarr
Big Data Tech Forum: Big Data Enabling Technologies and Applications
San Diego Chinese American Science and Engineering Association (SDCASEA)
Sanford Consortium
La Jolla, CA
December 2, 2017
Understanding the Big Picture of e-ScienceAndrew Sallans
A. Sallans. "Understanding the Big Picture of e-Science." Presented at the 2011 eScience Bootcamp at the University of Virginia's Claude Moore Health Sciences Library. 4 March 2011
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.13
Sixth Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of Technology Sydney
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Sydney, Australia
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.08
Third Lecture in the
Australian American Leadership Dialogue Scholar Tour
Monash University
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Clayton, Australia
Creating a Big Data Machine Learning Platform in CaliforniaLarry Smarr
Big Data Tech Forum: Big Data Enabling Technologies and Applications
San Diego Chinese American Science and Engineering Association (SDCASEA)
Sanford Consortium
La Jolla, CA
December 2, 2017
Understanding the Big Picture of e-ScienceAndrew Sallans
A. Sallans. "Understanding the Big Picture of e-Science." Presented at the 2011 eScience Bootcamp at the University of Virginia's Claude Moore Health Sciences Library. 4 March 2011
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.13
Sixth Lecture in the
Australian American Leadership Dialogue Scholar Tour
University of Technology Sydney
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Sydney, Australia
Coupling Australia’s Researchers to the Global Innovation EconomyLarry Smarr
08.10.08
Third Lecture in the
Australian American Leadership Dialogue Scholar Tour
Monash University
Title: Coupling Australia’s Researchers to the Global Innovation Economy
Clayton, Australia
Opening Keynote Lecture
15th Annual ON*VECTOR International Photonics Workshop
Calit2’s Qualcomm Institute
University of California, San Diego
February 29, 2016
S#$% My Network Says (CTC Retreat 2010)Gary Wilhelm
In the spirit of the well-known Twitter feed about a dad's view of the world, the campus network actually provides both insightful and perverse findings to the ITS Comm Tech Director of Networking, Jim Gogan. As part of the annual campus network status update, Jim will share many of these findings, all in a G-rated format, as well as what he thinks the network will be telling him over the next year.
SC21: Larry Smarr on The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Larry Smarr, founding director of Calit2 (now Distinguished Professor Emeritus at the University of California San Diego) and the first director of NCSA, is one of the seminal figures in the U.S. supercomputing community. What began as a personal drive, shared by others, to spur the creation of supercomputers in the U.S. for scientific use, later expanded into a drive to link those supercomputers with high-speed optical networks, and blossomed into the notion of building a distributed, high-performance computing infrastructure – replete with compute, storage and management capabilities – available broadly to the science community.
Opening Keynote Lecture
15th Annual ON*VECTOR International Photonics Workshop
Calit2’s Qualcomm Institute
University of California, San Diego
February 29, 2016
S#$% My Network Says (CTC Retreat 2010)Gary Wilhelm
In the spirit of the well-known Twitter feed about a dad's view of the world, the campus network actually provides both insightful and perverse findings to the ITS Comm Tech Director of Networking, Jim Gogan. As part of the annual campus network status update, Jim will share many of these findings, all in a G-rated format, as well as what he thinks the network will be telling him over the next year.
SC21: Larry Smarr on The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Larry Smarr, founding director of Calit2 (now Distinguished Professor Emeritus at the University of California San Diego) and the first director of NCSA, is one of the seminal figures in the U.S. supercomputing community. What began as a personal drive, shared by others, to spur the creation of supercomputers in the U.S. for scientific use, later expanded into a drive to link those supercomputers with high-speed optical networks, and blossomed into the notion of building a distributed, high-performance computing infrastructure – replete with compute, storage and management capabilities – available broadly to the science community.
Accelerating Data-driven Discovery in Energy ScienceIan Foster
A talk given at the US Department of Energy, covering our work on research data management and analysis. Three themes:
(1) Eliminate data friction (use of SaaS for research data management)
(2) Liberate scientific data (research on data extraction, organization, publication)
(3) Create discovery engines at DOE facilities (services that organize data + computation)
Working towards Sustainable Software for Science (an NSF and community view)Daniel S. Katz
This talk looks at the goal of sustainable scientific software from the point-of-view of an NSF program officer who funds software as infrastructure, meaning software that enables a community beyond the developers to perform research, and from the point-of-view of the attendees of the First Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE1, http://wssspe.researchcomputing.org.uk/wssspe1/). Issues to be discussed include what sustainability means, funding, incentives, career paths, and communities.
A National Big Data Cyberinfrastructure Supporting Computational Biomedical R...Larry Smarr
Invited Presentation
Symposium on Computational Biology and Bioinformatics:
Remembering John Wooley
National Institutes of Health
Bethesda, MD
July 29, 2016
Cyberinfrastructure to Support Ocean ObservatoriesLarry Smarr
05.03.18
Invited Talk to the Ocean Studies Board
National Research Council
Title: Cyberinfrastructure to Support Ocean Observatories
University of California San Diego
Dr. Robert Voigt from the Krell Institute presented this deck at the recent HPC Saudi conference.
"This talk will provide a historical perspective on the challenges of educating computational scientists based on my personal involvement over a number of years. Three decidedly different activities will be drawn on to indicate how one can successfully approach the challenge. The first is based on experiences at the Institute for Computer Applications in Science and Engineering at the NASA Langley Research Center where visiting students were exposed to multidisciplinary research driven by computer simulations. The second is the Predictive Science Academic Alliance Program funded by the National Nuclear Security Administration, a component of the US Department of Energy (DOE). The third is the Computational Science Graduate Fellowship program funded by the DOE. The latter two programs provide students with exposure to multidisciplinary research and perhaps more unique, require them to spend a three month period at one of the DOE national laboratories. My experience with these three efforts suggest that development of computational scientists require three key components: class room exposure to applied mathematics, computer science and a scientific or engineering discipline; exposure to teams conducting multidisciplinary research; and a significant internship at a major research facility."
Watch a conversation with Dr. Robert Voight: http://wp.me/p3RLHQ-gBl
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Climate Science presents several data intensive challenges that are the intersection of software architecture and data science. This includes developing approaches for scaling the analysis of highly distributed data across institutional and system boundaries. JPL has been developing approaches for quantitatively evaluating software architectures to consider different topologies in the deployment of computing capabilities and methodologies in order to support the analysis of distributed climate data. This talk will cover those approaches and also needed research in new methodologies as remote sensing and climate model output data continue to increase in their size and distribution.
EarthCube Monthly Community Webinar- Nov. 22, 2013EarthCube
This webinar features project overviews of all EarthCube Awards (Building Blocks, Research Coordination Networks, Conceptual Designs, and Test Governance), followed by a call for involvement, and a Q&A session.
Agenda:
EarthCube Awards – Project Overviews
1.. EarthCube Web Services (Building Block)
2. EC3: Earth-Centered Community for Cyberinfrastructure (RCN)
3. GeoSoft (Building Block)
4. Specifying and Implementing ODSIP (Building Block)
5. A Broker Framework for Next Generation Geoscience (BCube) (Building Block)
6. Integrating Discrete and Continuous Data (Building Block)
7. EAGER: Collaborative Research (Building Block)
8. A Cognitive Computer Infrastructure for Geoscience (Building Block)
9. Earth System Bridge (Building Block)
10. CINERGI – Community Inventory of EC Resources for Geoscience Interoperability (BB)
11. Building a Sediment Experimentalist Network (RCN)
12. C4P: Collaboration and Cyberinfrastructure for Paleogeosciences (RCN)
13. Developing a Data-Oriented Human-centric Enterprise for Architecture (CD)
14. Enterprise Architecture for Transformative Research and Collaboration (CD)
15. EC Test Enterprise Governance: An Agile Approach (Test Governance)
A Call for Involvement!
Calit2-a Persistent UCSD/UCI Framework for CollaborationLarry Smarr
05.02.16
Invited Talk
Sun Microsystems Global Education and Research
Conference 2005
Title: Calit2-a Persistent UCSD/UCI Framework for Collaboration
San Francisco, CA
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
Serious threats to private and governmental organizations do not only come from the outside world, but also come from within. Some employees and contractors with legitimate access to buildings, networks, assets and information deliberately misuse their priviledged access to cause harm to their organization. What are the reasons behind their actions? Is it debts, greed, ideology, disgruntlement, or divided loyalty?
Regardless of their motivations or vulnerabilities, traitors have very similar types of personality and display a certain pattern of behaviours before committing an insider incident. As a prevention measure, it is vital that organizations and employees understand, recognize and detect the common indicators of insider threat. Would you recognize the signs?
Mario Vachon is an Insider Threat Security Specialist with the RCMP Departmental Security Branch.
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
Canada allocates a substantial amount of public funding to research, which is a critical factor in ensuring we remain innovative and competitive. Increasingly this funding is geared to the support and development of digital research infrastructure (DRI), including the underlying networks and the associated data acquisition, storage, analysis and visualization. In order to maximize the benefits of increasingly complex DRI and the research it facilitates, it is important to make sure data is properly stewarded, accessible and reusable. By adopting appropriate approaches to research data management we are better positioned to respond to challenges, such as effectively measuring research impacts, and ensuring the reproducibility, privacy, and security of research outputs.
Research Data Canada (RDC) is a member-driven organization committed to developing a sustainable approach to research data management, one based on interoperability and best practices. This session will provide an update on the efforts of RDC and partner organizations, including: CANARIE, Compute Canada, CARL Portage Network, CASRAI, the TriAgencies, and the Leadership Council for Digital Infrastructure. Intersections with international activities and projects will also be highlighted. These efforts are ultimately designed to faciliate a cohesive national approach to research data management, and one based on a clearly articulated vision for supporting innovation and discovery in Canada.
Mark Leggott is the Executive Director of Research Data Canada.
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
The Internet has revolutionized how — and how much — each of us can know. Our digital tools put the knowledge of the world at our fingertips — and soon, maybe, right into our heads. But what kinds of of knowledge do our devices give us, and how are they reshaping and challenging the role that education and libraries should play in our lives?
This talk was delivered by Michael Patrick Lynch, professor of philosophy at the University of Connecticut, where he directs the university’s Humanities Institute.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
Stephen Childs was hired by the University of Calgary to develop an individual-level predictive model mapping students' decisions to attend the University. In his experience, the higher education sector was slow to use all the data it has available, but this is now changing.
As interest in making use of organizational data grows, staff must consider how these models will be used, and any problems that could arise. When individual predictions become the basis for decisions, how do we ensure our algorithms don't make existing problems worse? A framework for handling these issues now will let organizations handle these issues in a way that is consistent with their values.
Given the culture of today's institutions, and the success of predictive analytics in other fields, there is no doubt that these tools will be used. These techniques can improve student success and the competitiveness of educational organizations, but the benefits should not be gained at the expense of individuals within the system. This talk will propose a set of best practices for using institutional data for predictive modelling to address equity, privacy and other concerns. We must start thinking of this now, before other practices become entrenched.
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
Canada’s National Research and Education Network, like other ultra-speed research networks, has evolved to transfer massive amounts of data at 100Gbps and beyond. But with the volume of data traffic growing at more than 50% per year, the ability to move increasing volumes of data is challenging. What are the kinds of applications in research and education that are driving this growth? What are the implications of the coming data tsunami on our communication networks? And what happens to network economics to keep up with the demand? CANARIE’s Chief Technology Officer, Mark Wolff, explores these topics and offer insights into how the NREN will evolve to continue to meet the unique needs of Canada’s research and education community.
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCybera Inc.
The City of Calgary is responsible for providing municipal services to 1.1 million people and 16,000 employees with more than 700 sites and critical infrastructure units. The municipal services represent a $60B asset base including water and wastewater treatment plants, light rapid transit, emergency services, roads and recreation facilities, and has revenue and procurement streams of $4.0B annually. During his tenure, Owen Key, Chief Security Officer and the Chief Information Officer for the City, has implemented enterprise systems for CCTV, access and ID control, physical security information management systems, and has responsibility for information security.
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
The law has long struggled to keep pace with the rapid change that comes with the Internet and new technologies. From the cross-border challenges posed by a global network to the privacy implications of big data, law and policy simply cannot move at “Internet speed.” Yet despite the difficulties, politicians and policy makers increasingly find themselves at the heart of emerging policy issues, asked to address the balance between privacy and surveillance, the competing copyright interests of creators and users, and the market structure for network providers and disruptive competitors. This keynote talk will explore the emerging law and policy challenges, highlighting how all Internet users have the opportunity to help shape the digital policy landscape. Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Historically, the University of Alberta lacked a centrally managed repository for reporting data, resulting in inconsistency and disparity in access for units across campus. Meaningful and actionable reports were limited, and only focused on the interests and goals of the few units with data analysts who could synthesize the information.
Over the last couple of years, the University of Alberta has undertaken major changes in how information is managed and utilized. At the forefront of this change has been an increased interest in supporting the development of analytics and supporting tools. Beginning with the implementation of a centrally managed data warehouse with self-service capabilities, and the introduction of cloud services with business process analysis tools, the University is just starting down the road of big data.
This presentation explores opportunities and challenges for the University of Alberta in utilizing big data.
Predicting the Future With Microsoft BingCybera Inc.
The next generation of data scientists will be asked to build predictive models that can extract inferences from very large datasets which are unobservable at the surface, even to the best domain experts. Microsoft has access to some truly large data sets, web and search data from the Bing search engine and social data through collaborations with Twitter. In this talk, we show you how a small team of data scientists used this data to build the Bing Predicts engine — a collection of machine learnt predictive models that is beating industry experts at predicting the outcome of events like the Super Bowl, the Oscars, elections and referendums and even breakthroughs in health sciences. The talk will also give a preview of how organizations can adopt a big data mindset to generate and experiment with large data sets and to make amazing predictions using their own data.
Analytics 101: How to not fail at analyticsCybera Inc.
"Data Scientist" is perhaps the hottest job title of recent years. But what is a data scientist? What does a data scientist actually do? And where can they be found? In this talk, presenter Daniel Haight describes the benefits of analytics to decision-making, and explores the characteristics of successful organizations that have fostered their own team of data scientists.
The MOOC movement is only four years old, but has already had a tremendous impact on teaching and learning. While the some of the original hype surrounding MOOCs has not been realized, the reality is that they are here for good and are influencing institutional thinking. This talk will discuss the past, present and future of MOOCs.
While the use of online instructional technologies allows the presentation of theoretical science materials, how do we deal with the fact that such courses often include hands-on labs? Laboratory simulations can only provide a solution for online students in a limited and often artificial way. Nearly 20 years ago, Athabasca University developed a solution to the problem of students having to travel to complete their lab work. Emerging technologies at the time allowed for quantitative physics labs to be sent to students as a small kit. The physics initiative was so successful, with over 5,000 students served, that it was picked up in other fields at Athabasca University.
Over the years, such material has become cheaper, easier to use, and more integrated with modern computers. Athabasca is now pioneering ways to put real labs directly onto the internet. In this session, the methods used to make real lab experiences available to online students will be discussed, and some of them demonstrated.
Canadian municipalities are making great strides when it comes to sharing their data in fun, interactive ways. In this session, presenters will look at cities that are using their data to create useful apps and services for citizens; and describe how all community leaders can get involved to make their municipality more open and accessible.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges. This session will offer insights into best practices for healthcare analytics programs, as well as use cases that demonstrate the potential benefits that can be realized through this work.
Checking in on Healthcare Data AnalyticsCybera Inc.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges.
Open access and open data: international trends and strategic contextCybera Inc.
Governments around the world fund billions of dollars in research every year. Ensuring that the results of research are available to the public, other researchers and industry has become an important underlying value in order to maximize the impact of our publicly funded research. This session will discuss what’s driving the trend towards greater openness and provide an overview of international developments that will help put Canada’s activities into context.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Science Engagement: A Non-Technical Approach to the Technical Divide
1. Science Engagement: A Non-
Technical Approach to the Technical
Divide
Jason Zurawski – zurawski@es.net
Science Engagement Engineer, ESnet
Lawrence Berkeley National Laboratory
CYBERA Summit 2014
September 24th, 2014
2. Outline
• What is ESnet?
• Defining Science Engagement
• Lessons Learned in Supporting Science
• Preparing for What Comes Next
• Conclusions
2 – ESnet Science Engagement (engage@es.net) -
9/30/2014
3. ESnet at a Glance
• High-speed national network,
optimized for DOE science missions:
– connecting 40 labs, plants and
facilities with >100 networks
– $32.6M in FY14, 42FTE
– older than commercial Internet,
growing twice as fast
• $62M ARRA grant for 100G upgrade:
SC Supports Research at More than 300 Institutions Across the U.S.
– transition to new era of optical networking
– world’s first 100G network at continental scale
• Culture of urgency:
– 4 awards in past 3 years
– R&D100 Award in FY13
– “5 out of 5” for customer satisfaction in last review
– Dedicated staff to support the mission of science
8
Universities
DOE laboratories
The Office of Science supports:
27,000 Ph.D.s, graduate students, undergraduates, engineers, and technicians
26,000 users of open-access facilities
300 leading academic institutions
17 DOE laboratories
3 – ESnet Science Engagement (engage@es.net) -
9/30/2014
5. Network as Infrastructure Instrument
EUROPE
(GÉANT/
NORDUNET)
25260 ESnet Map Rev 11/09/12
100G IP Hubs
Nx10G IP Hub
Major R&E
and International
peering connections
Office of Science National Labs
Ames
ANL
BNL
FNAL
JLAB
Ames Laboratory (Ames, IA)
Argonne National Laboratory (Argonne, IL)
Brookhaven National Laboratory (Upton, NY)
Fermi National Accelerator Laboratory (Batavia, IL)
Thomas Jefferson National Accelerator Facility (Newport News, VA)
LBNL
ORNL
PNNL
PPPL
SLAC
Lawrence Berkeley National Laboratory (Berkeley, CA)
Oak Ridge National Laboratory (Oak Ridge, TN)
Pacific Northwest National Laboratory (Richland, WA)
Princeton Plasma Physics Laboratory (Princeton, NJ)
Stanford Linear Accelerator Center (Menlo Park, CA)
ASIA-PACIFIC
(ASGC/Kreonet2/
TWAREN)
ASIA-PACIFIC
(KAREN/KREONET2/
NUS-GP/ODN/
REANNZ/SINET/
TRANSPAC/TWAREN)
AUSTRALIA
(AARnet)
LATIN AMERICA
CLARA/CUDI
CANADA
(CANARIE)
RUSSIA
AND CHINA
(GLORIAD)
US R&E
(DREN/Internet2/NLR)
US R&E
(DREN/Internet2/
NASA)
US R&E
(NASA/NISN/
USDOI)
ASIA-PACIFIC
(BNP/HEPNET)
ASIA-PACIFIC
(ASCC/KAREN/
KREONET2/NUS-GP/
ODN/REANNZ/
SINET/TRANSPAC)
AUSTRALIA
(AARnet)
US R&E
(DREN/Internet2/
NISN/NLR)
US R&E
(Internet2/
NLR)
CERN
US R&E
(DREN/Internet2/
NISN)
CANADA
(CANARIE) LHCONE
CANADA
(CANARIE)
FRANCE
(OpenTransit)
RUSSIA
AND CHINA
(GLORIAD)
CERN
(USLHCNet)
ASIA-PACIFIC
(SINET)
EUROPE
(GÉANT)
LATIN AMERICA
(AMPATH/CLARA)
LATIN AMERICA
(CLARA/CUDI)
HOUSTON
ALBUQUERQUE
El PASO
SUNNYVALE
BOISE
SEATTLE
KANSAS CITY
NASHVILLE
WASHINGTON DC
NEW YORK
BOSTON
CHICAGO
DENVER
SACRAMENTO
ATLANTA
ESnet
Energy Sciences N etwor k
PNNL
SLAC
AMES PPPL
BNL
ORNL
JLAB
FNAL
ANL
LBNL
Vision: Scientific progress will be completely unconstrained by the
physical location of instruments, people, computational resources, or
data. 5 – ESnet Science Engagement (engage@es.net) -
9/30/2014
6. Outline
• What is ESnet?
• Defining Science Engagement
• Lessons Learned in Supporting Science
• Preparing for What Comes Next
• Conclusions
6 – ESnet Science Engagement (engage@es.net) -
9/30/2014
7. Challenges to Network Adoption
• Causes of performance issues are
complicated for users.
• Lack of communication and collaboration
between the CIO’s office and researchers on
campus.
The Capability Gap
• Lack of IT expertise within a science
collaboration or experimental facility
• User’s performance expectations are low
(“The network is too slow”, “I tried it and it
didn’t work”).
• Cultural change is hard (“we’ve always
shipped disks!”).
• Scientists want to do science not IT support
7 – ESnet Science Engagement (engage@es.net) -
9/30/2014
8. Requirements Reviews
http://www.es.net/about/science-requirements/network-requirements-reviews/
The purpose of these reviews is to accurately characterize the near-term,
medium-term and long-term network requirements of the science conducted by
each program office.
The reviews attempt to bring about a network-centric understanding of the
science process used by the researchers and scientists, to derive network
requirements.
We have found this to be an effective method for determining network
requirements for ESnet's customer base.
8 – ESnet Science Engagement (engage@es.net) -
9/30/2014
9. High Energy Physics
Nuclear Physics
Photo Photo courtesy of JGI courtesy of NIST
Basic Energy Research
Fusion Energy Sciences
Biological and Environmental
Research
Advanced Scientific Computing
Research
Photo courtesy of LBL
Photo courtesy of LBL
Photo courtesy of SLAC
Photo courtesy of PPPL
9 – ESnet Science Engagement (engage@es.net) -
9/30/2014
10. How do we know what our
scientists need?
• Each Program Office has a dedicated
requirements review every three years
• Two workshops per year, attendees
chosen by science programs
• Discussion centered on science case
studies
• Instruments and Facilities – the
“hardware”
• Process of Science – science workflow
• Collaborators
• Challenges
• Network requirements derived from
science case studies + discussions
• Reports contain requirements analysis,
case study text, outlook
10 – ESnet Science Engagement (engage@es.net) -
9/30/2014
11. 2013 BER
Sample
Findings:
Environmental
Molecular
Sciences
Laboratory
(EMSL)
“EMSL frequently needs to ship physical copies of media to users when data
sizes exceed a few GB. More often than not, this is due to lack of bandwidth or
storage resources at the user's home institution.”
12. Outline
• What is ESnet?
• Defining Science Engagement
• Lessons Learned in Supporting Science
• Preparing for What Comes Next
• Conclusions
12 – ESnet Science Engagement (engage@es.net) -
9/30/2014
14. Big Science Now Comes in Small Packages
14 – ESnet Science Engagement (engage@es.net) -
9/30/2014
15. User Workflow & Bottleneck Identification
Users
Publications
1. Allocation
2. Endstation 3. Sample
4. Control
Software
5. Data
Collection
6. Data Transfer /
Management
7. Data
Processing
9. Write and
edit
8. Data Analysis / Info Extraction /
Visualization / Simulation
15 – ESnet Science Engagement (engage@es.net) -
9/30/2014
16. Coupling Research Facilities & HPC resources with Networks
Analyzer
Crystals XES
Detector
Diffraction
Detector
Injector
X-ray Beam
Apertures
X-ray diffraction
(structure)
Liquid-jet
Injection of
mm-size crystals
• Recent beam time on free-electron laser
(LCLS) at SLAC to take ‘snapshots’ of
catalytic reaction in Photosystem II (Nick
Sauter et al).
• Data transported to a nearby HPC resource
(NERSC) for real-time computational
analysis.
• This one experiment tripled NERSC’s
X-ray emission spectroscopy
(Chemistry at the catalytic site)
• charge density/spin state
• ligand environment
network utilization.
Kern et al (2012) PNAS 109: 9721
Sierra et al (2012) Acta Cryst D68: 1584
Mori et al (2012) PNAS 109: 19103
Optical
pump
Source: Nicholas Sauter,
LBNL
16 – ESnet Science Engagement (engage@es.net) -
9/30/2014
17. After processing on a
supercomputer, models are
created…once we get them
there.
E Pluribus Unum
Hundreds to thousands
of these images are
created in a few
hours…they can range
in size from MB to TB
17 – ESnet Science Engagement (engage@es.net) -
9/30/2014
18. Experimental Facility to Computing Facility over ESnet
18 – ESnet Science Engagement (engage@es.net) -
9/30/2014
19. Outline
• What is ESnet?
• Defining Science Engagement
• Lessons Learned in Supporting Science
• Preparing for What Comes Next
• Conclusions
19 – ESnet Science Engagement (engage@es.net) -
9/30/2014
20. Understanding Data Trends
100PB
10PB
1PB
100TB
10TB
1TB
100GB
10GB
Data Scale
Collaboration Scale
Small collaboration
scale, e.g. light and
neutron sources
Medium
collaboration scale,
e.g. HPC codes
A few large collaborations
have internal software and
networking organizations
Large collaboration
scale, e.g. LHC
20 – ESnet Science Engagement (engage@es.net) -
9/30/2014
21. The Long Tail
• There will always be a small population of users
that produce “Big data”
– Normally these are groups that have technological
sophistication
– IT shops for software, Network teams to implement
tech du-jour (SDN, Cloud, blah blah)
• Science doesn’t only occur on the left side of the
graph below
– The long tail needs the most help
– Progress will be made regardless; there are a lot
more “easy wins” (e.g. orders of magnitude of
improvement available) on the right side
First result on Google:
21 – ESnet Science Engagement (engage@es.net) -
9/30/2014
22. Post-it I keep On My Desk
• Engagement = figuring out if the solution is a good idea, and then helping with integration
– Asking questions, building trust
– Provide a solution, not a technology (and certainly not a headache)
• Lots of easy things – e.g. changing data management tools, eliminating capacity
bottlenecks, stopping non-congestive packet loss
22 – ESnet Science Engagement (engage@es.net) -
9/30/2014
• Engineers are the early adopters of
most things
• Impacted science groups come in
much later
• We don’t want scientists to be
engineers. They do better as
scientists
• Engagement != dropping something
new into a user’s lap and hoping for
the best
23. DOE Facilities in 2025: More Data, More Users, More Discovery
Experimental facilities will be transformed by high-resolution
detectors, advanced mathematical analysis techniques,
robotics, software automation, and programmable networks.
Detectors capable of
generating terabit data
streams. Computational tools for
analysis, data reduction
& feature extraction in
situ, using advanced
algorithms and special-purpose
hardware.
Increase scientific
throughput from
robotics and
automation software.
Data management and
sharing, with federated
identity management
and flexible access
control. Post-processing:
reconstruction, inter-comparison,
simulation,
visualization.
Integration of
experimental and
computational facilities
in real time, using
programmable
networks.
23 – ESnet Science Engagement (engage@es.net) -
9/30/2014
24. Outline
• What is ESnet?
• Defining Science Engagement
• Lessons Learned in Supporting Science
• Preparing for What Comes Next
• Conclusions
24 – ESnet Science Engagement (engage@es.net) -
9/30/2014
25. Conclusions (& Action Items)
• Science engagement isn’t hard
– More about listening than building
– Building occurs with or without knowing the use cases, this can help refine
• Science engagement can’t be done on found cycles
– Dedicated person(s) with a communications/technology background
– Gives a known ‘landing point’; builds trust, encourages growth
• Benefits when attempted:
– Potentially saving on costs of build/operation
– Happy customers
– Deeper understanding of the science, which advances society (e.g. I want to see a cure for
cancer before I need one, networks are a part of that)
25 – ESnet Science Engagement (engage@es.net) -
9/30/2014
26. Conclusions (& Action Items)
• Country/Region/Province Suggestions:
– Find a ‘champion’ to coordinate, and participants from other locations
– Develop a system similar to ESnet’s Requirements Reviews (we are happy to help)
– Tie the success of science to the network:
• Will help to gauge ‘how big’ to build the network, and on what time scales
• Will also turn out some negative information, e.g. how the network problems/lack of capability may
be hurting innovation
– Tie in to PERT (PErformance Response Team) activities
• E.g. if you have a PERT. If you don’t, you need one
• A PERT debugs end to end performance problems. These are often different than ‘Link X flapped to
Peer Y’
• The PERT would advocate for Science DMZs, DTNs, perfSONAR, and other network solutions to
assist in science
• engage@es.net
26 – ESnet Science Engagement (engage@es.net) -
9/30/2014
27. Science Engagement: A Non-
Technical Approach to the Technical
Divide
Jason Zurawski – zurawski@es.net
Science Engagement Engineer, ESnet
Lawrence Berkeley National Laboratory
CYBERA Summit 2014
September 24th, 2014
Editor's Notes
Two reviews per year, One review per program office every 3 years
Goals –
1. Accurately characterize current and future network requirements
2. Collect network requirements from scientists and Program Office
Structure
Elicit information from managers, scientists and network users regarding usage patterns, science process, instruments and facilities – codify in “Case Studies”
Case studies focus on two different aspects of the science
Instruments and Facilities – the “hardware” of science
Process of Science – the way in which the Instruments and Facilities are used in the conduct of the science
Synthesize network requirements from the Case Studies
ESnet’s core mission is to serve the DOE/SC science programs
Large-scale data movement
Network services to enable science
Network implications arise from the conduct of science
Science instruments and facilities
Process of science
How will these change over time?