Reference Is Dead! Long Live Reference! The Future of Reference ServicesDon Boozer
Has Google made reference librarians obsolete? Is a golden age of librarianship being ushered in? Technology has had a democratizing effect on the availability of information, but what does this mean for reference services? The future of reference services has yet to be written, and there are both challenges as well as opportunities ahead. A panel of experts will confront these questions from a variety of perspectives including public and academic, front-line and administrative, and adult and young adult. Come and join this timely and thought-provoking discussion. - Presented at the Ohio Library Council Convention & Expo 2014
This document provides tips for searching databases more effectively. It discusses using Boolean operators like AND, OR and NOT to narrow or expand searches. Phrase searches can be done with quotation marks. Capitalization does not matter. Filters can be used to limit results. The asterisk serves as a wildcard. Users can search multiple related terms at once, like "librar*" to find library and related terms. Power searching allows searching across multiple databases simultaneously.
The document provides tips for conducting effective searches, including using Boolean operators like AND, OR and NOT; using phrase searches; capitalization doesn't matter; using built-in filters; and using the asterisk (*) trick to search for multiple related terms at once. Boolean operators allow limiting searches to results containing all terms (AND), either term (OR), or excluding certain terms (NOT). The asterisk (*) trick allows searching for different forms of a word like "child*" to include "children", "childhood", etc. Power searching across multiple databases at once further expands search results.
To upload photos to Flickr, log into your account and select Upload. Choose photos avoiding those with people or personal details, focusing instead on objects, colors, seasons, backgrounds, or animals. Find the photos folder, select the photos, and choose the license terms, preferably Attribution, to allow sharing and reuse with credit. Add tags and sets to the photos to help others find them before finalizing the upload to your photostream.
Information Seeking & Reference Serviceslaurenshopp
The document discusses information seeking behaviors and reference services. It explains that when an individual needs information, they experience an information need, seek information to address that need, and exhibit information behaviors in how they seek information. It also discusses how people tend to exert the least amount of effort when seeking information according to Zipf's Principle of Least Effort. The document then covers the objectives and tools of reference services, both historically and presently.
Presented by Marian Ramos at PAARL’s National Summer Conference on the theme "Superior Practices and World Widening Services of Philippine Libraries", held at Dao District, Tagbilaran City, Bohol, 14-16 April 2010
This document discusses Boolean logic and search operators that can be used to refine searches. It explains the basic Boolean operators - AND, OR, and NOT - and how they combine search terms. Specifically, it provides examples of using OR to search for terms in combination, AND to find terms that co-occur, and NOT to exclude certain terms. The document also covers techniques like phrase searching using quotation marks, grouping terms with parentheses, and using modifiers like asterisks to expand searches. The goal is to illustrate how Boolean logic and operators can help users cast broad searches initially and then progressively narrow them down to the most relevant results.
Libraries: Reference Services in a Virtual Contextkoegeljm
This document discusses virtual reference services (VRS) in libraries, including common types like email, web forms, chat, and instant messaging. It provides examples of libraries that have implemented chat widgets like Meebo Me and analyzes the results, such as increased questions but shorter transaction times. The conclusion is that VRS helps libraries meet patron needs and younger generations are attracted to libraries' reference services through VRS, though it also challenges librarians to broaden their skills.
Reference Is Dead! Long Live Reference! The Future of Reference ServicesDon Boozer
Has Google made reference librarians obsolete? Is a golden age of librarianship being ushered in? Technology has had a democratizing effect on the availability of information, but what does this mean for reference services? The future of reference services has yet to be written, and there are both challenges as well as opportunities ahead. A panel of experts will confront these questions from a variety of perspectives including public and academic, front-line and administrative, and adult and young adult. Come and join this timely and thought-provoking discussion. - Presented at the Ohio Library Council Convention & Expo 2014
This document provides tips for searching databases more effectively. It discusses using Boolean operators like AND, OR and NOT to narrow or expand searches. Phrase searches can be done with quotation marks. Capitalization does not matter. Filters can be used to limit results. The asterisk serves as a wildcard. Users can search multiple related terms at once, like "librar*" to find library and related terms. Power searching allows searching across multiple databases simultaneously.
The document provides tips for conducting effective searches, including using Boolean operators like AND, OR and NOT; using phrase searches; capitalization doesn't matter; using built-in filters; and using the asterisk (*) trick to search for multiple related terms at once. Boolean operators allow limiting searches to results containing all terms (AND), either term (OR), or excluding certain terms (NOT). The asterisk (*) trick allows searching for different forms of a word like "child*" to include "children", "childhood", etc. Power searching across multiple databases at once further expands search results.
To upload photos to Flickr, log into your account and select Upload. Choose photos avoiding those with people or personal details, focusing instead on objects, colors, seasons, backgrounds, or animals. Find the photos folder, select the photos, and choose the license terms, preferably Attribution, to allow sharing and reuse with credit. Add tags and sets to the photos to help others find them before finalizing the upload to your photostream.
Information Seeking & Reference Serviceslaurenshopp
The document discusses information seeking behaviors and reference services. It explains that when an individual needs information, they experience an information need, seek information to address that need, and exhibit information behaviors in how they seek information. It also discusses how people tend to exert the least amount of effort when seeking information according to Zipf's Principle of Least Effort. The document then covers the objectives and tools of reference services, both historically and presently.
Presented by Marian Ramos at PAARL’s National Summer Conference on the theme "Superior Practices and World Widening Services of Philippine Libraries", held at Dao District, Tagbilaran City, Bohol, 14-16 April 2010
This document discusses Boolean logic and search operators that can be used to refine searches. It explains the basic Boolean operators - AND, OR, and NOT - and how they combine search terms. Specifically, it provides examples of using OR to search for terms in combination, AND to find terms that co-occur, and NOT to exclude certain terms. The document also covers techniques like phrase searching using quotation marks, grouping terms with parentheses, and using modifiers like asterisks to expand searches. The goal is to illustrate how Boolean logic and operators can help users cast broad searches initially and then progressively narrow them down to the most relevant results.
Libraries: Reference Services in a Virtual Contextkoegeljm
This document discusses virtual reference services (VRS) in libraries, including common types like email, web forms, chat, and instant messaging. It provides examples of libraries that have implemented chat widgets like Meebo Me and analyzes the results, such as increased questions but shorter transaction times. The conclusion is that VRS helps libraries meet patron needs and younger generations are attracted to libraries' reference services through VRS, though it also challenges librarians to broaden their skills.
This document provides a list of 21 tools from the Word 2007 ribbon but does not include any descriptions of the tools. It appears to be a worksheet for identifying the functions of various buttons and options within the Home, Insert, Page Layout, References, and Review tabs of the Word 2007 ribbon interface.
This document provides guidance on searching for information on the Internet about the relationship between television violence and juvenile crime. It identifies key concepts to search, suggests keywords using synonyms, explains how to use implied and explicit Boolean operators, and provides examples of phrase searches and link searches to help locate relevant information on this topic.
The document provides instructions for using the Magnetic Lasso Tool in Photoshop to select an object, then cut and paste it onto a collage layer. Specifically, it instructs the user to right click the Lasso Tool and select Magnetic Lasso, trace around the object with Magnetic Lasso, then switch to the Move Tool to pick up and move the selected object to the collage layer.
To crop an image, turn on the Crop Tool and draw a box around the part of the picture you want to keep. Then, select Crop from the Image menu to cut away anything outside the box, leaving only the selected area visible. This trims an image down to just the important central portion.
The document summarizes the advantages a student would have using a laptop for schoolwork compared to using only paper and pencil. It lists 12 ways a laptop would enhance the student's learning, such as having access to up-to-date information, communicating with experts worldwide, and selecting their own learning style. It concludes by noting the relatively low cost of providing students laptops compared to the priceless value of an educated workforce.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
This document provides a list of 21 tools from the Word 2007 ribbon but does not include any descriptions of the tools. It appears to be a worksheet for identifying the functions of various buttons and options within the Home, Insert, Page Layout, References, and Review tabs of the Word 2007 ribbon interface.
This document provides guidance on searching for information on the Internet about the relationship between television violence and juvenile crime. It identifies key concepts to search, suggests keywords using synonyms, explains how to use implied and explicit Boolean operators, and provides examples of phrase searches and link searches to help locate relevant information on this topic.
The document provides instructions for using the Magnetic Lasso Tool in Photoshop to select an object, then cut and paste it onto a collage layer. Specifically, it instructs the user to right click the Lasso Tool and select Magnetic Lasso, trace around the object with Magnetic Lasso, then switch to the Move Tool to pick up and move the selected object to the collage layer.
To crop an image, turn on the Crop Tool and draw a box around the part of the picture you want to keep. Then, select Crop from the Image menu to cut away anything outside the box, leaving only the selected area visible. This trims an image down to just the important central portion.
The document summarizes the advantages a student would have using a laptop for schoolwork compared to using only paper and pencil. It lists 12 ways a laptop would enhance the student's learning, such as having access to up-to-date information, communicating with experts worldwide, and selecting their own learning style. It concludes by noting the relatively low cost of providing students laptops compared to the priceless value of an educated workforce.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
3. Conduct the following searches: # results: 2 Keywords + “and” search: 51,600 multi-ethnic and education and advantageous 616,000 multilingual and education and valuable 1,830,000 multicultural and education and effective # results: 3 keywords + “and” search 1,650,000 multi-ethnic and education 2,140,000 multilingual and education 3,790,000 multicultural and education 347,000,000 helpful 631,000,000 education 19,900,000 multicultural # results: Keyword search:
4. Conduct the following searches: # results Keywords + “and not” search: 1,840,000 (multicultural and education) not training 51,000 (multi-ethnic and instruction) not multilingual 1,550,000 (multilingual and education) not training # results: 2 Keywords + “or” search: 1,980,000 multicultural or education or training 45,000,000 education or instruction or training 77,300 multicultural or multilingual or multi-ethnic # results: 3 keywords + “or” search 141,000 multi-ethnic or multilingual 647,000 multi-ethnic or multicultural 1,040,000 multicultural or multilingual