Replacing `import` with `accio`! Compiling Pythons with Custom Grammar for the sake of a joke!
In Python, overwriting builtin functions is fairly easy. You can even do it in the interpreter! But can you overwrite a statement, like import, just as easily? Let's go on an adventure, discovering how the import statement works, and how Python statements are defined in the CPython source code. We'll face some consequences of bootstrapping, and, to get our custom Harry Potter-themed Grammar to work, we'll have to compile a Python to compile a Python.
Slaying the Dragon: Implementing a Programming Language in RubyJason Yeo Jie Shun
The document provides an overview of creating your own programming language. It discusses implementing a basic Lisp dialect called MAL to demonstrate core concepts like parsing, the abstract syntax tree, and defining functions. The examples show how to tokenize, parse, and evaluate simple MAL programs that perform operations like addition and defining functions to square values.
The document discusses an attempt to use Play, Slick, and play2-auth together for a web application project. It describes setting up the build configuration and dependencies, defining Account and Role models using Slick, and implementing authentication and authorization logic. However, the author encountered difficulties after only one month of using Scala and was not able to complete the implementation.
The document discusses Python concepts related to identity, mutability, and scope. It provides examples to illustrate that integers with values below 256 have shared identity due to interning, while higher values do not. It also demonstrates how lists are mutable, so modifying nested list elements modifies the original lists. The document shows how default arguments are evaluated only once at definition time, leading to unexpected behavior. Finally, it gives an example of how variables defined in the global scope are accessible from within a function.
The document discusses OAuth 1.0 and 2.0 authentication protocols. It explains the key concepts of OAuth 1.0 including the use of consumer tokens, temporary credentials, access tokens, and signing requests with HMAC-SHA1 signatures. It also covers OAuth 2.0 which removes signatures in favor of SSL/TLS and uses grants like authorization code and implicit to issue access tokens. The document provides code examples for implementing OAuth 1.0 token requests and authorization headers.
Pattern matching in Elixir by example - Alexander KhokhlovElixir Club
Pattern matching in Elixir allows variables to be bound to values in a structure like a tuple, map, or list. It checks for structural equality rather than referential equality. Some key aspects of pattern matching include: variables can be rebound but not reassigned, patterns can match nested data structures, and functions can have multiple clauses to handle different patterns. Pattern matching is used throughout Elixir for control flow, case expressions, with expressions, and more.
This document contains C++ code that implements bubble sort, insertion sort, and selection sort algorithms to sort arrays of random numbers. It generates random arrays, copies the arrays, then applies each sorting algorithm to a separate array and measures the time taken. It displays the original and sorted arrays. The functions for the sorting algorithms and auxiliary functions like generating and copying arrays are also defined.
I love Ruby! But as in any relationship, to love means that you (often) have to accept the “dark side” too! Ruby is human in nature and has a lot of gotchas, tricks, wierdness and sometimes scary features that I plan to highlight. This talk aims to provide the “Ah-ha!” moments when working in Ruby.
This talk is for beginners and experts alike – in fact, I tag slides to mark their level and beginners can choose to tune out of the heavy stuff!
Slaying the Dragon: Implementing a Programming Language in RubyJason Yeo Jie Shun
The document provides an overview of creating your own programming language. It discusses implementing a basic Lisp dialect called MAL to demonstrate core concepts like parsing, the abstract syntax tree, and defining functions. The examples show how to tokenize, parse, and evaluate simple MAL programs that perform operations like addition and defining functions to square values.
The document discusses an attempt to use Play, Slick, and play2-auth together for a web application project. It describes setting up the build configuration and dependencies, defining Account and Role models using Slick, and implementing authentication and authorization logic. However, the author encountered difficulties after only one month of using Scala and was not able to complete the implementation.
The document discusses Python concepts related to identity, mutability, and scope. It provides examples to illustrate that integers with values below 256 have shared identity due to interning, while higher values do not. It also demonstrates how lists are mutable, so modifying nested list elements modifies the original lists. The document shows how default arguments are evaluated only once at definition time, leading to unexpected behavior. Finally, it gives an example of how variables defined in the global scope are accessible from within a function.
The document discusses OAuth 1.0 and 2.0 authentication protocols. It explains the key concepts of OAuth 1.0 including the use of consumer tokens, temporary credentials, access tokens, and signing requests with HMAC-SHA1 signatures. It also covers OAuth 2.0 which removes signatures in favor of SSL/TLS and uses grants like authorization code and implicit to issue access tokens. The document provides code examples for implementing OAuth 1.0 token requests and authorization headers.
Pattern matching in Elixir by example - Alexander KhokhlovElixir Club
Pattern matching in Elixir allows variables to be bound to values in a structure like a tuple, map, or list. It checks for structural equality rather than referential equality. Some key aspects of pattern matching include: variables can be rebound but not reassigned, patterns can match nested data structures, and functions can have multiple clauses to handle different patterns. Pattern matching is used throughout Elixir for control flow, case expressions, with expressions, and more.
This document contains C++ code that implements bubble sort, insertion sort, and selection sort algorithms to sort arrays of random numbers. It generates random arrays, copies the arrays, then applies each sorting algorithm to a separate array and measures the time taken. It displays the original and sorted arrays. The functions for the sorting algorithms and auxiliary functions like generating and copying arrays are also defined.
I love Ruby! But as in any relationship, to love means that you (often) have to accept the “dark side” too! Ruby is human in nature and has a lot of gotchas, tricks, wierdness and sometimes scary features that I plan to highlight. This talk aims to provide the “Ah-ha!” moments when working in Ruby.
This talk is for beginners and experts alike – in fact, I tag slides to mark their level and beginners can choose to tune out of the heavy stuff!
This document contains a presentation on Python programming. It introduces Python basics like printing "Hello World", using Python as a calculator, strings and other data types, functions, classes, conditional statements like if/else, and repetition with while loops. The presentation covers Python concepts in 10 sections and includes code examples for each topic.
The document creates a database called "bug" and defines several tables to track bugs, users, products, and solutions. It creates tables for user details, products, experts, users reporting bugs, the bugs themselves, and solutions. Data is inserted into each table as examples.
Yan Cui presented on using F# in real world applications. Some key points included:
- F# allows defining types that make invalid states unrepresentable, improving correctness.
- The functional approach in F# helps tame complexity in large projects.
- Examples showed how F# was used to model game states and logic for a slots game and Monopoly bonus game. Types with measures were used to represent things like money amounts and positions.
- Actor model architecture was proposed for stateful servers, with gatekeeper and worker actors managing player states.
The document discusses various techniques for testing UIViews in iOS, including unit testing, snapshot testing, and layout testing. It provides an example of unit testing a table view cell by generating a random view model as input, creating the view, configuring it with the input, and then validating the view's snapshot and layout. It also discusses using property-based testing with random generators to test views across a wide range of randomized inputs.
This document discusses Python's import statement and provides examples of using __import__ for dynamic loading of modules. It demonstrates how to import a module string dynamically using __import__ when a module name is stored in a variable. It also shows how to import specific functions from a module using __import__'s fromlist parameter. The document provides references for further information on import, __import__, and reloading modules in Python.
This document discusses Flex Builder 3 and creating a simple add function application using MXML and ActionScript. It includes code snippets for the MXML user interface, ActionScript calculation logic, and connecting to a backend Java service via AMF.
Sides to accompany Presentation at Open Source Panel, MCN 2010, October 28th.
Drawing examples from web projects at the Victoria and Albert Museum, I will identify free and open source technologies that have enabled us to deliver value to colleagues and visitors alike. Furthermore, we will see how these technologies - when combined with open standards - can provide a powerful toolkit for working with legacy and proprietary systems. This allows "just-in-time" features to be added to existing systems outside costly or time-consuming upgrade cycles. Overall, I will share some approaches that could be useful for other institutions wishing to engage technical staff and save on licensing software.
The document summarizes key concepts about optionals in Swift, including:
Optionals represent possibly missing values and can be nil. Non-optional types cannot be nil. Functions can return optionals to indicate possible missing values. Optionals must be unwrapped to access their underlying value. Forced unwrapping with ! should be avoided. Optional binding with if let is safer for testing and unwrapping. Optional chaining with ? allows working with chained optionals in a concise way.
This document discusses digital marketing strategies for improving website revenue. It is a presentation by Josh Whiten, Digital Marketing Director of Sagittarius Marketing. The presentation covers strategies for feeding the marketing funnel, reducing friction in the customer journey, and increasing customer lifetime value. Specific tactics discussed include search engine optimization, paid search, content marketing, conversion rate optimization, personalization, and remarketing. The goal is to increase key metrics like visits, orders, conversion rate, and average order value to double website revenue.
Utvecklingsbolag Concordias företagsrådgivare presenterade Concordias företagstjänster i Starta eget temadag. Målgrupp är företagare som vill starta och utveckla verksamhet.
Avaintilastoja Pietarsaaren seudusta: BKT, toimialajakauma ja työpaikat, Suomen monipuolisin teollisuusrakenne, arvonlisäys, 20 suurinta yksityistä työnantajaa, eläin- ja turkistuotanto, väestömuutokset, logistiikka ja kielijakauma
Executive Insight is an American business publication that delivers strategies and solutions by and for healthcare executives. Since launching in 2010, it has served as a source of peer-to-peer communication for C-suite leaders in hospitals, health networks and physician group practices
Executive Insight offers a monthly print magazine, a weekly e-newsletter and a website. Through each of these channels, it delivers financial, legal, operational, regulatory and information technology analysis with print and online articles, webinars, roundtables, resource directories and online conferences
The document discusses odd behaviors in Python related to identity, mutability, and scope. It provides examples testing the identity and mutability of various Python objects. It also discusses issues that can arise from using mutable default arguments and provides tips on how to avoid these issues, such as using None as a default instead of a mutable object.
This structural plan is a strategic plan for land use in
the Jakobstad region, and the content of the plan affects
the entire region. The purpose of this structural
plan is to achieve a common, regional consensus on the
most important issues concerning land use, housing
and transportation (LHT). At the same time, the main
contours of the region’s social structure up until the
year 2040 are sketched out. Examples of the questions
answered in the plan include where new workplace and
residential areas should be located, how traffic and logistical
issues can be solved and how cooperation between
the municipal and public sectors in regard to service
can be developed.
The structural plan provides a comprehensive view of
how LHT can be coordinated and also helps the region’s
individual municipalities take neighboring municipalities’
planning into consideration.
The Jakobstad region aims for:
– Pleasant living and leisure environments,
– Competitive infrastructure and good
transportation systems,
– Attractive environments for the establishment
of new businesses,
– Broader cooperation in municipal service
production.
Using Personalisation To Reduce The FrictionSagittarius
The document appears to be notes from a digital marketing conference on travel. It includes:
- Names of several speakers on topics like customer lifecycles, customer service, and the connected travel consumer.
- Hashtags around digital marketing and travel as well as the conference host @SagittariusMktg.
- Notes on concepts like customer lifetime value, calculating profitability, and reducing friction for customers.
- Statistics shared on website visits, conversions, and growth in online bookings from optimizing digital experiences.
- Mentions of learned, explicit and implied customer data, as well as the "human API".
- Closing tips around knowing your customer, understanding their journey, and reducing friction
The document describes various features of an online educational course ontology including viewing the course structure and list of lectures accompanied by smart tagged videos, knowledge tests for students semantically linked to lecture keywords, literature sources in BIBO format, keywords linked to external sources, an ontology visualization of the training course, a feedback tool, a knowledge base of course ontologies, viewing course information in HTML and table formats, viewing term details in HTML, a list of references from heterogeneous sources, a SPARQL endpoint API, automated error detection using SPARQL queries, and contact information.
To use precipitation grids outside the US in HEC-HMS, two things are required: 1) loading the precipitation grids into a DSS file and 2) creating a file that associates grid cells with subbasins using GeoHMS. While GeoHMS was designed for the conterminous US, it can be used outside the US by modifying projection files to tell GeoHMS the watershed is in the US coordinate system and generating gridcell files using this "lie". Grids must also be loaded to DSS properly by understanding how row and column numbers relate to coordinates.
This document contains a presentation on Python programming. It introduces Python basics like printing "Hello World", using Python as a calculator, strings and other data types, functions, classes, conditional statements like if/else, and repetition with while loops. The presentation covers Python concepts in 10 sections and includes code examples for each topic.
The document creates a database called "bug" and defines several tables to track bugs, users, products, and solutions. It creates tables for user details, products, experts, users reporting bugs, the bugs themselves, and solutions. Data is inserted into each table as examples.
Yan Cui presented on using F# in real world applications. Some key points included:
- F# allows defining types that make invalid states unrepresentable, improving correctness.
- The functional approach in F# helps tame complexity in large projects.
- Examples showed how F# was used to model game states and logic for a slots game and Monopoly bonus game. Types with measures were used to represent things like money amounts and positions.
- Actor model architecture was proposed for stateful servers, with gatekeeper and worker actors managing player states.
The document discusses various techniques for testing UIViews in iOS, including unit testing, snapshot testing, and layout testing. It provides an example of unit testing a table view cell by generating a random view model as input, creating the view, configuring it with the input, and then validating the view's snapshot and layout. It also discusses using property-based testing with random generators to test views across a wide range of randomized inputs.
This document discusses Python's import statement and provides examples of using __import__ for dynamic loading of modules. It demonstrates how to import a module string dynamically using __import__ when a module name is stored in a variable. It also shows how to import specific functions from a module using __import__'s fromlist parameter. The document provides references for further information on import, __import__, and reloading modules in Python.
This document discusses Flex Builder 3 and creating a simple add function application using MXML and ActionScript. It includes code snippets for the MXML user interface, ActionScript calculation logic, and connecting to a backend Java service via AMF.
Sides to accompany Presentation at Open Source Panel, MCN 2010, October 28th.
Drawing examples from web projects at the Victoria and Albert Museum, I will identify free and open source technologies that have enabled us to deliver value to colleagues and visitors alike. Furthermore, we will see how these technologies - when combined with open standards - can provide a powerful toolkit for working with legacy and proprietary systems. This allows "just-in-time" features to be added to existing systems outside costly or time-consuming upgrade cycles. Overall, I will share some approaches that could be useful for other institutions wishing to engage technical staff and save on licensing software.
The document summarizes key concepts about optionals in Swift, including:
Optionals represent possibly missing values and can be nil. Non-optional types cannot be nil. Functions can return optionals to indicate possible missing values. Optionals must be unwrapped to access their underlying value. Forced unwrapping with ! should be avoided. Optional binding with if let is safer for testing and unwrapping. Optional chaining with ? allows working with chained optionals in a concise way.
This document discusses digital marketing strategies for improving website revenue. It is a presentation by Josh Whiten, Digital Marketing Director of Sagittarius Marketing. The presentation covers strategies for feeding the marketing funnel, reducing friction in the customer journey, and increasing customer lifetime value. Specific tactics discussed include search engine optimization, paid search, content marketing, conversion rate optimization, personalization, and remarketing. The goal is to increase key metrics like visits, orders, conversion rate, and average order value to double website revenue.
Utvecklingsbolag Concordias företagsrådgivare presenterade Concordias företagstjänster i Starta eget temadag. Målgrupp är företagare som vill starta och utveckla verksamhet.
Avaintilastoja Pietarsaaren seudusta: BKT, toimialajakauma ja työpaikat, Suomen monipuolisin teollisuusrakenne, arvonlisäys, 20 suurinta yksityistä työnantajaa, eläin- ja turkistuotanto, väestömuutokset, logistiikka ja kielijakauma
Executive Insight is an American business publication that delivers strategies and solutions by and for healthcare executives. Since launching in 2010, it has served as a source of peer-to-peer communication for C-suite leaders in hospitals, health networks and physician group practices
Executive Insight offers a monthly print magazine, a weekly e-newsletter and a website. Through each of these channels, it delivers financial, legal, operational, regulatory and information technology analysis with print and online articles, webinars, roundtables, resource directories and online conferences
The document discusses odd behaviors in Python related to identity, mutability, and scope. It provides examples testing the identity and mutability of various Python objects. It also discusses issues that can arise from using mutable default arguments and provides tips on how to avoid these issues, such as using None as a default instead of a mutable object.
This structural plan is a strategic plan for land use in
the Jakobstad region, and the content of the plan affects
the entire region. The purpose of this structural
plan is to achieve a common, regional consensus on the
most important issues concerning land use, housing
and transportation (LHT). At the same time, the main
contours of the region’s social structure up until the
year 2040 are sketched out. Examples of the questions
answered in the plan include where new workplace and
residential areas should be located, how traffic and logistical
issues can be solved and how cooperation between
the municipal and public sectors in regard to service
can be developed.
The structural plan provides a comprehensive view of
how LHT can be coordinated and also helps the region’s
individual municipalities take neighboring municipalities’
planning into consideration.
The Jakobstad region aims for:
– Pleasant living and leisure environments,
– Competitive infrastructure and good
transportation systems,
– Attractive environments for the establishment
of new businesses,
– Broader cooperation in municipal service
production.
Using Personalisation To Reduce The FrictionSagittarius
The document appears to be notes from a digital marketing conference on travel. It includes:
- Names of several speakers on topics like customer lifecycles, customer service, and the connected travel consumer.
- Hashtags around digital marketing and travel as well as the conference host @SagittariusMktg.
- Notes on concepts like customer lifetime value, calculating profitability, and reducing friction for customers.
- Statistics shared on website visits, conversions, and growth in online bookings from optimizing digital experiences.
- Mentions of learned, explicit and implied customer data, as well as the "human API".
- Closing tips around knowing your customer, understanding their journey, and reducing friction
The document describes various features of an online educational course ontology including viewing the course structure and list of lectures accompanied by smart tagged videos, knowledge tests for students semantically linked to lecture keywords, literature sources in BIBO format, keywords linked to external sources, an ontology visualization of the training course, a feedback tool, a knowledge base of course ontologies, viewing course information in HTML and table formats, viewing term details in HTML, a list of references from heterogeneous sources, a SPARQL endpoint API, automated error detection using SPARQL queries, and contact information.
To use precipitation grids outside the US in HEC-HMS, two things are required: 1) loading the precipitation grids into a DSS file and 2) creating a file that associates grid cells with subbasins using GeoHMS. While GeoHMS was designed for the conterminous US, it can be used outside the US by modifying projection files to tell GeoHMS the watershed is in the US coordinate system and generating gridcell files using this "lie". Grids must also be loaded to DSS properly by understanding how row and column numbers relate to coordinates.
The document discusses ways to keep the immune system strong through reducing inflammation, taking antioxidants, and maintaining a healthy lifestyle. It notes that inflammation can be both good and bad, and that antioxidants from vitamins C and D can help reverse age-related immune deficiencies by elevating lymphocyte and T-cell numbers and increasing killer cell activity. The document stresses the importance of getting enough sleep, managing stress, and regular exercise to support overall health.
This document discusses strategies for writing code that is compatible with both Python 2 and Python 3 using the six library. It provides examples of how six addresses differences between Python versions for string handling, I/O, URL encoding, parsing, pickling, and iterating over dictionaries. The document recommends adopting a policy of no new Python 2 only code, checking Python compatibility in code reviews, and planning to migrate existing code by 2020.
Replacing `import` with `accio` in cpythonAmy Hanlon
Replacing `import` with `accio`: Compiling Pythons with Custom Grammar for the sake of a joke!
These are the slides from my 03/25/14 talk at NYC Hack and Tell.
Turn your spaghetti code into ravioli with JavaScript modulesjerryorr
JavaScript is the language that powers the interactive web of the future. But as our web applications become larger and more complex, we begin to strain the old paradigm of throwing a bunch of JavaScript functions into a few files. Complex dependencies, tight coupling, and global state can turn our code into a huge plate of spaghetti. Though browsers do not natively support JavaScript modules, there are many tools that can help us to write clean, modular JavaScript.
In this session, we will explore the benefits of writing modular JavaScript. We will also take a deep dive into specific JavaScript module systems, such as Browserify, RequireJS, and the module standards that are coming in ES6.
Akka persistence == event sourcing in 30 minutesKonrad Malawski
Akka 2.3 introduces akka-persistence, a wonderful way of implementing event-sourced applications. Let's give it a shot and see how DDD and Akka are a match made in heaven :-)
This document discusses several Python peculiarities and quirks through examples of code snippets. Some key points covered include:
- Importing * can override expected values
- Default arguments are evaluated once at compile time
- Built-in functions like str behave differently on integers vs other objects
- Special modules and future imports can enable unusual syntax as easter eggs
- Implicit variables like _ can cause unexpected behavior
- Indexing issues can arise from iterating over lists in certain ways
The examples serve to illustrate subtle behaviors in Python and emphasize writing clear and intentional code over clever tricks that may confuse others or cause bugs. Readability, commenting, and avoiding imports of all symbols are suggested.
F# was used to build game infrastructure and logic for a company serving millions of users daily. Some key benefits of F# included:
1) Domain modeling using discriminated unions, types, and measures helped increase correctness and productivity.
2) An actor model with asynchronous message passing was used to build stateful game servers in a scalable and efficient way without locks.
3) Processing game events as immutable facts allowed different systems to process specific facts independently and flexibly.
The document discusses various container data structures in Go, including lists, rings, heaps, maps, and slices. It provides code examples and explanations for each: lists are implemented as doubly-linked lists; rings provide a circular list; heaps implement min-heap trees; maps are unordered dictionaries; slices are references to arrays. Channels can also act as FIFO queues when buffered. The document advocates for some form of generics in Go to avoid type assertions.
The document discusses various container data structures in Go including lists, rings, heaps, maps, and slices. It provides code examples and explanations for how each works. Lists are implemented as doubly-linked lists. Rings provide a circular list structure. Heaps implement min-heap behavior. Maps provide associative arrays. Slices allow accessing portions of arrays. Channels can act as FIFO queues when buffered. The document advocates for some form of generics in Go to improve type safety with containers.
F# is used to model the domain and logic for a real-time multiplayer game. The actor model and immutable state is used to build stateful servers that handle individual player states efficiently without locks. Agents process messages asynchronously to handle get/put state requests with optimistic concurrency control and automatically persist state changes. This approach improved performance, latency, costs and correctness over traditional databases.
The document discusses using the Paco parsing library in Elixir. It shows how to define parsers for literals, sequences, repetitions, alternatives and more. It also demonstrates parsing expressions, references to elements with quantities, and converting terms to parsers via a Parsable protocol.
Learn You a Functional JavaScript for Great GoodMike Harris
We have been told by just about everyone that we should learning functional programming, let this session be your introduction using a language you already know JavaScript.
Yep, JavaScript. No endless amounts of parentheses. No monadic arrows. Just good old JavaScript.
We'll look take a look at the functional JavaScript landscape see how to use:
Currying
Combinators
Multimethods
We'll be using Underscore.js, allong.es, and bilby.js to help us.
The document discusses various idioms in Swift including optional binding with guard let and if let, nil coalescing operator, switch statements with optionals and associated values, closures, lazy properties, and computed properties with property observers. Key idioms covered include using guard let to ensure non-nil arguments, extracting associated values from enums using switch, initializing immutable variables with closures, and updating for loops to the Swift 3 syntax.
En esta charla veremos con detalle algunas de las construcciones más pythonicas y las posibilidades de expresar de forma clara, concisa y elegante cosas que en otros lenguajes nos obligarían a dar muchos rodeos.
A veces es fácil olvidar algunos recursos como que una función puede devolver varios valores, cómo manipular listas y diccionarios de forma sencilla, contextos, generadores... En esta charla veremos de forma entretenida y práctica cómo mejorar nuestro nivel de Python "nativo".
Sie kennen die bekannten Angriffsvektoren wie SQL-Injections oder XSS. Ihre Anwendung ist sicher. Ist Sie das wirklich? Auch wenn Sie in Ihrer Webanwendung kein HTML5 einsetzen, die Browser sind bereit! Kennen Sie alle neuen Markups? Haben Sie bereits die Potentiale von Cross Origin Requests, WebSockets oder Local Storage auf dem Radar? Lernen Sie neue Gefahrenpotentiale kennen, die durch die Unterstützung von HTML5 und dessen APIs entstanden sind. - See more at: http://www.developer-week.de/Programm/Veranstaltung/(event)/11133#sthash.ZRPweawl.dpuf
https://www.youtube.com/watch?v=VNmtmz3mJN4&
Deep dive into InjectionTDD - how to perform iOS unit tests realtime, without rebuilding entire Xcode project.
"A 1,500 line (!!) switch statement powers your Python!" - Allison Kaptur, !!...akaptur
The document discusses the inner workings of the Python virtual machine and bytecode. It explains that Python code is compiled to bytecode, which is then interpreted by a large switch statement in the Python virtual machine. The bytecode consists of numeric codes and arguments that correspond to stack-based operations. It provides examples of disassembling bytecode into a more human-readable format and how the virtual machine handles dynamic operations like string formatting and operator overloading.
The document describes the structure of various user activity log collections stored in different databases. It includes collections for errors, access logs, attribute changes, status changes, and purchase charges with details on the fields captured for each user event.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
27. >>> del __builtins__.float!
!
>>> float(3)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'float' is not
defined!
!
>>> wingardium_leviosa(3)!
3.0
28. >>> del __builtins__.float!
!
>>> float(3)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'float' is not
defined!
!
>>> wingardium_leviosa(3)!
3.0
29. >>> del __builtins__.float!
!
>>> float(3)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'float' is not
defined!
!
>>> wingardium_leviosa(3)!
3.0
30. >>> del __builtins__.float!
!
>>> float(3)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'float' is not
defined!
!
>>> wingardium_leviosa(3)!
3.0
31. >>> del __builtins__.float!
!
>>> float(3)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'float' is not
defined!
!
>>> wingardium_leviosa(3)!
3.0
46. >>> __builtins__.__import__(random)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'random' is not
defined!
!
>>> __builtins__.__import__(‘random’)!
<module 'random' from ‘/usr/local/…/
random.pyc’>
47. >>> __builtins__.__import__(random)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'random' is not
defined!
!
>>> __builtins__.__import__(‘random’)!
<module 'random' from ‘/usr/local/…/
random.pyc’>
48. >>> __builtins__.__import__(random)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'random' is not
defined!
!
>>> __builtins__.__import__(‘random’)!
<module 'random' from ‘/usr/local/…/
random.pyc’>
49. >>> __builtins__.__import__(random)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
NameError: name 'random' is not
defined!
!
>>> __builtins__.__import__(‘random’)!
<module 'random' from ‘/usr/local/…/
random.pyc’>
59. >>> del __builtins__.__import__!
!
>>> random = accio(‘random’)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
File “/usr/local/…/random.py”, line
42, in <module>!
from __future__ import division!
ImportError: __import__ not found
60. >>> del __builtins__.__import__!
!
>>> random = accio(‘random’)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
File “/usr/local/…/random.py”, line
42, in <module>!
from __future__ import division!
ImportError: __import__ not found
61. >>> del __builtins__.__import__!
!
>>> random = accio(‘random’)!
Traceback (most recent call last):!
File "<stdin>", line 1, in <module>!
File “/usr/local/…/random.py”, line
42, in <module>!
from __future__ import division!
ImportError: __import__ not found