This document discusses how smart contracts may incorporate machine learning capabilities in the future. It notes that while smart contracts themselves cannot literally learn, machine learning could be used with oracles, off-chain smart contracts, and other systems that interact with smart contracts. The document also cautions that security will need to improve and that non-determinism from machine learning may cause issues for blockchain consensus. It provides examples of how machine learning could be applied, such as for fraud detection, customer service agents, and medical diagnosis.
Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Ag...Dilum Bandara
Modeling and validating multi-layered and multi-model access control policies of a Hyperledger Fabric based agriculture supply chain
Citation:
H.M.N. Dilum Bandara, Shiping Chen, Mark Staples, and Yilin Sai, “Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain,” in Proc. 3rd IEEE Int. Conf. on Trust, Privacy, and Security in Intelligent Systems, and Applications (TPS 2021) Special Session on Agriculture Cybersecurity, Dec. 2021.
By the end of this webinar you should be able to understand
The concepts, use cases and basics of smart contracts
How Blockchain and smart contracts work and developer success
How smart contracts work on both the Ethereum and Hyperledger platforms from a practical level
The constructs of smart contract, common coding requirements and demos
What are the most in demand Blockchain Certifications?
How do these certification meet the needs of todays Enterprises?
What about Blockchain Career Demand?
Analysing Data from Blockchains - Keynote @ SOCCA 2020Ingo Weber
Keynote at the Symposium on Cryptocurrency Analysis (SOCCA 2020). Content:
In order to analyse how concrete blockchain systems as well as blockchain applications are used, data must be extracted from these systems. Due to various complexities inherent in blockchain, the question how to interpret such data is non-trivial. Such interpretation should often be shared among parties, e.g., if they collaborate via a blockchain. To this end, we devised an approach codify the interpretation of blockchain data, to extract data from blockchains accordingly, and to output it in suitable formats -- see https://arxiv.org/abs/2001.10281.
In addition, application developers and users of blockchain applications may want to estimate the cost of using or op- erating a blockchain application. In the keynote, I will also discuss our cost estimation method.
Credit goes to Christopher B Ferris @christo4ferris who put together this presentation which covers the latest developments of Hyperledger Fabric made available in Fabric 1.1 and 1.2 and what can be expected next.
By the end of this webinar you should be able to understand
The concepts, use cases and basics of smart contracts
How Blockchain and smart contracts work
How smart contracts work on both the Ethereum and Hyperledger platforms from a practical level
The constructs of smart contract, common coding requirements and demos
What are the most in demand Blockchain Certifications?
How do these certification meet the needs of todays Enterprises?
What about Blockchain Career Demand?
What is a Blockchain?
A cryptographically secure, shared, distributed ledger.
Immutable transactions are written on this distributed ledger on distributed nodes
Transformational technology in which business and government invest in.
It’s a decentralized database which stores information in the form of transactions.
Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Ag...Dilum Bandara
Modeling and validating multi-layered and multi-model access control policies of a Hyperledger Fabric based agriculture supply chain
Citation:
H.M.N. Dilum Bandara, Shiping Chen, Mark Staples, and Yilin Sai, “Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain,” in Proc. 3rd IEEE Int. Conf. on Trust, Privacy, and Security in Intelligent Systems, and Applications (TPS 2021) Special Session on Agriculture Cybersecurity, Dec. 2021.
By the end of this webinar you should be able to understand
The concepts, use cases and basics of smart contracts
How Blockchain and smart contracts work and developer success
How smart contracts work on both the Ethereum and Hyperledger platforms from a practical level
The constructs of smart contract, common coding requirements and demos
What are the most in demand Blockchain Certifications?
How do these certification meet the needs of todays Enterprises?
What about Blockchain Career Demand?
Analysing Data from Blockchains - Keynote @ SOCCA 2020Ingo Weber
Keynote at the Symposium on Cryptocurrency Analysis (SOCCA 2020). Content:
In order to analyse how concrete blockchain systems as well as blockchain applications are used, data must be extracted from these systems. Due to various complexities inherent in blockchain, the question how to interpret such data is non-trivial. Such interpretation should often be shared among parties, e.g., if they collaborate via a blockchain. To this end, we devised an approach codify the interpretation of blockchain data, to extract data from blockchains accordingly, and to output it in suitable formats -- see https://arxiv.org/abs/2001.10281.
In addition, application developers and users of blockchain applications may want to estimate the cost of using or op- erating a blockchain application. In the keynote, I will also discuss our cost estimation method.
Credit goes to Christopher B Ferris @christo4ferris who put together this presentation which covers the latest developments of Hyperledger Fabric made available in Fabric 1.1 and 1.2 and what can be expected next.
By the end of this webinar you should be able to understand
The concepts, use cases and basics of smart contracts
How Blockchain and smart contracts work
How smart contracts work on both the Ethereum and Hyperledger platforms from a practical level
The constructs of smart contract, common coding requirements and demos
What are the most in demand Blockchain Certifications?
How do these certification meet the needs of todays Enterprises?
What about Blockchain Career Demand?
What is a Blockchain?
A cryptographically secure, shared, distributed ledger.
Immutable transactions are written on this distributed ledger on distributed nodes
Transformational technology in which business and government invest in.
It’s a decentralized database which stores information in the form of transactions.
Blockchain and Services – Exploring the LinksIngo Weber
In this keynote talk, given at the ASSRI Symposium 2018, I explore four different facets of the relationship between Blockchain and Services.
First, application-level service interfaces for interaction with Blockchain-based applications enable easy integration with existing infrastructure. Second, service composition can be achieved through smart contracts, and enable different approaches to orchestrations and choreographies. Third, Blockchain-aaS offerings cover infrastructure operation, but can go beyond that. And finally, microservice principles can be applied to smart contract design.
Software Architecture and Model-Driven Engineering for BlockchainIngo Weber
This talk was given at the August SydEthereum meetup, and gives an overview of our Blockchain research (Data61, CSIRO). The focus is on Software Architecture and Model-Driven Engineering. In addition to some approaches and tooling, it mentions some of the empirical work on availability of write transactions on Ethereum.
Blockchain: Background and Data61 Research OverviewIngo Weber
My keynote slides at the Korean National Blockchain Conference, giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain.
Behavioral Analytics and Blockchain Applications – a Reliability View. Keynot...Ingo Weber
This keynote talk covered research and insights from the speaker’s last 7 years of research on two topics of relevance to the RSDA workshop. The first part was about behavioural data analytics for reliability and dependability purposes, i.e., with a focus on sequences of events, rather than static structures or the presence of certain events in a log. Specifically, the approach of using Process Mining techniques to gain insights into traces of logged events was presented.
The second part of the talk was centred around a summary of insights into security, dependability, and reliability aspects of blockchain applications. With the introduction of smart contracts, blockchain technology has become a general-purpose code execution framework, and architects and developers need to understand the specific implications on security and dependability when building applications on blockchain.
Triple Entry Accounting: A BlockChain Use Case for Banks With R3 CordaDebajani Mohanty
Nine years on, yet BlockChain is still into infancy. People even now are shy regarding implementing BlockChain into existing projects and being benefited by the tremendous opportunities it could bring. This video explains an use case "Triple Entry Accounting" implemented on a distributed ledger tech product that would bring down cost, time of execution and complexities for transactions between different parties.
As an enterprise IT professional, Service provider, ISP or Systems Integrator you may be wondering where all the hype is going with blockchain?
The session will cover topics such as.
• What exactly is Enterprise Blockchain technology and why is so disruptive?
• Why are companies are embracing Blockchain technologies?
• Overview of major Enterprise Blockchains (Hyperledger, Ethereum, Quorum and R3 Corda)
• What are the industries that are ripe for disruption from Blockchain Technology?
• What is Blockchain as a Service (BaaS) and why as an IT Professional you should understand this technology.
• The top five areas that IT professionals and should learn to profit from Blockchain
MyBlockChainExperts
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...Pandora Boxchain
A talk given at North Star AI conference 2018 by Dr Maxim Orlovsky uncovers technical details of the possible intersections between AI and blockchain technologies. In particular – how blockchain and our Pandora Boxchain project can help solve Byzantine fault tolerance problem in autonomous multi-agent environments and decrease strategic risks coming from the emerging artificial intelligence
Blockchain and Services – Exploring the LinksIngo Weber
In this keynote talk, given at the ASSRI Symposium 2018, I explore four different facets of the relationship between Blockchain and Services.
First, application-level service interfaces for interaction with Blockchain-based applications enable easy integration with existing infrastructure. Second, service composition can be achieved through smart contracts, and enable different approaches to orchestrations and choreographies. Third, Blockchain-aaS offerings cover infrastructure operation, but can go beyond that. And finally, microservice principles can be applied to smart contract design.
Software Architecture and Model-Driven Engineering for BlockchainIngo Weber
This talk was given at the August SydEthereum meetup, and gives an overview of our Blockchain research (Data61, CSIRO). The focus is on Software Architecture and Model-Driven Engineering. In addition to some approaches and tooling, it mentions some of the empirical work on availability of write transactions on Ethereum.
Blockchain: Background and Data61 Research OverviewIngo Weber
My keynote slides at the Korean National Blockchain Conference, giving an overview of our research in Software Architecture, Model-Driven Engineering, Dependability / Availability, and Business Process Execution in the context of Blockchain.
Behavioral Analytics and Blockchain Applications – a Reliability View. Keynot...Ingo Weber
This keynote talk covered research and insights from the speaker’s last 7 years of research on two topics of relevance to the RSDA workshop. The first part was about behavioural data analytics for reliability and dependability purposes, i.e., with a focus on sequences of events, rather than static structures or the presence of certain events in a log. Specifically, the approach of using Process Mining techniques to gain insights into traces of logged events was presented.
The second part of the talk was centred around a summary of insights into security, dependability, and reliability aspects of blockchain applications. With the introduction of smart contracts, blockchain technology has become a general-purpose code execution framework, and architects and developers need to understand the specific implications on security and dependability when building applications on blockchain.
Triple Entry Accounting: A BlockChain Use Case for Banks With R3 CordaDebajani Mohanty
Nine years on, yet BlockChain is still into infancy. People even now are shy regarding implementing BlockChain into existing projects and being benefited by the tremendous opportunities it could bring. This video explains an use case "Triple Entry Accounting" implemented on a distributed ledger tech product that would bring down cost, time of execution and complexities for transactions between different parties.
As an enterprise IT professional, Service provider, ISP or Systems Integrator you may be wondering where all the hype is going with blockchain?
The session will cover topics such as.
• What exactly is Enterprise Blockchain technology and why is so disruptive?
• Why are companies are embracing Blockchain technologies?
• Overview of major Enterprise Blockchains (Hyperledger, Ethereum, Quorum and R3 Corda)
• What are the industries that are ripe for disruption from Blockchain Technology?
• What is Blockchain as a Service (BaaS) and why as an IT Professional you should understand this technology.
• The top five areas that IT professionals and should learn to profit from Blockchain
MyBlockChainExperts
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...Pandora Boxchain
A talk given at North Star AI conference 2018 by Dr Maxim Orlovsky uncovers technical details of the possible intersections between AI and blockchain technologies. In particular – how blockchain and our Pandora Boxchain project can help solve Byzantine fault tolerance problem in autonomous multi-agent environments and decrease strategic risks coming from the emerging artificial intelligence
How to Build Your Blockchain Project with ChainstackChainstack
Meetup 23rd July 2019
Many businesses and developers keen to explore how blockchain technology can add value to processes today. However, many remain unsure of how to get started. In this deck, Jona Smulders Cohen runs through everything you need to know when attempting to build your blockchain project. Alex Khaerov, Dev Lead at Chainstack runs through a simple demo which you can access and try out yourself here: https://bit.ly/2GCOWFk
Slides for technical demo: https://bit.ly/2Ms9Yu5
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
Polyglot Ethereum - Smart Contracts for the EnterpriseMike Slinn
Smart contracts require integration with legacy systems. It is not enough to say "we have enterprise blockchain"; if it is not integrated, you have nothing.
As enterprises across verticals explore the
opportunities for innovation and process
optimization using blockchain technologies, they
are looking for in technical aspects of deploying
and integrating blockchain technology, with their
existing IT systems.
Based on operating models and blockchain
platforms, there are variations in deployment and
operations aspects, along with factors like
integration & information security. This document
provides approach and factors to consider during
selection and implementation of blockchain
technologies
https://www.lntinfotech.com/Canada/
This talk was presented at the 6th Annual Global Big Data Conference in Santa Clara, California on August 29, 2018.
Michael Slinn has performed technical due diligence for investors since the mid 1980s. In this 40-minute presentation he explains how he evaluates blockchain-related technology companies. See https://www.mslinn.com/blog/2018/08/29/evaluating-blockchain-companies.html
Scala 3 is known as Dotty, and is expected to be released in 2020. It features intersection types, union types, repeated by-name parameters, trait parameters, improved lazy val initialization, native support for type classes, compatibility with most Scala 2 libraries, and optional support for syntax similar to Haskell and Python. Michael presents the current version of Dotty (see the forthcoming video for the live demo).
EmpathyWorks – Towards an Event-Based Simulation/ML Hybrid PlatformMike Slinn
Abstract: Machine learning systems have become the dominant form of AI for enterprises due in large part to years of experimentation with combinations of technical approaches. Today’s ML systems are unlike traditional software systems in that algorithms are not used to procedurally specify how systems learn to recognize or classify input. On the other hand, simulation systems have traditionally been highly procedural, which is good for understanding how a result was obtained, but ‘learning’ is not normally expected. Mike Slinn will discuss a hybrid approach under consideration based on work he started in 2008.
Bio: Companies that Mike Slinn cofounded or advised have been sold to IBM, Otsuka, Microsoft, Yahoo! and NBC Interactive. A recognized software expert in US and European courts, Mike opines on contractual and patent disputes. Mike received an Electronics Engineering degree in 1979 from Carleton University in Ottawa.
Play Architecture, Implementation, Shiny Objects, and a ProposalMike Slinn
ScalaCourses.com has been serving online Scala and Play training material to students for over two years. ScalaCourses.com teaches courses on the same technology stack that the web site runs on. The Cadenza application that powers ScalaCourses.com is a Play Framework 2 application, written in Scala and using Akka, Slick, AWS and Postgres. Some of the architectural features in Cadenza that allow a modest-sized Play application to serve large amounts of multimedia data efficiently is discussed, including technical details of how to work with an immutable domain model that can be modified.
Over the last 2+ years the underlying technology has changed a lot; a brief history of Play Framework will be recounted, and how that impacted Cadenza. The talk concludes with a proposal regarding Play Framework's future.
Writing concurrent programs that can run in multiple threads and on multiple cores is crucial but daunting. Futures provides a convenient abstraction for many problem domains. The online course "Intermediate Scala" includes an up-to-date discussion of futures and the parts of java.util.concurrent that underlie the Scala futures implementation. Unlike Java's futures, Scala futures supports composition, transformations and sophisticated callbacks.
The author is managing editor of http://scalacourses.com, which offers self-paced online courses that teach Introductory and Intermediate Scala and Play Framework.
This presentation is for enterprises that are considering adopting Scala. The author is managing editor of http://scalacourses.com, which offers self-paced online courses that teach Introductory and Intermediate Scala and Play Framework.
The author is managing editor of http://scalacourses.com, which offers self-paced online courses that teach Introductory and Intermediate Scala and Play Framework.
The author is managing editor of http://scalacourses.com, which offers self-paced online courses that teach Introductory and Intermediate Scala and Play Framework.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
4. About Mike Slinn
• Distinguished engineer
• Contributor to Ethereum Java and Scala libraries
• Operates ScalaCourses.com
• Publisher of Java / Node.js Ethereum courses
(www.cryptocourses.tech)
• Author of EmpathyWorks (artificial personality)
• Expert witness
• Twitter: mslinn
5. Key Facts about Mike Slinn
• Focuses on generating business value by
applying people, process and technology
• Wrote 3 books on distributed computing
• Created hundreds of online lectures on
advanced computing concepts
• Uses many computer languages (“polyglot”)
7. The most popular language or framework used
to write smart contracts in 10 years probably
has not been conceived of yet.
-- Mike Slinn, March 3, 2018 --
8. Machine Learning & Smart Contracts
• Machine learning (ML) will be commonly used
with smart contracts in 10 years.
• Highly specialized languages will evolve to
define and verify contracts in various industries.
• ML will have features added to guarantee
deterministic results for decentralized apps.
• Security will surely have to improve
9. Espionage
• In 10 years time corporate and nation/state
espionage will include:
o Sabotaging training data
o Spoofing smart contract events
o Seeding smart contract templates with security
weaknesses
14. Beware Non-Deterministic Behavior
• Blockchain requires determinism for consensus
• An AI-driven product may not have deterministic
behavior and may produce counter-intuitive
results
• A personalized recommender system may
produce different results for a user action after
learning additional preferences
15. ML is Currently Offchain
ML is currently centralized offchain, because
significant computation and storage are
required
• Centralized, offchain processes can respond
to onchain events and initiate activity via
json-rpc or IPC to Ethereum clients
• ML likely not decentralized for several years
16. ‘Decentralization’ is Misleading
• Decentralization uses consensus before
output is accepted from multiple EVMs, which
then leads to transactions.
• Centralization does not use consensus; note
that the web3 definition of centralization
includes distributed applications that employ
DNS with geolocation routing and failover.
18. Solidity is Not Required
• Centralization is optional
• System integration strategies
o ML systems can indirectly interact with the blockchain
using json-rpc or IPC to an Ethereum client such as
geth or Parity
o Native apps can combine ML with blockchain
• Application decentralization is optional
• Solidity is optional
19. Issues With Solidity:
• Primitive type system.
• Compiler bugs (more surely exist).
• Few software tools available.
• Expensive to work with.
• Very expensive to maintain.
• Shelf life for this technology will be short.
20. Avoid Solidity If Possible
• Write the smart contract in the language of your
choice, and use json-rpc calls as desired.
• Resulting code will be well understood by all.
• Audits will be more reliable.
• Costs will be much less using a common
language instead of Solidity.
• Talent will be much easier to find.
21. Ethereum Is Not Symmetric
• Onchain smart contracts are distributed and
use consensus
• Offchain smart contracts (using Ethereum
clients) are centralized and do not use
consensus
• This will likely evolve over the next several
years
22. Transpiling
• Process of converting a program written in one
language into another language.
• Solidity could be transpiled to json-rpc calls from
node.js and JVM languages (Java, Scala,
JRuby, Jython, Groovy, etc).
• … but don’t bother because you endure all the
problems with Solidity and get none of the
benefits of native contracts
24. Self-Optimizing Contracts
• Optimize transactions for greatest margin,
minimal waste, constant deal flow, or other
criteria
• Results would improve over time
• This is an onchain example
26. Fraudulent Event Detection
• Smart contracts currently act on all events
• Fraud detection often employs machine
learning
• Incorporating ML into smart contracts could
make them resistant to fraud
• This is an onchain example
27.
28. Automated Customer Service Agents
• Chatbots and voice interfaces (Alexa)
• Much more natural to use
• Can be built into devices
• This is an onchain example
30. Medical Diagnosis Expert System
• Smart contract mediates access to an expert system
(oracle, incorporates machine learning)
• Accepts anonymous patient data
• Passes data to an expert system that performs analysis
• Returns diagnostic results
• Charges for the service
• This is an offchain example
32. Supply Chain
• SOLIDITY IS NOT REQUIRED
• Native application (JVM, .NET, C++, whatever)
uses json-rpc to interact with the blockchain
• Solidity could be transpiled to json-rpc calls, but
don’t bother as previously discussed
• This is an offchain example
35. Traditional Contracts…
• Outline the terms of a relationship
• According to a specific jurisdiction
• So that the specified government can enforce
the terms
36. Smart Contracts…
• Enable rule-based autonomous actions in
response to events.
• Work within and between organizations and
the rest of society, world-wide.
37. Smart Contracts Threaten Tradition
• Enforce a relationship with cryptographic
code
• Without regard to the jurisdiction of any
government
38. System Integration
• Collecting inputs and outputs to smart
contracts requires system integration.
• Approaches to system integration vary widely
according to the nature of the input sources,
output destinations, volumes of data, required
reliability, fairness (near-constant latency),
etc.
39. Smart Contracts …
• Also known as cryptocontracts
• Are computer programs
• Directly control the transfer of blockchain-based
digital currencies or assets
• Define the rules and penalties for an agreement
• Might automatically enforce those obligations
40. Smart Contract Capabilities
Manage relationship between parties by:
• Maintaining virtual ledgers
• Reading/writing arbitrary on-chain data
• Reading/writing off-chain data
• Forwarding events to other contracts
• Acting as a software library
42. Oracles
• Smart contracts need oracles to resolve details
that cannot be precisely known at the time the
contract is written.
• Oracles provide reference information for smart
contracts.
• An oracle is a REST API connected to a data
source.
• Using oracles generally decreases security
44. Ethereum Virtual Machine (EVM)
• Deterministic.
• Each Ethereum node has an EVM instance.
• EVM has a similar execution model to both the
Java and the .NET virtual machines.
• All these VMs are stack machines executing
bytecode.
• EVM adds storage and its bytecode is more
suited for contracts.
45. Viable Smart Contract Languages
All compile to EVM byte code except Chaincode
• AxLang
• Chaincode (Hyperledger)
• LLL
• Pact (Kadena)
• Solidity
47. Solidity
• Solidity contracts are difficult to secure.
• Formal verification could help.
• Most Solidity contracts ignore security
recommendations.
• Solidity’s support for types is rather primitive.
50. AxLang
• Smart contract language designed to support
formal verification.
• Cross-compiled Scala DSL for Ethereum
• Designed to scale
• Not yet ready
51. Pact / Kadena
• Functional, interpreted Lisp-like syntax
• Features type inference
• Similar to database stored procedures in an
online transaction processing (OLTP) system
• Not Turing complete
• Runs on the Kadena blockchain
54. Some json-rpc Libraries
• web3.js – for node.js
o Can also transpile Solidity to JavaScript
• web3j – for Java
• Can also transpile Solidity to Java
• web3j-scala – for Scala
o (I wrote this one)
o Idiomatic Scala wrapper around web3j
56. How do Computers Learn?
• Trial and error with feedback
• Training
57. Types of Machine Learning
Classifier systems
Reinforcement
Representation
Rule-based
Similarity and metric
Sparse dictionary
Support vector machines
Association rule
Artificial neural networks
Bayesian networks
Clustering
Decision tree
Deep
Genetic algorithms
Inductive logic programming
58. How Might Smart Contracts Learn?
• “Learning” computation must occur off-chain
• Enforced by the Ethereum fee structure
59. Machine Learning Applications
Machine perception, including computer
vision and object recognition
Optimization and metaheuristic
Recommendation systems
Robot locomotion (autonomy)
Sentiment analysis
Speech and handwriting recognition
Structural health monitoring
Syntactic pattern recognition
User behavior analytics
Translation
Automated theorem proving
Adaptive websites
Bioinformatics
Classifying DNA sequences
Detecting credit-card fraud
General game playing
Information retrieval
Internet fraud detection
Insurance
Linguistics
Medical diagnosis
62. Solidity and Security
• Contracts written in Solidity are difficult to
make secure.
o Formal verification could help.
• Solidity’s support for types is primitive
63. Security Cannot Be Retrofitted
• Secure systems can only be designed that
way from the start
o Trying to secure an existing platform can only give
marginal improvements
• Need orders of magnitude of improvements
to smart contract security
o Not possible without a fresh start