This photo album was created by Diana yareli Mejía Alanuza. It contains photographs that were taken to document memories and events in her life. The photo album allows Diana to look back fondly at past experiences and people who were important to her.
The document outlines the mission, vision, sales and marketing, production and delivery, and management and operations of Catch Fire University. The mission is to educate and motivate people to ignite positive financial change through online resources. Potential clients are those seeking financial freedom and improvement. Modules are prerecorded and delivered weekly by email with accompanying assignments posted on Facebook. Effectiveness is tracked through email and social media analytics.
Raman Kumar is a result-oriented professional with nearly 9 years of experience in tool room operations, new product development, client servicing, and more. He has expertise in designing sheet metal press tools, jigs, fixtures, and implementing quality standards. Currently he is the Deputy Manager of Tool Room at MENETA Automotive Components private limited in Sonipat, where he is responsible for tool manufacturing, maintenance, production, and more. Previously he held roles at H-One and Taehwa Enterprises India Pvt. Ltd. where he managed various tooling and product development projects. He holds a Diploma in Tool & Die Making and is proficient in AutoCAD, CATIA, and Pro/
Business Development on NetIQ IDM
By Novell Consulting Ukraine (NCU)Overview on value add of NCU
• Built new integration modules (drivers)
• Build a Risk Assesment System inside NetIQ IDM
• Enhanced user interface features of the portal IDM
UserApplication
• Comprehensive Separation of Duties management on
the application request stage.
• Other examples of enhancements made to NetIQ IDM
IDM integration module for Microstrategy
Risk Assessment System inside NetIQ IDM
Enhanced user interface features of the portal IDM UserApplication
Comprehensive Separation of Duties management
This photo album was created by Diana yareli Mejía Alanuza. It contains photographs that were taken to document memories and events in her life. The photo album allows Diana to look back fondly at past experiences and people who were important to her.
The document outlines the mission, vision, sales and marketing, production and delivery, and management and operations of Catch Fire University. The mission is to educate and motivate people to ignite positive financial change through online resources. Potential clients are those seeking financial freedom and improvement. Modules are prerecorded and delivered weekly by email with accompanying assignments posted on Facebook. Effectiveness is tracked through email and social media analytics.
Raman Kumar is a result-oriented professional with nearly 9 years of experience in tool room operations, new product development, client servicing, and more. He has expertise in designing sheet metal press tools, jigs, fixtures, and implementing quality standards. Currently he is the Deputy Manager of Tool Room at MENETA Automotive Components private limited in Sonipat, where he is responsible for tool manufacturing, maintenance, production, and more. Previously he held roles at H-One and Taehwa Enterprises India Pvt. Ltd. where he managed various tooling and product development projects. He holds a Diploma in Tool & Die Making and is proficient in AutoCAD, CATIA, and Pro/
Business Development on NetIQ IDM
By Novell Consulting Ukraine (NCU)Overview on value add of NCU
• Built new integration modules (drivers)
• Build a Risk Assesment System inside NetIQ IDM
• Enhanced user interface features of the portal IDM
UserApplication
• Comprehensive Separation of Duties management on
the application request stage.
• Other examples of enhancements made to NetIQ IDM
IDM integration module for Microstrategy
Risk Assessment System inside NetIQ IDM
Enhanced user interface features of the portal IDM UserApplication
Comprehensive Separation of Duties management
Este documento presenta un taller sobre eventos sustentables impartido por Vicente Ferreyra Acosta de la empresa Sustentur. El taller incluye una introducción a la sustentabilidad en la industria de eventos, tendencias actuales y metodologías para organizar eventos sustentables. También presenta ejercicios prácticos para identificar impactos ambientales, sociales y económicos de eventos, así como acciones para minimizar dichos impactos a nivel local.
Differentiated Instruction In Plain EnglishGlenn Wiebe
The document provides examples of how to adapt content for differentiated instruction. It suggests options like using a quality curriculum with varied starting points and presentation resources, compacting the curriculum, and using exit cards. It also gives examples of modifying a biography about Vincent Van Gogh by adding punny relatives like "Verti Gogh", "Stopin Gogh", and "Amee Gogh" to demonstrate adapting content for different learning needs.
John Constable: being a romantic and a scientistSandra Lemaitre
John Constable was an English landscape painter in the early 19th century who found inspiration in the landscapes and skies of rural England. He believed painting was a scientific pursuit and carefully studied nature. While he aimed to capture realistic scenes, his work also included symbolic and romantic elements like rainbows. Some aspects of his grand landscape paintings featuring religious buildings and skies with dramatic clouds have led scholars to debate whether he should also be considered a romantic painter. Constable felt a deep connection to the countryside around his hometown and sought to express his feelings about nature through his artwork.
El documento describe la apoptosis o muerte celular programada. La apoptosis es un proceso ordenado en el que las células se autodestruyen de forma limpia. Involucra el encogimiento de la célula y el núcleo, la fragmentación del ADN y la fagocitosis rápida del cadáver celular. La apoptosis elimina células dañadas o no deseadas y es importante para regular procesos como el desarrollo embrionario y la respuesta inmune. Se controla a través de las vías extrínseca e intrínseca, que
Want to discover how you can get self-service data exploration capabilities on data stored in multiple formats in files or NoSQL databases? Watch this session of Free Code Fridays to get a basic understanding of Apache Drill.
Drill is an open source, low-latency query engine for Hadoop that delivers secure, interactive SQL analytics at petabyte scale. With the ability to discover schemas on-the-fly, you can get faster time-to-value without waiting for IT to prepare the data for analysis. By adhering to ANSI SQL standards, Drill does not require a learning curve and integrates seamlessly with visualization tools.
Los juegos de realidad alternativa (ARG) utilizan el mundo real como plataforma para contar una historia interactiva donde es difícil distinguir entre la realidad y la ficción. Los ARG involucran a los participantes en la búsqueda de pistas dispersas en múltiples medios para desentrañar un misterio. Dos de los ARG más populares fueron Cicada 3310, que involucró a cientos de personas en la solución de acertijos digitales, y Jejune Institute, que promocionó falsos servicios en San Francisco como parte de su
Level One - Unlock Your Career in Manufacturing - SampleAnanth Palaniappan
Many studies in India state that more than 90% of engineers are not readily employable, resulting in poor understanding of the shop floor, reduced productivity and resulting in poor business performance of the companies.
Level One is a detailed guide on providing induction training to engineers and graduates joining the manufacturing sector in India, which is not covered in any curriculum. This book will help in understanding the fundamentals of various functions, job responsibilities, various tools and techniques, MIS reports and the analysis to be done, thus serving as an Induction Kit for new employees.
Visit www.levelone.co.in to read about the book and order
Buy this book here: https://notionpress.com/read/level-one
This document lists various educational tools and websites for students and teachers. It notes that some students find subjects like history, science, math and English boring. It then lists over 30 different websites for creating things like word clouds, timelines, posters, photo editing, and 3D books. It also lists sites for teachers to use for video editing, lesson planning, file sharing, and teaching resources. It concludes by asking the reader to share their favorite site with a neighbor and provides contact information for more questions.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Este documento presenta un taller sobre eventos sustentables impartido por Vicente Ferreyra Acosta de la empresa Sustentur. El taller incluye una introducción a la sustentabilidad en la industria de eventos, tendencias actuales y metodologías para organizar eventos sustentables. También presenta ejercicios prácticos para identificar impactos ambientales, sociales y económicos de eventos, así como acciones para minimizar dichos impactos a nivel local.
Differentiated Instruction In Plain EnglishGlenn Wiebe
The document provides examples of how to adapt content for differentiated instruction. It suggests options like using a quality curriculum with varied starting points and presentation resources, compacting the curriculum, and using exit cards. It also gives examples of modifying a biography about Vincent Van Gogh by adding punny relatives like "Verti Gogh", "Stopin Gogh", and "Amee Gogh" to demonstrate adapting content for different learning needs.
John Constable: being a romantic and a scientistSandra Lemaitre
John Constable was an English landscape painter in the early 19th century who found inspiration in the landscapes and skies of rural England. He believed painting was a scientific pursuit and carefully studied nature. While he aimed to capture realistic scenes, his work also included symbolic and romantic elements like rainbows. Some aspects of his grand landscape paintings featuring religious buildings and skies with dramatic clouds have led scholars to debate whether he should also be considered a romantic painter. Constable felt a deep connection to the countryside around his hometown and sought to express his feelings about nature through his artwork.
El documento describe la apoptosis o muerte celular programada. La apoptosis es un proceso ordenado en el que las células se autodestruyen de forma limpia. Involucra el encogimiento de la célula y el núcleo, la fragmentación del ADN y la fagocitosis rápida del cadáver celular. La apoptosis elimina células dañadas o no deseadas y es importante para regular procesos como el desarrollo embrionario y la respuesta inmune. Se controla a través de las vías extrínseca e intrínseca, que
Want to discover how you can get self-service data exploration capabilities on data stored in multiple formats in files or NoSQL databases? Watch this session of Free Code Fridays to get a basic understanding of Apache Drill.
Drill is an open source, low-latency query engine for Hadoop that delivers secure, interactive SQL analytics at petabyte scale. With the ability to discover schemas on-the-fly, you can get faster time-to-value without waiting for IT to prepare the data for analysis. By adhering to ANSI SQL standards, Drill does not require a learning curve and integrates seamlessly with visualization tools.
Los juegos de realidad alternativa (ARG) utilizan el mundo real como plataforma para contar una historia interactiva donde es difícil distinguir entre la realidad y la ficción. Los ARG involucran a los participantes en la búsqueda de pistas dispersas en múltiples medios para desentrañar un misterio. Dos de los ARG más populares fueron Cicada 3310, que involucró a cientos de personas en la solución de acertijos digitales, y Jejune Institute, que promocionó falsos servicios en San Francisco como parte de su
Level One - Unlock Your Career in Manufacturing - SampleAnanth Palaniappan
Many studies in India state that more than 90% of engineers are not readily employable, resulting in poor understanding of the shop floor, reduced productivity and resulting in poor business performance of the companies.
Level One is a detailed guide on providing induction training to engineers and graduates joining the manufacturing sector in India, which is not covered in any curriculum. This book will help in understanding the fundamentals of various functions, job responsibilities, various tools and techniques, MIS reports and the analysis to be done, thus serving as an Induction Kit for new employees.
Visit www.levelone.co.in to read about the book and order
Buy this book here: https://notionpress.com/read/level-one
This document lists various educational tools and websites for students and teachers. It notes that some students find subjects like history, science, math and English boring. It then lists over 30 different websites for creating things like word clouds, timelines, posters, photo editing, and 3D books. It also lists sites for teachers to use for video editing, lesson planning, file sharing, and teaching resources. It concludes by asking the reader to share their favorite site with a neighbor and provides contact information for more questions.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Essentials of Automations: Exploring Attributes & Automation Parameters
NYC Solar Summit 2013: Breaking Solar Barriers in NYC
1. NYC Solar Summit
June 4, 2013
David Gilford, Assistant Director
Breaking Solar Barriers in NYC:
From Finance to Hot Water
2. 2
Why solar matters to NYC
Financing remains a key barrier
Solar thermal in NYC: opportunities and challenges
Credit: NYC Mayor’s Office of Long-term Planning and Sustainability
Breaking Solar Barriers in NYC
From Finance to Hot Water
3. 3
Clean, distributed energy
– Helps reach NYC’s 2030 goal of
800MW of new clean DG
– Can target particular areas and
neighborhoods (e.g., Solar
Empowerment Zones)
Economic development
– ~$116M economic impact,
growing at ~80% per year
– Not just panels: labor costs can
be ~50% of the total
Looking ahead, other benefits
– Resiliency and disaster recovery
– Software and data innovation
Why solar matters to NYC
Benefits go far beyond sustainability
4. 4
Despite progress in many areas, financing remains a key barrier
Upfront costs are a major impediment to solar market growth
Capital expense vs. operating expense
– Building owners face high upfront
costs for a long-term return
For SunShot Rooftop Solar Challenge,
Mayor’s Office and EDC co-chairing
Financing Options working group
“Generating reliable and affordable solar energy is both a public
good and a national goal.
A necessary component to achieve this vision is the availability of
scalable, low-cost financing.”
(US Department of Energy, SunShot Grand Challenge)
5. 5
5
A multitude of mechanisms help finance solar PV nationally
Type Offered by
Loans and
credit
enhance-
ment
Crowd-
funding
Issue addressed Description
Individual projects gather equity from
cooperative investors for small shares of
ownership
Investors receive low-yield and do not off-
take energy
Various programs offer low cost debt
financing with long term payback periods
for certain PV projects
4
2
Community
Solar
1
Access to low cost equity
financing
Decoupling of system
location, ownership and
power off-taking
Lower installed cost through
aggregation/economies of
scale
Utility or Special Purpose Entity offers a
program to retail customers to own or
purchase energy/RECs from a locally
sited PV system for a premium
This program allows customers who
would otherwise be unable a way to
“power” their homes with PV
Solar Mosaic
Abundance
Generation
SunFunder
Kickstarter
Kiva
Sacramento
United Power
(CO)
University Park
(MD)
Clean Energy
Collective (CO)
Solar for Sakai
Municipal
Credit Unions
Public
institutions
Sources: 1. BNEF, Extraordinary popular solutions: funding from the crowds, 06/15/12
2. NREL, A Guide to Community Solar: Utility, Private, and Non-profit Project Development, 11/2012
On-bill
financing
Several utilities nationwide administer
low-interest loans which are repaid
through utility bills
3
Access to low cost debt
financing
System ownership tied to
utility account
Public
institutions
Utilities
Access to low cost debt
financing
PPA’s and
Solar Leasing
Third party companies offer the electricity
produced or leasing of the PV system
5 High up-front capital cost
Maintenance and service
Various
DirectOwnership3rdPartyOwnership
6. 6
Financing solar in NYC has unique challenges
Stakeholder interviews identified NYC-specific paths forward
Nature of NYC projects often makes them more difficult to finance
– Many small-to-medium-sized, unique projects
– Multiple tenants or owners (e.g., condos) adds complexity, as power
off-taker is often not the owner
To help solve these challenges, existing financing options include:
– Reducing customer acquisition costs, by aggregating purchasing (e.g.,
“Solarize”)
– Bundling projects together, or targeting multi-building projects for
economies of scale and consistency
Emerging options include crowdfunding and community solar
– Allows renters and others to make small investments can expand the
pool of capital and reduce financing costs
Next phase of SunShot Rooftop Solar Challenge will identify opportunities
to pilot new mechanisms to address these barriers
7. 7
One of the most promising
renewable energy
technologies:
High energy production, low
capital costs relative to PV
Mature, efficient technology
Shorter payback period than
solar PV, excluding incentives
NYC is the most favorable
market in the state for solar
thermal:
High solar radiation
High energy savings potential:
DHW accounts for 19% of
energy consumption
Potential to provide up to 75%
of hot water needs for an
average family
A great opportunity… …still poised for takeoff…
New York has trailed
domestic and global markets
for solar thermal:
Installed capacity per capita in
the United States is 24Wth
while in New York State it is
only 0.3Wth
NYS has 6% of the US
population but only 0.008% of
the solar thermal installed
capacity
Although arguably more
promising, solar thermal
significantly lags PV growth:
~50 systems commissioned in
NYC vs. 687 PV systems
…if barriers are addressed.
Obstacles to growth include:
Financial
− High upfront capital costs
− Lack of financing
− Limited incentives
Technical
− Insufficient performance
data
− Limited awareness of
technology and potential
− Lack of certified
professionals
Regulatory
− Complex regulation and
high transaction costs
The “Other” Solar: Solar Thermal
Despite a strong opportunity, solar hot water has lagged PV locally
8. 8
NYCEDC Solar Thermal Pilot set out to identify market potential
Grants led to white paper on opportunities and challenges
Announced in 2009, grant program
offered incentives (up to $50K per
system) to commercial and multi-
family residential installations
Installations took place from 2010-
2012, with performance data
collected from diverse projects
White paper released June 2013,
available for download at
www.nycedc.com/cleantech
9. 9
Key findings show opportunities to scale deployment
Pilot suggests strong viability for
scaling solar thermal citywide,
identifying 4,565 highest-potential
buildings
– Over 20 years, these could yield
$200M in energy savings;
– Create 1,200 new jobs; and
– Reduce emissions by 6 billion
pounds
Key takeaways from pilot include:
– Hot water load matters
– Siting and orientation are critical
– Incentives are important
– Data increases transparency and
drives deployment