Agile Use Cases: Balancing Utility with Simplicity - May 2009IIBA Rochester NY
A mainstay of conventional requirements gathering, use cases can ease the transition to agile methodologies. In this practical program, we explore:
* how to write uses cases
* how to adapt uses cases to agile projects
* how to automate acceptance testing with use cases
Ted Husted is a member of the International
Institute for Business Analysis (IIBA), and the Executive Vice
President Elect of the Rochester NY Chapter. Ted has published three
books and several magazine articles on software development and
testing, and he speaks at professional conferences and conventions on
a regular basis.
Ted Husted works in Pittsford NY with VanDamme Associates, a .NET integrator specializing in non-profits and associations.
This document discusses backchanneling and tools that can be used to facilitate it. Backchanneling gives students a voice and encourages student engagement, reflective thinking, and collaboration. It introduces several digital tools for backchanneling: TodaysMeet, TitanPad, and Lino. These tools allow students to collaboratively edit spaces, send comments to each other, and organize discussions in different formats like questions or visual thinking. The document encourages teachers to explore these tools and consider if they will push students to think critically, visually, and collaboratively.
The document discusses the origins and early development of Twitter. It notes that Twitter's founders came across the word "twitter" and felt it perfectly captured the idea of short bursts of information like bird chirps. Early tweets were limited to 140 characters. The document also provides guidance on how to use Twitter, including basic terminology like following, favoriting, retweeting, hashtags, and mentions. It suggests following other educators and educational hashtags as a way to join the Twitter community.
SEWM'14 keynote: Mining Events from Multimedia StreamsJonathon Hare
Keynote at the ICMR 2014 Workshop on Social Events in Web Multimedia (SEWM). Glasgow, UK. 1st April 2014.
The aggregation of items from social media streams, such as Flickr photos and Twitter tweets, into meaningful groups can help users contextualise and effectively consume the torrents of information on the social web. This task is challenging due to the scale of the streams and the inherently multimodal nature of the information being contextualised.
In this talk we’ll describe some of our recent work on trend and event detection in multimedia data streams. We focus on scalable streaming algorithms that can be applied to multimedia data streams from the web and the social web. The talk will cover two particular aspects of our work: mining Twitter for trending images by detecting near duplicates; and detecting social events in multimedia data with streaming clustering algorithms. We will describe in detail our techniques, and explore open questions and areas of potential future work, in both these tasks.
This document contains a series of mathematical equations and symbols. It appears to be documenting complex calculations or formulas across multiple steps involving variables such as I, E, C, A, B, L, N and mathematical operators like +, -, =, ). The equations span multiple lines and incorporate parentheses to delineate order of operations. Overall it provides technical documentation of mathematical relationships but does not include additional context to explain the meaning or application of the calculations.
- The study examined the evolution of social relationships among first-year middle school students over time from cliques to circles.
- Students' social networks transitioned from tight-knit cliques of close friends to larger circles of acquaintances and classmates as relationships broadened beyond initial friendship groups over the school year.
- Larger circles correlated with increased cognitive load as students managed more relationships, showing that social network structure impacts cognitive resource allocation.
Agile Use Cases: Balancing Utility with Simplicity - May 2009IIBA Rochester NY
A mainstay of conventional requirements gathering, use cases can ease the transition to agile methodologies. In this practical program, we explore:
* how to write uses cases
* how to adapt uses cases to agile projects
* how to automate acceptance testing with use cases
Ted Husted is a member of the International
Institute for Business Analysis (IIBA), and the Executive Vice
President Elect of the Rochester NY Chapter. Ted has published three
books and several magazine articles on software development and
testing, and he speaks at professional conferences and conventions on
a regular basis.
Ted Husted works in Pittsford NY with VanDamme Associates, a .NET integrator specializing in non-profits and associations.
This document discusses backchanneling and tools that can be used to facilitate it. Backchanneling gives students a voice and encourages student engagement, reflective thinking, and collaboration. It introduces several digital tools for backchanneling: TodaysMeet, TitanPad, and Lino. These tools allow students to collaboratively edit spaces, send comments to each other, and organize discussions in different formats like questions or visual thinking. The document encourages teachers to explore these tools and consider if they will push students to think critically, visually, and collaboratively.
The document discusses the origins and early development of Twitter. It notes that Twitter's founders came across the word "twitter" and felt it perfectly captured the idea of short bursts of information like bird chirps. Early tweets were limited to 140 characters. The document also provides guidance on how to use Twitter, including basic terminology like following, favoriting, retweeting, hashtags, and mentions. It suggests following other educators and educational hashtags as a way to join the Twitter community.
SEWM'14 keynote: Mining Events from Multimedia StreamsJonathon Hare
Keynote at the ICMR 2014 Workshop on Social Events in Web Multimedia (SEWM). Glasgow, UK. 1st April 2014.
The aggregation of items from social media streams, such as Flickr photos and Twitter tweets, into meaningful groups can help users contextualise and effectively consume the torrents of information on the social web. This task is challenging due to the scale of the streams and the inherently multimodal nature of the information being contextualised.
In this talk we’ll describe some of our recent work on trend and event detection in multimedia data streams. We focus on scalable streaming algorithms that can be applied to multimedia data streams from the web and the social web. The talk will cover two particular aspects of our work: mining Twitter for trending images by detecting near duplicates; and detecting social events in multimedia data with streaming clustering algorithms. We will describe in detail our techniques, and explore open questions and areas of potential future work, in both these tasks.
This document contains a series of mathematical equations and symbols. It appears to be documenting complex calculations or formulas across multiple steps involving variables such as I, E, C, A, B, L, N and mathematical operators like +, -, =, ). The equations span multiple lines and incorporate parentheses to delineate order of operations. Overall it provides technical documentation of mathematical relationships but does not include additional context to explain the meaning or application of the calculations.
- The study examined the evolution of social relationships among first-year middle school students over time from cliques to circles.
- Students' social networks transitioned from tight-knit cliques of close friends to larger circles of acquaintances and classmates as relationships broadened beyond initial friendship groups over the school year.
- Larger circles correlated with increased cognitive load as students managed more relationships, showing that social network structure impacts cognitive resource allocation.
This document discusses setting up TensorFlow for GPU usage and training models in parallel across multiple GPUs. It provides instructions on limiting GPU memory usage on a per-process basis, distributing TensorFlow workload across GPUs, and monitoring GPU usage.
[DL Hacks]Deep Neuroevolution: Genetic Algorithms Are a Competitive Alternati...Deep Learning JP
The document discusses Deep Learning Japan (DL Papers), a website that aggregates and shares Japanese-language papers on deep learning. It provides an overview of the website's features and content, including sections on recent papers, tutorials, tools and frameworks. In summary:
- DL Papers collects and shares Japanese papers on deep learning techniques to help disseminate research.
- The site organizes papers into categories like recent publications, tutorials, tools and frameworks.
- It aims to help more researchers engage with deep learning and accelerate progress in the field through open sharing of ideas.
2018년 2월 24일 KCD2018에서 Google Polymer에 대하여 발표한 내용입니다. 이 발표에서는 웹, 하이브리드 앱 및 프로그레시브 웹 앱 개발을 위한 구글의 웹컴포넌트 라이브러리인 폴리머를 쉽고 재미있게 다룹니다. 웹컴포넌트, 폴리머에 대한 소개와 함께 폴리머 2.0의 특징을 소개합니다. 또한 modulizer, TypeScript, yarn, webpack의 도입을 추진하고 있는 폴리머 3.0 알파 버전의 주요변화를 알아봅니다.
Mining Events from Multimedia Streams (WAIS Research group seminar June 2014)Jonathon Hare
The document discusses mining meaningful events and trends from multimedia streams on social media. It describes challenges including dealing with massive amounts of data and making effective use of different modalities. It then presents two case studies: monitoring Twitter's visual pulse by detecting trending images, and detecting social events from a Flickr image collection using features like time, location, text and image similarities between photos. Clustering algorithms are used to group related photos into events. Feature weighting is also explored to determine the most important features for separating events.
The document discusses social media and its influence on financial markets. It notes that information and opinions shared on platforms like Twitter and Facebook can impact cryptocurrency prices and stock market indicators. Studies show correlations between social media posts and fluctuations in Bitcoin values as well as stock price changes and trading volumes. Therefore, analyzing social media data may provide insights into investor sentiment and help predict market movements.
This document discusses various Amazon Web Services (AWS) products for data science and analytics workflows. It highlights how AWS services like Amazon Redshift, Amazon Kinesis, Amazon EMR, and others can be used together for extracting, transforming, loading (ETL) data, performing analytics, and building data science models at scale. Specific applications and customers like Hearst Publishing that leverage these AWS services for clickstream analytics are also mentioned. The document aims to provide an overview of the AWS big data and analytics portfolio.
The document contains information about various topics including numbers, letters, symbols, measurements, and geographic locations. It discusses numeric values, words, chemical formulas, and temperature readings. Various places, people, and objects are also listed without additional context.
The document contains technical information about Kintone, including:
1. Details about Kintone features such as record management, user management, and permissions.
2. A timeline of Kintone updates and releases in 2016 including new features and enhancements.
3. Instructions for using Kintone including logging in, navigating records, and managing fields.
This document discusses plans for developing an educational website and content. It outlines key steps and considerations for the project pipeline including audience analysis, persona development, pricing strategy, identifying priorities for ideas, colors, fonts and branding. It also discusses content format and structure, topics, focus, identity and design. Other sections provide recommendations for hosting, configuring systems, determining site sections, UI/UX design, modules, optimization, security and initial content marketing strategies. Metrics for success and key performance indicators are also mentioned.
The document is 3 sentences or less as requested. It provides a high-level overview of the essential information by summarizing the main topics and considerations discussed in the source material for planning an educational website project.
This document is a PDF file containing technical information about the document structure and formatting. It includes objects like pages, images, and streams of encoded text. The summary provides high-level technical details without interpreting the full contents.
- The document discusses topic modeling and describes several steps in the process: removing common words, calculating term frequencies, normalizing term frequencies, and calculating the similarity between documents and topics based on term frequency-inverse document frequency.
- Key algorithms and calculations mentioned include removing common words, calculating tf-idf to measure how important a term is to a document, and using tf-idf scores to determine the similarity between documents and topics.
- The goal is to automatically organize large text corpuses by categorizing documents into topics based on the terms they contain and how common or rare those terms are.
The document discusses a meeting between two parties. Key points discussed include:
1) An overview of the current situation and challenges faced.
2) Potential solutions and next steps were proposed to address the issues.
3) Both parties agreed to continue discussions and work together to resolve their differences.
The document discusses a meeting between two parties. Key points discussed include:
1) An overview of the current situation and challenges faced.
2) Potential solutions and next steps were proposed to address the issues.
3) Both parties agreed to continue discussions and work together to resolve their differences.
This document discusses setting up TensorFlow for GPU usage and training models in parallel across multiple GPUs. It provides instructions on limiting GPU memory usage on a per-process basis, distributing TensorFlow workload across GPUs, and monitoring GPU usage.
[DL Hacks]Deep Neuroevolution: Genetic Algorithms Are a Competitive Alternati...Deep Learning JP
The document discusses Deep Learning Japan (DL Papers), a website that aggregates and shares Japanese-language papers on deep learning. It provides an overview of the website's features and content, including sections on recent papers, tutorials, tools and frameworks. In summary:
- DL Papers collects and shares Japanese papers on deep learning techniques to help disseminate research.
- The site organizes papers into categories like recent publications, tutorials, tools and frameworks.
- It aims to help more researchers engage with deep learning and accelerate progress in the field through open sharing of ideas.
2018년 2월 24일 KCD2018에서 Google Polymer에 대하여 발표한 내용입니다. 이 발표에서는 웹, 하이브리드 앱 및 프로그레시브 웹 앱 개발을 위한 구글의 웹컴포넌트 라이브러리인 폴리머를 쉽고 재미있게 다룹니다. 웹컴포넌트, 폴리머에 대한 소개와 함께 폴리머 2.0의 특징을 소개합니다. 또한 modulizer, TypeScript, yarn, webpack의 도입을 추진하고 있는 폴리머 3.0 알파 버전의 주요변화를 알아봅니다.
Mining Events from Multimedia Streams (WAIS Research group seminar June 2014)Jonathon Hare
The document discusses mining meaningful events and trends from multimedia streams on social media. It describes challenges including dealing with massive amounts of data and making effective use of different modalities. It then presents two case studies: monitoring Twitter's visual pulse by detecting trending images, and detecting social events from a Flickr image collection using features like time, location, text and image similarities between photos. Clustering algorithms are used to group related photos into events. Feature weighting is also explored to determine the most important features for separating events.
The document discusses social media and its influence on financial markets. It notes that information and opinions shared on platforms like Twitter and Facebook can impact cryptocurrency prices and stock market indicators. Studies show correlations between social media posts and fluctuations in Bitcoin values as well as stock price changes and trading volumes. Therefore, analyzing social media data may provide insights into investor sentiment and help predict market movements.
This document discusses various Amazon Web Services (AWS) products for data science and analytics workflows. It highlights how AWS services like Amazon Redshift, Amazon Kinesis, Amazon EMR, and others can be used together for extracting, transforming, loading (ETL) data, performing analytics, and building data science models at scale. Specific applications and customers like Hearst Publishing that leverage these AWS services for clickstream analytics are also mentioned. The document aims to provide an overview of the AWS big data and analytics portfolio.
The document contains information about various topics including numbers, letters, symbols, measurements, and geographic locations. It discusses numeric values, words, chemical formulas, and temperature readings. Various places, people, and objects are also listed without additional context.
The document contains technical information about Kintone, including:
1. Details about Kintone features such as record management, user management, and permissions.
2. A timeline of Kintone updates and releases in 2016 including new features and enhancements.
3. Instructions for using Kintone including logging in, navigating records, and managing fields.
This document discusses plans for developing an educational website and content. It outlines key steps and considerations for the project pipeline including audience analysis, persona development, pricing strategy, identifying priorities for ideas, colors, fonts and branding. It also discusses content format and structure, topics, focus, identity and design. Other sections provide recommendations for hosting, configuring systems, determining site sections, UI/UX design, modules, optimization, security and initial content marketing strategies. Metrics for success and key performance indicators are also mentioned.
The document is 3 sentences or less as requested. It provides a high-level overview of the essential information by summarizing the main topics and considerations discussed in the source material for planning an educational website project.
This document is a PDF file containing technical information about the document structure and formatting. It includes objects like pages, images, and streams of encoded text. The summary provides high-level technical details without interpreting the full contents.
- The document discusses topic modeling and describes several steps in the process: removing common words, calculating term frequencies, normalizing term frequencies, and calculating the similarity between documents and topics based on term frequency-inverse document frequency.
- Key algorithms and calculations mentioned include removing common words, calculating tf-idf to measure how important a term is to a document, and using tf-idf scores to determine the similarity between documents and topics.
- The goal is to automatically organize large text corpuses by categorizing documents into topics based on the terms they contain and how common or rare those terms are.
The document discusses a meeting between two parties. Key points discussed include:
1) An overview of the current situation and challenges faced.
2) Potential solutions and next steps were proposed to address the issues.
3) Both parties agreed to continue discussions and work together to resolve their differences.
The document discusses a meeting between two parties. Key points discussed include:
1) An overview of the current situation and challenges faced.
2) Potential solutions and next steps were proposed to address the issues.
3) Both parties agreed to continue discussions and work together to resolve their differences.
FPGA based 10G Performance Tester for HW OpenFlow SwitchYutaka Yasuda
SDN operators need to measure the performance of OF HW switch on their site. Cause there is 1000 times differences in latency, depends on the specified flow entry. ASIC can forward in several μsecs but the software (CPU) may take msec.
To protect yourself from unexpected performance plunge, monitor your switches healthiness on your site.
A proposal of the OpenFlow controller development support tool Yutaka Yasuda
OpenFlow controller programmer does not have any method to confirm how reflected their code to the flow control, directly and intuitively
“This code, how does work on... which flow?”
“This flow, which code does make it?”
This slides shows the basic design of the mechanism for binding code and flow to see them.
It enables cross referencing logic and flow each other and also enable tracing the flow over switches.
It had been presented at the 16th IOT conference of IPSJ, March 2012.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Keywords: AI, Containeres, Kubernetes, Cloud Native
Event Link: https://meine.doag.org/events/cloudland/2024/agenda/#agendaId.4211
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsScyllaDB
ScyllaDB monitoring provides a lot of useful information. But sometimes it’s not easy to find the root of the problem if something is wrong or even estimate the remaining capacity by the load on the cluster. This talk shares our team's practical tips on: 1) How to find the root of the problem by metrics if ScyllaDB is slow 2) How to interpret the load and plan capacity for the future 3) Compaction strategies and how to choose the right one 4) Important metrics which aren’t available in the default monitoring setup.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxSunil Jagani
Discover how AI is transforming the workplace and learn strategies for reskilling and upskilling employees to stay ahead. This comprehensive guide covers the impact of AI on jobs, essential skills for the future, and successful case studies from industry leaders. Embrace AI-driven changes, foster continuous learning, and build a future-ready workforce.
Read More - https://bit.ly/3VKly70
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.