This document discusses an unattended Apache BigTop installer CD that can be used for automated installation using preseeding. It provides links to download ISO files for BigTop versions 0.6.0 through 0.7.0 and screenshots of the installer interface. Key details include that the default credentials are user/hadoop.TW and it installs Hadoop 2.0 and YARN by default. The document also discusses using BigTop to simplify deploying Hadoop-based environments across different Linux distributions similarly to how Debian simplified deploying Linux.
Mac protocols sensor_20071105_slideshareChih-Yu Lin
This document summarizes several MAC protocols for wireless sensor networks. It begins by introducing the need for MAC protocols to control medium access in wireless networks and common sources of energy waste. It then categorizes MAC protocols as contention-based (like ALOHA and CSMA), schedule-based (like TDMA), or hybrid. Specific protocols discussed include S-MAC, B-MAC, TRAMA, and hybrid protocols like Z-MAC and Funneling-MAC. The document emphasizes energy efficiency as the primary concern for MAC protocols in wireless sensor networks.
This document discusses challenges in writing concurrent programs and provides examples of concurrency techniques. It explains that hardware and compiler optimizations can result in unexpected program behaviors. It then describes memory model definitions, performance patterns like LMAX and RCU, and security issues such as timing side-channel attacks using Intel TSX. The goal is to understand how to write correct and efficient concurrent code despite relaxed memory consistency models.
DARPA CGC and DEFCON CTF: Automatic Attack and Defense TechniqueChong-Kuan Chen
The document discusses automatic attack and defense techniques explored through DARPA's Cyber Grand Challenge (CGC) and DEFCON CTF competitions. It introduces CGC and covers topics like vulnerability discovery, fuzzing, symbolic/concolic execution, and software hardening. It describes CGC's qualification round in 2015 and final event in 2016, which was won by ForAllSecure/Mayhem. Various techniques used by competing teams are discussed, including AFL fuzzing, symbolic execution tools like S2E and Angr, and approaches that combined fuzzing and symbolic execution like Driller.
This document discusses an unattended Apache BigTop installer CD that can be used for automated installation using preseeding. It provides links to download ISO files for BigTop versions 0.6.0 through 0.7.0 and screenshots of the installer interface. Key details include that the default credentials are user/hadoop.TW and it installs Hadoop 2.0 and YARN by default. The document also discusses using BigTop to simplify deploying Hadoop-based environments across different Linux distributions similarly to how Debian simplified deploying Linux.
Mac protocols sensor_20071105_slideshareChih-Yu Lin
This document summarizes several MAC protocols for wireless sensor networks. It begins by introducing the need for MAC protocols to control medium access in wireless networks and common sources of energy waste. It then categorizes MAC protocols as contention-based (like ALOHA and CSMA), schedule-based (like TDMA), or hybrid. Specific protocols discussed include S-MAC, B-MAC, TRAMA, and hybrid protocols like Z-MAC and Funneling-MAC. The document emphasizes energy efficiency as the primary concern for MAC protocols in wireless sensor networks.
This document discusses challenges in writing concurrent programs and provides examples of concurrency techniques. It explains that hardware and compiler optimizations can result in unexpected program behaviors. It then describes memory model definitions, performance patterns like LMAX and RCU, and security issues such as timing side-channel attacks using Intel TSX. The goal is to understand how to write correct and efficient concurrent code despite relaxed memory consistency models.
DARPA CGC and DEFCON CTF: Automatic Attack and Defense TechniqueChong-Kuan Chen
The document discusses automatic attack and defense techniques explored through DARPA's Cyber Grand Challenge (CGC) and DEFCON CTF competitions. It introduces CGC and covers topics like vulnerability discovery, fuzzing, symbolic/concolic execution, and software hardening. It describes CGC's qualification round in 2015 and final event in 2016, which was won by ForAllSecure/Mayhem. Various techniques used by competing teams are discussed, including AFL fuzzing, symbolic execution tools like S2E and Angr, and approaches that combined fuzzing and symbolic execution like Driller.
In this session, participants will explore simple, step-by-step strategies for Chinese language
learning based on differentiated instruction and backward design theory, that are currently being
successfully implemented in the classroom. Participants will learn practical methods for creating fun and effective activities to elevate students’ interest and performance in Chinese language learning. Participants will walk away with ideas about how differentiated instruction can be incorporated into the Chinese classroom.
In this session, participants will explore simple, step-by-step strategies for Chinese language
learning based on differentiated instruction and backward design theory, that are currently being
successfully implemented in the classroom. Participants will learn practical methods for creating fun and effective activities to elevate students’ interest and performance in Chinese language learning. Participants will walk away with ideas about how differentiated instruction can be incorporated into the Chinese classroom.