The document describes a proposed peer-to-peer tutoring application called Super User. It allows users to volunteer as tutors to help other users who are having difficulties with their mobile devices or applications. The application monitors user behaviors to identify knowledgeable users and prompts them to become tutors. As tutors gain experience, they can view their profile and ratings within the application. Tutors earn points and rewards based on the help they provide to other users.
Exploring two critical elements in the foundations of a healthy relationship. The two elements are commitment and boundaries, both of which are important for building strong relationships but require work over time.
The document presents an algorithm to calculate the probability of yesterday's weather based on the weighted evolutionary novelty metrics (WENM) and evolutionary novelty metrics (ENM) of previous and current versions of class histories. It selects the top N class histories based on WENM from previous versions and top M class histories based on ENM from the last two versions to determine if yesterday's weather has been seen before. The algorithm is described as too complex.
Transitioning to Cognos Workspace Advanced: Migrating from Query & Analysis S...Senturus
Query Studio and Analysis Studio was deprecated after the Cognos BI 10.2.2 release. Learn to migrate away from Query and Analysis studio and use Cognos Workspace Advanced. View the webinar video recording and download this deck: http://www.senturus.com/resources/transitioning-to-cognos-workspace-advanced/.
This overview of Cognos Workspace Advanced shows user interface and capabilities against both relational and dimensional data source. In addition, we compare and contrast Workspace Advanced against Query and Analysis Studio, including a review of any current functionality gaps.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
End of the Resume, Rise of the Super UserDavid Spark
Whether you're looking to get hired, or you're looking for A+ talent, you want to be seen as or want to be looking for super users.
The 8 ½ x 11 paper resume has no more future in the age of social media. Be seen as a super user by attaching yourself to a brand and/or industry. Create, share, and build relationships with industry members and other super users. Super users are highly visible. Look for them. They're an excellent source for marketing, staffing, business development, and more.
This 14 minute live presentation given at the Dice event at The Computer History Museum in Mountain View, CA explains the super user model and gives examples of how companies have found, built relationships with, and hired super users.
The document discusses the empowerment of ERP super users and super user groups. It argues that selecting, developing and empowering key business users as ERP super users can help bridge communication gaps between IT and business users of ERP systems. These super users can help drive greater value from ERP systems through activities like process automation, education, and transformation. The document also provides suggestions for developing super users and establishing super user groups through guidelines on vision, objectives, structure and other elements.
CAFE (Cognos Analysis for Excel): Using Excel with Cognos BI and TM1Senturus
Learn best uses for CAFE, useful techniques, common pitfalls and see demos. View the webinar video recording and download this deck: http://www.senturus.com/resources/cognos-cafe/.
Business and financial analysts use Cognos Analysis For Excel (CAFE) as a way to combine enterprise information with local data in an Excel spreadsheet that can be refreshed as server information changes. In this webinar, we looked at the capabilities of CAFE, compared them when using the tool with TM1 versus Cognos BI as a source and shared a number of useful tips and caveats.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
Exploring two critical elements in the foundations of a healthy relationship. The two elements are commitment and boundaries, both of which are important for building strong relationships but require work over time.
The document presents an algorithm to calculate the probability of yesterday's weather based on the weighted evolutionary novelty metrics (WENM) and evolutionary novelty metrics (ENM) of previous and current versions of class histories. It selects the top N class histories based on WENM from previous versions and top M class histories based on ENM from the last two versions to determine if yesterday's weather has been seen before. The algorithm is described as too complex.
Transitioning to Cognos Workspace Advanced: Migrating from Query & Analysis S...Senturus
Query Studio and Analysis Studio was deprecated after the Cognos BI 10.2.2 release. Learn to migrate away from Query and Analysis studio and use Cognos Workspace Advanced. View the webinar video recording and download this deck: http://www.senturus.com/resources/transitioning-to-cognos-workspace-advanced/.
This overview of Cognos Workspace Advanced shows user interface and capabilities against both relational and dimensional data source. In addition, we compare and contrast Workspace Advanced against Query and Analysis Studio, including a review of any current functionality gaps.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
End of the Resume, Rise of the Super UserDavid Spark
Whether you're looking to get hired, or you're looking for A+ talent, you want to be seen as or want to be looking for super users.
The 8 ½ x 11 paper resume has no more future in the age of social media. Be seen as a super user by attaching yourself to a brand and/or industry. Create, share, and build relationships with industry members and other super users. Super users are highly visible. Look for them. They're an excellent source for marketing, staffing, business development, and more.
This 14 minute live presentation given at the Dice event at The Computer History Museum in Mountain View, CA explains the super user model and gives examples of how companies have found, built relationships with, and hired super users.
The document discusses the empowerment of ERP super users and super user groups. It argues that selecting, developing and empowering key business users as ERP super users can help bridge communication gaps between IT and business users of ERP systems. These super users can help drive greater value from ERP systems through activities like process automation, education, and transformation. The document also provides suggestions for developing super users and establishing super user groups through guidelines on vision, objectives, structure and other elements.
CAFE (Cognos Analysis for Excel): Using Excel with Cognos BI and TM1Senturus
Learn best uses for CAFE, useful techniques, common pitfalls and see demos. View the webinar video recording and download this deck: http://www.senturus.com/resources/cognos-cafe/.
Business and financial analysts use Cognos Analysis For Excel (CAFE) as a way to combine enterprise information with local data in an Excel spreadsheet that can be refreshed as server information changes. In this webinar, we looked at the capabilities of CAFE, compared them when using the tool with TM1 versus Cognos BI as a source and shared a number of useful tips and caveats.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
Digital Diary Dialogues is a mobile learning project that uses smartphones to facilitate cross-curricular, peer-to-peer learning activities between students in multiple countries. Students in Finland, Scotland, England, and Afghanistan create and exchange microblogs and learning objects using Nokia N95 phones. The project focuses on effective use of mobile technology for communication and learning, using international connections to motivate students, and sharing pedagogical approaches across partnerships.
The document summarizes key points from a workshop on developing impact pathways for projects.
1. The workshop discussed making impact pathways (how projects create change) explicit in order to improve project practice and impact. Explicit impact pathways can help with planning, evaluation, program integration, and ex-post impact assessment.
2. The workshop introduced the Pathways of Influence, Performance and Adoption (PIPA) approach for making impact pathways explicit. PIPA develops two perspectives - a problem tree showing how project outputs address problems to achieve goals, and network maps showing the relationships needed over time to achieve goals.
3. Integrating these perspectives provides a more complete picture of a project's theory of change from an
This document is an advertisement for StartUp Media Pvt. Limited, an Indian media company based in Pune. It provides services such as advertising, graphic design, event management, documentary film production, and online marketing. The document promotes StartUp Media as a partner to help clients enhance brand awareness, engage target audiences, and add authenticity to communication through creative ideas and a global reach. It includes contact information for Nitin Beohar in new business development.
The document discusses how smartphones, tablets, and bring your own devices have changed audience engagement at events, with over half of Europeans now owning smartphones and nearly a fifth owning tablets. It also outlines how virtual and live events combined can maximize reach and engagement through sharing content before, during, and after events across various online platforms and social media. Finally, it notes how event content and promotions can drive engagement on social media by providing shareable content, coupons, and other brand benefits to extend the impact of the event.
The document discusses the efforts of a citizens' group in Washington state to advocate for funding and support for school libraries and technology. It describes how they mobilized over 15,000 citizens to lobby the state legislature after budget cuts threatened library programs. Through persistence and concrete data-backed requests over several years, the group helped establish school libraries and technology as part of the state's basic education requirements. Their efforts secured emergency funding, legislative mandates, and standards to ensure equitable access to libraries, technology and literacy opportunities for all students in Washington.
The document provides an overview of Europeana's strategic plan and current landscape. It discusses moving to a more user-focused approach and transitioning to Europeana Libraries and Europeana Research. Key points include segmenting users, improving content quality and ingestion workflows, facilitating knowledge transfer through projects, distributing content through various channels, and engaging users in new ways with curators. The goal is to build trusted cultural heritage resources and support the cultural sector through aggregation, facilitation, distribution, and engagement.
Yes systems engineering, you are a disciplineJoseph KAsser
Systems engineering is currently characterized by conflicting and contradictory opinions on its nature. The paper begins by describing the evolution of systems engineering in the National Council on Systems Engineering (NCOSE)/ International Council on Systems Engineering (INCOSE) and the difficulty in defining and differentiating systems engineering as a discipline. The paper then identifies and discusses six different and somewhat contradictory camps or perspectives of systems engineering. After identifying the cause of the contradictions the paper suggests one way to reconcile the camps is to dissolve the problem to distinguish between the activity known as systems engineering and the role of the systems engineer with a return to the old pre-NCOSE systems engineering paradigm. The paper then continues by testing the hypothesis and shows that systems engineering is a discipline that can be differentiated from other disciplines. However, it is not a traditional engineering discipline.
Informal Learning Evidence in Online Communities of Mobile Device Enthusiasts...Hernan Sagastegui Chigne
This document describes a study that investigated the informal learning practices of enthusiastic mobile device owners. The study found that mobile device users deploy the mobile, connective, and collaborative capabilities of their devices in a variety of informal learning contexts, and in quite innovative ways. Trends emerged, such as the increasing importance of podcasting and audio and the use of built-in GPS. Informal learners identified learning activities that could be enhanced by mobile technology, and developed methods that helped them achieve their learning goals using these devices. The study also found that informal learners make use of the connectivity of their mobile devices to engage in collaborative learning.
The document discusses project management techniques like the critical path method (CPM) and program evaluation and review technique (PERT) which are used to schedule projects by breaking them into tasks, estimating durations, and identifying the critical path of activities that determine the overall project duration. CPM and PERT involve creating a network diagram of tasks and their dependencies to determine the earliest and latest times that tasks can start and finish without extending the project completion date.
The document discusses the emergence and development of open and distance learning (ODL) and its increasing importance in the 21st century. It outlines how ODL has evolved from its origins in the 16th century using print-only materials to incorporate more flexible delivery methods and multimedia technologies. The document also examines key issues driving the global movement toward ODL, such as rising enrollment, the demand for lifelong learning opportunities, and the consequences of globalization.
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyShane Mitchell
This document discusses the connected and sustainable energy community enabled by smart grids. Key points include:
1) A smart grid allows energy to flow in both directions, enabling consumers to become producers by generating and storing their own energy from sources like solar and wind.
2) Distributed energy generation and storage from renewable micro-sources helps power the grid while reducing emissions.
3) Connected transmission, distribution assets, and personnel allow real-time visibility and control of the energy supply chain for improved efficiency.
Matching teaching styles and learning styles hmlt 5203 131_assignment_1Mohammad Ismail
In this powerpoint presentation, teaching and learning styles are being matched so that teachers improve their delivery methods to suit all the students' learning styles.
This document summarizes the work of various professional learning communities (PLCs) at Newark High School. It describes how PLCs in subjects like social studies, science, English, world languages, health/PE, fine arts, and math are aligning curriculum, examining student work and assessments, and implementing strategies in the classroom. PLCs are also working to engage families and the community as well as connect with every student. The document credits Susan Williams as the project manager and Maggie Boone as technical producer in summarizing the PLCs' work.
Back To The Grassroots – CED and Building Local PowerRaïmi Osseni
This workshop explores changes in dominant CED theory and practice from earlier visions linked to traditions of grassroots community organizing and building citizens' power at the local
level to a narrower entrepreneurial and technical intervention. What are the implications of these
changes? Are there practices and organizations that embody the two approaches? What does community organizing have to do with CED?
Eric Shragge, School of Community and Public Affairs, Concordia University
Raimi Osseni, CCEDNet Emerging Leaders
The document discusses a GIS-based transmission line mapping and maintenance system that uses tools like image processing, thematic mapping, and spatial data analysis. It emphasizes using Google Maps and Earth for asset mapping and land base views, and Smallworld for additional analysis capabilities. The system aims to support maintenance planning, reporting, and asset management through an integrated platform.
The document describes the formation of the Washington Coalition for School Libraries and Information Technology (WCS-Lit). The coalition advocates for full-time certified teacher-librarians in every school and fully-funded library materials and technology resources. The coalition envisions equitable access to technology, literacy, and a world-class education for all students in Washington state.
The document discusses ePortfolios, which allow students and teachers to collect artifacts in various media types and connect evidence to goals or standards. ePortfolios engage learners through tools like multimedia and social networking. They facilitate making connections between people, ideas, resources and learning. ePortfolios are defined as a process of collecting, selecting, reflecting on and presenting work rather than just a product or technology. Assessment is an important part of ePortfolios to improve learning.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Digital Diary Dialogues is a mobile learning project that uses smartphones to facilitate cross-curricular, peer-to-peer learning activities between students in multiple countries. Students in Finland, Scotland, England, and Afghanistan create and exchange microblogs and learning objects using Nokia N95 phones. The project focuses on effective use of mobile technology for communication and learning, using international connections to motivate students, and sharing pedagogical approaches across partnerships.
The document summarizes key points from a workshop on developing impact pathways for projects.
1. The workshop discussed making impact pathways (how projects create change) explicit in order to improve project practice and impact. Explicit impact pathways can help with planning, evaluation, program integration, and ex-post impact assessment.
2. The workshop introduced the Pathways of Influence, Performance and Adoption (PIPA) approach for making impact pathways explicit. PIPA develops two perspectives - a problem tree showing how project outputs address problems to achieve goals, and network maps showing the relationships needed over time to achieve goals.
3. Integrating these perspectives provides a more complete picture of a project's theory of change from an
This document is an advertisement for StartUp Media Pvt. Limited, an Indian media company based in Pune. It provides services such as advertising, graphic design, event management, documentary film production, and online marketing. The document promotes StartUp Media as a partner to help clients enhance brand awareness, engage target audiences, and add authenticity to communication through creative ideas and a global reach. It includes contact information for Nitin Beohar in new business development.
The document discusses how smartphones, tablets, and bring your own devices have changed audience engagement at events, with over half of Europeans now owning smartphones and nearly a fifth owning tablets. It also outlines how virtual and live events combined can maximize reach and engagement through sharing content before, during, and after events across various online platforms and social media. Finally, it notes how event content and promotions can drive engagement on social media by providing shareable content, coupons, and other brand benefits to extend the impact of the event.
The document discusses the efforts of a citizens' group in Washington state to advocate for funding and support for school libraries and technology. It describes how they mobilized over 15,000 citizens to lobby the state legislature after budget cuts threatened library programs. Through persistence and concrete data-backed requests over several years, the group helped establish school libraries and technology as part of the state's basic education requirements. Their efforts secured emergency funding, legislative mandates, and standards to ensure equitable access to libraries, technology and literacy opportunities for all students in Washington.
The document provides an overview of Europeana's strategic plan and current landscape. It discusses moving to a more user-focused approach and transitioning to Europeana Libraries and Europeana Research. Key points include segmenting users, improving content quality and ingestion workflows, facilitating knowledge transfer through projects, distributing content through various channels, and engaging users in new ways with curators. The goal is to build trusted cultural heritage resources and support the cultural sector through aggregation, facilitation, distribution, and engagement.
Yes systems engineering, you are a disciplineJoseph KAsser
Systems engineering is currently characterized by conflicting and contradictory opinions on its nature. The paper begins by describing the evolution of systems engineering in the National Council on Systems Engineering (NCOSE)/ International Council on Systems Engineering (INCOSE) and the difficulty in defining and differentiating systems engineering as a discipline. The paper then identifies and discusses six different and somewhat contradictory camps or perspectives of systems engineering. After identifying the cause of the contradictions the paper suggests one way to reconcile the camps is to dissolve the problem to distinguish between the activity known as systems engineering and the role of the systems engineer with a return to the old pre-NCOSE systems engineering paradigm. The paper then continues by testing the hypothesis and shows that systems engineering is a discipline that can be differentiated from other disciplines. However, it is not a traditional engineering discipline.
Informal Learning Evidence in Online Communities of Mobile Device Enthusiasts...Hernan Sagastegui Chigne
This document describes a study that investigated the informal learning practices of enthusiastic mobile device owners. The study found that mobile device users deploy the mobile, connective, and collaborative capabilities of their devices in a variety of informal learning contexts, and in quite innovative ways. Trends emerged, such as the increasing importance of podcasting and audio and the use of built-in GPS. Informal learners identified learning activities that could be enhanced by mobile technology, and developed methods that helped them achieve their learning goals using these devices. The study also found that informal learners make use of the connectivity of their mobile devices to engage in collaborative learning.
The document discusses project management techniques like the critical path method (CPM) and program evaluation and review technique (PERT) which are used to schedule projects by breaking them into tasks, estimating durations, and identifying the critical path of activities that determine the overall project duration. CPM and PERT involve creating a network diagram of tasks and their dependencies to determine the earliest and latest times that tasks can start and finish without extending the project completion date.
The document discusses the emergence and development of open and distance learning (ODL) and its increasing importance in the 21st century. It outlines how ODL has evolved from its origins in the 16th century using print-only materials to incorporate more flexible delivery methods and multimedia technologies. The document also examines key issues driving the global movement toward ODL, such as rising enrollment, the demand for lifelong learning opportunities, and the consequences of globalization.
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyShane Mitchell
This document discusses the connected and sustainable energy community enabled by smart grids. Key points include:
1) A smart grid allows energy to flow in both directions, enabling consumers to become producers by generating and storing their own energy from sources like solar and wind.
2) Distributed energy generation and storage from renewable micro-sources helps power the grid while reducing emissions.
3) Connected transmission, distribution assets, and personnel allow real-time visibility and control of the energy supply chain for improved efficiency.
Matching teaching styles and learning styles hmlt 5203 131_assignment_1Mohammad Ismail
In this powerpoint presentation, teaching and learning styles are being matched so that teachers improve their delivery methods to suit all the students' learning styles.
This document summarizes the work of various professional learning communities (PLCs) at Newark High School. It describes how PLCs in subjects like social studies, science, English, world languages, health/PE, fine arts, and math are aligning curriculum, examining student work and assessments, and implementing strategies in the classroom. PLCs are also working to engage families and the community as well as connect with every student. The document credits Susan Williams as the project manager and Maggie Boone as technical producer in summarizing the PLCs' work.
Back To The Grassroots – CED and Building Local PowerRaïmi Osseni
This workshop explores changes in dominant CED theory and practice from earlier visions linked to traditions of grassroots community organizing and building citizens' power at the local
level to a narrower entrepreneurial and technical intervention. What are the implications of these
changes? Are there practices and organizations that embody the two approaches? What does community organizing have to do with CED?
Eric Shragge, School of Community and Public Affairs, Concordia University
Raimi Osseni, CCEDNet Emerging Leaders
The document discusses a GIS-based transmission line mapping and maintenance system that uses tools like image processing, thematic mapping, and spatial data analysis. It emphasizes using Google Maps and Earth for asset mapping and land base views, and Smallworld for additional analysis capabilities. The system aims to support maintenance planning, reporting, and asset management through an integrated platform.
The document describes the formation of the Washington Coalition for School Libraries and Information Technology (WCS-Lit). The coalition advocates for full-time certified teacher-librarians in every school and fully-funded library materials and technology resources. The coalition envisions equitable access to technology, literacy, and a world-class education for all students in Washington state.
The document discusses ePortfolios, which allow students and teachers to collect artifacts in various media types and connect evidence to goals or standards. ePortfolios engage learners through tools like multimedia and social networking. They facilitate making connections between people, ideas, resources and learning. ePortfolios are defined as a process of collecting, selecting, reflecting on and presenting work rather than just a product or technology. Assessment is an important part of ePortfolios to improve learning.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
2. • Problem: Technological literacy and basic literacy issues, also multi-language
issues…
• Idea:
• Peer to peer level tutoring on how to use a device, its features, menus and the
applications on it.
3. Solution description
• Peer to peer level tutoring on how to use a device, its features, menus and the applications on it.
• On device mechanism to identify what a uses interacts with often and how good he is getting at it.
(user behavior on different applications and areas on the devices )
• Determining efficiency in task performance. E.g. mapping of shortest route to achieving a task based
on number of test, quality of results, frequency of use,
• Prompt user with suggestion to enlist to the service as a peer tutor. By registering, the user creates a
profile, with such information as language, location, which is used in the matching process.
• The pool of enlisted peer tutor becomes a crowd-sourced data center for user support on mobile
devices and applications
• User support/help desk requests are matched and queued to these peer tutors.
• Some of the criteria for matching are location and language allowing for multilingual user support
services extension.
• User behavior monitoring on usage of the device, its features and applications determines who is a
tutor
• Online service with user profiles.
• Queuing mechanism of requests to tutors. E.g. Areas with few tutors, urgency of request, availability
of the tutor, etc.
• Mapping and routing of calls.
5. for the user who joined by
volunteer the system prompts
them to undertake some tests to
on test there level of competency
rs
pe th e
a , a n
or t
u t te e r om p a ti o
t n the registers into the
a lu p r li c
e n system and become a
c om n vo c a ap p Person A
b e oi l so he tutor
To an j m a in t
c st e j o
sy t o
er
us Tutors
Active user
Application
User
Tutor
ap p a u The tutor and
s
i nf l ic at er i n user,have have two
or m io n st a
a l ls
a nd ti o n t he n ways of communicating
pre li k en t t he ,1.audio
f er e e rs
re d h is ba 2. remote access
la n l oc a s ic
g ua t
ge s io n Person B
wh
hi e n t
di s de he
al u
s vi c e se r
in , ha
co the appl s ,
nn ap ica pr
ec
t e p l i t i o ob l
d c e
to ati n, h ms
a on e wi
tu a n s pe t h
to d
r ge e d
ts
7. Tutor using the application
Text
Yes Yes Define Install Audio
Tutor Register? Settings Application
Remote access
No No
Download application
Text
Install Application Audio
Remote access
9. User Volunteer to be a tutor
• Simon is a student at university of Nairobi undertaking a bachelors degree in computer science
• He is a member of various IT forums , where he gets ideas offers help when posted in the forums
• He learns about active users in one of the forums he is involved in
• He goes to the service and registers as the super user tutor
• He registers , inputs his basic information ,
• The basic information entail ,his names ,age ,preferred languages , location and phone number
• He also enters applications that he wants to be a tutor
• He enters three applications , one he indicates his competency level is expect , and the other two
He enters as an intermediate
• the system gives him a set of questions for him to answer to determine his competency level of all
the applications as he has indicated
• in the calendar he picks days that he is available those are days that he doesn’t have classes and he
doesn’t need to study
• On completion he downloads the applications
• soon after starts receiving calls from users on various areas of the applications he had indicated ,
that they need help in.
10. User prompted to be a tutor
• Danni boy is a senior software developer at Corner baridi company
• He owns a Nokia N8 for 1 year that he has been using
• Nokia N8 has logs to there server that they collect data (user behavior)
• From these data they are able to determine , competency level of various users who are using the
device
• They check:
• Frequency of using different areas of the device
• Ease of completion task
• Shortest route they use
• Danni has been using his media player a lot and data collected from his usage indicate he is a
suitable candidate ,
• the application prompts him to join active users ,
• The prompt is a basic information about active user , what it does and how to join by registering to
the system to be a tutor
• He accepts the request and a form pops up for him to fill his basic information (names ,age ,preferred
languages , location and phone number )on completion on registering the application is installed on
his device
• Hence becomes a tutor and connected to users on days available as per his calendar
• The system continue to monitor his user behavior on other areas of his device and discover he is
good at setting up network configuration on his phone , so it notifies him cause he is registered the
information is simply added to his profile and becomes a tutor
11. How useful it is to user
• Caro is a working single mother of three ,
• She buys nokia E71 to help her manage her hectic life (reminders and emails
etc)
• She has never used nokia E71 before hence having a hard time navigating and
using it
• A friend tells her about active user and she installs
• And cause it is optional to register , she decided not to register
• Hence every time she gets stuck using her nokia E71 she speed dials “5” and
automatically opens the application
• And she is able to get connected to the server and get connected to a tutor who
assists her
• She later learns registering helps one define settings like preferred languages,
rate tutors and also tag favorite tutors hence connected to them directly
• So she registers
13. • Henry is a tutor , in active user
Super User
application
• Is a tutor in N8 network configuration Henry Mark
• He is highly rated by users who are 21 years old
connected by him and many of them Nairobi
have tagged him as there favorite tutor Kenya
• Henry can view his profile form the
service and monitor his rating Member since 2011
• For every rating he gets he gains Users helped: 12 users
points ,
• The system monitors the points when Likes: 10
he reaches the minimum points to gets Dislikes: 2
rewarded he is rewarded and Points earned: 20
encouraged to do more cause each Amount earned: $200
level the rewards become bigger
• The rewards come in many forms but
Exit Redeem cash
all depends in different level that the
points get