SlideShare a Scribd company logo
Unit II: The Needs of Computation
Human’s Everyday Life ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human’s Problem-Solving ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human’s Problem-Solving ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computing, Computation, and Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The difference between humans and computing machines ,[object Object],input think act
The difference between humans and computing machines ,[object Object],input compute act    
Transformation input think act input compute act    
Transformation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],   
Transformation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],think compute
Representation of the World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computation in Different Number Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Binary System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Binary System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Binary Computing System  ,[object Object],[object Object],[object Object],01111 00011 10010 15 3 + 10 + 2 18
Problem-solving using “computers” ,[object Object],A Problem Describing  The Problem in Math. “ Computing” The  Corresponding Math.  Problem Returning The Result Solution  To The  Problem Human problem-solving v.s. computer-based problem-solving
Conclusion  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

ICANN Rules vs Privacy
ICANN Rules vs PrivacyICANN Rules vs Privacy
ICANN Rules vs Privacy
Blacknight
 
Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2
Nasir Jumani
 
Introduction of Computer Network
Introduction of Computer NetworkIntroduction of Computer Network
Introduction of Computer Network
chouhanankit03
 
Infobrokering And Searching The Deep Web
Infobrokering And Searching The Deep WebInfobrokering And Searching The Deep Web
Infobrokering And Searching The Deep Web
Witold Kozakiewicz
 
Power Point Lesson 06
Power Point Lesson 06Power Point Lesson 06
Power Point Lesson 06
Nasir Jumani
 
A brief history of home computer technology
A brief history of home computer technologyA brief history of home computer technology
A brief history of home computer technology
venusanderson225
 
History of Computer
History of ComputerHistory of Computer
History of Computer
jordonestrada25
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep Web
Wendy DeGroat
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
Dan Goldstein
 
ICANN 51: DNS Risk Framework
ICANN 51: DNS Risk FrameworkICANN 51: DNS Risk Framework
ICANN 51: DNS Risk Framework
ICANN
 
Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!
Mohammad kermani
 
Setting standards-friendly web type
Setting standards-friendly web typeSetting standards-friendly web type
Setting standards-friendly web type
Pascal Klein
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
Nasir Jumani
 
Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.
Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.
Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.
Jaime P
 
Why do some people believe in myths?
Why do some people believe in myths?Why do some people believe in myths?
Why do some people believe in myths?
Aurora Computer Studies
 
Left, right or middle
Left, right or middleLeft, right or middle
Left, right or middle
Brent Heard
 
Brief History of the PC
Brief History of the PCBrief History of the PC
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
APNIC
 
World Geography: Sample PowerPoint
World Geography: Sample PowerPointWorld Geography: Sample PowerPoint
World Geography: Sample PowerPoint
Julia Hemmings
 

Viewers also liked (19)

ICANN Rules vs Privacy
ICANN Rules vs PrivacyICANN Rules vs Privacy
ICANN Rules vs Privacy
 
Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2
 
Introduction of Computer Network
Introduction of Computer NetworkIntroduction of Computer Network
Introduction of Computer Network
 
Infobrokering And Searching The Deep Web
Infobrokering And Searching The Deep WebInfobrokering And Searching The Deep Web
Infobrokering And Searching The Deep Web
 
Power Point Lesson 06
Power Point Lesson 06Power Point Lesson 06
Power Point Lesson 06
 
A brief history of home computer technology
A brief history of home computer technologyA brief history of home computer technology
A brief history of home computer technology
 
History of Computer
History of ComputerHistory of Computer
History of Computer
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep Web
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
ICANN 51: DNS Risk Framework
ICANN 51: DNS Risk FrameworkICANN 51: DNS Risk Framework
ICANN 51: DNS Risk Framework
 
Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!Introduction to network ( Internet and its layer) Or how internet really works!
Introduction to network ( Internet and its layer) Or how internet really works!
 
Setting standards-friendly web type
Setting standards-friendly web typeSetting standards-friendly web type
Setting standards-friendly web type
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
 
Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.
Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.
Hiroshima i Nagasaki. 4t ESO. Ies Josep Tapiró.
 
Why do some people believe in myths?
Why do some people believe in myths?Why do some people believe in myths?
Why do some people believe in myths?
 
Left, right or middle
Left, right or middleLeft, right or middle
Left, right or middle
 
Brief History of the PC
Brief History of the PCBrief History of the PC
Brief History of the PC
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
 
World Geography: Sample PowerPoint
World Geography: Sample PowerPointWorld Geography: Sample PowerPoint
World Geography: Sample PowerPoint
 

Similar to The Needs Of Computation

06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptx06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptx
SaharA84
 
Foundation for computational computing
Foundation for computational computingFoundation for computational computing
Foundation for computational computing
ramled931
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
DHANIK VIKRANT
 
Introduction to computer sciences
Introduction to computer sciencesIntroduction to computer sciences
Introduction to computer sciences
fikirabc
 
Artificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptxArtificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptx
honeydv1979
 
Computer Systems Foundation General
Computer Systems Foundation GeneralComputer Systems Foundation General
Computer Systems Foundation General
mrcarty
 
Introduction to CS
Introduction to CSIntroduction to CS
Introduction to CS
MariusBujorianu1
 
Computer application in mgt www.it-workss.com
Computer application in mgt   www.it-workss.comComputer application in mgt   www.it-workss.com
Computer application in mgt www.it-workss.com
Varunraj Kalse
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
Remaisha Ali
 
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTINGINTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
sharock2
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
Praveen M Jigajinni
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptx
mehrajdin18
 
Computer science basic
Computer science basicComputer science basic
Computer science basic
RentBooks now
 
5_6174859010987000554.pdf
5_6174859010987000554.pdf5_6174859010987000554.pdf
5_6174859010987000554.pdf
ssuserf39aa4
 
IT and Computing
   IT and Computing   IT and Computing
IT and Computing
MiXvideos
 
Introduction to Computer Fundamentals
Introduction to Computer FundamentalsIntroduction to Computer Fundamentals
Introduction to Computer Fundamentals
shivanichauhan1953
 
Uses Of Calculus is Computer Science
Uses Of Calculus is Computer ScienceUses Of Calculus is Computer Science
Uses Of Calculus is Computer Science
Arnob Khan
 
introduction to it
introduction to itintroduction to it
introduction to it
Shahi Raz Akhtar
 
Computer notes
Computer notesComputer notes
Computer notes
Durgashankar Rana
 
ICT Lecture 1 -Computer Systems and Ergonomics.pdf
ICT Lecture 1 -Computer Systems and Ergonomics.pdfICT Lecture 1 -Computer Systems and Ergonomics.pdf
ICT Lecture 1 -Computer Systems and Ergonomics.pdf
joshielq
 

Similar to The Needs Of Computation (20)

06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptx06-01 Machine Learning and Linear Regression.pptx
06-01 Machine Learning and Linear Regression.pptx
 
Foundation for computational computing
Foundation for computational computingFoundation for computational computing
Foundation for computational computing
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Introduction to computer sciences
Introduction to computer sciencesIntroduction to computer sciences
Introduction to computer sciences
 
Artificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptxArtificial Intteligence-unit 1.pptx
Artificial Intteligence-unit 1.pptx
 
Computer Systems Foundation General
Computer Systems Foundation GeneralComputer Systems Foundation General
Computer Systems Foundation General
 
Introduction to CS
Introduction to CSIntroduction to CS
Introduction to CS
 
Computer application in mgt www.it-workss.com
Computer application in mgt   www.it-workss.comComputer application in mgt   www.it-workss.com
Computer application in mgt www.it-workss.com
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTINGINTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptx
 
Computer science basic
Computer science basicComputer science basic
Computer science basic
 
5_6174859010987000554.pdf
5_6174859010987000554.pdf5_6174859010987000554.pdf
5_6174859010987000554.pdf
 
IT and Computing
   IT and Computing   IT and Computing
IT and Computing
 
Introduction to Computer Fundamentals
Introduction to Computer FundamentalsIntroduction to Computer Fundamentals
Introduction to Computer Fundamentals
 
Uses Of Calculus is Computer Science
Uses Of Calculus is Computer ScienceUses Of Calculus is Computer Science
Uses Of Calculus is Computer Science
 
introduction to it
introduction to itintroduction to it
introduction to it
 
Computer notes
Computer notesComputer notes
Computer notes
 
ICT Lecture 1 -Computer Systems and Ergonomics.pdf
ICT Lecture 1 -Computer Systems and Ergonomics.pdfICT Lecture 1 -Computer Systems and Ergonomics.pdf
ICT Lecture 1 -Computer Systems and Ergonomics.pdf
 

More from Nasir Jumani

Introduction to Machine Vision
Introduction to Machine VisionIntroduction to Machine Vision
Introduction to Machine Vision
Nasir Jumani
 
Power Point Lesson 08 P2
Power Point Lesson 08 P2Power Point Lesson 08 P2
Power Point Lesson 08 P2
Nasir Jumani
 
Power Point Lesson 09 Part 1
Power Point Lesson 09 Part 1Power Point Lesson 09 Part 1
Power Point Lesson 09 Part 1
Nasir Jumani
 
Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2
Nasir Jumani
 
Power Point Lesson 07 P2
Power Point Lesson 07 P2Power Point Lesson 07 P2
Power Point Lesson 07 P2
Nasir Jumani
 
Power Point Lesson 10 Part1
Power Point  Lesson 10  Part1Power Point  Lesson 10  Part1
Power Point Lesson 10 Part1
Nasir Jumani
 
Power Point Lesson 07 P1
Power Point  Lesson 07  P1Power Point  Lesson 07  P1
Power Point Lesson 07 P1
Nasir Jumani
 
Power Point Lesson 04
Power Point  Lesson 04Power Point  Lesson 04
Power Point Lesson 04
Nasir Jumani
 
Power Point Lesson 05
Power Point  Lesson 05Power Point  Lesson 05
Power Point Lesson 05
Nasir Jumani
 
Number Systems
Number  SystemsNumber  Systems
Number Systems
Nasir Jumani
 
Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03
Nasir Jumani
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
Nasir Jumani
 
Power Point Lesson 02
Power Point Lesson 02Power Point Lesson 02
Power Point Lesson 02
Nasir Jumani
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
Nasir Jumani
 

More from Nasir Jumani (14)

Introduction to Machine Vision
Introduction to Machine VisionIntroduction to Machine Vision
Introduction to Machine Vision
 
Power Point Lesson 08 P2
Power Point Lesson 08 P2Power Point Lesson 08 P2
Power Point Lesson 08 P2
 
Power Point Lesson 09 Part 1
Power Point Lesson 09 Part 1Power Point Lesson 09 Part 1
Power Point Lesson 09 Part 1
 
Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2
 
Power Point Lesson 07 P2
Power Point Lesson 07 P2Power Point Lesson 07 P2
Power Point Lesson 07 P2
 
Power Point Lesson 10 Part1
Power Point  Lesson 10  Part1Power Point  Lesson 10  Part1
Power Point Lesson 10 Part1
 
Power Point Lesson 07 P1
Power Point  Lesson 07  P1Power Point  Lesson 07  P1
Power Point Lesson 07 P1
 
Power Point Lesson 04
Power Point  Lesson 04Power Point  Lesson 04
Power Point Lesson 04
 
Power Point Lesson 05
Power Point  Lesson 05Power Point  Lesson 05
Power Point Lesson 05
 
Number Systems
Number  SystemsNumber  Systems
Number Systems
 
Power Point Lesson 03
Power Point  Lesson 03Power Point  Lesson 03
Power Point Lesson 03
 
Power Point Lesson 01
Power Point Lesson 01Power Point Lesson 01
Power Point Lesson 01
 
Power Point Lesson 02
Power Point Lesson 02Power Point Lesson 02
Power Point Lesson 02
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

The Needs Of Computation