TINTIN is a tool for incremental integrity checking of SQL assertions. It currently runs on SQL server but it may easily be adapted to other relational DBMSs
El documento describe las características y responsabilidades de los servidores públicos. Explica que los servidores públicos prestan servicios al Estado a través de instituciones estatales como hospitales, escuelas y fuerzas de seguridad. Administran recursos estatales por lo que deben comportarse de manera intachable e honesta para proteger los intereses de la sociedad. También se detallan las diferentes categorías de servidores públicos y su régimen laboral.
O documento discute a violência urbana à luz dos ensinamentos espíritas. Aponta que a indignação popular com a violência não resolve o problema e pode envenenar os pensamentos. Defende que os espíritas devem entender que todos, inclusive criminosos, são irmãos em progresso e que a reabilitação, e não apenas o encarceramento, é necessária. Conclui que cada um constrói seu futuro com suas ações, e que a compreensão espírita pode ajudar a lidar com as mazelas sociais de forma construtiva.
Funky Renewables is a renewable energy company that provides flexible solutions using various renewable technologies like solar PV, wind, heat pumps, and biomass. They pride themselves on using high quality, long lasting components from partners in Germany and elsewhere in Europe. Their mission is to install renewable systems to the highest standards using qualified technicians while offering strong warranties and customer service.
VV Mineral Mining Dismisses Allegations Against Companyshiva rajan
VV Mineral Mining has dismissed allegations against the company for illegal beach mining in Tamil Nadu's Tuticorin district that has caused heavy beach erosion and corrosion issues in neighboring villages. The former district collector, Ashish Kumar, had investigated these allegations but was later transferred, though there is no evidence the transfer was due to political connections. VV Mineral stated the allegations were baseless and motivated. However, the first District Collector, V Sundaram, had written a letter accusing VV Mineral of illegal mining worth over Rs. 96,000 crores and favoritism shown by state government departments to the company. The founder of VV Mineral dismissed the allegations as a conspiracy by business rivals.
This document discusses an arbitration case between AT&T and Saudi Cable Company regarding a $4.5 billion telecommunications project in Saudi Arabia. AT&T and Saudi Cable had partnered to bid for the project but later disagreed on the terms of their final commercial contract. AT&T filed for arbitration claiming the pre-bid agreement was terminated, while Saudi Cable counterclaimed that AT&T failed to negotiate in good faith. Both parties agreed to an arbitrator, but Saudi Cable later challenged his impartiality. Both the ICC and English courts reviewed the challenge and found no evidence of apparent bias by the arbitrator.
RE-DELAYS: Documenting and analising the cost of regulatory delaysIEA_RETD
IEA-RETD investigated the costs of regulatory delays for the growth and economic potential of the renewable energy industry. Key recommendations from the RE-DELAYS project are:
• Streamline the regulatory processes by creating a one stop shop with simplified rules for applications.
• Increase accountability for decision making processes at the regulatory/governmental level, for example in the form of pre-determined fines associated with not achieving set milestones.
• Link the level of incentive such as FIT to delay.
• Define clear procedures and cost impact assessment of appeal processes.
• Inform the public about benefits and risks of RE and encourage consultative mechanisms to share concerns.
The project was carried out by 3E together with London Economics International LLC (LEI).
RES-T-NEXT, IEA RETD workshop in London, 26th August 2015IEA_RETD
IEA-RETD Report: Next Generation Policy Instruments for Renewable Transport (RES-T-NEXT)
David de Jager, Operating Agent IEA-RETD
The RES-T-Next project aims at providing an analysis of next generation RES-T policy instruments and recommendations regarding private and urban transport in order to increase the level of energy used from renewable sources and to decrease GHG emissions.
El documento describe las características y responsabilidades de los servidores públicos. Explica que los servidores públicos prestan servicios al Estado a través de instituciones estatales como hospitales, escuelas y fuerzas de seguridad. Administran recursos estatales por lo que deben comportarse de manera intachable e honesta para proteger los intereses de la sociedad. También se detallan las diferentes categorías de servidores públicos y su régimen laboral.
O documento discute a violência urbana à luz dos ensinamentos espíritas. Aponta que a indignação popular com a violência não resolve o problema e pode envenenar os pensamentos. Defende que os espíritas devem entender que todos, inclusive criminosos, são irmãos em progresso e que a reabilitação, e não apenas o encarceramento, é necessária. Conclui que cada um constrói seu futuro com suas ações, e que a compreensão espírita pode ajudar a lidar com as mazelas sociais de forma construtiva.
Funky Renewables is a renewable energy company that provides flexible solutions using various renewable technologies like solar PV, wind, heat pumps, and biomass. They pride themselves on using high quality, long lasting components from partners in Germany and elsewhere in Europe. Their mission is to install renewable systems to the highest standards using qualified technicians while offering strong warranties and customer service.
VV Mineral Mining Dismisses Allegations Against Companyshiva rajan
VV Mineral Mining has dismissed allegations against the company for illegal beach mining in Tamil Nadu's Tuticorin district that has caused heavy beach erosion and corrosion issues in neighboring villages. The former district collector, Ashish Kumar, had investigated these allegations but was later transferred, though there is no evidence the transfer was due to political connections. VV Mineral stated the allegations were baseless and motivated. However, the first District Collector, V Sundaram, had written a letter accusing VV Mineral of illegal mining worth over Rs. 96,000 crores and favoritism shown by state government departments to the company. The founder of VV Mineral dismissed the allegations as a conspiracy by business rivals.
This document discusses an arbitration case between AT&T and Saudi Cable Company regarding a $4.5 billion telecommunications project in Saudi Arabia. AT&T and Saudi Cable had partnered to bid for the project but later disagreed on the terms of their final commercial contract. AT&T filed for arbitration claiming the pre-bid agreement was terminated, while Saudi Cable counterclaimed that AT&T failed to negotiate in good faith. Both parties agreed to an arbitrator, but Saudi Cable later challenged his impartiality. Both the ICC and English courts reviewed the challenge and found no evidence of apparent bias by the arbitrator.
RE-DELAYS: Documenting and analising the cost of regulatory delaysIEA_RETD
IEA-RETD investigated the costs of regulatory delays for the growth and economic potential of the renewable energy industry. Key recommendations from the RE-DELAYS project are:
• Streamline the regulatory processes by creating a one stop shop with simplified rules for applications.
• Increase accountability for decision making processes at the regulatory/governmental level, for example in the form of pre-determined fines associated with not achieving set milestones.
• Link the level of incentive such as FIT to delay.
• Define clear procedures and cost impact assessment of appeal processes.
• Inform the public about benefits and risks of RE and encourage consultative mechanisms to share concerns.
The project was carried out by 3E together with London Economics International LLC (LEI).
RES-T-NEXT, IEA RETD workshop in London, 26th August 2015IEA_RETD
IEA-RETD Report: Next Generation Policy Instruments for Renewable Transport (RES-T-NEXT)
David de Jager, Operating Agent IEA-RETD
The RES-T-Next project aims at providing an analysis of next generation RES-T policy instruments and recommendations regarding private and urban transport in order to increase the level of energy used from renewable sources and to decrease GHG emissions.
TINTIN is a tool for incrementally checking integrity constraints defined on SQL databases. It captures proposed data changes and checks if they would violate any constraints, rather than re-checking all data. TINTIN works by translating SQL constraints into logical rules, then generating incremental consistency checks based on the changes. It was shown to check constraints more efficiently than non-incremental approaches. Future work includes supporting more complex SQL features in constraints.
The document discusses SQL and common table expressions (CTE). It provides an example of using a CTE to query hierarchical data and print an organization structure tree by recursively joining the CTE to itself. Administrative commands can also be executed through SQL using the ADMIN_CMD stored procedure.
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
You have well-managed systems, but demand continues to increase to manage tablets and devices. The additional manageability features of Windows 10 also add a new possibility to manage mobile devices completely on premises. When should you use Intune, Configuration Manager, or both? Join this session to learn about best practices and explore scenarios to understand the best management strategy for your enterprise.
The World Outside - The Blind Spot of TDDAmit Anafy
The document discusses the limitations of test-driven development (TDD) and how it can lead developers to be overconfident in their integration testing. It describes a situation where the author's microservice passed its own unit and integration tests but caused errors when integrated with another service due to inconsistencies in how data was handled between the services. The author learned that implicit tests are not enough and that internal and external data types need to be separated and explicitly tested to avoid integration issues being missed.
GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Per...GlobalLogic Ukraine
16 грудня 2021 року відбувся GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Personal Skill”! Анатолій Сахно (Software Testing Consultant, GlobalLogic) розібрав принципи TDD (розробки, керованої тестами) та приклади їх застосування. Крім того, поговорили про:
- Ефективне використання модульних тестів у повсякденних задачах;
- Використання TDD при розробці тестових фреймворків;
- Застосування принципів TDD при написанні функціональних автотестів.
Більше про захід: https://www.globallogic.com/ua/about/events/globallogic-test-automation-online-techtalk-test-driven-development-as-a-personal-skill/
Приємного перегляду і не забудьте залишити коментар про враження від TechTalk!
Ця активність — частина заходів в рамках GlobalLogic Test Automation Advent Calendar, ще більше заходів та цікавинок за посиланням: https://bit.ly/AdventCalendar_fb
Hyper-pragmatic Pure FP testing with distage-testkit7mind
Having a proper test suite can turn ongoing application maintenance and development into pure joy – the best tests check meaningful properties, not the implementation details, and hold no impliict assumptions about their test environment - every test case must be self-contained and portable. To ensure that tests are free of implementation details and environment dependency, we may simply run them in a different test environment, with different implementations of components. But the boileplate and manual work involved in rewiring components, writing hardcoded fixtures and setting up different test environments make this very hard to do at scale. To tackle this problem we've created distage & distage-testkit, distage-testkit gives you the following superpowers:
* ability to easily swap out individual components or entire test environments
* principled & leak-free control of global resources for integration testing – docker containers, DBs, DDLs
* execute effects or allocate resources per-test, e.g. generate random fixtures per-test
* first-class testing of functional effects
* write tests as lambdas – access test fixtures via parameters or ZIO Environment
...and more! We'll also discuss general testing practices and what really distinguishes good tests from great tests.
This document discusses unit testing and why it is important for software developers. It provides an overview of unit testing, including what unit testing is, why we should do it, how the testing process works. It then gives a example of unit testing a sample photo gallery app, demonstrating how to test models, services, and view models. It also covers best practices for unit testing like mocking dependencies and using stubs to generate test data.
The document discusses the Dependency Inversion Principle (DIP), which states that high-level modules should not depend on low-level modules, both should depend on abstractions. It defines DIP and provides examples of how to implement dependency injection through interface injection, setter injection, and constructor injection. The key benefit of DIP is that it reduces coupling between modules and allows for loose coupling through abstraction.
Alex conrad - Pyramid Tweens (PloneConf 2011)aconrad
Pyramid tweens are middlewares that sit between Pyramid code and application views. They can be used to apply common behavior to all requests. Tween factories are called at application startup and return a tween function that is called per request. Tweens can be positioned implicitly by the order they are added, with hints using tween constants, or explicitly in the ini file. Common tweens include pyramid_debugtoolbar and pyramid_tm.
The document provides an overview of TrustInSoft's approach to mathematically guaranteeing bug-free C and C++ code through formal methods. It discusses examples of applying formal verification to real-world codebases, including an airplane code in 2006, the PolarSSL cryptography library in 2016, and the PlayStation in 2019. The document outlines a "journey to bug free software" with increasing levels of rigor from testing to full mathematical guarantees. It presents toy examples and semantic patterns to detect vulnerabilities. Overall, the document promotes TrustInSoft's static analysis tools for verifying absence of bugs in safety-critical systems code.
Slides of the talk gave to Devoxx with José Paumard about new features coming in CDI 2. Java SE support, asynchronous event, Interceptor on producers...
UEMB270: Software Distribution Under The HoodIvanti
This document summarizes the processes and workflow involved in software distribution tasks using Ivanti Interchange. It describes how tasks are created by the scheduler service on the core server and pushed to managed devices. The task handler proxy gathers task information from the database and sends it to the policy task handler, which discovers devices and pushes commands. The policy is published to the APM service and downloaded by PolicySync on devices. Troubleshooting tips are provided for issues on the core server or client side. An overview of changes coming to the portal manager is also provided.
Agile Development of High Performance ApplicationsFabian Lange
Slides from my talk at gearconf 2010 in Düsseldorf, discussing Performance as an important non-functional requirement. Because NFRs are hard to test, I showed how AppDynamics Lite could be used to ease pain and build better performing apps.
If you are interested in performance and application performance monitoring, visit our blog:
http://blog.codecentric.de/en/category/performance-en/
If you want to try appdynamics lite yourself, download it at http://appdynamics.com/free
You will learn what is Security Development Lifecycle (SDL).
You will understand why SDL is important.
You will dive in details of SDL and you will see tips for each SDL phase.
You will realize how to roll out an SDL in your organization.
Finally, you will have all skills to deliver a secure product.
This presentation covers the below recent solutions created by me.
1. Text Analytics and Data security
2. Image Flip, compress automation and Inline display in dashboard
3. User Creation and security Automation
The document discusses various tools for monitoring IBM Cognos TM1 servers, including:
1) Using JMeter with the TM1 plugin to monitor servers dynamically or analyze log files statically.
2) Using the TM1 Operations Console to monitor application server metrics and configure watchdog rules to kill processes.
3) Checking the }ClientProperties cube or enabling login logging to monitor user activity.
4) Configuring Windows Error Reporting to capture crash dumps without additional software.
Droidcon it 2015: Android Lollipop for EnterpriseConsulthinkspa
Android Lollipop introduced several new security features for enterprise mobile device management including enhanced SELinux policies, Smart Lock, Device Protection, the Device Administration API, and Managed Profiles. It also improved data encryption with faster encryption of only used blocks and support for encryption without password. These features help provide a more secure environment for enterprise mobility.
Continuous Delivery and Automated Operations on k8s with keptnAndreas Grabner
Slidedeck from Vienna DevOps & Security Meetup. This talk is keptn - an open source event driven control plane for continuous delivery and automated operations for kubernetes
This document provides an introduction to JUnit, a unit testing framework for Java. It discusses why unit testing is important, how to write and organize JUnit tests, how to use assertions and mocks, and how to integrate JUnit with IDEs and build tools like Maven and Ant. Key aspects covered include the benefits of unit testing, the core components and design of JUnit, best practices for test-driven development and test maintenance, and resources for learning more about JUnit.
Nashik's top web development company, Upturn India Technologies, crafts innovative digital solutions for your success. Partner with us and achieve your goals
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...Luigi Fugaro
Vector databases are transforming how we handle data, allowing us to search through text, images, and audio by converting them into vectors. Today, we'll dive into the basics of this exciting technology and discuss its potential to revolutionize our next-generation AI applications. We'll examine typical uses for these databases and the essential tools
developers need. Plus, we'll zoom in on the advanced capabilities of vector search and semantic caching in Java, showcasing these through a live demo with Redis libraries. Get ready to see how these powerful tools can change the game!
TINTIN is a tool for incrementally checking integrity constraints defined on SQL databases. It captures proposed data changes and checks if they would violate any constraints, rather than re-checking all data. TINTIN works by translating SQL constraints into logical rules, then generating incremental consistency checks based on the changes. It was shown to check constraints more efficiently than non-incremental approaches. Future work includes supporting more complex SQL features in constraints.
The document discusses SQL and common table expressions (CTE). It provides an example of using a CTE to query hierarchical data and print an organization structure tree by recursively joining the CTE to itself. Administrative commands can also be executed through SQL using the ADMIN_CMD stored procedure.
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
You have well-managed systems, but demand continues to increase to manage tablets and devices. The additional manageability features of Windows 10 also add a new possibility to manage mobile devices completely on premises. When should you use Intune, Configuration Manager, or both? Join this session to learn about best practices and explore scenarios to understand the best management strategy for your enterprise.
The World Outside - The Blind Spot of TDDAmit Anafy
The document discusses the limitations of test-driven development (TDD) and how it can lead developers to be overconfident in their integration testing. It describes a situation where the author's microservice passed its own unit and integration tests but caused errors when integrated with another service due to inconsistencies in how data was handled between the services. The author learned that implicit tests are not enough and that internal and external data types need to be separated and explicitly tested to avoid integration issues being missed.
GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Per...GlobalLogic Ukraine
16 грудня 2021 року відбувся GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Personal Skill”! Анатолій Сахно (Software Testing Consultant, GlobalLogic) розібрав принципи TDD (розробки, керованої тестами) та приклади їх застосування. Крім того, поговорили про:
- Ефективне використання модульних тестів у повсякденних задачах;
- Використання TDD при розробці тестових фреймворків;
- Застосування принципів TDD при написанні функціональних автотестів.
Більше про захід: https://www.globallogic.com/ua/about/events/globallogic-test-automation-online-techtalk-test-driven-development-as-a-personal-skill/
Приємного перегляду і не забудьте залишити коментар про враження від TechTalk!
Ця активність — частина заходів в рамках GlobalLogic Test Automation Advent Calendar, ще більше заходів та цікавинок за посиланням: https://bit.ly/AdventCalendar_fb
Hyper-pragmatic Pure FP testing with distage-testkit7mind
Having a proper test suite can turn ongoing application maintenance and development into pure joy – the best tests check meaningful properties, not the implementation details, and hold no impliict assumptions about their test environment - every test case must be self-contained and portable. To ensure that tests are free of implementation details and environment dependency, we may simply run them in a different test environment, with different implementations of components. But the boileplate and manual work involved in rewiring components, writing hardcoded fixtures and setting up different test environments make this very hard to do at scale. To tackle this problem we've created distage & distage-testkit, distage-testkit gives you the following superpowers:
* ability to easily swap out individual components or entire test environments
* principled & leak-free control of global resources for integration testing – docker containers, DBs, DDLs
* execute effects or allocate resources per-test, e.g. generate random fixtures per-test
* first-class testing of functional effects
* write tests as lambdas – access test fixtures via parameters or ZIO Environment
...and more! We'll also discuss general testing practices and what really distinguishes good tests from great tests.
This document discusses unit testing and why it is important for software developers. It provides an overview of unit testing, including what unit testing is, why we should do it, how the testing process works. It then gives a example of unit testing a sample photo gallery app, demonstrating how to test models, services, and view models. It also covers best practices for unit testing like mocking dependencies and using stubs to generate test data.
The document discusses the Dependency Inversion Principle (DIP), which states that high-level modules should not depend on low-level modules, both should depend on abstractions. It defines DIP and provides examples of how to implement dependency injection through interface injection, setter injection, and constructor injection. The key benefit of DIP is that it reduces coupling between modules and allows for loose coupling through abstraction.
Alex conrad - Pyramid Tweens (PloneConf 2011)aconrad
Pyramid tweens are middlewares that sit between Pyramid code and application views. They can be used to apply common behavior to all requests. Tween factories are called at application startup and return a tween function that is called per request. Tweens can be positioned implicitly by the order they are added, with hints using tween constants, or explicitly in the ini file. Common tweens include pyramid_debugtoolbar and pyramid_tm.
The document provides an overview of TrustInSoft's approach to mathematically guaranteeing bug-free C and C++ code through formal methods. It discusses examples of applying formal verification to real-world codebases, including an airplane code in 2006, the PolarSSL cryptography library in 2016, and the PlayStation in 2019. The document outlines a "journey to bug free software" with increasing levels of rigor from testing to full mathematical guarantees. It presents toy examples and semantic patterns to detect vulnerabilities. Overall, the document promotes TrustInSoft's static analysis tools for verifying absence of bugs in safety-critical systems code.
Slides of the talk gave to Devoxx with José Paumard about new features coming in CDI 2. Java SE support, asynchronous event, Interceptor on producers...
UEMB270: Software Distribution Under The HoodIvanti
This document summarizes the processes and workflow involved in software distribution tasks using Ivanti Interchange. It describes how tasks are created by the scheduler service on the core server and pushed to managed devices. The task handler proxy gathers task information from the database and sends it to the policy task handler, which discovers devices and pushes commands. The policy is published to the APM service and downloaded by PolicySync on devices. Troubleshooting tips are provided for issues on the core server or client side. An overview of changes coming to the portal manager is also provided.
Agile Development of High Performance ApplicationsFabian Lange
Slides from my talk at gearconf 2010 in Düsseldorf, discussing Performance as an important non-functional requirement. Because NFRs are hard to test, I showed how AppDynamics Lite could be used to ease pain and build better performing apps.
If you are interested in performance and application performance monitoring, visit our blog:
http://blog.codecentric.de/en/category/performance-en/
If you want to try appdynamics lite yourself, download it at http://appdynamics.com/free
You will learn what is Security Development Lifecycle (SDL).
You will understand why SDL is important.
You will dive in details of SDL and you will see tips for each SDL phase.
You will realize how to roll out an SDL in your organization.
Finally, you will have all skills to deliver a secure product.
This presentation covers the below recent solutions created by me.
1. Text Analytics and Data security
2. Image Flip, compress automation and Inline display in dashboard
3. User Creation and security Automation
The document discusses various tools for monitoring IBM Cognos TM1 servers, including:
1) Using JMeter with the TM1 plugin to monitor servers dynamically or analyze log files statically.
2) Using the TM1 Operations Console to monitor application server metrics and configure watchdog rules to kill processes.
3) Checking the }ClientProperties cube or enabling login logging to monitor user activity.
4) Configuring Windows Error Reporting to capture crash dumps without additional software.
Droidcon it 2015: Android Lollipop for EnterpriseConsulthinkspa
Android Lollipop introduced several new security features for enterprise mobile device management including enhanced SELinux policies, Smart Lock, Device Protection, the Device Administration API, and Managed Profiles. It also improved data encryption with faster encryption of only used blocks and support for encryption without password. These features help provide a more secure environment for enterprise mobility.
Continuous Delivery and Automated Operations on k8s with keptnAndreas Grabner
Slidedeck from Vienna DevOps & Security Meetup. This talk is keptn - an open source event driven control plane for continuous delivery and automated operations for kubernetes
This document provides an introduction to JUnit, a unit testing framework for Java. It discusses why unit testing is important, how to write and organize JUnit tests, how to use assertions and mocks, and how to integrate JUnit with IDEs and build tools like Maven and Ant. Key aspects covered include the benefits of unit testing, the core components and design of JUnit, best practices for test-driven development and test maintenance, and resources for learning more about JUnit.
Nashik's top web development company, Upturn India Technologies, crafts innovative digital solutions for your success. Partner with us and achieve your goals
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...Luigi Fugaro
Vector databases are transforming how we handle data, allowing us to search through text, images, and audio by converting them into vectors. Today, we'll dive into the basics of this exciting technology and discuss its potential to revolutionize our next-generation AI applications. We'll examine typical uses for these databases and the essential tools
developers need. Plus, we'll zoom in on the advanced capabilities of vector search and semantic caching in Java, showcasing these through a live demo with Redis libraries. Get ready to see how these powerful tools can change the game!
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...kalichargn70th171
In today's fiercely competitive mobile app market, the role of the QA team is pivotal for continuous improvement and sustained success. Effective testing strategies are essential to navigate the challenges confidently and precisely. Ensuring the perfection of mobile apps before they reach end-users requires thoughtful decisions in the testing plan.
How GenAI Can Improve Supplier Performance Management.pdfZycus
Data Collection and Analysis with GenAI enables organizations to gather, analyze, and visualize vast amounts of supplier data, identifying key performance indicators and trends. Predictive analytics forecast future supplier performance, mitigating risks and seizing opportunities. Supplier segmentation allows for tailored management strategies, optimizing resource allocation. Automated scorecards and reporting provide real-time insights, enhancing transparency and tracking progress. Collaboration is fostered through GenAI-powered platforms, driving continuous improvement. NLP analyzes unstructured feedback, uncovering deeper insights into supplier relationships. Simulation and scenario planning tools anticipate supply chain disruptions, supporting informed decision-making. Integration with existing systems enhances data accuracy and consistency. McKinsey estimates GenAI could deliver $2.6 trillion to $4.4 trillion in economic benefits annually across industries, revolutionizing procurement processes and delivering significant ROI.
Superpower Your Apache Kafka Applications Development with Complementary Open...Paul Brebner
Kafka Summit talk (Bangalore, India, May 2, 2024, https://events.bizzabo.com/573863/agenda/session/1300469 )
Many Apache Kafka use cases take advantage of Kafka’s ability to integrate multiple heterogeneous systems for stream processing and real-time machine learning scenarios. But Kafka also exists in a rich ecosystem of related but complementary stream processing technologies and tools, particularly from the open-source community. In this talk, we’ll take you on a tour of a selection of complementary tools that can make Kafka even more powerful. We’ll focus on tools for stream processing and querying, streaming machine learning, stream visibility and observation, stream meta-data, stream visualisation, stream development including testing and the use of Generative AI and LLMs, and stream performance and scalability. By the end you will have a good idea of the types of Kafka “superhero” tools that exist, which are my favourites (and what superpowers they have), and how they combine to save your Kafka applications development universe from swamploads of data stagnation monsters!
Stork Product Overview: An AI-Powered Autonomous Delivery FleetVince Scalabrino
Imagine a world where instead of blue and brown trucks dropping parcels on our porches, a buzzing drove of drones delivered our goods. Now imagine those drones are controlled by 3 purpose-built AI designed to ensure all packages were delivered as quickly and as economically as possible That's what Stork is all about.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
React.js, a JavaScript library developed by Facebook, has gained immense popularity for building user interfaces, especially for single-page applications. Over the years, React has evolved and expanded its capabilities, becoming a preferred choice for mobile app development. This article will explore why React.js is an excellent choice for the Best Mobile App development company in Noida.
Visit Us For Information: https://www.linkedin.com/pulse/what-makes-reactjs-stand-out-mobile-app-development-rajesh-rai-pihvf/
Penify - Let AI do the Documentation, you write the Code.KrishnaveniMohan1
Penify automates the software documentation process for Git repositories. Every time a code modification is merged into "main", Penify uses a Large Language Model to generate documentation for the updated code. This automation covers multiple documentation layers, including InCode Documentation, API Documentation, Architectural Documentation, and PR documentation, each designed to improve different aspects of the development process. By taking over the entire documentation process, Penify tackles the common problem of documentation becoming outdated as the code evolves.
https://www.penify.dev/
Orca: Nocode Graphical Editor for Container OrchestrationPedro J. Molina
Tool demo on CEDI/SISTEDES/JISBD2024 at A Coruña, Spain. 2024.06.18
"Orca: Nocode Graphical Editor for Container Orchestration"
by Pedro J. Molina PhD. from Metadev
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...kalichargn70th171
Visual testing plays a vital role in ensuring that software products meet the aesthetic requirements specified by clients in functional and non-functional specifications. In today's highly competitive digital landscape, users expect a seamless and visually appealing online experience. Visual testing, also known as automated UI testing or visual regression testing, verifies the accuracy of the visual elements that users interact with.
WWDC 2024 Keynote Review: For CocoaCoders AustinPatrick Weigel
Overview of WWDC 2024 Keynote Address.
Covers: Apple Intelligence, iOS18, macOS Sequoia, iPadOS, watchOS, visionOS, and Apple TV+.
Understandable dialogue on Apple TV+
On-device app controlling AI.
Access to ChatGPT with a guest appearance by Chief Data Thief Sam Altman!
App Locking! iPhone Mirroring! And a Calculator!!
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
Manyata Tech Park Bangalore_ Infrastructure, Facilities and Morenarinav14
Located in the bustling city of Bangalore, Manyata Tech Park stands as one of India’s largest and most prominent tech parks, playing a pivotal role in shaping the city’s reputation as the Silicon Valley of India. Established to cater to the burgeoning IT and technology sectors
Going AOT: Everything you need to know about GraalVM for Java applications
TINTIN: demo of the tool
1. TINTIN
TINTIN
A Tool for INcremental INTegrity checking
of SQL assertions in SQLServer
Xavier Oriol Universitat Politècnica de Catalunya
Ernest Teniente Universitat Politècnica de Catalunya
Guillem Rull Universitat de Barcelona
2. TINTIN
2
Schema Motivating Example
name: String
Person
*1..*
FamousDirector
*
Directs Wins
Consider the constraint:
Any famous director has directed some award-winning movie
Steven Spielberg Jurassic Park (I) Visual Effects
directed won
title: String
releasedYear: Integer
Movie
name: String
Award
*
3. TINTIN
3
How can we check this constraint?
Running a query looking for the violations
Select * from FamousDirector as FD
where not exists (Select * from Directs as D
join Wins as W on (D.movie_id = W.movie_id)
where D.person_id = FD.id)
Writing a query returning any famous director who has not directed an
award-winning movie. Empty query = constraint satisfaction
Problem: bad performance
Running the query = checking all the data
If we delete ‘Jurassic Park’ from DB, and run the
query, it will search for award-winning movies for all
famous directors...
… but the unique relevant one to check is Spielberg!
4. TINTIN
4
How can we check this constraint?
Manually programming an efficient solution is difficult
Deleting an award-winning movie from DB
causes a violation…
… unless in the DB there is another
award-winning movie directed by the
same director…
… or there is an insertion of a new movie …
… or the director is being deleted as a famous
director
… which should be award-winning and by the same
director…
… such that it is not being deleted in
the same transaction too…
Manual programming = Are you sure you
are taking into account all cases?
5. TINTIN
5
We need an automatic method for
Checking only those parts of the data that might violate our defined
constraints taking in account the update being applied
In other words, we need
an Incremental method for consistency checking
This is exactly what we provide with TINTIN
7. TINTIN
7
del_DIRECTS
person_id movie_id
1 1
What has happened?
TINTIN now automatically captures all the
insertions/deletions the user wants to apply
delete from directs where movie_id = 1
insert into movie values (2, ‘War Horse’, 2012)
The update is not applied, but the tuples the user wants to
insert/delete are internally stored in auxiliary SQL tables
If a user sends
ins_MOVIE
Id Title Year
2 War Horse 2012
Current table
Auxiliary tables
DIRECTS
person_id movie_id
1 1
8. TINTIN
8
TINTIN – A Quick DEMO
1. Connect TINTIN to your DB
2. Write your assertions into TINTIN
9. TINTIN
9
FamousDirector
Id Name
1 Steven Spielberg
ins_MOVIE
Id Title Year
2 War Horse 2012
What has happened?
The safeCommit() procedure has been created. This
procedure looks for ins/deletions of tuples violating your
defined assertion/s
The safeCommit procedure inspects the auxiliary tables
storing the modifications to be applied. If it finds an
insertion/deletion causing a violation, the updates are
discarded, otherwise, they are committed
del_DIRECTS
movie_id person_id
1 1
This is going to violate our assertion!
10. TINTIN
10
TINTIN – A Quick DEMO
1. Connect TINTIN to your DB
2. Write your assertions into TINTIN
3. Use your DB normally. Just recall to call safeCommit() at
the end of your transactions
11. TINTIN
11
TINTIN – A Quick DEMO
delete from directs
where movie_id = 1;
insert into movie
values (2, ‘War Horse’, 2012);
insert into directs
values(1, 2)
safeCommit()
delete from directs
where movie_id = 1;
insert into movie
values (2, ‘War Horse’, 2012);
insert into directs
values(1, 2)
insert into wins(2, 1)
safeCommit()
1 violation was found.
The update is rejected.
No violations were found.
The update is commited.
Two simple use case examples:
12. TINTIN
12
Scalability experiment
We have used the TPC-H benchmark, a benchmark for illustrating
decision support systems that examine large volumes of data.
- Current data = 1GB * SF
- Data updates = 1MB * SF
*Nim = Non Incremental Approach
13. TINTIN
13
What does it support?
It supports any relational algebra constraint
What do we plan to support in the future?
SQL distributive aggregates & arithmetic functions