This document discusses various computer science concepts including algorithms, data structures, programming paradigms, and type systems. It provides examples of complexity analysis, functional programming concepts like map and reduce, and higher order functions. It also mentions technologies like Moore's Law, JavaScript, and ASM.js.
The document describes a visit by Lidia Vidal Vargas and students from her school to the "Franz Tamayo" Superior Training Teachers School in Llica, Potosi, Bolivia. The purpose of the visit was to learn about ancestral forms of preserving and using freshwater. Key points include:
- The group learned about traditional water preservation methods in Llica, a small town known for its quinoa production.
- They heard a local legend called "The Thunupa legend" which explains the origins of Salar de Uyuni salt flats.
- The students and teachers thanked their hosts for the hospitality and for sharing their water-related knowledge and cultural traditions.
Online video consumption is growing rapidly in both the US and India. In the US in February 2013, 178 million people watched over 33 billion online videos, with Google sites receiving the most viewers. In India, online video viewing doubled from 2011-2013, with over 54 million unique viewers watching 3.7 billion videos per month in March 2013 led by Google sites. While digital marketing penetration is lower in India than the US currently, it is growing much faster as internet usage increases significantly.
The document discusses the growing internet usage among older adults in India aged 50 and above. It notes that while youth have traditionally been the main internet users, older adults are now adopting the internet at faster rates due to lower costs and an increasing need to connect with family. Some key reasons older adults have started using the internet include communicating with children who have moved abroad via email and video calls, online shopping, and accessing news and information. The document also outlines some challenges to older adult internet usage like physical and technological limitations but argues that increasing mobility options, more user-friendly devices, and lower costs will continue to drive up rates of usage among this demographic.
Prezentacija sa Euroguidance konferencije o karijernom vođenju i savetovanju koja je održana u saradnji sa Ministarstvom omladine i sporta i Ministarstvom prosvete, nauke i tehnološkog razvoja, 5. decembra 2013. godine u Palati Srbija u Beogradu.
This document introduces film production audits conducted by Spatial Access. It discusses that film production involves various stages and costs, including talent, locations, and post-production. As production budgets increase, marketers are increasingly seeking to rationalize costs through film audits. Spatial Access audits all film production costs like talent fees, rights, and negotiations to ensure clients pay the right price without compromising quality. Past clients praise Spatial Access for cost savings and optimizing various contractual aspects.
The document describes a visit by Lidia Vidal Vargas and students from her school to the "Franz Tamayo" Superior Training Teachers School in Llica, Potosi, Bolivia. The purpose of the visit was to learn about ancestral forms of preserving and using freshwater. Key points include:
- The group learned about traditional water preservation methods in Llica, a small town known for its quinoa production.
- They heard a local legend called "The Thunupa legend" which explains the origins of Salar de Uyuni salt flats.
- The students and teachers thanked their hosts for the hospitality and for sharing their water-related knowledge and cultural traditions.
Online video consumption is growing rapidly in both the US and India. In the US in February 2013, 178 million people watched over 33 billion online videos, with Google sites receiving the most viewers. In India, online video viewing doubled from 2011-2013, with over 54 million unique viewers watching 3.7 billion videos per month in March 2013 led by Google sites. While digital marketing penetration is lower in India than the US currently, it is growing much faster as internet usage increases significantly.
The document discusses the growing internet usage among older adults in India aged 50 and above. It notes that while youth have traditionally been the main internet users, older adults are now adopting the internet at faster rates due to lower costs and an increasing need to connect with family. Some key reasons older adults have started using the internet include communicating with children who have moved abroad via email and video calls, online shopping, and accessing news and information. The document also outlines some challenges to older adult internet usage like physical and technological limitations but argues that increasing mobility options, more user-friendly devices, and lower costs will continue to drive up rates of usage among this demographic.
Prezentacija sa Euroguidance konferencije o karijernom vođenju i savetovanju koja je održana u saradnji sa Ministarstvom omladine i sporta i Ministarstvom prosvete, nauke i tehnološkog razvoja, 5. decembra 2013. godine u Palati Srbija u Beogradu.
This document introduces film production audits conducted by Spatial Access. It discusses that film production involves various stages and costs, including talent, locations, and post-production. As production budgets increase, marketers are increasingly seeking to rationalize costs through film audits. Spatial Access audits all film production costs like talent fees, rights, and negotiations to ensure clients pay the right price without compromising quality. Past clients praise Spatial Access for cost savings and optimizing various contractual aspects.
This talk was given at Velocity '13 in Santa Clara by Abe Stanway and Jon Cowie. It talks about how Etsy make sense of the 250k metrics they gather, using their new Kale stack.
The document discusses the history and evolution of programming languages from Assembly to modern languages like JavaScript. It notes that each language was created to solve specific problems in different domains. It then discusses object oriented programming concepts like classes in different languages and how they relate to earlier concepts from Plato and Darwin. It concludes by describing how Koding was built using technologies like CoffeeScript, Bongo, and Kite to provide an environment for developers.
This document appears to be notes from a Clojure community night talk that discussed various topics:
- Why Clojure is a data-oriented programming language and how its inherent data structures can be used to derive program structure
- Examples of how Clojure's data behaviors like sequences, maps, macros can be used for programming
- How a "monster let" expression that locks dependencies into an opaque function can be refactored into a composable graph structure using functions
- Examples of Clojure libraries that enable fast array math (HipHip), DOM manipulation (Dommy), and data validation (Schema)
- Areas where Clojure could be improved including debugging tools, compiler speed and tooling,
Concurrency is hard. Consistency in distributed systems is hard. And then the whole thing should be highly-available and error resilient.
Fear not, there are good news: There exists an awesome tool called ZooKeeper to help you with this. There even exists a plethora of Python libraries for it, but how to know what to use and how?
This talk will walk you through ZooKeeper and how to use it with Python. We’ll be focusing on what I think is the most prominient ZooKeeper library out there for Python: Kazoo.
You’ll see how to do things in ZooKeeper and how to implement them using Kazoo. We’ll also peek in to the recipes Kazoo offers, and if we have enough time, touch a real life application we’ve used Kazoo and ZooKeeper to build at Spotify.
This document discusses functional programming concepts and patterns using JavaScript examples. It covers mapping, filtering and reducing arrays, building abstractions through composition of small functions, and using libraries like Underscore and Lemonad to apply functional patterns. It also discusses relational algebra using the codd.js library and pipelines for composing operations.
This document discusses JavaScript code architecture and module patterns using RequireJS. It begins with an introduction to RequireJS and how it can be used to dynamically load modules and their dependencies. Next, it covers defining modules with and without dependencies, and how to return maker functions from modules to create "classes". The document concludes with notes on best practices for modules and an overview of RequireJS configuration options to integrate third-party libraries.
Implementing the Split-Apply-Combine model in Clojure and Incanter Tom Faulhaber
These are the slides from my talk to the Bay Area Clojure Group meeting in San Francisco on June 6, 2013.
The slides are not meant to stand alone, so they may not be completely useful if you did not attend.
Here is the description of the talk sent out in advance:
Tom Faulhaber will talk about interactive data analysis focusing on data organization and the split-apply-combine pattern. You'll find that split-apply-combine is a powerful tool that applies to many of the data problems that we look at in Clojure. This pattern is the basis of the popular plyr package developed by Hadley Wickham in the R language.
Tom will demonstrate some basic ideas of data analysis and show how they're implemented in the Incanter system. We'll discuss split-apply-combine and how it's used in Incanter today. Then, we'll discuss how to implement a full version of split-apply-combine in Clojure on top of Incanter's dataset type. Finally, we'll use our implementation to learn about some real data.
The document discusses the Batou framework for automating multi-component deployments. Batou models system configuration as compositions of simple components that each handle a single task like creating a file or directory. Components declare their desired state and Batou ensures the actual system state matches it. This allows Batou to converge the system configuration across different environments and handle changes reliably with minimal downtime through incremental updates.
The document discusses various topics related to designing applications for garbage collection, including understanding how garbage collection works, monitoring garbage collection, debugging memory leaks, and designing for partial availability during garbage collection pauses. Specific techniques covered include monitoring GC time and heap usage, visualizing GC logs, using YourKit for memory leak detection, and protocols for clients to ignore servers undergoing garbage collection.
Storyplayer is a new open-source testing tool created by DataSift to help plug a gap in their layered testing strategy. It is designed to test services and systems using simple PHP scripts and stories. Storyplayer includes modules for vagrant, savageD, graphite and more to help set up test environments, monitor tests, and test non-functional requirements. It is available on GitHub and can help developers and testers share responsibility for testing different layers.
The Seneca Pattern at EngineYard Distill 2013 ConferenceRichard Rodger
The document discusses building large applications using a pattern matching approach with microservices. Small independent processes communicate via asynchronous messages to perform actions like saving or retrieving data, deploying applications, and routing requests. This approach allows for easy scaling, language independence between processes, and a shared mental model based on patterns that is intuitive for both humans and machines.
The document discusses three main challenges of crowdsourcing data: 1) crowdsourcing data, 2) human motivation, and 3) behavioral design. It explores theories of human motivation and how interface design can affect behavior. Specific examples are discussed, such as default choice bias and how interface elements in applications like Snackbot can influence user choices. The document advocates for social interfaces to draw from social and cognitive science regarding crowd data analysis, motivation, and designs that compel human participation and empowerment.
My mom told me that Git doesn’t scale by Vicent MartíCodemotion
With over 2 million and a half repositories, GitHub is the world’s largest source code host. Since day one, we’ve faced an unique engineering problem: making terabytes of Git data always available, either directly or through our website. This talk offers a hopefully insightful view into the internals of Git, the way its original design affects our scalable architecture, and the many things we’ve learnt while solving this fascinating problem.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
This talk was given at Velocity '13 in Santa Clara by Abe Stanway and Jon Cowie. It talks about how Etsy make sense of the 250k metrics they gather, using their new Kale stack.
The document discusses the history and evolution of programming languages from Assembly to modern languages like JavaScript. It notes that each language was created to solve specific problems in different domains. It then discusses object oriented programming concepts like classes in different languages and how they relate to earlier concepts from Plato and Darwin. It concludes by describing how Koding was built using technologies like CoffeeScript, Bongo, and Kite to provide an environment for developers.
This document appears to be notes from a Clojure community night talk that discussed various topics:
- Why Clojure is a data-oriented programming language and how its inherent data structures can be used to derive program structure
- Examples of how Clojure's data behaviors like sequences, maps, macros can be used for programming
- How a "monster let" expression that locks dependencies into an opaque function can be refactored into a composable graph structure using functions
- Examples of Clojure libraries that enable fast array math (HipHip), DOM manipulation (Dommy), and data validation (Schema)
- Areas where Clojure could be improved including debugging tools, compiler speed and tooling,
Concurrency is hard. Consistency in distributed systems is hard. And then the whole thing should be highly-available and error resilient.
Fear not, there are good news: There exists an awesome tool called ZooKeeper to help you with this. There even exists a plethora of Python libraries for it, but how to know what to use and how?
This talk will walk you through ZooKeeper and how to use it with Python. We’ll be focusing on what I think is the most prominient ZooKeeper library out there for Python: Kazoo.
You’ll see how to do things in ZooKeeper and how to implement them using Kazoo. We’ll also peek in to the recipes Kazoo offers, and if we have enough time, touch a real life application we’ve used Kazoo and ZooKeeper to build at Spotify.
This document discusses functional programming concepts and patterns using JavaScript examples. It covers mapping, filtering and reducing arrays, building abstractions through composition of small functions, and using libraries like Underscore and Lemonad to apply functional patterns. It also discusses relational algebra using the codd.js library and pipelines for composing operations.
This document discusses JavaScript code architecture and module patterns using RequireJS. It begins with an introduction to RequireJS and how it can be used to dynamically load modules and their dependencies. Next, it covers defining modules with and without dependencies, and how to return maker functions from modules to create "classes". The document concludes with notes on best practices for modules and an overview of RequireJS configuration options to integrate third-party libraries.
Implementing the Split-Apply-Combine model in Clojure and Incanter Tom Faulhaber
These are the slides from my talk to the Bay Area Clojure Group meeting in San Francisco on June 6, 2013.
The slides are not meant to stand alone, so they may not be completely useful if you did not attend.
Here is the description of the talk sent out in advance:
Tom Faulhaber will talk about interactive data analysis focusing on data organization and the split-apply-combine pattern. You'll find that split-apply-combine is a powerful tool that applies to many of the data problems that we look at in Clojure. This pattern is the basis of the popular plyr package developed by Hadley Wickham in the R language.
Tom will demonstrate some basic ideas of data analysis and show how they're implemented in the Incanter system. We'll discuss split-apply-combine and how it's used in Incanter today. Then, we'll discuss how to implement a full version of split-apply-combine in Clojure on top of Incanter's dataset type. Finally, we'll use our implementation to learn about some real data.
The document discusses the Batou framework for automating multi-component deployments. Batou models system configuration as compositions of simple components that each handle a single task like creating a file or directory. Components declare their desired state and Batou ensures the actual system state matches it. This allows Batou to converge the system configuration across different environments and handle changes reliably with minimal downtime through incremental updates.
The document discusses various topics related to designing applications for garbage collection, including understanding how garbage collection works, monitoring garbage collection, debugging memory leaks, and designing for partial availability during garbage collection pauses. Specific techniques covered include monitoring GC time and heap usage, visualizing GC logs, using YourKit for memory leak detection, and protocols for clients to ignore servers undergoing garbage collection.
Storyplayer is a new open-source testing tool created by DataSift to help plug a gap in their layered testing strategy. It is designed to test services and systems using simple PHP scripts and stories. Storyplayer includes modules for vagrant, savageD, graphite and more to help set up test environments, monitor tests, and test non-functional requirements. It is available on GitHub and can help developers and testers share responsibility for testing different layers.
The Seneca Pattern at EngineYard Distill 2013 ConferenceRichard Rodger
The document discusses building large applications using a pattern matching approach with microservices. Small independent processes communicate via asynchronous messages to perform actions like saving or retrieving data, deploying applications, and routing requests. This approach allows for easy scaling, language independence between processes, and a shared mental model based on patterns that is intuitive for both humans and machines.
The document discusses three main challenges of crowdsourcing data: 1) crowdsourcing data, 2) human motivation, and 3) behavioral design. It explores theories of human motivation and how interface design can affect behavior. Specific examples are discussed, such as default choice bias and how interface elements in applications like Snackbot can influence user choices. The document advocates for social interfaces to draw from social and cognitive science regarding crowd data analysis, motivation, and designs that compel human participation and empowerment.
My mom told me that Git doesn’t scale by Vicent MartíCodemotion
With over 2 million and a half repositories, GitHub is the world’s largest source code host. Since day one, we’ve faced an unique engineering problem: making terabytes of Git data always available, either directly or through our website. This talk offers a hopefully insightful view into the internals of Git, the way its original design affects our scalable architecture, and the many things we’ve learnt while solving this fascinating problem.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
6. 1861
Tuesday, 7 May 13
“A general “law of least effort” applies to cognitive as well as physical
exertion. The law asserts that if there are several ways of achieving the
same goal, people will eventually gravitate to the least demanding course
of action. In the economy of action, effort is a cost, and the acquisition of
skill is driven by the balance of benefits and costs. Laziness is built deep into our nature.”
7. Tuesday, 7 May 13
Personal experience
Negative experience
Fundamental attribution error
16. Offset Moore’s law
Tuesday, 7 May 13
"software is getting slower more rapidly than hardware becomes faster." this was said in 1995 the year java was released.
17. JS’s moore law?
Tuesday, 7 May 13
As javascript get engines get faster, developers will increase double the size of their libraries
every 2 years.
This is 2010 to 2013, so it almost lines up.
22. The Somebody Else's Problem
Field is a field running on the
principle that if something is
identified to be somebody else's
problem, the brain will edit it
out of the person's vision. -
Adams
Tuesday, 7 May 13
We have invented phrases that our somebody elses problem’
Ship it. premature optimization...
89. Tuesday, 7 May 13
December, 2004.
Jeffrey Dean
Jeff Dean puts his pants on one leg at a time, but if he had more legs, you would see that his approach is O(log n).
102. Fantasy land
Tuesday, 7 May 13
It was so named after the infamous bug 94 on the promises spec
Dealing with null.
103. Free.
Tuesday, 7 May 13
By adhering to these specs we start go get some things for free.
For example in my previous maybe example i wrote map. We don’t actually have to do that.
It can be implmented for us.
Same with a whole host of functions Lift for example which takes a function and runs it in the
monadic context.
Again we don’t have to worry about writing any of this, we get it for free.
We get assurances to an extent that these operations will run. Regardless of where or what
the monad is dealing with.
Just freedom. Is this not the idea of the lazy developer and comforms to DRY, LRU etc etc etc
Unfortuantly we can not get 100% assurance if we were to do this, we would need to rely on
another concept from the early computer science days...
104. Types
Tuesday, 7 May 13
Types can take this concept even further.
We don’t have to worry about people doing stupid things with our code as we can remove
this ability for them
112. A type system is a tractable syntactic
method for proving the absence of certain
program behaviors by classifying phrases
according to the kinds of values they
compute.
Tuesday, 7 May 13
113. A type system is a tractable syntactic
method for proving the absence of certain
program behaviors by classifying phrases
according to the kinds of values they
compute.
Tuesday, 7 May 13
tractable easy to control
114. A type system is a tractable syntactic
method for proving the absence of certain
program behaviors by classifying phrases
according to the kinds of values they
compute.
Tuesday, 7 May 13