The voiced consonants of ancient Egyptian have changed over time. The document discusses what happened to the voiced consonants in Egyptian language. It was presented at the 10th International Congress of Egyptologists in Rhodes, Greece in May 2008.
THE BARBARIAN NAMES ON THE OSTRACA FROM THE EASTERN DESERT (3RD CENTURY CE) helmutsatzinger
The document discusses ostraca from Roman garrisons in Egypt's Eastern Desert from the 3rd century CE that contain the names of individuals with Barbarian names. These names were likely Blemmyes, a nomadic group that inhabited the area at the time. Evidence suggests the names on the ostraca match onomastic material from Blemmyan inscriptions and papyri, providing insight into their ethnicity and language.
Satzinger, A Lexicon of Egyptian Lexical Roots (Project) helmutsatzinger
The document describes Helmut Satzinger's project to create a complete inventory of lexical roots in the Egyptian language across all stages from hieroglyphic to Coptic texts. So far, an initial beta version of a database in Excel or FileMaker has been created. Further steps include finishing the inclusion of Demotic and Coptic forms, extracting and organizing roots, and formatting for print. The project cooperates with other leading Egyptology institutions and researchers working on Egyptian lexicography and text databases.
Project of compiling a lexicon of Egyptian lexical roots, supported by the Austrian Research Fund (Wissenschaftsfonds / FWF). Collaborators Mag. Kristina Hutter (2018), Prof. Danijela Stefanovic (2020).
This document contains images and descriptions of Egyptian statues from the New Kingdom period (approximately 1550-1069 BC). It includes over 50 individual entries showing statues of various types including seated figures, kneeling figures, standing figures, and paired/family group statues. The statues depict people in roles like scribes, priests, officials and their wives, and date from the 18th dynasty during the reigns of pharaohs like Hatshepsut, Thutmose III, and Amenhotep III. The entries note the material, current location, and time period of each piece.
THE BARBARIAN NAMES ON THE OSTRACA FROM THE EASTERN DESERT (3RD CENTURY CE) helmutsatzinger
The document discusses ostraca from Roman garrisons in Egypt's Eastern Desert from the 3rd century CE that contain the names of individuals with Barbarian names. These names were likely Blemmyes, a nomadic group that inhabited the area at the time. Evidence suggests the names on the ostraca match onomastic material from Blemmyan inscriptions and papyri, providing insight into their ethnicity and language.
Satzinger, A Lexicon of Egyptian Lexical Roots (Project) helmutsatzinger
The document describes Helmut Satzinger's project to create a complete inventory of lexical roots in the Egyptian language across all stages from hieroglyphic to Coptic texts. So far, an initial beta version of a database in Excel or FileMaker has been created. Further steps include finishing the inclusion of Demotic and Coptic forms, extracting and organizing roots, and formatting for print. The project cooperates with other leading Egyptology institutions and researchers working on Egyptian lexicography and text databases.
Project of compiling a lexicon of Egyptian lexical roots, supported by the Austrian Research Fund (Wissenschaftsfonds / FWF). Collaborators Mag. Kristina Hutter (2018), Prof. Danijela Stefanovic (2020).
This document contains images and descriptions of Egyptian statues from the New Kingdom period (approximately 1550-1069 BC). It includes over 50 individual entries showing statues of various types including seated figures, kneeling figures, standing figures, and paired/family group statues. The statues depict people in roles like scribes, priests, officials and their wives, and date from the 18th dynasty during the reigns of pharaohs like Hatshepsut, Thutmose III, and Amenhotep III. The entries note the material, current location, and time period of each piece.
With Danijela Stefanovic: Baklava for the Effendi! The linguistic heritage of...helmutsatzinger
This document compares the linguistic heritage of the Ottoman Empire in Egypt and Serbia. It discusses three languages involved: Ottoman Turkish, Egyptian Arabic, and Serbian. It provides numerous examples of loanwords that have been incorporated from Turkish into both Egyptian Arabic and Serbian vocabularies. It also discusses differences in scripts, accents, and other linguistic features between the three languages. Finally, it lists some relevant bibliographic sources on the topic of Turkish loanwords in Egyptian Arabic and Serbian.
Project: Publication of the Middle Kingdom and Second Intermediate Period stelae (CAA) from the Berlin Museum,
by Danijela Stefanovic and Helmut Satzinger
The document discusses several Egyptian tomb models from the Middle Kingdom period depicting various occupations and activities that were important to daily life. These include models of weavers, bakers, millers, offering bearers, a granary, baking, brewing and butchery, plowing, boats, and a garden. Many of the models are housed in museums in locations like Boston, Berlin, Florence, Turin, Copenhagen, London, and New York.
A Lexicon of Egyptian Lexical Roots (Project) helmutsatzinger
This document describes Helmut Satzinger's project to establish a complete inventory of lexical roots in the Egyptian language as attested across all historical stages from hieroglyphic and hieratic texts through Demotic and Coptic. Satzinger has applied to the Austrian Research Fund for support of the project, and expects a decision by October 2014. The presentation has been uploaded to SlideShare for further information about the project if it receives funding.
Il papiro mitologico di Khonsu-mes della Collezione Drovetti: uno dei più beg...helmutsatzinger
Conference
“Una collezione di antichità Egizie unica al mondo”
Bernardino Drovetti, dall’avventura alla scienza
23 maggio 2014
Accademia delle Scienze di Torino Sala dei Mappamondi
The document discusses statues of kings from Egypt's Middle Kingdom (around 2000 BC). It presents several statues of pharaohs from the 11th Dynasty, including Nebhetepre Mentuhotep II, and the 12th Dynasty, including Senusret I, Senusret II, Senusret III, Amenemhat II, Amenemhat III. The statues are displayed in museums around the world and are made from materials like granite, schist, and serpentine. They provide portraits of the pharaohs from this time period between idealization and realism.
The document discusses Crown Prince Rudolf of Austria's journey to Egypt and Palestine in 1881. It provides details on Rudolf's companions, which included his uncle Archduke Karl Salvator of Tuscany and notable hunter, as well as Count Josef Hoyos and painter Franz von Pausinger. The trip was intended to be a hunting journey according to the Emperor's wishes, and to strengthen Rudolf's Catholic beliefs, so religious figures also accompanied him. Rudolf had a passion for natural sciences and recorded observations of the local wildlife, including birds and mammals, during the trip.
Die Skultur von Privatpersonen (18. Dynastie)helmutsatzinger
The document summarizes Egyptian art from the 18th Dynasty of the New Kingdom period (ca. 1550-1292 BCE), including a list of kings and their reigns. It provides images and descriptions of artifacts from the reigns of Hatshepsut, Thutmose III, Amenhotep II, Amenhotep III, and Horemheb that are sculptures of officials, priests, and royal family members. The artifacts are made from materials like granite, limestone, and sandstone and are held in museums around the world.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
With Danijela Stefanovic: Baklava for the Effendi! The linguistic heritage of...helmutsatzinger
This document compares the linguistic heritage of the Ottoman Empire in Egypt and Serbia. It discusses three languages involved: Ottoman Turkish, Egyptian Arabic, and Serbian. It provides numerous examples of loanwords that have been incorporated from Turkish into both Egyptian Arabic and Serbian vocabularies. It also discusses differences in scripts, accents, and other linguistic features between the three languages. Finally, it lists some relevant bibliographic sources on the topic of Turkish loanwords in Egyptian Arabic and Serbian.
Project: Publication of the Middle Kingdom and Second Intermediate Period stelae (CAA) from the Berlin Museum,
by Danijela Stefanovic and Helmut Satzinger
The document discusses several Egyptian tomb models from the Middle Kingdom period depicting various occupations and activities that were important to daily life. These include models of weavers, bakers, millers, offering bearers, a granary, baking, brewing and butchery, plowing, boats, and a garden. Many of the models are housed in museums in locations like Boston, Berlin, Florence, Turin, Copenhagen, London, and New York.
A Lexicon of Egyptian Lexical Roots (Project) helmutsatzinger
This document describes Helmut Satzinger's project to establish a complete inventory of lexical roots in the Egyptian language as attested across all historical stages from hieroglyphic and hieratic texts through Demotic and Coptic. Satzinger has applied to the Austrian Research Fund for support of the project, and expects a decision by October 2014. The presentation has been uploaded to SlideShare for further information about the project if it receives funding.
Il papiro mitologico di Khonsu-mes della Collezione Drovetti: uno dei più beg...helmutsatzinger
Conference
“Una collezione di antichità Egizie unica al mondo”
Bernardino Drovetti, dall’avventura alla scienza
23 maggio 2014
Accademia delle Scienze di Torino Sala dei Mappamondi
The document discusses statues of kings from Egypt's Middle Kingdom (around 2000 BC). It presents several statues of pharaohs from the 11th Dynasty, including Nebhetepre Mentuhotep II, and the 12th Dynasty, including Senusret I, Senusret II, Senusret III, Amenemhat II, Amenemhat III. The statues are displayed in museums around the world and are made from materials like granite, schist, and serpentine. They provide portraits of the pharaohs from this time period between idealization and realism.
The document discusses Crown Prince Rudolf of Austria's journey to Egypt and Palestine in 1881. It provides details on Rudolf's companions, which included his uncle Archduke Karl Salvator of Tuscany and notable hunter, as well as Count Josef Hoyos and painter Franz von Pausinger. The trip was intended to be a hunting journey according to the Emperor's wishes, and to strengthen Rudolf's Catholic beliefs, so religious figures also accompanied him. Rudolf had a passion for natural sciences and recorded observations of the local wildlife, including birds and mammals, during the trip.
Die Skultur von Privatpersonen (18. Dynastie)helmutsatzinger
The document summarizes Egyptian art from the 18th Dynasty of the New Kingdom period (ca. 1550-1292 BCE), including a list of kings and their reigns. It provides images and descriptions of artifacts from the reigns of Hatshepsut, Thutmose III, Amenhotep II, Amenhotep III, and Horemheb that are sculptures of officials, priests, and royal family members. The artifacts are made from materials like granite, limestone, and sandstone and are held in museums around the world.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
What happened to the voiced consonants of Egyptian ?
1. What happened to the voiced consonants of Egyptian ? Helmut Satzinger University of Vienna Xth INTERNATIONAL CONGRESS OF EGYPTOLOGISTS Rhodes, 22-29 May 2008