This is the first part presentation of the Multimodal Application Framework (MAF) held in CINECA few months ago. Its development is still ongoing and is aimed to create an instrument for rapidly develop scientific visualization applications.
My 12 year old son created this as part of his history project, using the actual letter his great-grandmother received from the commanding officer after the death of her son in Italy during WWII. We wanted to share it to ensure that we continue to honor and respect those that gave their lives for our freedom. May we always remember, freedom comes with a hefty price. LEST WE FORGET
This is the first part presentation of the Multimodal Application Framework (MAF) held in CINECA few months ago. Its development is still ongoing and is aimed to create an instrument for rapidly develop scientific visualization applications.
My 12 year old son created this as part of his history project, using the actual letter his great-grandmother received from the commanding officer after the death of her son in Italy during WWII. We wanted to share it to ensure that we continue to honor and respect those that gave their lives for our freedom. May we always remember, freedom comes with a hefty price. LEST WE FORGET
A poresentation made at the ICELT conference, Melaka, Malaysia, November 2009 about idiomatic phrases in Asian varieties of English and in academic texts.
MAF3 Framework (Part 2)
The cross-platform MAF Event Bus make use of Qt Signal/Slot to dispatch events between objects locally and remotely. Qt mechanism has been extended to manage also a remote communication transparently to the EventBus user and decouple the sender from the receiver allowing sending events remotely using different network connectors expandable through the strategy pattern.
The technology bubble on the US and European stock markets reached its high in March 2000. The peak was followed by a three year bearish trend, during which many investors suffered heavy losses. The investors started to question, whether it was not possible to recognize the bubble on the equity market in advance. Investment strategists and academicians started to come up with new models which were able to indicate time periods when the stock market was over- or undervalued.
Most of these sophisticated models are hidden in the information databases of the investment banks. During the past three years I got an access to most of the databases, which brought me to the decision to write my dissertation about the stock market valuation models.
The aim of this dissertation is to present, construct, evaluate and logically sort contemporary stock market valuation methods. This research paper is divided into three parts.
Part one answers important questions which the stock market valuation methods evoke. Firstly, it describes how the methods define the under- or overvaluation of the market. Then I come up with the definition and anatomy of the stock market bubble. The impact of the equity market bubbles on the economy and its implications for monetary policy are also analyzed in great detail. Part one contains few paragraphs, where I discuss the relationship between the efficient market theory and the stock market valuation models, because these two concepts seem to be in contradiction. Final chapter of part one is dedicated to the index S&P 500. Data related to this index are the main inputs for majority of the presented models.
In part two I presented in detail 19 stock market valuation methods. I sorted these methods into six groups:▪ models based on accounting entries,▪ models analyzing the earnings yield and the bond yield,▪ equity risk premium models,▪ return vs. risk models, ▪ technical methods and▪ psychological methods.
For each model I gathered long-term data, constructed the valuation indicator and at the end of each model I made a summary, which amongst other things includes positives and negatives of the particular method.
Part three is a synthesis of outputs of the 19 stock market valuation models presented in part two. I aggregated results of the models into a unique graphical table. Columns represent each model, lines represent months. Orange color indicates months with high overvaluation and blue color indicates months with high undervaluation.
I went one step further and I constructed my Composite Stock Market Valuation Indicator, which is basically equally weighted index of the modified individual valuation indicators presented in part two.
The Composite Sock Market Valuation Indicator identified many time periods, which had been ex-post recognized by the economists as times, when the stock market was heavily under- or overvalued. Stock market valuation methods are clearly a useful and functional tool for investors, economists and monetary authorities.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
A poresentation made at the ICELT conference, Melaka, Malaysia, November 2009 about idiomatic phrases in Asian varieties of English and in academic texts.
MAF3 Framework (Part 2)
The cross-platform MAF Event Bus make use of Qt Signal/Slot to dispatch events between objects locally and remotely. Qt mechanism has been extended to manage also a remote communication transparently to the EventBus user and decouple the sender from the receiver allowing sending events remotely using different network connectors expandable through the strategy pattern.
The technology bubble on the US and European stock markets reached its high in March 2000. The peak was followed by a three year bearish trend, during which many investors suffered heavy losses. The investors started to question, whether it was not possible to recognize the bubble on the equity market in advance. Investment strategists and academicians started to come up with new models which were able to indicate time periods when the stock market was over- or undervalued.
Most of these sophisticated models are hidden in the information databases of the investment banks. During the past three years I got an access to most of the databases, which brought me to the decision to write my dissertation about the stock market valuation models.
The aim of this dissertation is to present, construct, evaluate and logically sort contemporary stock market valuation methods. This research paper is divided into three parts.
Part one answers important questions which the stock market valuation methods evoke. Firstly, it describes how the methods define the under- or overvaluation of the market. Then I come up with the definition and anatomy of the stock market bubble. The impact of the equity market bubbles on the economy and its implications for monetary policy are also analyzed in great detail. Part one contains few paragraphs, where I discuss the relationship between the efficient market theory and the stock market valuation models, because these two concepts seem to be in contradiction. Final chapter of part one is dedicated to the index S&P 500. Data related to this index are the main inputs for majority of the presented models.
In part two I presented in detail 19 stock market valuation methods. I sorted these methods into six groups:▪ models based on accounting entries,▪ models analyzing the earnings yield and the bond yield,▪ equity risk premium models,▪ return vs. risk models, ▪ technical methods and▪ psychological methods.
For each model I gathered long-term data, constructed the valuation indicator and at the end of each model I made a summary, which amongst other things includes positives and negatives of the particular method.
Part three is a synthesis of outputs of the 19 stock market valuation models presented in part two. I aggregated results of the models into a unique graphical table. Columns represent each model, lines represent months. Orange color indicates months with high overvaluation and blue color indicates months with high undervaluation.
I went one step further and I constructed my Composite Stock Market Valuation Indicator, which is basically equally weighted index of the modified individual valuation indicators presented in part two.
The Composite Sock Market Valuation Indicator identified many time periods, which had been ex-post recognized by the economists as times, when the stock market was heavily under- or overvalued. Stock market valuation methods are clearly a useful and functional tool for investors, economists and monetary authorities.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/