- The Oyu Tolgoi project in Mongolia signed an Investment Agreement in October 2009 to develop one of the largest copper and gold mines in Asia.
- They are currently in the process of fulfilling 10 conditions in the agreement over the next 6 months to make it effective, and have already completed 5 of the conditions.
- Over the next few years, they will invest over $5 billion to develop the mine and build infrastructure, hiring over 4,000 workers for construction and 3,000 long-term operations roles.
- They are working to develop comprehensive training programs with universities and vocational schools to prepare Mongolian workers to meet international mining standards for the decades-long project.
This document provides an overview of Exploros, a 1:1 classroom instructional platform. It summarizes Exploros as transforming existing curriculum into collaborative, teacher-guided learning experiences for students using their devices, while automatically collecting learning data. It describes how Exploros can engage students, improve lesson design and instructional methods, and shift districts to a more sustainable financial model by reducing costs for instructional materials, assessment, and data/support over time. Exploros claims to save districts money starting in year 3 by allowing them to pay for device refreshes from their operating budget.
El documento describe las características de la Web 2.0, incluyendo la participación activa de los usuarios como creadores de contenido, el uso de blogs, wikis y redes sociales, y el almacenamiento en la nube de datos e información. También explica cómo la Web 2.0 ha democratizado los medios y ha reducido los costos de difusión de información.
Armen Patrikian is a dedicated and talented employee who excels at his craft. The author recalls Armen coming in early, staying late, and working on Saturdays to help develop new accounts, showing that he is a true team player. The author believes Armen would be an asset to any organization.
Dining etiquette is important for interviews to make a good impression. Follow basic rules like keeping your napkin on your lap, using utensils properly from the outside in, and waiting for your host to begin eating. Order conservatively, chew with your mouth closed, and remember the focus is the interview, not the food. Always thank your host and send a follow up note after the meal.
- The Oyu Tolgoi project in Mongolia signed an Investment Agreement in October 2009 to develop one of the largest copper and gold mines in Asia.
- They are currently in the process of fulfilling 10 conditions in the agreement over the next 6 months to make it effective, and have already completed 5 of the conditions.
- Over the next few years, they will invest over $5 billion to develop the mine and build infrastructure, hiring over 4,000 workers for construction and 3,000 long-term operations roles.
- They are working to develop comprehensive training programs with universities and vocational schools to prepare Mongolian workers to meet international mining standards for the decades-long project.
This document provides an overview of Exploros, a 1:1 classroom instructional platform. It summarizes Exploros as transforming existing curriculum into collaborative, teacher-guided learning experiences for students using their devices, while automatically collecting learning data. It describes how Exploros can engage students, improve lesson design and instructional methods, and shift districts to a more sustainable financial model by reducing costs for instructional materials, assessment, and data/support over time. Exploros claims to save districts money starting in year 3 by allowing them to pay for device refreshes from their operating budget.
El documento describe las características de la Web 2.0, incluyendo la participación activa de los usuarios como creadores de contenido, el uso de blogs, wikis y redes sociales, y el almacenamiento en la nube de datos e información. También explica cómo la Web 2.0 ha democratizado los medios y ha reducido los costos de difusión de información.
Armen Patrikian is a dedicated and talented employee who excels at his craft. The author recalls Armen coming in early, staying late, and working on Saturdays to help develop new accounts, showing that he is a true team player. The author believes Armen would be an asset to any organization.
Dining etiquette is important for interviews to make a good impression. Follow basic rules like keeping your napkin on your lap, using utensils properly from the outside in, and waiting for your host to begin eating. Order conservatively, chew with your mouth closed, and remember the focus is the interview, not the food. Always thank your host and send a follow up note after the meal.
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
The web is moving towards a 100% Encrypted Web—but can we get it, right? Understanding the surge in use of https for malware and phishing, the renewed importance of revocation checking, the role of browser UI design in protecting users, the renewed importance of identity in TLS certificates, and the latest industry studies and initiatives for a safer Internet.
Payments Security – Vital Information all Payment Processors need to knowCASCouncil
CASC Member Dean Coclin, Symantec's Transact conference 2016 presentation on the CA/B Forum, the problem with SHA-1 and future solutions to the problem.
The document provides an overview and results of an audit conducted by the Online Trust Alliance (OTA) of email authentication, site security, privacy practices, and mandated security requirements of 13 free electronic tax filing websites. Key findings include: 4 sites failed on email authentication, 3 sites failed on site security, privacy practices and data sharing by the sites were unexpected and concerning, and while most sites followed IRS mandates on SSL certificates and domains, challenge/response for account setup was only implemented by 38% of sites. The OTA aims to promote best practices to enhance online trust and security.
CA/Browser Forum—To effect positive changes to improve internet security CASCouncil
The document discusses the CA/Browser Forum, which advances best practices for certificate authorities (CAs) and browser vendors. It outlines the forum's members and activities, including developing guidelines like the Baseline Requirements. CAs must adhere to these guidelines to issue publicly-trusted certificates recognized by major browsers. The forum is open to CAs and browsers, governed by bylaws, and communicates through websites and meetings to improve internet security.
Update on the Work of the CA / Browser ForumCASCouncil
This document summarizes updates from various root programs and working groups related to digital certificates. It discusses recent developments in Microsoft, Google, Apple, Adobe and Mozilla's root programs, as well as technical advances regarding .onion domains, certificate transparency, SHA1 deprecation, short-lived certificates, and IPv6 support. It also provides updates on the CA/Browser Forum working groups for code signing, policy review, validation and security information sharing. Finally, it lists upcoming CA/Browser Forum meetings in June and October of 2015.
Online commerce requires trust. Certificate Authorities provide that trust through SSL certificates. EV-SSL (the EV stands for Extended Validation) provides the gold standard for SSL certificates. Merchants must undergo a rigorous process to obtain an EV-SSL certificate, and how browsers display the certificate is different than a normal SSL certificate.
This document summarizes developments within the CA/Browser Forum in 2014. It discusses new working groups on code signing and policy/information sharing. Key topics of discussion included the SHA-1 deprecation timeline, the Heartbleed vulnerability, and how to define the scope and requirements of SSL certificates. Current discussions focus on issues like certificate authority authorization records and the proposed retirement of SHA-1 in browsers.
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
Join the CASC Wednesday April 30 for a Google+ hangout on the Heartbleed Bug. We’ll cover everything from what the bug does to how to tell if your site is at risk and how certificate authorities are responding.
Panel of CASC members:
• Robin Alden- Comodo
• Jeremy Rowley- DigiCert
• Bruce Morton- Entrust
• Rick Andrews- Symantec
• Wayne Thayer- Go Daddy
Watch the recording: http://bit.ly/1jAQCtk
New Ideas on CAA, CT and Public Key Pinning for a Safer InternetCASCouncil
The CASC RSA 2014 Presentation- TECH-T09
New Ideas on CAA, CT, and Public Key Pinning for a Safer Internet
Kirk Hall- Operations Director, Trust ServiceTrend Micro
Rick Andrews- Senior Technical Director for Trust Services Symantec
Wayne Thayer- VP and GM, Security Products GoDaddy
Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements CASCouncil
The document outlines the CA/Browser Forum's phases of deprecating and revoking certificates for internal domain names, including commonly used TLDs like .local and .private. It began in 2009 by proposing to expand reserved names, launched a public review of requirements in 2011, made the requirements effective in 2012 by requiring CAs to notify customers of the change, and set revocation dates between 2015-2016. It also discusses the forum's rules for certificates containing new gTLDs once they are approved.
Please join the CASC for a Hangout covering that State of the Web. Topics covered :
The move to 2048-bit certificates
The move to ShA2
TLS 1.2
EV certificates
Revocation checking
Always on SSL
PFS
New gTLDs
Members from Comodo, DigiCert, Entrust, and GoDaddy.
Robin Alden- Comodo
Jeremy Rowley- DigiCert
Bruce Morton- Entrust
Wayne Thayer- Go Daddy
Rick Andrews- Symantec
Trust Service Providers: Self-Regulatory ProcessesCASCouncil
1. The document outlines Ben Wilson's experience in cybersecurity standards including BS 7799 in 1995-1996 and work with CA/Browser Forum and ETSI on guidelines for EV SSL certificates and security requirements from 2005-2013.
2. It also summarizes an academic paper on the process of private rule-making, including agenda-setting, problem identification, decision-making, implementation, and evaluation.
3. Key aspects of effective self-regulation discussed are addressing problems through research and standards changes, choosing best practices, transparency, self-auditing, and cooperation between private organizations and government.
The document discusses several proposals to improve SSL certificate security standards, including Certificate Transparency (CT), Certificate Authority Authorization (CAA), and public key pinning. CT aims to prevent misissued certificates by logging all certificates and allowing public audits. CAA allows domain owners to specify which CAs are authorized to issue certificates for their domain. Key pinning reduces the threat surface by having browsers only accept certificates from pre-approved CAs for a given site. While these proposals enhance security, there are also challenges to their adoption and deployment across the existing CA ecosystem. Overall the document presents an optimistic view that ongoing improvements through industry collaboration can strengthen SSL/TLS security over time.
This document summarizes the chronology of frameworks for CA self-governance from 1995-2013. It discusses the CA/Browser Forum guidelines, WebTrust program for CAs, baseline requirements, and efforts of the CA Security Council to advance security. The path ahead involves addressing SSL/TLS vulnerabilities, improving audit coordination, and increasing public education on secure SSL/TLS implementation.
DigiCert supports the concept of certificate transparency which provides insight into issued SSL certificates and better remediation. Certificate transparency logs all certificates issued and enables fast detection of mis-issued certificates. While DigiCert has already implemented certificate transparency, questions remain regarding log security, privacy, and exemptions that require discussion before industry-wide adoption. Overall, certificate transparency enhances security without introducing unintended consequences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
The web is moving towards a 100% Encrypted Web—but can we get it, right? Understanding the surge in use of https for malware and phishing, the renewed importance of revocation checking, the role of browser UI design in protecting users, the renewed importance of identity in TLS certificates, and the latest industry studies and initiatives for a safer Internet.
Payments Security – Vital Information all Payment Processors need to knowCASCouncil
CASC Member Dean Coclin, Symantec's Transact conference 2016 presentation on the CA/B Forum, the problem with SHA-1 and future solutions to the problem.
The document provides an overview and results of an audit conducted by the Online Trust Alliance (OTA) of email authentication, site security, privacy practices, and mandated security requirements of 13 free electronic tax filing websites. Key findings include: 4 sites failed on email authentication, 3 sites failed on site security, privacy practices and data sharing by the sites were unexpected and concerning, and while most sites followed IRS mandates on SSL certificates and domains, challenge/response for account setup was only implemented by 38% of sites. The OTA aims to promote best practices to enhance online trust and security.
CA/Browser Forum—To effect positive changes to improve internet security CASCouncil
The document discusses the CA/Browser Forum, which advances best practices for certificate authorities (CAs) and browser vendors. It outlines the forum's members and activities, including developing guidelines like the Baseline Requirements. CAs must adhere to these guidelines to issue publicly-trusted certificates recognized by major browsers. The forum is open to CAs and browsers, governed by bylaws, and communicates through websites and meetings to improve internet security.
Update on the Work of the CA / Browser ForumCASCouncil
This document summarizes updates from various root programs and working groups related to digital certificates. It discusses recent developments in Microsoft, Google, Apple, Adobe and Mozilla's root programs, as well as technical advances regarding .onion domains, certificate transparency, SHA1 deprecation, short-lived certificates, and IPv6 support. It also provides updates on the CA/Browser Forum working groups for code signing, policy review, validation and security information sharing. Finally, it lists upcoming CA/Browser Forum meetings in June and October of 2015.
Online commerce requires trust. Certificate Authorities provide that trust through SSL certificates. EV-SSL (the EV stands for Extended Validation) provides the gold standard for SSL certificates. Merchants must undergo a rigorous process to obtain an EV-SSL certificate, and how browsers display the certificate is different than a normal SSL certificate.
This document summarizes developments within the CA/Browser Forum in 2014. It discusses new working groups on code signing and policy/information sharing. Key topics of discussion included the SHA-1 deprecation timeline, the Heartbleed vulnerability, and how to define the scope and requirements of SSL certificates. Current discussions focus on issues like certificate authority authorization records and the proposed retirement of SHA-1 in browsers.
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
Join the CASC Wednesday April 30 for a Google+ hangout on the Heartbleed Bug. We’ll cover everything from what the bug does to how to tell if your site is at risk and how certificate authorities are responding.
Panel of CASC members:
• Robin Alden- Comodo
• Jeremy Rowley- DigiCert
• Bruce Morton- Entrust
• Rick Andrews- Symantec
• Wayne Thayer- Go Daddy
Watch the recording: http://bit.ly/1jAQCtk
New Ideas on CAA, CT and Public Key Pinning for a Safer InternetCASCouncil
The CASC RSA 2014 Presentation- TECH-T09
New Ideas on CAA, CT, and Public Key Pinning for a Safer Internet
Kirk Hall- Operations Director, Trust ServiceTrend Micro
Rick Andrews- Senior Technical Director for Trust Services Symantec
Wayne Thayer- VP and GM, Security Products GoDaddy
Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements CASCouncil
The document outlines the CA/Browser Forum's phases of deprecating and revoking certificates for internal domain names, including commonly used TLDs like .local and .private. It began in 2009 by proposing to expand reserved names, launched a public review of requirements in 2011, made the requirements effective in 2012 by requiring CAs to notify customers of the change, and set revocation dates between 2015-2016. It also discusses the forum's rules for certificates containing new gTLDs once they are approved.
Please join the CASC for a Hangout covering that State of the Web. Topics covered :
The move to 2048-bit certificates
The move to ShA2
TLS 1.2
EV certificates
Revocation checking
Always on SSL
PFS
New gTLDs
Members from Comodo, DigiCert, Entrust, and GoDaddy.
Robin Alden- Comodo
Jeremy Rowley- DigiCert
Bruce Morton- Entrust
Wayne Thayer- Go Daddy
Rick Andrews- Symantec
Trust Service Providers: Self-Regulatory ProcessesCASCouncil
1. The document outlines Ben Wilson's experience in cybersecurity standards including BS 7799 in 1995-1996 and work with CA/Browser Forum and ETSI on guidelines for EV SSL certificates and security requirements from 2005-2013.
2. It also summarizes an academic paper on the process of private rule-making, including agenda-setting, problem identification, decision-making, implementation, and evaluation.
3. Key aspects of effective self-regulation discussed are addressing problems through research and standards changes, choosing best practices, transparency, self-auditing, and cooperation between private organizations and government.
The document discusses several proposals to improve SSL certificate security standards, including Certificate Transparency (CT), Certificate Authority Authorization (CAA), and public key pinning. CT aims to prevent misissued certificates by logging all certificates and allowing public audits. CAA allows domain owners to specify which CAs are authorized to issue certificates for their domain. Key pinning reduces the threat surface by having browsers only accept certificates from pre-approved CAs for a given site. While these proposals enhance security, there are also challenges to their adoption and deployment across the existing CA ecosystem. Overall the document presents an optimistic view that ongoing improvements through industry collaboration can strengthen SSL/TLS security over time.
This document summarizes the chronology of frameworks for CA self-governance from 1995-2013. It discusses the CA/Browser Forum guidelines, WebTrust program for CAs, baseline requirements, and efforts of the CA Security Council to advance security. The path ahead involves addressing SSL/TLS vulnerabilities, improving audit coordination, and increasing public education on secure SSL/TLS implementation.
DigiCert supports the concept of certificate transparency which provides insight into issued SSL certificates and better remediation. Certificate transparency logs all certificates issued and enables fast detection of mis-issued certificates. While DigiCert has already implemented certificate transparency, questions remain regarding log security, privacy, and exemptions that require discussion before industry-wide adoption. Overall, certificate transparency enhances security without introducing unintended consequences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.