The Western Wall is part of the Second Temple built in Jerusalem 2500 years ago. It contains some of the heaviest stones ever used in building. Above the Wall is the golden-domed Stone Mosque, the third holiest site in Islam. Below, Jews pray for the restoration of the First Temple, the most important site for Judaism. The tunnel entrance provides access below the original floor from the time of the Second Temple.
The document contains photographs taken by Ivan Szedo on July 8, 2010 of various floating restaurants located on the River Danube in Budapest, Hungary. The photos depict both the exteriors and interiors of multiple ships that serve as restaurants, including the Fortuna, Vogue, Duchess Zsofia, Blue River Pub, Aquamarine, and others. The photos show the dining areas, bars, decks, bedrooms, and balconies aboard the floating restaurants.
The document is a 24 slide presentation about the Stanley Hotel in Estes Park, Colorado. It includes photos of the exterior, lobby, ballroom and grounds of the historic hotel. The presentation was created by Ivan Szedo and encourages viewers to share their opinions and feedback via email.
The Jewish community in Mikulov, Czech Republic originated in the 15th century when Jews expelled from Vienna and parts of Austria settled there. Another influx of Jews came after expulsions from nearby Moravian towns. The Jews established their own quarter in Mikulov and were granted self-government and privileges in 1591. By the 16th century, Mikulov had become one of the largest Jewish communities in Moravia and was an important spiritual center for Judaism in the region.
This document appears to be a collection of 21 photographs taken in Mikulov, Czech Republic on October 14, 2008 by Ivan Szedo. The photographs are unlabeled but were compiled into a PowerPoint file by Ivan Szedo with his contact information provided.
The document discusses poppies, lands, plants and insects as seen in photographs taken by Ivan Szedo in 2009. It provides a link to Szedo's website containing more of his nature photographs but warns that copying the pictures is forbidden without permission.
The Western Wall is part of the Second Temple built in Jerusalem 2500 years ago. It contains some of the heaviest stones ever used in building. Above the Wall is the golden-domed Stone Mosque, the third holiest site in Islam. Below, Jews pray for the restoration of the First Temple, the most important site for Judaism. The tunnel entrance provides access below the original floor from the time of the Second Temple.
The document contains photographs taken by Ivan Szedo on July 8, 2010 of various floating restaurants located on the River Danube in Budapest, Hungary. The photos depict both the exteriors and interiors of multiple ships that serve as restaurants, including the Fortuna, Vogue, Duchess Zsofia, Blue River Pub, Aquamarine, and others. The photos show the dining areas, bars, decks, bedrooms, and balconies aboard the floating restaurants.
The document is a 24 slide presentation about the Stanley Hotel in Estes Park, Colorado. It includes photos of the exterior, lobby, ballroom and grounds of the historic hotel. The presentation was created by Ivan Szedo and encourages viewers to share their opinions and feedback via email.
The Jewish community in Mikulov, Czech Republic originated in the 15th century when Jews expelled from Vienna and parts of Austria settled there. Another influx of Jews came after expulsions from nearby Moravian towns. The Jews established their own quarter in Mikulov and were granted self-government and privileges in 1591. By the 16th century, Mikulov had become one of the largest Jewish communities in Moravia and was an important spiritual center for Judaism in the region.
This document appears to be a collection of 21 photographs taken in Mikulov, Czech Republic on October 14, 2008 by Ivan Szedo. The photographs are unlabeled but were compiled into a PowerPoint file by Ivan Szedo with his contact information provided.
The document discusses poppies, lands, plants and insects as seen in photographs taken by Ivan Szedo in 2009. It provides a link to Szedo's website containing more of his nature photographs but warns that copying the pictures is forbidden without permission.
El documento describe un restaurante alemán ubicado a 17 km de Frankfurt que sirve grandes porciones de comida como schnitzels y salchichas de hasta 600 gramos, así como bebidas como cerveza y cócteles de varios litros. La conversación entre amigos sugiere que probarán varios platillos abundantes y compartirán anécdotas sobre comidas copiosas.
The document discusses photographs taken by Ivan Szedo in 2010 of Anasazi Indian dwellings and drawings located in Canyonland, Utah. It provides the date and subject of 14 photographs and includes a thank you from the photographer as well as a link to another slideshow and his email for opinions.
Karlovy Vary es una ciudad balneario en la República Checa conocida por sus fuentes termales, que recibió su nombre en honor al emperador Carlos IV. Fue un popular destino turístico en el siglo XIX para tratamientos termales y hoy en día también es conocida por su festival de cine internacional y el licor Becherovka.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health over time.
The document is a 17 slide presentation by Ivan Szedo about the Denver Art Museum. It provides details over 15 numbered slides about exhibits at the museum followed by a request for opinions to be sent to the author's email and links to older presentations. The presentation gives an overview of artwork and exhibits featured at the Denver Art Museum on June 15, 2012.
The document describes photos taken during a shopping trip in Bali Island, Indonesia in 2009. It includes photos from a silver shop showing silverware workshops, a woodcarver's shop with examples of their works, and a batik shop with pictures of batik art. The document provides links to additional photo presentations from Bali Island and notices that copying or distributing the pictures is forbidden.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...AlexanderRichford
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation Functions to Prevent Interaction with Malicious QR Codes.
Aim of the Study: The goal of this research was to develop a robust hybrid approach for identifying malicious and insecure URLs derived from QR codes, ensuring safe interactions.
This is achieved through:
Machine Learning Model: Predicts the likelihood of a URL being malicious.
Security Validation Functions: Ensures the derived URL has a valid certificate and proper URL format.
This innovative blend of technology aims to enhance cybersecurity measures and protect users from potential threats hidden within QR codes 🖥 🔒
This study was my first introduction to using ML which has shown me the immense potential of ML in creating more secure digital environments!
Discover the Unseen: Tailored Recommendation of Unwatched ContentScyllaDB
The session shares how JioCinema approaches ""watch discounting."" This capability ensures that if a user watched a certain amount of a show/movie, the platform no longer recommends that particular content to the user. Flawless operation of this feature promotes the discover of new content, improving the overall user experience.
JioCinema is an Indian over-the-top media streaming service owned by Viacom18.
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
El documento describe un restaurante alemán ubicado a 17 km de Frankfurt que sirve grandes porciones de comida como schnitzels y salchichas de hasta 600 gramos, así como bebidas como cerveza y cócteles de varios litros. La conversación entre amigos sugiere que probarán varios platillos abundantes y compartirán anécdotas sobre comidas copiosas.
The document discusses photographs taken by Ivan Szedo in 2010 of Anasazi Indian dwellings and drawings located in Canyonland, Utah. It provides the date and subject of 14 photographs and includes a thank you from the photographer as well as a link to another slideshow and his email for opinions.
Karlovy Vary es una ciudad balneario en la República Checa conocida por sus fuentes termales, que recibió su nombre en honor al emperador Carlos IV. Fue un popular destino turístico en el siglo XIX para tratamientos termales y hoy en día también es conocida por su festival de cine internacional y el licor Becherovka.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health over time.
The document is a 17 slide presentation by Ivan Szedo about the Denver Art Museum. It provides details over 15 numbered slides about exhibits at the museum followed by a request for opinions to be sent to the author's email and links to older presentations. The presentation gives an overview of artwork and exhibits featured at the Denver Art Museum on June 15, 2012.
The document describes photos taken during a shopping trip in Bali Island, Indonesia in 2009. It includes photos from a silver shop showing silverware workshops, a woodcarver's shop with examples of their works, and a batik shop with pictures of batik art. The document provides links to additional photo presentations from Bali Island and notices that copying or distributing the pictures is forbidden.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...AlexanderRichford
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation Functions to Prevent Interaction with Malicious QR Codes.
Aim of the Study: The goal of this research was to develop a robust hybrid approach for identifying malicious and insecure URLs derived from QR codes, ensuring safe interactions.
This is achieved through:
Machine Learning Model: Predicts the likelihood of a URL being malicious.
Security Validation Functions: Ensures the derived URL has a valid certificate and proper URL format.
This innovative blend of technology aims to enhance cybersecurity measures and protect users from potential threats hidden within QR codes 🖥 🔒
This study was my first introduction to using ML which has shown me the immense potential of ML in creating more secure digital environments!
Discover the Unseen: Tailored Recommendation of Unwatched ContentScyllaDB
The session shares how JioCinema approaches ""watch discounting."" This capability ensures that if a user watched a certain amount of a show/movie, the platform no longer recommends that particular content to the user. Flawless operation of this feature promotes the discover of new content, improving the overall user experience.
JioCinema is an Indian over-the-top media streaming service owned by Viacom18.
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Introducing BoxLang : A new JVM language for productivity and modularity!Ortus Solutions, Corp
Just like life, our code must adapt to the ever changing world we live in. From one day coding for the web, to the next for our tablets or APIs or for running serverless applications. Multi-runtime development is the future of coding, the future is to be dynamic. Let us introduce you to BoxLang.
Dynamic. Modular. Productive.
BoxLang redefines development with its dynamic nature, empowering developers to craft expressive and functional code effortlessly. Its modular architecture prioritizes flexibility, allowing for seamless integration into existing ecosystems.
Interoperability at its Core
With 100% interoperability with Java, BoxLang seamlessly bridges the gap between traditional and modern development paradigms, unlocking new possibilities for innovation and collaboration.
Multi-Runtime
From the tiny 2m operating system binary to running on our pure Java web server, CommandBox, Jakarta EE, AWS Lambda, Microsoft Functions, Web Assembly, Android and more. BoxLang has been designed to enhance and adapt according to it's runnable runtime.
The Fusion of Modernity and Tradition
Experience the fusion of modern features inspired by CFML, Node, Ruby, Kotlin, Java, and Clojure, combined with the familiarity of Java bytecode compilation, making BoxLang a language of choice for forward-thinking developers.
Empowering Transition with Transpiler Support
Transitioning from CFML to BoxLang is seamless with our JIT transpiler, facilitating smooth migration and preserving existing code investments.
Unlocking Creativity with IDE Tools
Unleash your creativity with powerful IDE tools tailored for BoxLang, providing an intuitive development experience and streamlining your workflow. Join us as we embark on a journey to redefine JVM development. Welcome to the era of BoxLang.
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Wiki project3 (1)
1. Circe: Odysseus and
his men stay withScheria: After washing up
her
for a year while she the Phaeacians help
here, Cicones: Odysseus
Odysseus and send him
gives directions to the and his men attack
Underworld and home to Ithaca. the tribe and lose
suggests routes back Scylla and Charybdis: some men.
to Ithaca. Odysseus loses six men to Troy: battleground of
Cyclopes: At Polyphemos’
the monster Scylla. Trojan war
Underworld: cave, four men are killed,
Odysseus seeks and Poseidon curses
Teiresias’ advice and Odysseus for his actions.
Ogygia: The nymph
meets souls of the Ithaca: Odysseus’ home
Calypso imprisons
dead.
Odysseus for years, but Helios: Odysseus and his
the god Hermes
Laestrygonians: The men are stranded for a
ultimately convinces
giants eat some of month when the men
her to free Odysseus. destroy
the men and Lotus-eaters: slaughter Helios’ cattle, so
feed Odysseus’ men fruit
most of Odysseus’ Odysseus hasprompting Zeus to cause
to force them to leave.
ships. the death of all of
Odysseus’ men.