Slides from the XPath tutorial given by Arne Blankerts and me on the IPC 2009. We did a lot of life hacking during the session, so the slides are not that extensive.
All you need to know about XPath 1.0 in a web scraping project: the different axes, attribute matching, string functions, EXSLT extensions plus a few other handy patterns like CSS selectors and Javascript parsing.
This document provides an introduction to XML Path Language (XPath), which is a syntax for locating information in an XML document. It describes the different node types in an XML document and XPath tree, such as element nodes, attribute nodes, and text nodes. It also explains some basic XPath concepts like axes, node tests, and location paths that allow navigating the XPath tree using steps separated by axes and node tests. Some examples of XPath functions and operators for manipulating node sets returned from location paths are also presented. Finally, it provides sample XML documents and uses XPath to select nodes and extract information from them.
This document provides an agenda for a presentation on XML DOM functionality in .NET. The presentation covers loading XML data into an XmlDocument object, working with child nodes, retrieving nodes that match criteria using XPath expressions, selecting single nodes, and retrieving node attributes. It demonstrates these concepts using a sample XML file representing a grocery store inventory. The conclusion emphasizes that the XmlDocument class represents an entire XML document in memory and supports loading, reading, and writing XML data using DOM functionality.
XPath is a language for selecting nodes in an XML document. It uses path expressions that navigate the hierarchical structure of XML. Path expressions select nodes or node-sets using steps, axes, predicates and wildcards. XPath is commonly used with XSLT to transform XML documents into other formats. It contains functions like position(), count(), and last() to retrieve information about nodes.
The document outlines Java 8's Stream API. It discusses stream building blocks like default methods, functional interfaces, lambda expressions, and method references. It describes characteristics of streams like laziness and parallelization. It covers creating streams from collections, common functional interfaces, and the anatomy of a stream pipeline including intermediate and terminal operations. It provides examples of common stream API methods like forEach, map, filter, findFirst, toArray, collect, and reduce.
Start programming in a more functional style in Java. This is the second in a two part series on lambdas and streams in Java 8 presented at the JoziJug.
All you need to know about XPath 1.0 in a web scraping project: the different axes, attribute matching, string functions, EXSLT extensions plus a few other handy patterns like CSS selectors and Javascript parsing.
This document provides an introduction to XML Path Language (XPath), which is a syntax for locating information in an XML document. It describes the different node types in an XML document and XPath tree, such as element nodes, attribute nodes, and text nodes. It also explains some basic XPath concepts like axes, node tests, and location paths that allow navigating the XPath tree using steps separated by axes and node tests. Some examples of XPath functions and operators for manipulating node sets returned from location paths are also presented. Finally, it provides sample XML documents and uses XPath to select nodes and extract information from them.
This document provides an agenda for a presentation on XML DOM functionality in .NET. The presentation covers loading XML data into an XmlDocument object, working with child nodes, retrieving nodes that match criteria using XPath expressions, selecting single nodes, and retrieving node attributes. It demonstrates these concepts using a sample XML file representing a grocery store inventory. The conclusion emphasizes that the XmlDocument class represents an entire XML document in memory and supports loading, reading, and writing XML data using DOM functionality.
XPath is a language for selecting nodes in an XML document. It uses path expressions that navigate the hierarchical structure of XML. Path expressions select nodes or node-sets using steps, axes, predicates and wildcards. XPath is commonly used with XSLT to transform XML documents into other formats. It contains functions like position(), count(), and last() to retrieve information about nodes.
The document outlines Java 8's Stream API. It discusses stream building blocks like default methods, functional interfaces, lambda expressions, and method references. It describes characteristics of streams like laziness and parallelization. It covers creating streams from collections, common functional interfaces, and the anatomy of a stream pipeline including intermediate and terminal operations. It provides examples of common stream API methods like forEach, map, filter, findFirst, toArray, collect, and reduce.
Start programming in a more functional style in Java. This is the second in a two part series on lambdas and streams in Java 8 presented at the JoziJug.
Sedna XML Database: Query Parser & Optimizing RewriterIvan Shcheklein
The document discusses Sedna, an XML query parser and optimizer. It describes:
1) The goals of supporting a wide range of queries while achieving high performance.
2) The query processing steps of parsing, analysis, optimization, and physical plan generation.
3) The optimizing rewriter removes unnecessary operations through rewriting rules like combining // steps or removing duplicate nodes.
Architecture of Native XML Database Sednamaria.grineva
Sedna is a document database with APIs for C, Java, Scheme, OmniMark, Python, PHP, and .Net. The core C API allows for session management, transactions, query execution and result processing, and data loading. The Sedna architecture also includes an open socket protocol and extensibility of the basic C API to create new APIs.
In this Meetup Victor Perepelitsky - R&D Technical Leader at LivePerson leading the 'Real Time Event Processing Platform' team , will talk about Java 8', 'Stream API', 'Lambda', and 'Method reference'.
Victor will clarify what functional programming is and how can you use java 8 in order to create better software.
Victor will also cover some pain points that Java 8 did not solve regarding functionality and see how you can work around it.
This document contains the slides for a presentation on Java 8 Lambdas and Streams. The presentation will cover lambdas, including their concept, syntax, functional interfaces, variable capture, method references, and default methods. It will also cover streams. The slides provide some incomplete definitions that will be completed during the presentation. Questions from attendees are welcome. A quick survey asks about past experience with lambdas and streams.
Lambda expressions allow implementing functional interfaces using anonymous functions. Method references provide a shorthand syntax for referring to existing methods as lambda expressions. The Stream API allows functional-style operations on streams of values, including intermediate and terminal operations. The new Date/Time API provides a safer and more comprehensive replacement for the previous date/time classes in Java.
The document discusses combinator libraries and domain-specific languages (DSLs) in F#. It explains that combinator libraries allow defining DSLs that embed in a host language. It provides examples of using F# to define DSLs for expressions, HTML, and forms. The document also discusses how F# features like algebraic data types and quotations enable easily defining and compiling DSLs to other languages.
An Annotation Framework for Statically-Typed Syntax TreesRay Toal
This document presents an annotation framework for statically typed syntax trees that allows generating parsers and abstract syntax trees from annotated context-free grammars. Key contributions include a grammar-independent annotation approach, a definition of statically typed AST specifications, and a prototype parser generator. The framework uses annotations to specify the types of values nodes produce, supporting scalar, string, node reference, and list values. An example grammar for a simple language is annotated to demonstrate the approach. The prototype implementation generates scanners, parsers producing the specified ASTs, AST node classes, and visitor code from annotated grammars.
Lambda expressions, default methods in interfaces, and the new date/time API are among the major new features in Java 8. Lambda expressions allow for functional-style programming by treating functionality as a method argument or anonymous implementation. Default methods add new capabilities to interfaces while maintaining backwards compatibility. The date/time API improves on the old Calendar and Date APIs by providing immutable and easier to use classes like LocalDate.
This seminar presentation provides an overview of YACC (Yet Another Compiler Compiler). It discusses what compilers do, the structure of compilers including scanners, parsers, semantic routines, code generators and optimizers. It then reviews parsers and how YACC works by taking a grammar specification and generating C code for a parser. YACC declarations and commands are also summarized.
The HTTP protocol adheres to the functional programming paradigm. This talk looks at HTTP on .NET and illustrates how F# allows for a more direct correlation to the patterns of composition inherent in the design of HTTP.
10 Lines or Less; Interesting Things You Can Do In Java With Minimal CodeKathy Brown
This document provides 10 lines of Java code examples for working with files and images in IBM Notes/Domino. It discusses reading and writing files using different methods like FileChannel and BufferedReader. It also demonstrates how to create a thumbnail image from a file attachment and embed it in a rich text field as a MIME object rather than a file attachment. The document emphasizes using try/finally blocks to properly close streams and considers server permissions and memory usage implications.
The document discusses object-oriented programming (OOP) and functional programming (FP). It argues that OOP and FP are not opposites and can be effectively combined. It addresses common myths about FP, such as that it is new, hard, or only suitable for mathematical problems. The document also compares how OOP and FP approach concepts like decomposition, composition, error handling, and mutability/referential transparency. While both approaches have merits, the document concludes there is no single best approach and the choice depends on the problem and programmer preferences.
BP107: Ten Lines Or Less: Interesting Things You Can Do In Java With Minimal ...panagenda
Don’t be afraid of Java! Many IBM Notes/Domino developers, both new and seasoned, have an irrational fear of learning and using Java because it seems overwhelming. Julian and Kathy will help you over this stumbling block with several short, understandable, and useful examples of Java that you can learn from. All of the examples will be ten lines of code or less, making them approachable and easy to understand. And we will show you how to integrate the Java code with an XPages application so you can get started right away.
A function provides a convenient way of packaging a computational recipe, so that it can be used as often as required. A function definition consists of two parts: interface and body. The interface of a function (also called its prototype) specifies how it may be used. It consists of three entities:
The function name. This is simply a unique identifier.
The function parameters (also called its signature). This is a set of zero or more typed identifiers used for passing values to and from the function.
The function return type. This specifies the type of value the function returns. A function which returns nothing should have the return type void.
The body of a function contains the computational steps (statements) that comprise the function.
The document discusses lambda expressions in Java 8. It defines lambda expressions as anonymous functions that can be passed around as method parameters or returned from methods. Lambda expressions allow treating functions as first-class citizens in Java by letting functions be passed around as arguments to other functions. The document provides examples of lambda expressions in Java 8 and how they can be used with functional interfaces, method references, the forEach() method, and streams. It also discusses scope and type of lambda expressions and provides code samples demonstrating streams and stream pipelines.
This document contains information about Lex, Yacc, Flex, and Bison. It provides definitions and descriptions of each tool. Lex is a lexical analyzer generator that reads input specifying a lexical analyzer and outputs C code implementing a lexer. Yacc is a parser generator that takes a grammar description and snippets of C code as input and outputs a shift-reduce parser in C. Flex is a tool similar to Lex for generating scanners based on regular expressions. Bison is compatible with Yacc and can be used to develop language parsers.
Presentation provides introduction and detailed explanation of the Java 8 Lambda and Streams. Lambda covers with Method references, default methods and Streams covers with stream operations,types of streams, collectors. Also streams are elaborated with parallel streams and benchmarking comparison of sequential and parallel streams.
Additional slides are covered with Optional, Splitators, certain projects based on lambda and streams
Slides from our XML workshop on the International PHP Conference 2009 in Karlsruhe. Not that much information in here, since we did a lot of live stuff. But hopefully still valueable.
Sedna XML Database: Query Parser & Optimizing RewriterIvan Shcheklein
The document discusses Sedna, an XML query parser and optimizer. It describes:
1) The goals of supporting a wide range of queries while achieving high performance.
2) The query processing steps of parsing, analysis, optimization, and physical plan generation.
3) The optimizing rewriter removes unnecessary operations through rewriting rules like combining // steps or removing duplicate nodes.
Architecture of Native XML Database Sednamaria.grineva
Sedna is a document database with APIs for C, Java, Scheme, OmniMark, Python, PHP, and .Net. The core C API allows for session management, transactions, query execution and result processing, and data loading. The Sedna architecture also includes an open socket protocol and extensibility of the basic C API to create new APIs.
In this Meetup Victor Perepelitsky - R&D Technical Leader at LivePerson leading the 'Real Time Event Processing Platform' team , will talk about Java 8', 'Stream API', 'Lambda', and 'Method reference'.
Victor will clarify what functional programming is and how can you use java 8 in order to create better software.
Victor will also cover some pain points that Java 8 did not solve regarding functionality and see how you can work around it.
This document contains the slides for a presentation on Java 8 Lambdas and Streams. The presentation will cover lambdas, including their concept, syntax, functional interfaces, variable capture, method references, and default methods. It will also cover streams. The slides provide some incomplete definitions that will be completed during the presentation. Questions from attendees are welcome. A quick survey asks about past experience with lambdas and streams.
Lambda expressions allow implementing functional interfaces using anonymous functions. Method references provide a shorthand syntax for referring to existing methods as lambda expressions. The Stream API allows functional-style operations on streams of values, including intermediate and terminal operations. The new Date/Time API provides a safer and more comprehensive replacement for the previous date/time classes in Java.
The document discusses combinator libraries and domain-specific languages (DSLs) in F#. It explains that combinator libraries allow defining DSLs that embed in a host language. It provides examples of using F# to define DSLs for expressions, HTML, and forms. The document also discusses how F# features like algebraic data types and quotations enable easily defining and compiling DSLs to other languages.
An Annotation Framework for Statically-Typed Syntax TreesRay Toal
This document presents an annotation framework for statically typed syntax trees that allows generating parsers and abstract syntax trees from annotated context-free grammars. Key contributions include a grammar-independent annotation approach, a definition of statically typed AST specifications, and a prototype parser generator. The framework uses annotations to specify the types of values nodes produce, supporting scalar, string, node reference, and list values. An example grammar for a simple language is annotated to demonstrate the approach. The prototype implementation generates scanners, parsers producing the specified ASTs, AST node classes, and visitor code from annotated grammars.
Lambda expressions, default methods in interfaces, and the new date/time API are among the major new features in Java 8. Lambda expressions allow for functional-style programming by treating functionality as a method argument or anonymous implementation. Default methods add new capabilities to interfaces while maintaining backwards compatibility. The date/time API improves on the old Calendar and Date APIs by providing immutable and easier to use classes like LocalDate.
This seminar presentation provides an overview of YACC (Yet Another Compiler Compiler). It discusses what compilers do, the structure of compilers including scanners, parsers, semantic routines, code generators and optimizers. It then reviews parsers and how YACC works by taking a grammar specification and generating C code for a parser. YACC declarations and commands are also summarized.
The HTTP protocol adheres to the functional programming paradigm. This talk looks at HTTP on .NET and illustrates how F# allows for a more direct correlation to the patterns of composition inherent in the design of HTTP.
10 Lines or Less; Interesting Things You Can Do In Java With Minimal CodeKathy Brown
This document provides 10 lines of Java code examples for working with files and images in IBM Notes/Domino. It discusses reading and writing files using different methods like FileChannel and BufferedReader. It also demonstrates how to create a thumbnail image from a file attachment and embed it in a rich text field as a MIME object rather than a file attachment. The document emphasizes using try/finally blocks to properly close streams and considers server permissions and memory usage implications.
The document discusses object-oriented programming (OOP) and functional programming (FP). It argues that OOP and FP are not opposites and can be effectively combined. It addresses common myths about FP, such as that it is new, hard, or only suitable for mathematical problems. The document also compares how OOP and FP approach concepts like decomposition, composition, error handling, and mutability/referential transparency. While both approaches have merits, the document concludes there is no single best approach and the choice depends on the problem and programmer preferences.
BP107: Ten Lines Or Less: Interesting Things You Can Do In Java With Minimal ...panagenda
Don’t be afraid of Java! Many IBM Notes/Domino developers, both new and seasoned, have an irrational fear of learning and using Java because it seems overwhelming. Julian and Kathy will help you over this stumbling block with several short, understandable, and useful examples of Java that you can learn from. All of the examples will be ten lines of code or less, making them approachable and easy to understand. And we will show you how to integrate the Java code with an XPages application so you can get started right away.
A function provides a convenient way of packaging a computational recipe, so that it can be used as often as required. A function definition consists of two parts: interface and body. The interface of a function (also called its prototype) specifies how it may be used. It consists of three entities:
The function name. This is simply a unique identifier.
The function parameters (also called its signature). This is a set of zero or more typed identifiers used for passing values to and from the function.
The function return type. This specifies the type of value the function returns. A function which returns nothing should have the return type void.
The body of a function contains the computational steps (statements) that comprise the function.
The document discusses lambda expressions in Java 8. It defines lambda expressions as anonymous functions that can be passed around as method parameters or returned from methods. Lambda expressions allow treating functions as first-class citizens in Java by letting functions be passed around as arguments to other functions. The document provides examples of lambda expressions in Java 8 and how they can be used with functional interfaces, method references, the forEach() method, and streams. It also discusses scope and type of lambda expressions and provides code samples demonstrating streams and stream pipelines.
This document contains information about Lex, Yacc, Flex, and Bison. It provides definitions and descriptions of each tool. Lex is a lexical analyzer generator that reads input specifying a lexical analyzer and outputs C code implementing a lexer. Yacc is a parser generator that takes a grammar description and snippets of C code as input and outputs a shift-reduce parser in C. Flex is a tool similar to Lex for generating scanners based on regular expressions. Bison is compatible with Yacc and can be used to develop language parsers.
Presentation provides introduction and detailed explanation of the Java 8 Lambda and Streams. Lambda covers with Method references, default methods and Streams covers with stream operations,types of streams, collectors. Also streams are elaborated with parallel streams and benchmarking comparison of sequential and parallel streams.
Additional slides are covered with Optional, Splitators, certain projects based on lambda and streams
Slides from our XML workshop on the International PHP Conference 2009 in Karlsruhe. Not that much information in here, since we did a lot of live stuff. But hopefully still valueable.
The document summarizes Gary Leonard Dare's presentation on the IP-XACT standard and SPIRIT Consortium. It discusses the SPIRIT Consortium's creation of standards including IP-XACT, its merger with Accellera, and the standardization of IP-XACT as IEEE P1685. It also notes some limitations of IP-XACT including handling external filesets and hierarchical components.
XML and its related technologies are ubiquitous in todays web development. PHP offers many ways to create and process XML content. This workshop will give you an overview on the most important XML extensions for PHP, focussing on the use of XPath in cooperation with them. Do you still scrape web content using regular expressions? Ever wondered you people do all those nifty operations in their XSLTs? Don't know, what axis are in terms of XPath? If you can answer any of the questions above with "yes" or are simply interested in XPath and XML in PHP, you should join this session.
Neos Content Repository – Git for contentRobert Lemke
The core team of the Open Source CMS Neos has been working on a new content repository for the last 8 years. What took us long? The new CR is event-sourced, with sophisticated projections and a thoroughly designed PHP API, something which has not been done before, not even outside the PHP ecosystem. This content repository allows you to work with content similar to managing Code with Git – branches, versioning, and multi-language with fallbacks included. There's a big range of applications for the Neos CR and since it is available as a standalone component, you can use it in any Composer-based project. We'll guide you through the concepts, architecture, and API of the Neos CR, enough for you to start with your own experiments.
Key topics when migrating from FAST to Solr, EuroCon 2010Cominvent AS
Presented during Lucene EuroCon 2010 in Prague. This presentation assumes no prior experience with FAST ESP, but some idea of what Solr/Lucene is. It gives you some hints on what to expect when migrating.
This document summarizes a system called Siphon that is used at Microsoft for streaming and analyzing large volumes of data. Some key points:
- Siphon ingests an average of 3.9 million events per second (800 TB per day) from various data sources and uses over 1,700 Kafka brokers for distribution.
- It provides low latency of 10 seconds for the 99th percentile and is used for real-time analytics and insights for services like Bing, Office 365, and internal tools.
- The document then describes the Siphon architecture with data centers around the world and how it handles streaming, batch processing, and auditing of data.
Il TechAdvisor Roberto Polli condivide l'esperienza maturata su iPython, una potente shell interattiva nata per affiancare la classica shell Bash comunemente utilizzata dagli amministratori di sistema. Attraverso degli esempi pratici mostra le principali differenze tra i due approcci ed aiuta a comprendere quale sia lo strumento più adatto a specifici casi d'uso.
Durante la presentazione mostra inoltre come:
- evitare errori comuni negli script bash;
- velocizzare la creazione di script per l'esecuzione di test mediante la libreria nose;
- riutilizzare moduli Python esistenti nella shell interattiva;
- usare il framework Flask per convertire facilmente gli script in web services.
Code
http://ipython.org/
http://flask.pocoo.org/
http://nose.readthedocs.org/
https://github.com/ioggstream/dsadmin/
Babel
http://www.babel.it
http://vaunaspada.babel.it/blog
While python is widely used for automating administration tasks, it’s not still widely known and used between system administrators.
iPython is an interactive python shell that embeds bash functionalities. We’ll show how to :
* replace some bash tasks avoiding common errors
* resembling some bash behaviour
* create testing (nose) and monitoring scripts
* use flask to expose those scripts on HTTP
This presentation includes basic information related to sockets ,socket-buffer,cliet-server programs and relationship between them
The files included in the ppt for the variables are taken from linux-2.6.10.
In case of any queriers.
contact souravpunoriyar@gmail.com
This document discusses using the IP-XACT standard to address challenges in verification automation. IP-XACT allows generating verification platforms, register tests, and other elements from a single IP description. It standardizes IP information exchange and reduces duplication. Using IP-XACT, a verification flow is proposed where the testbench, models, and register tests are automatically generated from an IP-XACT file, improving consistency and reducing turnaround times. IP-XACT is now an IEEE standard developed by the SPIRIT consortium to describe IPs in a vendor-neutral way and enable maximum automation.
The first compilers were written by hand-translating programs into machine code opcodes. The earliest programs were written directly in binary opcodes by looking up each instruction and its corresponding opcode. Later, the first assemblers were created by hand to automate this process. These early assemblers could then be used to assemble more advanced assemblers and compilers. This process of using each new tool to build the next was called bootstrapping. The first high-level programming language was FORTRAN, created in 1954, which had an optimizing compiler that produced very efficient code and helped establish modern programming practices.
Learning Erlang (from a Prolog dropout's perspective)elliando dias
This document is a presentation by Kenji Rikitake given at the 1000speakers:4 conference on 26-APR-2008 about learning Erlang from the perspective of a former Prolog programmer. It discusses why Rikitake didn't like Prolog in the 1980s, why he is now interested in Erlang, some challenges in learning Erlang, examples of IPv6 string manipulation and parallel processing he will demonstrate, results from concurrency testing using Erlang's built-in parallel map function, and conclusions about Erlang and parallel programming.
This document provides information about installing and configuring Asterisk PBX software on a Linux system. It discusses installing necessary hardware like an X100P FXO card and TDM400P FXS card. It describes configuring the zaptel and zapata files to define the channels for each card. Finally, it briefly discusses setting up SIP by editing the sip.conf and extensions.conf files to register Asterisk with a SIP proxy.
Riot Games Scalable Data Warehouse Lecture at UCSB / UCLAsean_seannery
This is a talk that was given for the Scalable Internet Services Masters-level Computer Science class at UCLA and UCSB. It briefly discusses the server architecture for the game League of Legends before going into depth about how the data warehouse can hold petabytes of player data. Discussion about message queue architecture and scalability occurs along the way
IN JAVA BJP5 Exercise 6.19 leetSpeak LanguageType Java file pr.pdfarkmuzikllc
IN JAVA
BJP5 Exercise 6.19: leetSpeak Language/Type: Java file processing Scanner Author: Marty
Stepp (on 2019/09/19) Write a method leetSpeak that accepts two parameters: a Scanner
representing an input file, and a PrintStream representing an output file. Your method should
convert the input file's text to "leet speak" (aka 1337 speak), an internet dialect where various
letters are replaced by other letters/numbers. Output the leet version of the text to the given
output file. Preserve the original line breaks from the input. Also wrap each word of input in
parentheses. Perform the following replacements: For example, if the input file lincoln.txt
contains the following text: four score and seven years ago our fathers brought forth on this
continent a new nation And your method is called in the following way: Scanner input = new
Scanner(new File("lincoln.txt")); PrintStream output = new PrintStream(new File("leet.txt"));
leetSpeak(input, output); Then after the call, the output file leet.txt should contain the following
text: (four) (scor3) (4nd) (s3v3n)(y34rz)(4g) (Our) (f47h3rz) (brough7) (for7h) (0n) (7hiz)
(c0n7in3n7) (4) (n3w) (n47ion) You may assume that each token from the input file is separated
by exactly one space. Hint: You may want to use the String object's replace method, which is
used as follows: String str = "mississippi"; str = str.replace("s", "*"); // str = "mi**i**ippi" Type
your solution here:.
The document discusses the architecture and programming of 8-bit and 16-bit microprocessors. It covers the objectives of studying the architecture, instruction set, and peripheral interfacing of the 8085 and 8086 microprocessors. It provides details on the architecture, registers, instruction set, addressing modes of the 8085 microprocessor. It also discusses the architecture, registers, features, memory segmentation and addressing of the 8086 microprocessor.
Linux rumpkernel - ABC2018 (AsiaBSDCon 2018)Hajime Tazaki
This document discusses Linux rumpkernel and the LKL (Linux Kernel Library). It introduces LKL as a library that allows running unmodified Linux kernel code in various configurations like application libraries and microkernels. LKL transforms a monolithic kernel code into a reusable library called liblkl by outsourcing machine-dependent code and keeping application and kernel code untouched. It provides different interfaces for applications to interact with the LKL kernel, including direct syscalls, hijacking the host library, or extending an alternative libc. Various usages of LKL are also presented, such as running a network stack in userspace (NUSE), building unikernels, and doing network simulation with ns-3 using the Linux network stack.
Embedded Recipes 2017 - An easy-to-install real world embedded Linux distribu...Anne Nicolas
Atom Linux is an open source project still in early starting phase. Its purpose is to give the user a way to easily create a robust and secure embedded Linux system. The user downloads a bootstrap image, then configures the utilities (servers…) and libraries needed by its custom code. Except its own code, he doesn’t need to do any compilation, the system automatically downloads prebuilt packages from the Atom Linux server. The Atom Linux system is built with robustness and security in mind. Among other features, it provides secured multi-partitioned update system and power supply fault tolerance.
Christophe BLAESS, Logilin
The document describes Takeoka's Raspberry Pi cluster consisting of 3 nodes with a total of 6 processor cores. The cluster provides low-cost computing power and acts as a gateway and file server for Takeoka's home network. Takeoka hopes that future technologies like MRAM will enable new "normally off computing" architectures with even lower power consumption by allowing complete powering off of systems when not in use.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
XPath - A practical guide
1. XPath - A practical guide
Arne Blankerts <arne@thephp.cc>, TobiasSchlitt <toby@php.net>
IPC 2009
2009-11-17
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 1 / 26
2. Outline
1 Welcome
2 Introduction
3 In details
4 Quiz
5 The end
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 2 / 26
3. Arne Blankerts
Arne Blankerts <arne@thephp.cc>
PHP since 1999 (10 years of PHP!)
Co-Founder of thePHP.cc
ballyhoo. werbeagentur.
Open source addicted
Inventor and lead developer of fCMS site
system
Contributor and translator for the PHP manual
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 3 / 26
4. Tobias Schlitt
Tobias Schlitt <toby@php.net>
PHP since 2001
Freelancing consultant
Qualified IT Specialist
Studying CS at TU Dortmund
(finishing 2010)
OSS addicted
PHP
eZ Components
PHPUnit
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 4 / 26
5. Outline
1 Welcome
2 Introduction
Overview
Basics
3 In details
4 Quiz
5 The end
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 5 / 26
6. Overview
XPath
Enables you to select information parts from XML documents.
Traverse the XML tree
Select XML nodes
W3C recommendation
Version 1: November 1999
Version 2: January 2007
Fields of application
XSLT (XML Stylesheet Language Transformations)
Fetching XML nodes within programming languages
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 6 / 26
7. Addressing
Every XPath expression matches a set of nodes (0..n)
It encodes an “address” for the selected nodes
Simple XPath expressions look similar to Unix file system addresses
Absolute vs. relative addressing
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 7 / 26
8. Practical
Let’s dig into the code
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 8 / 26
9. Outline
1 Welcome
2 Introduction
3 In details
Syntax
Specialities
Functions
Axis
PHP function integration
4 Quiz
5 The end
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 9 / 26
11. Contexts
Every expression step creates new context
Next evaluated in context created by previous step
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 11 / 26
12. Navigation
/ One level down
// Any number of levels down
../ One level up
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 12 / 26
13. Practical
Let’s dig into the code
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 13 / 26
14. Indexing
Access nodes by position: [2]
Start index
Indexing generally 1 based
Some Internet Explorer versions start with 0
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 14 / 26
15. Union
Union the node sets selected by multiple XPath expressions.
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 15 / 26
16. Practical
Let’s dig into the code
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 16 / 26
17. Functions
String Context
string-join() position()
substring() last()
starts-with() Aggregate
contains() count()
string-length() min() / max()
Math Node
round() local-name()
floor() Logic
not()
true()
Function overview
An overview on all functions can be found on
http://www.w3.org/TR/xpath-functions/
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 17 / 26
18. Axis
13 dimensions
Imagine an XML document to be a 13 dimensional space...
Axis Shortcut
ancestor
ancestor-or-self
attribute @
child -
descendant
descendant-or-self //
following
following-sibling
namespace
parent ..
preceding
preceding-sibling
self .
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 18 / 26
19. Practical
Let’s dig into the code
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 19 / 26
20. PHP function integration
Register PHP callbacks to enhance functionality
Possible since PHP 5.3.0
Works with functions and static methods
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 20 / 26
21. Practical
Let’s dig into the code
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 21 / 26
22. Outline
1 Welcome
2 Introduction
3 In details
4 Quiz
5 The end
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 22 / 26
30. Outline
1 Welcome
2 Introduction
3 In details
4 Quiz
5 The end
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 24 / 26
31. Q/A
Are there any questions left?
Please give us some feedback!
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 25 / 26
32. The end
Thanks for being here!
We hope you enjoyed the session!
Slides and material
Delivered by Software & Support
http://schlitt.info/opensource
On slideshare: http://www.slideshare.net/tobyS
Contact us:
Arne Blankerts <arne@thephp.cc>
Tobias Schlitt <toby@php.net>
Please rate our talk at: http://joind.in/1042
Arne Blankerts, Tobias Schlitt (IPC 2009) XPath - A practical guide 2009-11-17 26 / 26