Lightning talk done for American Express Publishing Online team on September 16, 2011. When I started working at AEXP, I was the only one who used zsh while everyone else used bash. The presentation was about why zsh is "the shit."
Z shell (zsh) provides many powerful features out of the box that can make the shell experience more efficient and productive compared to other shells like bash. Zsh includes advanced tab completion for commands like git, path expansion and replacement, right-hand prompts, spelling correction, powerful aliases, extended globbing, environment variable editing, and programmable file renaming. It also features intuitive history searching, syntax highlighting, and integration with the oh-my-zsh framework. Overall, zsh's extensive capabilities and customization options allow users to optimize their shell workflow.
This document provides an overview of the Z shell (zsh) and highlights some of its advantages over other shells like Bash. It discusses zsh's improved tab completion for commands like git, its ability to expand and replace paths, its right prompt, spelling correction, advanced aliasing features, and syntax highlighting. The document also briefly outlines the history of shells like the Thompson shell, Bourne shell, C shell, Korn shell, and Bash before concluding that zsh offers many powerful features out of the box.
Zsh is a shell that has been available since 1990 but has grown in popularity recently due to frameworks like oh-my-zsh. It can be installed on Debian/Ubuntu and Mac systems and set as the default shell. Zsh offers powerful tab autocompletion, globbing patterns for file searching, path expansion and replacement, spelling correction, and aliases. Users can customize the prompt and integrate information from programs like Python virtual environments, version control systems, and batteries. Libraries exist to configure zsh through frameworks like oh-my-zsh and prezto.
Real programmers use programming languages (Not shell scripts)thedandan
This document discusses when to use shell scripts versus programming languages for writing programs and scripts. It defines shell scripts and programming languages. While shell scripts are quick to write and use familiar commands, the document outlines several issues with shell scripts such as confusing syntax, being untyped, slow performance, lack of portability, and no exception handling. It recommends using shell scripts for short command line tasks and programming languages for anything more complicated, fast, portable, or that needs testing.
Zsh and fish are better alternatives to the default bash shell. Zsh features include shared history between shells, autocorrection, powerful autocompletion for many commands out of the box and with plugins, autoexpand to avoid typing too much, and arrow key history search with minimal configuration. Fish shell stands out for its autosuggestions as you type and smart tab suggestions that parse man pages to provide command syntax help. Both shells can be enhanced with additional frameworks like oh my zsh which provides themes, plugins, and functions.
This document provides recommendations for tools used by hackers. It recommends text editors like Git that are flexible, extensible, and multi-platform. It also recommends Git and Github for source code management and collaboration. Other recommended tools include Gist for code snippets, Zsh as an alternative shell to Bash, Ack as an alternative to Grep, Jump for bookmarks, Terminitor for automating workflows, and optimizing SSH connections.
Z shell (zsh) provides many powerful features out of the box that can make the shell experience more efficient and productive compared to other shells like bash. Zsh includes advanced tab completion for commands like git, path expansion and replacement, right-hand prompts, spelling correction, powerful aliases, extended globbing, environment variable editing, and programmable file renaming. It also features intuitive history searching, syntax highlighting, and integration with the oh-my-zsh framework. Overall, zsh's extensive capabilities and customization options allow users to optimize their shell workflow.
This document provides an overview of the Z shell (zsh) and highlights some of its advantages over other shells like Bash. It discusses zsh's improved tab completion for commands like git, its ability to expand and replace paths, its right prompt, spelling correction, advanced aliasing features, and syntax highlighting. The document also briefly outlines the history of shells like the Thompson shell, Bourne shell, C shell, Korn shell, and Bash before concluding that zsh offers many powerful features out of the box.
Zsh is a shell that has been available since 1990 but has grown in popularity recently due to frameworks like oh-my-zsh. It can be installed on Debian/Ubuntu and Mac systems and set as the default shell. Zsh offers powerful tab autocompletion, globbing patterns for file searching, path expansion and replacement, spelling correction, and aliases. Users can customize the prompt and integrate information from programs like Python virtual environments, version control systems, and batteries. Libraries exist to configure zsh through frameworks like oh-my-zsh and prezto.
Real programmers use programming languages (Not shell scripts)thedandan
This document discusses when to use shell scripts versus programming languages for writing programs and scripts. It defines shell scripts and programming languages. While shell scripts are quick to write and use familiar commands, the document outlines several issues with shell scripts such as confusing syntax, being untyped, slow performance, lack of portability, and no exception handling. It recommends using shell scripts for short command line tasks and programming languages for anything more complicated, fast, portable, or that needs testing.
Zsh and fish are better alternatives to the default bash shell. Zsh features include shared history between shells, autocorrection, powerful autocompletion for many commands out of the box and with plugins, autoexpand to avoid typing too much, and arrow key history search with minimal configuration. Fish shell stands out for its autosuggestions as you type and smart tab suggestions that parse man pages to provide command syntax help. Both shells can be enhanced with additional frameworks like oh my zsh which provides themes, plugins, and functions.
This document provides recommendations for tools used by hackers. It recommends text editors like Git that are flexible, extensible, and multi-platform. It also recommends Git and Github for source code management and collaboration. Other recommended tools include Gist for code snippets, Zsh as an alternative shell to Bash, Ack as an alternative to Grep, Jump for bookmarks, Terminitor for automating workflows, and optimizing SSH connections.
Selenium IDE is a Firefox add-on that allows users to record, edit, and debug automated tests of interactions with a browser. It allows for easy recording and playback of test steps as well as features like intelligent field selection, autocomplete commands, debugging tools, and the ability to save and run test suites to ensure full browser functionality. The tutorial demonstrates how to create a simple login test with Selenium IDE.
This document discusses reactive programming in Spring 5. It begins with an overview of reactive systems and their benefits like responsiveness, resilience and scalability. It then covers reactive streams and key implementations like Reactor and RxJava. Reactive streams provide a common protocol for asynchronous stream processing. The document concludes with how Spring 5 adds support for reactive programming by allowing non-blocking APIs and integrating frameworks like RxJava and Reactor.
This document discusses the history and current state of the Spring Framework and previews new features in Spring Framework 5. It outlines the challenges of blocking I/O and imperative code in traditional Spring applications and how Spring 5 aims to address this through support for reactive programming with Reactor and RxJava. Key new aspects of Spring 5 include Java 8 support, HTTP/2 integration, reactive controllers and routing, and integration of Reactive Streams for asynchronous non-blocking code.
The document provides an introduction to UNIX shell scripting basics. It discusses what a shell and shell script are, how to run commands and write simple shell scripts using bash. It covers basics like variables, conditionals, loops, pipes and redirection to process inputs, outputs and errors when running programs from shell scripts.
Selenium is an open source browser automation tool used for automating web application testing. It supports recording and playback of test cases in multiple programming languages like Java, Python and Ruby. Selenium has several components like Selenium IDE for recording and playing back tests without coding, Selenium RC for running tests on remote machines, and Selenium Webdriver which allows directly controlling browser behavior without relying on external servers. Selenium Grid enables parallel execution of tests on different machines for faster test runs. Selenium is used by many companies for testing web applications and is useful for both functional and regression testing of websites and web apps.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Selenium IDE is a Firefox add-on that allows users to record, edit, and debug automated tests of interactions with a browser. It allows for easy recording and playback of test steps as well as features like intelligent field selection, autocomplete commands, debugging tools, and the ability to save and run test suites to ensure full browser functionality. The tutorial demonstrates how to create a simple login test with Selenium IDE.
This document discusses reactive programming in Spring 5. It begins with an overview of reactive systems and their benefits like responsiveness, resilience and scalability. It then covers reactive streams and key implementations like Reactor and RxJava. Reactive streams provide a common protocol for asynchronous stream processing. The document concludes with how Spring 5 adds support for reactive programming by allowing non-blocking APIs and integrating frameworks like RxJava and Reactor.
This document discusses the history and current state of the Spring Framework and previews new features in Spring Framework 5. It outlines the challenges of blocking I/O and imperative code in traditional Spring applications and how Spring 5 aims to address this through support for reactive programming with Reactor and RxJava. Key new aspects of Spring 5 include Java 8 support, HTTP/2 integration, reactive controllers and routing, and integration of Reactive Streams for asynchronous non-blocking code.
The document provides an introduction to UNIX shell scripting basics. It discusses what a shell and shell script are, how to run commands and write simple shell scripts using bash. It covers basics like variables, conditionals, loops, pipes and redirection to process inputs, outputs and errors when running programs from shell scripts.
Selenium is an open source browser automation tool used for automating web application testing. It supports recording and playback of test cases in multiple programming languages like Java, Python and Ruby. Selenium has several components like Selenium IDE for recording and playing back tests without coding, Selenium RC for running tests on remote machines, and Selenium Webdriver which allows directly controlling browser behavior without relying on external servers. Selenium Grid enables parallel execution of tests on different machines for faster test runs. Selenium is used by many companies for testing web applications and is useful for both functional and regression testing of websites and web apps.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
2. What is zsh? Zsh is a UNIX command interpreter (shell) Extended bash; most resembles the Korn shell (ksh); its compatibility with the 1988 Korn shell has been gradually increasing. enhancements include: command-line editor options for customizing its behavior filename globbing features to make C-shell (csh) users feel more at home extra features drawn from tcsh (another `custom' shell) Most bash configs are compatible
5. Other features Sharing of command history among all running shells Extended file globbing allows file specification without needing to run an external program such as find Improved variable/array handling Editing of multi-line commands in a single buffer Spelling correction Various compatibility modes, e.g. zsh can pretend to be a Bourne shell when run as /bin/sh Themeable prompts, including the ability to put prompt information on the right side of the screen and have it auto-hide when typing a long command Loadable modules, providing among other things: full TCP and Unix domain socket controls, an FTP client, and extended math functions Fully customizable
6. Getting started with zsh A lot of people included their dotfiles on GitHub Oh my zsh! By default, zsh has a lot of options already active