SlideShare a Scribd company logo
1 of 44
Download to read offline
The	Tools	and	Machinery		
Behind	the	Curtain	
Jan	Van	Bruaene	
VP	of	Engineering,	Real-Time	Innovations	
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	
Our	customer’s	mission	critical	
systems	demand	high	quality	products
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	
RTI Quality
Management
System
•  Development	Process	Manual	
•  Naming	conventions	
•  Document	Organization	
•  Configuration	Management	
•  Branching	and	versioning	
•  Porting	process	
•  Coding	guides	
•  Design	and	code	reviews	
•  Testing	process	
•  Documentation	process	
•  Release	process	
•  Defect	management	
•  Root	cause	and	corrective	actions	
•  Maintenance,	Support	and	Escalation	processes	
•  IP,	legal	and	export	process	
•  Audit	process	
•  Vulnerability	management	process	
•  Etc.		
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2017	Real-Time	Innovations,	Inc.	Confidential.	
Customers	can	sign	up	to		
the	security	notification	list		
by	emailing	security@rti.com
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
Documented development processes and best practices
Development Milestones
©2018	Real-Time	Innovations,	Inc.	Confidential.	
Design		
Review	
Engineering		
Req.	Freeze		
Feature	
Freeze		
Code	
Freeze		
Install	Testing	
Completed		
General		
Availability	
Release	(GAR)	
~1yr	
Patch	
(Maintenance	
Release)	
New	Architecture	
Major	Release	
HEAD	
SUPPORT	
BRANCH	
PORTING	
BRANCH	
Major	Release	
CUSTOMER	
BRANCH	
Customer	Specific	Feature	
Patch	
•  Each	release	can	include	new	features,	new	RTI	Connext	products,	architecture	ports	and	bug	fixes.		
•  Certain	features	are	listed	as	‘experimental’	or	products	may	be	‘Beta’	releases	
Note:	not	shown	are	release	branches
©2018	Real-Time	Innovations,	Inc.	
The Tools
•  Configuration	management:	Git;	Atlassian	Fisheye		
•  Defect	management	and	traceability:	Atlassian	JIRA	
•  Enhancement	management:		Atlassian	JIRA	(and	Salesforce.com)	
•  Customer	case	tracking:	Salesforce.com	
•  Project	tracking	and	collaboration:	Atlassian	Jira,	Atlassian	Crucible,	Software	
Development	Folders	in	Egnyte,	Trello,	Microsoft	Project	and	Excel	
•  IDE:	Visual	Studio,	Eclipse,	SlickEdit,	Xcode,	atom,	zerobrane,	Wireframe	Sketcher	
•  Continuous	Integration:	Atlassian	Bamboo	
•  Memory	tools:	MemScope,	Rational	Purify,	Instruments	(Mac),	LeadDiag,	drmemory,	
Valgrind	and	JVisualVM	
•  Code	coverage	tools:	Rational	PureCoverage,	gcov	
•  CPU	profilers:	Callgrind,	Rational	Quantify,	JProfiler	
•  Static	Analysis	tools:	FindBugs	(Java),	clang	and	cppcheck	
•  Installers:	BitRock	InstallBuilder		
	
Work	in	progress:	Atlassian	
BitBucket,	Jenkins	CI
Atlassian tools provides us full traceability
©2018	Real-Time	Innovations,	Inc.	Confidential.
Dynamic Analysis using Valgrind with/without Buffer Pools
©2018	Real-Time	Innovations,	Inc.	
Testing
Regression	testing	
Feature	testing	
Interoperability	testing	
Install	testing	
Performance	and	scalability	testing	
Security	testing	
Endurance	testing
Unit tests - Regression testing
Also provide a level of single node feature testing
All	failing	unit	tests	are	analyzed.	Note	that	a	unit	test	may	fail	
not	only	because	of	a	functional	issue.	Other	reasons	include	
timing	issues,	infrastructure	issue,	platform	issue,	etc.
Feature testing
•  Our	previous	automated	RTI	Connext	DDS	distributed	feature	
framework	has	been	phased	out	and	will	be	replaced	by	a	new	
automated	distributed	feature	test	framework.		
–  Local	node	feature	testing	is	covered	partially	within	unit	tests.			
–  Manual	feature	testing	
•  RTI	Connext	Micro	has	a	new	
distributed	feature	test	framework		
and	test	description	language.
Interoperability testing
•  Vendor	interoperability	testing	done	at	OMG	events	through	shapes	demo.		
•  RTI	Connext	product	interoperability	testing	is	currently	done	manually		
–  During	install	testing	of	various	services	and	tools,	during	development,	and	
during	release	testing	of	Micro.		
–  Manual	testing	with	older	RTI	versions	is	done,	when	after	analysis,	we	
determine	there	is	a	risk	of	break	interoperability.		
•  Language	interoperability	testing	is	done	indirectly	through	the	usage	of	tools	
like	admin	console	(written	in	Java)	in	combination	with	applications	in	other	
languages.	We	have	also	added	automated	regression	tests	for	specific	features	
(e.g.,	keyhash).	
	
•  Note:	Interoperability	issues	are	documented	in	the	release	notes,	including	
backward	interoperability	options.
Install testing captures integration and interop issues
Manual	install	tests	plan	procedures	cover	
•  Installation	-	are	all	files	properly	installed?	
•  Graphical	User	Interface	tests,	e.g.,		
–  Integration	RTI	Launcher	with	Prototyper,	with	rtiddsgen,	
–  Admin	Console		
•  Documentation	tests	
•  Minimal	functionality		tests	for	all	products	using	the	
shipped	examples.		For	some	products,	we	run	a	full	
functionality	test	using	the	Getting	Started	Guide.		
This	is	performed	on	a	variety	of	platforms.		
•  Product	and	language	interoperability	testing	(limited)
Automated Install testing
•  Installation - filecheck to make sure files are properly installed.
•  Running rtiddsping, rtiddsspy and prototyper
•  Running rtiddsgen generated examples in C, C++, C++03. C++11, C++
CLI, C#, Java, using a combination of static/dynamic and release/debug
DDS libraries
•  Running shipped examples using a combination of static/dynamic and
release/debug DDS libraries
•  Performance examples in C++ and Java
•  TCP shipped examples in C
•  On more than 80 different architectures including Windows, Linux, Solaris,
Lynx, QNX, Darwin, VxWorks platforms. Not covered on e.g., VxWorks
653, etc.
Performance and memory profiling tests
•  Unit	tests	capture	performance	and	memory	information	for	specific	functions	
•  A	bespoke	performance	test	(PerfTest)	is	used	to	characterize	the	performance	
of	Connext	DDS,	and	can	be	used	in	conjunction	with	other	products,	e.g.,	
Routing	Service.	(Available	on	community.rti.com)		
•  A	specific	memTest	was	created	to	monitor	the	memory	footprint	of	Connext	
DDS.		
	
•  Connext	Micro	captures	memory	information	through	its	test	framework	
•  Admin	Console	takes	performance	snapshots	of	performance	critical	functions.	
The	results	are	analyzed	over	time		
•  Continuous	integration	of	PerfTest	and	MemTest	tests	ensures	we	do	not	regress	
as	new	features	are	added	to	the	Connext	DDS	product.
Automated performance, memory profiling and stress tests
compare variations with previous revisions. Performance data is
gathered at all levels of the product
Automated	Memory		
Usage	Statistics
DDS Secure Testing
•  DDS Secure functionality testing, including negative testing. E.g.,
–  configure DDS Secure with invalid governance or permissions file
–  configure DDS Secure with configuration files, with duplicate grant or subject names.
–  muck with the clock (e.g., provide a file with date past 2038)
–  tamper with wire communication
–  enable DDS Secure plugin with missing functions
•  DDS feature interoperability testing - validating how security interoperates with various
DDS features and products (e.g., reliability, batching, built-in types, CFT, different
transports, routing service, persistence service, etc)
•  DDS Vendor interoperability testing
•  Robustness and Performance testing
–  Valgrind (with/without RTI buffer mgt), perftest, discovery scalability
•  Usability testing
•  Red team testing at DoD IA Range in Quantico VA, part of the USS SECURE project
•  Fuzz testing
Endurance Testing
Testing	for	memory	growth,	or	other	unexpected	scenarios	in	long	
running	scenarios:	
1.  Start	publishing	samples	using	a	high	sequence	number.	
2.  Remote	participants	appearing	and	disappearing.	
3.  Remote	endpoints	appearing	and	disappearing.	
4.  Endpoints	communicating	with	different	instances	and	
message	sizes,	including	batching.	
	
More	to	come.		
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	
The RTI IIoT Lab
Our products are supported on a large set of architectures
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.	
The RTI HQ Lab Infrastructure consists of a large variety of target
architectures, a virtualized build and test infrastructure for enterprise
systems and a performance lab
©2018	Real-Time	Innovations,	Inc.	Confidential.
Software Architecture
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
©2018	Real-Time	Innovations,	Inc.	Confidential.
RTI HQ IP Mobility Test Lab
©2018	Real-Time	Innovations,	Inc.	
Great	products	are	built		
…	by	great	and	motivated	people	
…	with	the	right	tools		
…	and	guided	by	the	professional	processes	
With	Headquarters	in	Sunnyvale,	CA	and	a	Development	and	Support	Center	in	Granada,	Spain
Thank	you	
	
#MunichConnextCon18	
jan@rti.com

More Related Content

What's hot

Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overviewtbeckwith
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Craig Williams Resume_rev3
Craig Williams Resume_rev3Craig Williams Resume_rev3
Craig Williams Resume_rev3Craig Williams
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_securityDoina Draganescu
 
Version1 database-managed-services-brochure
Version1 database-managed-services-brochureVersion1 database-managed-services-brochure
Version1 database-managed-services-brochureVersion 1
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715Patrick Eyberg
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingAlienVault
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetwrix Corporation
 
Security and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoTSecurity and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoTVladimir Sklyar
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsNetwrix Corporation
 
Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?WiLS
 

What's hot (14)

Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Craig Williams Resume_rev3
Craig Williams Resume_rev3Craig Williams Resume_rev3
Craig Williams Resume_rev3
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security
 
Version1 database-managed-services-brochure
Version1 database-managed-services-brochureVersion1 database-managed-services-brochure
Version1 database-managed-services-brochure
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
Security and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoTSecurity and Safety Assurance in Industrial IoT
Security and Safety Assurance in Industrial IoT
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
 
Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?Audiovisual Digitization and Quality Control: How do people really do this?
Audiovisual Digitization and Quality Control: How do people really do this?
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 

Similar to The Tools and Machinery behind the curtain

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterForgeRock
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesTeamBreota
 
Stan Adkerson Professional Resume
Stan Adkerson Professional ResumeStan Adkerson Professional Resume
Stan Adkerson Professional ResumeStan Adkerson
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 
Software architecture
Software architectureSoftware architecture
Software architectureRifad Mohamed
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAmazon Web Services
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Precisely
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIndicThreads
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Glen Roberts, CISSP
 

Similar to The Tools and Machinery behind the curtain (20)

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
I doc on cloud
I doc on cloudI doc on cloud
I doc on cloud
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
 
Stan Adkerson Professional Resume
Stan Adkerson Professional ResumeStan Adkerson Professional Resume
Stan Adkerson Professional Resume
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Harsha CV
Harsha CVHarsha CV
Harsha CV
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

The Tools and Machinery behind the curtain