Check out the entire series on the Oracle Learning Library at http://www.oracle.com/goto/oll/rwp In this video, listen and watch Andrew Holdsworth, Vice President of Oracle Database Real-World Performance at Oracle Corporation, as he demonstrates how leaking cursors affect performance. Copyright © 2014 Oracle and/or its affiliates. Oracle® is a registered trademark of Oracle and/or its affiliates. All rights reserved. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the "Materials"). The Materials are provided "as is" without any warranty of any kind, either express or implied, including without limitation warranties of merchantability, fitness for a particular purpose, and non-infringement
Views: 6332 Oracle Learning Library
Josh Bloch, Jeremy Manson How can they do it? How can Josh Bloch and Jeremy Manson keep coming up with such great programming puzzlers year after year? They can't! In this, the eighth installment of the perennial crowd pleaser, Click and Hack the Type-It brothers are truly scraping the bottom of the barrel. But the dregs they come up can still astonish, delight, and educate. So come to "Java Puzzlers,—Scraping the Bottom of the Barrel, have some fun, and learn to avoid the traps and pitfalls in the Java programming language. One of these puzzlers is about regular expressions, whose performance is a rich topic with many surprises. For background and details, see http://swtch.com/~rsc/regexp/regexp1.html.
Views: 55447 Google Developers
00:00:00 - Introduction 00:00:50 - Hackathon Teaser 00:02:23 - Week 7 Recap 00:05:35 - C$50 Finance 00:07:47 - Cookies 00:15:46 - store 00:22:22 - Databases 00:27:15 - Mock Database 00:29:07 - SQL 00:39:32 - SQLite 00:51:52 - phpLiteAdmin 01:12:54 - lecture 01:38:39 - Race Conditions 01:45:57 - SQL Injection Attacks
Views: 17229 CS50
Computer programs can be made faster by making them do many things simultaneously. Let’s study three categorical ways to accomplish that in GCC. In the third episode, we study ways to offload code to various accelerators such as GPU on a graphics card. We also explore CUDA. The previous episode can be found at: https://www.youtube.com/watch?v=MfEkOcMILDo As a plot device in this tool-assisted education video, a Mandelbrot fractal is rendered. Twitter: https://twitter.com/RealBisqwit Liberapay: https://liberapay.com/Bisqwit (alternatives at https://iki.fi/bisqwit/donate.html) Twitch: https://twitch.tv/RealBisqwit Homepage: https://iki.fi/bisqwit/ OpenMP HQ: http://www.openmp.org/ OpenACC HQ: https://www.openacc.org/ You can contribute subtitles: https://www.youtube.com/timedtext_video?ref=share&v=kIA_UtdVabQ All downloads and compilation instructions: — https://github.com/bisqwit/cpp_parallelization_examples Background music: — Aoki Densetsu Shoot-bang — Game 01 — Kennosuke Suemura — Energy Breaker — Golden-Colored Wind — Yukio Nakajima — Tales of Phantasia — I Miss You — Motoi Sakuraba All music is played through OPL3 synthesis. Sound effects and foley are mostly from YouTube Audio Library. Some are recorded from video games like The Guardian Legend, Duck Hunt, Earthbound, and Super Mario All-Stars. Peter Penguin and Hazel Hopkins are characters of the Hackles webcomic which is © Drake Emko & Jen Brodzik. You can read it at: http://hackles.org/cgi-bin/archives.pl?request=1 #Bisqwit #Parallelism #Tutorial #Programming #Offloading #CUDA #NVidia #VectorCalculation
Views: 28042 Bisqwit
Check out our blog posts for more information: - https://goo.gl/l2Nxo8 - https://goo.gl/GSCn60 Welcome to the seventh video in the Firebase Database for SQL Developers series! Denormalization is great for increasing read and query performance, but it comes with the cost of data consistency. But have no fear! Multi-path updates can give you consistency with your denormalization. With the aid of lookup paths, you'll be able to copy data to multiple places and keep it all consistent. Watch more videos from this series: https://goo.gl/ZDcO0a Subscribe to the Firebase Channel: https://goo.gl/9giPHG
Views: 42907 Firebase
MIT 7.91J Foundations of Computational and Systems Biology, Spring 2014 View the complete course: http://ocw.mit.edu/7-91JS14 Instructor: David Gifford This lecture is guided by the question "Where is missing heritability found?" Prof. David Gifford discusses computational models that can predict phenotype from genotype. He then discusses how to discover and model quantitative trait loci. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 16693 MIT OpenCourseWare
There is a minute mistake in this program, Outer for-loop is running for 1 to n and due to this 1 is also coming in output which is not a prime number. Rest of logic is fine. You just need to run outer for-loop from 2 to n in order to correct the program. I already tried to fix it but did't find the way Please just how can I inform about this mistake for new visitors.
Views: 216882 Get Placed
Support Vector Machines are a very popular type of machine learning model used for classification when you have a small dataset. We'll go through when to use them, how they work, and build our own using numpy. This is part of Week 1 of The Math of Intelligence. This is a re-recorded version of a video I just released a day ago (the audio/video quality is better in this one) Code for this video: https://github.com/llSourcell/Classifying_Data_Using_a_Support_Vector_Machine Please Subscribe! And like. And comment. that's what keeps me going. Course Syllabus: https://github.com/llSourcell/The_Math_of_Intelligence Join us in the Wizards Slack channel: http://wizards.herokuapp.com/ More Learning resources: https://www.analyticsvidhya.com/blog/2015/10/understaing-support-vector-machine-example-code/ http://www.robots.ox.ac.uk/~az/lectures/ml/lect2.pdf http://machinelearningmastery.com/support-vector-machines-for-machine-learning/ http://www.cs.columbia.edu/~kathy/cs4701/documents/jason_svm_tutorial.pdf http://www.statsoft.com/Textbook/Support-Vector-Machines https://www.youtube.com/watch?v=_PwhiWxHK8o And please support me on Patreon: https://www.patreon.com/user?u=3191693 Follow me: Twitter: https://twitter.com/sirajraval Facebook: https://www.facebook.com/sirajology Instagram: https://www.instagram.com/sirajraval/ Instagram: https://www.instagram.com/sirajraval/ Signup for my newsletter for exciting updates in the field of AI: https://goo.gl/FZzJ5w Hit the Join button above to sign up to become a member of my channel for access to exclusive content!
Views: 149836 Siraj Raval
This video how-to shows basic concepts around conditional display of a column in a Table object, based on its data. This example is based on Jaspersoft Studio 6.0.1 but it should work (possibly with little editing) on recent releases, such as 5.x. See: http://community.jaspersoft.com/wiki/conditional-display-column-based-its-data
Views: 16335 Jaspersoft Embedded BI
Learn more about qureying in the official documentation: https://goo.gl/iLDAvS Welcome to the third video in the Firebase Database for SQL Developers series! Querying may be less powerful in NoSQL databases than compared to SQL databases, but there's still a lot you can do with the Firebase Database. Watch more videos from this series: https://goo.gl/ZDcO0a Subscribe to the Firebase Channel: https://goo.gl/9giPHG
Views: 101317 Firebase
In this video, Dominic Preuss shares an overview of Google Cloud Spanner, Google's mission-critical, relational and scalable application database, which is now publicly available as a managed service on Google Cloud. You'll learn how Cloud Spanner evolved, how Google uses it internally, and how you can use it for your next project. Missed the conference? Watch all the talks here: https://goo.gl/c1Vs3h Watch more talks about Infrastructure & Operations here: https://goo.gl/k2LOYG
Views: 18870 Google Cloud Platform
Get the most from Google Cloud SQL: Google's fully-managed database service that makes it easy to set up and maintain your relational databases in the cloud. In this video, Stanley Feng and Brett Hesterberg show you how to scale performance and securely connect to Cloud SQL from anywhere in the world. They dive into Cloud SQL's architecture to understand tradeoffs between performance and availability and discuss important considerations for instance sizing. You'll come away knowing how to get the most from your database, while letting Cloud SQL handle the mundane, but necessary and often time consuming tasks — like applying patches and updates, managing backups and configuring replications — so you can focus on developing your next great apps. Missed the conference? Watch all the talks here: https://goo.gl/c1Vs3h Watch more talks about Infrastructure & Operations here: https://goo.gl/k2LOYG
Views: 2321 Google Cloud Platform
Join Reddit, Thumbtack, and Tapjoy to discuss how they manage their big data with Google Cloud. Join: - Luis Bitencourt-Emilio, Principal Director of Engineering, Machine Learning at Reddit - Andreas Sekine, Software Engineer at Thumbtack - Robin Li, Director of Data Engineering and Data Science at Tapjoy - Felipe Hoffa, Developer Advocate at Google Cloud - Andrei Savu, Software Engineer at Twitter Recorded at the Data Engineers Club in San Francisco, November 2017 https://twitter.com/felipehoffa https://twitter.com/andreisavu https://twitter.com/bitoflime https://www.meetup.com/Data-Engineering-Club/
Views: 1318 Google Cloud Platform
Learn how to migrate to Oracle's Argus Safety. -- Is your organization considering migrating to Argus Safety, Oracle's comprehensive safety and pharmacovigilance system? Then you probably already know that moving and reformatting legacy adverse event cases can be a major bottleneck. BioPharm, with our partner, Valiance, can quickly automate and streamline many aspects of the migration and implementation process without resorting to custom scripts, existing APIs, and time-consuming manual tasks. From the assessment and strategy to the complete migration and verification of adverse event cases from your source system (e.g., AERS, ARISg, Excel, Trace, Custom, etc.), leveraging our tried-and-true methodologies and technologies helps you accelerate the entire process with confidence. Please join BioPharm's Dr. Rodney Lemery and Valiance's Richard Wells for a free one-hour webinar that will explore: -- The types of risks and challenges associated with safety data system migrations, including those related to Japan and other countries -- How to successfully approach a safety and pharmacovigilance system migration and implementation project -- The benefits of pre-configured migration software and automated 100% migration testing -- Examples of past migration and implementation projects -- Your own migration questions and challenges To view this webinar in its entirety, please visit: https://cc.readytalk.com/r/c281688i2iki&eom Twitter: http://www.twitter.com/BioPharmSystems Facebook: http://www.facebook.com/BioPharmSystems LinkedIn: http://www.linkedin.com/companies/biopharm-systems-inc Google+: https://plus.google.com/+BioPharm
Views: 1907 BioPharmSystems
This session focuses on the needs of the data integrator and data engineer whether that be for data warehousing & BI, advanced analytics of data for SaaS applications. We walk through a comprehensive set of new additions to Azure Data Factory and SSIS for moving and integrating data across on-premises and cloud. Topics and examples will include simple, scalable and reliable data pipelines in ADF using a serverless, parallel data movement service to/from the cloud, provisioning of Azure-SSIS Integration Runtime (IR) – dedicated servers for lifting & shifting SSIS packages to cloud– and its customization with your own/3rd party extensions, the execution of SSIS packages as first-class activities in ADF pipelines and their combination with other ADF activities to create modern ETL/ELT workflows all through the new code-free experience. Create a Free Account (Azure): https://aka.ms/azft-migrate
Views: 1350 Microsoft Developer
Views: 59898 Traversy Media
( Java Training - https://www.edureka.co/java-j2ee-soa-training) This Edureka Java tutorial (Java Blog Series: https://goo.gl/12JH8n) will help you in understanding the various fundamentals of Java in detail with examples. Check out our Java Playlist: https://goo.gl/ES3dI3 This video helps you to learn following topics: 1:30 Introduction to Java 5:09 Why learn Java? 11:33 Features of Java 19:02 How does Java work? 27:38 Data types in Java 36:06 Operators in Java 46:00 Control Statements in Java 1:15:01 Arrays in Java 1:22:00 Object Oriented Concepts in Java Subscribe to our channel to get video updates. Hit the subscribe button above. #Java #Javatutorial #Javaonlinetraining #Javaforbeginners How it Works? 1. This is a 7 Week Instructor led Online Course, 45 hours of assignment and 20 hours of project work 2. We have a 24x7 One-on-One LIVE Technical Support to help you with any problems you might face or any clarifications you may require during the course. 3. At the end of the training you will be working on a real time project for which we will provide you a Grade and a Verifiable Certificate! - - - - - - - - - - - - - - - - - About the Course Edureka's Advanced Java J2EE and SOA training and certification course is designed for students and professionals who want to be a Java Developer. This is a 42 hour course which will cover both core and advanced Java concepts like Database connectivity, Threads, Exception Handling, Collections, JSP, Servlets, XML Handling etc. We will also learn various Java frameworks like Hibernate and Spring. During our Java/ Certification training, our instructors will help you: 1. Develop the code with various Java data types, conditions and loops. 2. Implement arrays, functions and string handling techniques. 3. Understand object oriented programming through Java using Classes, Objects and various Java concepts like Abstract, Final etc. 4. Implement multi-threading and exception handling. 5. Use parse XML files using DOM and SAX in Java. 6. Write a code in JDBC to communicate with Database. 7. Develop web applications and JSP pages. 8. Interact with the database using hibernate framework. 9. Write code with spring framework components like Dependency Injection and Auto Wiring. 10. Implement SOA using web services. - - - - - - - - - - - - - - - - - - - Who should go for this course? This course is designed for professionals aspiring to become Java Developers. Programmers, Web Developers, Web Designers, Programming Hobbyists, Database Administrators, Youngsters who want to kick start their career are the key beneficiaries of this course. - - - - - - - - - - - - - - - - Why learn Java? Java is a general-purpose, class-based, object-oriented computer programming language that was designed by James Gosling at Sun Microsystems in 1995. Key Highlights of Java: Platform Independent: This allows programmers to develop applications that can run on any operating system. Usability of Java: Java is most widely used programming language. It is present everywhere. It really doesn't matter which domain you are working in, you will surely come across Java sooner or later! Open Source: The good news is that Java is available for free! All the development tools and the environment (JRE & JDK) that is used to develop Java applications are absolutely free of cost. Android: Irrespective of the fact that you are tech savvy or not, most of us are badly bitten by the Android bug! Android is in great demand today and fortunately you need Java for Android development. Hence, the importance of Java has increased even more. Hadoop: Hadoop is one of the most trending framework for processing Big Data. It has been designed and developed in Java. In spite of having a tough competition on the server side from Microsoft and other companies, Java is doing extremely well on mobile platforms, thanks to Android! It has also been the primary language for Hadoop Developers. For Java Training and Certification, please write back to us at [email protected] or call us at IND: 9606058406 / US: 18338555775 (toll free). Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka
Views: 419623 edureka!
Java 8 brought a number of new features to Java, one of those features was the Streams API. This API brought an easy way to create functional style list manipulation elements using a simple API. This is extremely powerful and allows you to create extremely complex interactions with relatively little code. For those familiar with C#, the Java Streams API offers a core feature set very similar to what you can do with LINQ. Certain syntactic limitations exist as well as a lack of extension methods to easily expand the system. Java solves these differences in other ways. The java Stream javadocs are here: https://docs.oracle.com/javase/8/docs/api/java/util/stream/Stream.html Curious about the Reactive Extensions and how they're different? Check out the video on building Fizz Buzz using JavaRX: https://youtu.be/ZTqIg-Fk2n4 Discord: https://discord.gg/hU5Kq2u
Views: 7213 World of Zero
This session dives into the steps required to design, build, deploy, and orchestrate a cloud native microservice architecture using Java and Eclipse MicroProfile. We use Red Hat’s MicroProfile implementation known as Thorntail, optimized for deployment to OpenShift and integrated with Azure services. Hear from Microsoft and Red Hat experts how adopting Cloud Native open source projects and open standards, while making use of tools, APIs, and Java specifications that developers are already familiar with, can allow you to achieve superior productivity. This session includes an overview of MicroProfile and demonstrations of how to put it into practice in the cloud.
Views: 254 Microsoft Ignite
Get complete courses at http://courses.caveofprogramming.com An introduction to lambda expressions, the most important new language feature in Java 8. Lambda expressions allow you to pass blocks of code to methods; something that could previously only be achieved by implementing an interface. ================================ Hello, This is John from caveofprogramming.com and in this tutorial we're going to look at lambda expressions in Java 8, so I've created a new project here and I've already got JDK8 installed, which you can see here, and I'm using it for this particular project. You might need to download a new eclipse to do this. So, lambda expressions are just a way of passing a block of code to a method. That's all they are. And I'm going to first go through how we would do this, very briefly, in previous versions of Java, and to understand this you need to have an understanding of interfaces and of implementing anonymous classes as well. So, typical situations when you might want to do this would be when you want to pass code to a thread, to execute it in its own thread, and where you want to pass code to a button, let's say in Java Swing, so that code can be executed when the button is clicked. If you want a some revision of any of this, I've got a massive free Java course that includes interfaces and anonymous classes and also a free course on multi-threading and also on Swing, and you can find those on caveofprogramming.com. So let's start by creating a class here. I'm going to create a class, let's call it "class Runner", just to give it a name, and I'm going to give this method which I'll call "public void run". Now let's imagine that for some reason we want to pass a block of code to run, so we don't want to pass in just strings, we want to actually pass a block of code. How would you do that in previous versions of Java? Well, the answer is first you need to define an interface, let's do that, let's say "interface" and I'll call this "Executable" and we need to give this interface a method, and this method would be a place where we put the code we want to run. Let's create a method called "void execute", just like that. Now we can say that the runner accepts an object that implements the executable interface. I'll just call it "e". So its going to get something that implements this interface and its going to know that that object, whatever it is, has an execute method, so we can call that method, let's put sysout in here and say "executing code block..." and let's just call "e.execute()". Now to actually use this, so firstly we need an instance of this runner class, let's say "Runner runner = new Runner" and then we can call the run method so let's say "runner.run". Now in previous versions of Java, to actually pass it some block of code we've got to somehow have an object that implements this interface, and we can do that using an anonymous class syntax. In previous versions of Java, we can say here "new executable", in this case. Open and close curly brackets and let's implement the method that this interface specifies. So I'll get rid of these lines that we don't actually need and we can put some code in that to execute. Let's say sysout "hello there", so this is all Java 6 or 7 syntax and if we now run this program, it says "hello there". So the whole point of this is just to pass in this code to this method and then this method can and do what it likes with it, and in this case it's just outputting something and then it's actually executing the code that we passed it in this method. So this is a lot of text purely just to specify this, so let's have a look at how we can do that with Lambda Expressions in Java 8. I'm going to just put a bit of separator text here; let's just put in like some equal signs. By the way, "Lambda Expressions" apparently comes from mathematics where the Greek letter lambda has been historically associated with some kind of analogous situation, passing a function to a function, something like that. So to use the Lambda Expression here we can say "runner.run". So the same thing again; we're calling this method and now again the challenge is to pass this method a block of code to execute, and we can pass this in a lot more elegantly with the Lambda Expression. We need two empty round brackets and an arrow. So it's just an hyphen and a right angle bracket, and then the expression we want to run. So this bit here is the lambda expression. I'm going to just paste this up here because I'm going to make this code available on caveofprogramming.com so you can refer back to it. If you run this now, see, it does the same thing as this unwieldy syntax that we had in previous versions of Java. So it's really important to keep in mind that all this is a block of code that this method is going to execute, and blocks of codes, of course, might have returned values and might also accept parameters ...
Views: 129594 Cave of Programming
An overview of the support for the Java 8 Stream API included in the Oracle Coherence 12c (12.2.1) release. Coherence 12.2.1 YouTube Playlist: https://www.youtube.com/playlist?list=PLxqhEJ4CA3JtazSZ0CI9JyriEjyHkb-9R Oracle Coherence: http://coherence.oracle.com Coherence on OTN: http://www.oracle.com/technetwork/middleware/coherence/overview/ The Coherence Community: https://java.net/projects/coherence Coherence Discussion Forums: https://forums.oracle.com/community/developer/english/fusion_middleware/application_server/coherence_support
Views: 834 OracleCoherence
On Gradient-Based Optimization: Accelerated, Stochastic and Nonconvex Abstract: Many new theoretical challenges have arisen in the area of gradient-based optimization for large-scale statistical data analysis, driven by the needs of applications and the opportunities provided by new hardware and software platforms. I discuss several recent, related results in this area: (1) a new framework for understanding Nesterov acceleration, obtained by taking a continuous-time, Lagrangian/Hamiltonian/symplectic perspective, (2) a discussion of how to escape saddle points efficiently in nonconvex optimization, and (3) the acceleration of Langevin diffusion. Bio: Michael I. Jordan is the Pehong Chen Distinguished Professor in the Department of Electrical Engineering and Computer Science and the Department of Statistics at the University of California, Berkeley. His research interests bridge the computational, statistical, cognitive and biological sciences. Prof. Jordan is a member of the National Academy of Sciences, a member of the National Academy of Engineering and a member of the American Academy of Arts and Sciences. He has been named a Neyman Lecturer and a Medallion Lecturer by the Institute of Mathematical Statistics. He received the IJCAI Research Excellence Award in 2016, the David E. Rumelhart Prize in 2015 and the ACM/AAAI Allen Newell Award in 2009. This video is closed captioned.
Views: 2586 Paul G. Allen School
To Download , send me an email to [email protected] Recommended Books at Amazon: Building Winning Algorithmic Trading Systems, + Website: A Trader's Journey From Data Mining to Monte Carlo Simulation to Live Trading (Wiley Trading) https://amzn.to/2DAxOyZ Explorations in Monte Carlo Methods (Undergraduate Texts in Mathematics) https://amzn.to/2TfBCe2 Follow me at LINKED IN: www.linkedin.com/in/luisolano Monte Carlo Simulation in NET PRESENT VALUE (NPV) Donations - this free info help you? we welcome donations! BTC 19QDxq4rKBWpZgU8doLtkvwZrhdiL6HNx7 ETH 0x9E4cea5f4aF2DCB263b83826E5172099d280205f LTC LYXjQTEeMPx96tdFJv94rGhWAnjAMERbSZ DSH XxVmueKYeT3sypZJep9eRQxhowpzARhHF5 DCR DsnT6SejtePMgFemgk1k2cALSX1NqwMjTq6 OMG 0x9E4cea5f4aF2DCB263b83826E5172099d280205f Let me know your comments, Thanks......
Views: 148834 Luis Olano
Check out my Blog: http://exceltraining101.blogspot.com This video is about creating a two variable data table feature. The use case for this is if you want to input two varying pieces of data and see how the output changes. For example say you are taking out a loan and maybe not sure how much you want to take out. At the same time you are unsure of the rate you might get. What are the possibilities of monthly payments you'll have? It's almost endless! With a two variable data table you can a range of interest rate AND a range of loan amounts and let the handy-dandy data table feature figure out the different monthly payments that are possible. Amazing! See the magic at work in the video. #exceltips #exceltipsandtricks #exceltutorial #doughexcel
Views: 240601 Doug H
BarTender gives you multiple ways to change the number of labels to be printed. In this video, you will learn several ways to set the print quantity: manually using the Print dialog or a data-entry form, or automatically using a database field
Views: 32139 SeagullScientificInc
First-order methods in optimization have become the workhorse tool in modern data-driven applications. Although various general methods with optimal iteration complexities have been known for decades, their standard analysis often appears unintuitive. In this talk, I will present a simple unifying framework based on the numerical discretization of a continuous-time dynamics. Further, I will present a novel accelerated method that is naturally obtained from this framework. The method matches the iteration complexity of the well-known Nesterov’s method, and is, in some cases, more stable under noise-corrupted gradients. Time permitting, I will talk about other applications of the framework, such as in obtaining width-independent parallel algorithms for problems with positive linear constraints, and the extensions of the framework to various settings, including that of block coordinate descent. See more at https://www.microsoft.com/en-us/research/video/a-unifying-theory-of-first-order-methods-and-applications/
Views: 1373 Microsoft Research
Demonstration of two-way data table feature in Excel. This kind of table is sometimes referred to as a two-variable data table. This tool is one of the most commonly used for sensitivity analysis or what if analysis. The table shows the effect of changing two input variables on a selected output variable. Download the demonstration file: https://alphabench.com/data/DirectMail.xlsx See the One-Variable Data Table tutorial: https://youtu.be/fSi3i3Hyvyg
Views: 91091 Matt Macarty
Google Tech Talk (more info below) February 22, 2011 Presented by Carsten Sinz, Stephan Falke, & Florian Merz, Karlsruhe Institute of Technology, Germany. ABSTRACT Producing reliable and secure software is time consuming and cost intensive, and still many software systems suffer from security vulnerabilities or show unintended, faulty behavior. Testing is currently the predominant method to ascertain software quality, but over the last years formal methods like abstract interpretation or model checking made huge progress and became applicable to real-world software systems. Their promise is to reach a much higher level of software quality with less effort. In this talk we present a recent method for systematic bug finding in C programs called Bounded Model Checking (BMC) that works fully automatic and achieves a high level of precision. We present our implementation, LLBMC, which---in contrast to other tools---doesn't work on the source code level, but employs a compiler intermediate representation (LLVM IR) as a starting point. It is thus easily adaptable to support verification of other programming languages such as C++ or ObjC. LLBMC also uses a highly precise (untyped) memory model, which allows to reason about heap and stack data accesses. Moreover, we show how LLBMC can be integrated into the software development process using a technique called Abstract Testing.
Views: 3414 GoogleTechTalks
Stochastic gradient-based methods are the state-of-the-art in large-scale machine learning optimization due to their extremely efficient per-iteration computational cost. Second-order methods, that use the second derivative of the optimization objective, are known to enable faster convergence. However, the latter has been much less explored due to the high cost of computing the second-order information. We will present second-order stochastic methods for (convex and non-convex) optimization problems arising in machine learning that match the per-iteration cost of gradient-based methods, yet enjoy the faster convergence properties of second-order optimization overall leading to faster algorithms than the best known gradient-based methods. See more at https://www.microsoft.com/en-us/research/video/efficient-second-order-optimization-for-machine-learning/
Views: 1479 Microsoft Research
Is matching in NC, i.e., is there a deterministic fast parallel algorithm for it? This has been an outstanding open question in TCS for over three decades, ever since the discovery of Random NC matching algorithms. Within this question, the case of planar graphs has remained an enigma: On the one hand, counting the number of perfect matchings is far harder than finding one (the former is #P-complete and the latter is in P), and on the other, for planar graphs, counting has long been known to be in NC whereas finding one has resisted a solution! The case of bipartite planar graphs was solved by Miller and Naor in 1989 via a flow-based algorithm. In 2000, Mahajan and Varadarajan gave an elegant way of using counting matchings to finding one, hence giving a different NC algorithm. However, non-bipartite planar graphs still didn't yield: the stumbling block being odd tight cuts. Interestingly enough, these are also a key to the solution: a balanced tight odd cut leads to a straight-forward divide and conquer NC algorithm. However, a number of ideas are needed to find such a cut in NC; the central one being an NC algorithm for finding a face of the perfect matching polytope at which $\Omega(n)$ new conditions, involving constraints of the polytope, are simultaneously satisfied. See more at https://www.microsoft.com/en-us/research/video/planar-graph-perfect-matching-is-in-nc/
Views: 868 Microsoft Research
Learn the basics of clinical trial management systems (CTMS). -- If you've ever wondered what a CTMS is, how one is beneficial, or how to select and implement one, then this webinar is for you. Join BioPharm Systems' Param Singh, vice president of clinical trial management solutions, for this one-hour session that will provide you with a basic understanding of clinical trial management systems. This webinar will answer the following questions: -What is a CTMS? -Which types of organizations need one? -How do you choose one? -How do you decide on an implementation strategy? -What are the best practices to consider for implementation? -What are some implementation pitfalls to avoid? To view this webinar in its entirety, please visit: http://www.biopharm.com or https://cc.readytalk.com/r/1s0dn4vwxki. Twitter: http://www.twitter.com/BioPharmSystems Facebook: http://www.facebook.com/BioPharmSystems LinkedIn: http://www.linkedin.com/companies/biopharm-systems-inc
Views: 14950 BioPharmSystems
Quiz 2 Review Session Instructor: Mitchell Peabody View the complete course: http://ocw.mit.edu/6-00SCS11 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 22998 MIT OpenCourseWare
Indeed serves over 200 million job seekers a month. To better serve our job seekers we take advantage of data related to jobs, resumes, clicks, impressions, applies, and hires. Many important product features at Indeed are built using data science solutions that incorporate our data. This talk aims to cover the process and tools we use to build data science solutions.
Views: 3152 @IndeedEng Talks
An easy way to record attendance is with a bar code reader or student id number and Excel. This tutorial shows how to use iteration to stamp the time of entry for a cell which then can be used to indicate a student's attendance. Example spreadsheet available at http://fs.50webs.com/files/attendance-distributable.xlsx more information available on my website http://twict.net/excel-timestamping
Views: 66258 twictnet
Alpha, originally known as Alpha AXP, is a 64-bit reduced instruction set computing instruction set developed by Digital Equipment Corporation, designed to replace their 32-bit VAX complex instruction set computer instruction set. Alpha was implemented in microprocessors originally developed and fabricated by DEC. These microprocessors were most prominently used in a variety of DEC workstations and servers, which eventually formed the basis for almost all of their mid-to-upper-scale lineup. Several third-party vendors also produced Alpha systems, including PC form factor motherboards. Operating systems that supported Alpha included OpenVMS, Tru64 UNIX, Windows NT, Linux, BSD UNIX, Plan 9 from Bell Labs, as well as the L4Ka::Pistachio kernel. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 1385 Audiopedia
Business Intelligence (BI) Test Automation Framework- End to End Testing. Complete End to End testing at various layers in data warehouse architecture In this framework, data is read from Excel sheet using Apache POI using Java
Views: 184 Vikas Automate_Everything
Learn how the top research universities are utilizing tools such as Google Compute Engine, BigQuery, and preemptible virtual machines to drastically reduce the time from idea to discovery, run millions of simulations at lightning-fast speed, and scale research capabilities with ease. Get tips for moving workloads to GCP and understand the differentiators. DA112 Event schedule → http://g.co/next18 Watch more Data Analytics sessions here → http://bit.ly/2KXMtcJ Next ‘18 All Sessions playlist → http://bit.ly/Allsessions Subscribe to the Google Cloud channel! → http://bit.ly/NextSub
Views: 508 Google Cloud Platform
AngularJS + REST Made Simple: Connecting AngularJS to a Backend with REST & JSON Speaker: Ben Busse, technology evangelist at dreamfactory Angular provides several convenient ways to interact with backend data using REST and JSON. This talk will explain an easy way to auto-generate REST APIs and wire up Angular to data sources like SQL, NoSQL, remote file storage, and external web services using an open source REST platform called DreamFactory. This session will introduce DreamFactory's REST API console, demonstrate a simple Angular app using CORS and REST calls for user creation, authentication, database CRUD, and external web services. Lastly, we'll briefly cover API test cases and mobile app deployment with Yeoman, DreamFactory, and PhoneGap. slides: Brad's: http://goo.gl/mvKxlz Ben's: http://goo.gl/VKDt2F James': http://goo.gl/el53vz Misko's: http://goo.gl/eFAsqw and http://goo.gl/6gwcDN
Views: 321706 Angular
Presenter: Jay Wright, CASAS On July 1, 2016, we officially transitioned from WIA (Workforce Investment Act) to WIOA (Workforce Innovation and Opportunity Act.) With this large-scale federal shift came many changes to the dynamics of how we now meet state and federal reporting standards. This workshop focuses on how the new NRS Tables affect these day to day considerations.
Views: 54 OTAN Serves Adult Education
Views: 2883 MrMcsoftware
Link to slides: http://www.slideshare.net/indeedeng/large-scale-interactive-analytics-with-imhotep In a previous talk, we explained how we developed Imhotep, a distributed system for building decision trees for machine learning. We went on to describe how we build large scale interactive analytics tools using the same platform. This has kept our engineering and product organizations focused on key metrics by analyzing test results. It also gives our marketing organization timely and accurate insight into our data - allowing us to identify opportunities, spot trends, and learn about our job seekers. In this talk, Zak Cocos, who leads our Marketing Sciences team, and Product Manager Tom Bergman will discuss and provide examples of the valuable insights that can be gained by using Imhotep with almost any data set.
Views: 2248 @IndeedEng Talks
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Mahjoub-Toonk-Reuille/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf Additional Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Mahjoub-Toonk-Reuille/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-WP.pdf Catching Malware En Masse: DNS and IP Style Dhia Mahjoub SENIOR SECURITY RESEARCHER, OPENDNS Thibault Reuille SECURITY RESEARCHER, OPENDNS INC Andree Toonk MANAGER OF NETWORK ENGINEERING, OPENDNS The Internet is constantly growing, providing a myriad of new services both legitimate and malicious. Criminals take advantage of the scalable, distributed, and rather easily accessible naming, hosting and routing infrastructures of the Internet. As a result, the battle against malware is raging on multiple fronts: the endpoint, the network perimeter, and the application layer. The need for innovative measures to gain ground against the enemy has never been greater. In this talk, we will present a novel and effective multi-pronged strategy to catch malware at the DNS and IP level, as well as our unique 3D visualization engine. We will describe the detection systems we built, and share several successful war stories about hunting down malware domains and associated rogue IP space. At the DNS level, we will describe original methods for tracking botnets, both fast flux and DGA-based. We use a combination of fast, light-weight graph clustering and DNS traffic analysis techniques and threat intelligence feeds to rapidly detect botnet domain families, identify new live CnC domains and IPs, and mitigate them. At the IP level, classical reputation methods assign “maliciousness” scores to IPs, BGP prefixes, or ASNs by merely counting domains and IPs. Our system takes an unconventional approach that combines two opposite, yet complementary views and leads to more effective predictive detections. (1) On one hand, we abstract away from the ASN view. We build the AS graph and investigate its topology to uncover hotspots of malicious or suspicious activities and then scan our DNS database for new domains hosted on these malicious IP ranges. To confirm certain common patterns in the AS graph and isolate suspicious address space, we will demonstrate novel forensics and investigative methods based on the monitoring of BGP prefix announcements. (2) On the other hand, we drill down to a granularity finer than the BGP prefix. For this, we zero in on re-assigned IP ranges reserved by bad customers within large prefixes to host Exploit kit domains, browlock, and other attack types. We will present various techniques we devised to efficiently discover suspicious smaller ranges and sweep en masse for candidate suspicious IPs. Our system provides actionable intelligence and preemptively detects and blocks malicious IP infrastructures prior to, or immediately after some of them are used to wage malware campaigns, therefore decisively closing the detection gap. During this presentation, we will publicly share some of the tools we built to gather this predictive intelligence. The discussion of these detection engines and “war stories” wouldn’t be complete without a visualization engine that adequately displays the use cases and offers a graph navigation and investigation tool. Therefore, in this presentation, we will present and publicly release for the first time our own 3D visualization engine, demonstrating the full process which transforms raw data into stunning 3D visuals. We will also present different techniques used to build and render large graph datasets: Force Directed algorithms accelerated on the GPU using OpenCL, 3D rendering and navigation using OpenGL ES, and GLSL Shaders. Finally, we will present a few scripts and methods used to explore our large networks. Every concept is intended to detect and highlight precise features and will be presented with its corresponding visual representation related to malware detection use cases.
Views: 2169 DEFCONConference