ThinkinG outside The box - =

Size: px
Start display at page:

Download "ThinkinG outside The box - ="

Transcription

1 ThinkinG outside The box - =

2 Hello, I'm Armin! I do Computers - with Python. Currently at Fireteam / Splash Damage. We do Internet for Pointy Shooty Games. c w

3 j t q t j d

4 X the box is comfortable

5 l the comfort is dangerous

6 5 0 the 9 dots puzzle (and things of similar nature) j

7 connect the dots h < - W h using exactly 4 straight lines, without retracing å U or removing one's pen from the paper j

8 connect the dots h < - W h using exactly 4 straight lines, without retracing å U or removing one's pen from the paper j

9 g i know it's cliché Ç

10 the six thinking hats J

11 the six thinking hats This guy J

12 z the majority is always wrong: congratulations; you're now a cynical asshole 7

13 m 1 a change of environment z

14 c computer games

15 4 Online infrastructure h Game Code * this graph is not very scientific

16 4 python!!!11 Online infrastructure h Game Code * this graph is not very scientific

17 Î community influences your thinking. - a

18 C++ good; Scripting Languages Bad u

19 E... if it takes you 30 minutes to do a one line change then you obviously would not want to have runtime type checks...

20 it's too easy to dismiss something on fringe or outdated experience alone

21 never underestimate how much your environment/community influences you 1

22 never underestimate how much your environment/community influences you (unfortunately that also includes things like the GIL is not a problem") 1

23 5 2 asking the right questions j

24 4 - the wrong questions are easy to spot on othersa

25 <redacted> how do I do something after return render_template(...) if I don't want to register teardown_request for all requests. J

26 he was looking for celery / message queue

27 first expectation was that the user wanted to change the HTTP response 0

28 teardown_request would not have worked anyways O

29 better: I don't want my user to wait while I do some processing on his data v

30 j t the box was Flask

31 B how to ask the right questions 2-5

32 assume you already started out wrong describe the actual problem =

33 How do I use Websockets with Flask? z

34 better: How do I notify my user about changes with low latency. 6

35 5 question leaves room for the answer

36 (a) Server-sent events via WSGI (b) application <-> redis <-> persistent connection server bit.ly/pypush Ô

37 < > Jump on IRC help out other people

38 m 3 questioning the right things z

39 the worst parts in my libraries are the ones where I took the design from elsewhere O

40 Ò it's not because I know better...

41 most things have some design behind as people copy it, the original design gets obscured and forgotten the original design might no longer apply 1

42 starting something new? question everything!

43 not with the intention of proving existing design wrong; with the intention of understanding it. 9

44 9 4 paradigm shifts F

45 Many times we don't even realize that things were an example of thinking outside the box. (a) "echo" -> Request/Response objects (b) Interactive Interpreters 9

46 That's also what makes it hard to find examples now... 9

47 every idea is a rehash don't get too excited when you feel all "obviously..." sometimes all that's necessary is transposing a concept from one industry to the other. 9

48 9 5 interesting examples F

49 Mill Processor: Basic Block: One entry, one exit. Break instruction bundles in half Two decoders, one moves left from EBB entry point, one moves to the right =

50 Mill Processor: Basic Block: One entry, one exit. Break instruction bundles in half Two decoders, one moves left from EBB entry point, one moves to the right two independent units, two separate caches =

51 High-level Queues for Request Handling Stateful Frontend Servers Stateless Workers =a

52 Sending around signed data Cookies Access/Refresh Tokens Activation Links Offers ˆ

53 The Rust Programming Language Memory ownership tracking (and otherwise just steal from C++, C, Python, Ruby, Haskell and Scheme) 1

54 Spotify's Native/Web Bridge spawns HTTP server on localhost:xxxxx provides OAuth bridge JavaScript authenticates with local server, sends commands and retrieves updates. c

55 y That's it; Now ask lucumr.pocoo.org/talks gittip.com/mitsuhiko y d? y

56 calibration slide 2 2 c

Writing Secure APIs. Armin Ronacher for PyCon.ru 2014

Writing Secure APIs. Armin Ronacher for PyCon.ru 2014 Writing Secure APIs Armin Ronacher for PyCon.ru 2014 Armin Ronacher Independent Contractor for Splash Damage / Fireteam Doing Online Infrastructure for Computer Games lucumr.pocoo.org/talks but does it

More information

modern and different PostgreSQL a talk by Armin Ronacher for DUMP 2014 (Russia)

modern and different PostgreSQL a talk by Armin Ronacher for DUMP 2014 (Russia) modern and different PostgreSQL a talk by Armin '@mitsuhiko' Ronacher for DUMP 2014 (Russia) That's me. I do Computers. Currently at Fireteam / Splash Damage. We do Internet for Pointy Shooty Games. Aside

More information

CS252 Advanced Programming Language Principles. Prof. Tom Austin San José State University Fall 2013

CS252 Advanced Programming Language Principles. Prof. Tom Austin San José State University Fall 2013 CS252 Advanced Programming Language Principles Prof. Tom Austin San José State University Fall 2013 What are some programming languages? Why are there so many? Different domains Mobile devices (Objective

More information

The State of Python. and the web. Armin Ronacher

The State of Python. and the web. Armin Ronacher The State of Python and the web Armin Ronacher // @mitsuhiko Who am I Armin Ronacher (@mitsuhiko) Founding Member of the Pocoo Team we're doing Jinja2, Werkzeug, Flask, Pygments, Sphinx and a bunch of

More information

Week - 04 Lecture - 01 Merge Sort. (Refer Slide Time: 00:02)

Week - 04 Lecture - 01 Merge Sort. (Refer Slide Time: 00:02) Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 04 Lecture - 01 Merge Sort (Refer

More information

It's Time To Get Functional 이건희

It's Time To Get Functional 이건희 It's Time To Get Functional 20071032 이건희 1 Context Intro Performance Popularity Network Effect Why Is It Time To Get Functional? 2 Intro 3 Architect You are the architect (or carpenter). 4 Tools Can you

More information

Building a Real-time Notification System

Building a Real-time Notification System Building a Real-time Notification System September 2015, Geneva Author: Jorge Vicente Cantero Supervisor: Jiri Kuncar CERN openlab Summer Student Report 2015 Project Specification Configurable Notification

More information

A Python for Future Generations. Ronacher

A Python for Future Generations. Ronacher A Python for Future Generations Armin @mitsuhiko Ronacher Hi, I'm Armin... and I do Open Source, lots of Python and SaaS Flask Sentry and here is where you can find me twitter.com/@mitsuhiko github.com/mitsuhiko

More information

Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras

Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras (Refer Slide Time: 00:17) Lecture No - 10 Hill Climbing So, we were looking

More information

4. Write sets of directions for how to check for direct variation. How to check for direct variation by analyzing the graph :

4. Write sets of directions for how to check for direct variation. How to check for direct variation by analyzing the graph : Name Direct Variations There are many relationships that two variables can have. One of these relationships is called a direct variation. Use the description and example of direct variation to help you

More information

Impossible Programs. Tom Stuart

Impossible Programs. Tom Stuart Impossible Programs Tom Stuart IMPOSSIBLE PROGRAMS @tomstuart / GOTO Chicago / 2015-05-11 PROGRAMS CAN T DO EVERYTHING IMPOSSIBLE PROGRAMS @tomstuart / GOTO Chicago / 2015-05-11 how can a PROGRAM be IMPOSSIBLE?

More information

PROBLEMS IN PRACTICE: THE WEB MICHAEL ROITZSCH

PROBLEMS IN PRACTICE: THE WEB MICHAEL ROITZSCH Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group PROBLEMS IN PRACTICE: THE WEB MICHAEL ROITZSCH THE WEB AS A DISTRIBUTED SYSTEM 2 WEB HACKING SESSION 3 3-TIER persistent

More information

Midterm Logistics. Midterm tonight, 7PM 10PM Exam location by last name:

Midterm Logistics. Midterm tonight, 7PM 10PM Exam location by last name: File Processing Midterm Logistics Midterm tonight, 7PM 10PM Exam location by last name: Last names starts with A-J: Hewlett 200 Last names starts with K-O: Braun Auditorium Last names starts with P-S:

More information

Direct Variations DIRECT AND INVERSE VARIATIONS 19. Name

Direct Variations DIRECT AND INVERSE VARIATIONS 19. Name DIRECT AND INVERSE VARIATIONS 19 Direct Variations Name Of the many relationships that two variables can have, one category is called a direct variation. Use the description and example of direct variation

More information

Close Your File Template

Close Your File Template In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of

More information

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall 2011.

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall 2011. Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.858 Fall 2011 Quiz I: Solutions Please do not write in the boxes below. I (xx/20) II (xx/10) III (xx/16)

More information

MITOCW watch?v=zm5mw5nkzjg

MITOCW watch?v=zm5mw5nkzjg MITOCW watch?v=zm5mw5nkzjg The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

MITOCW watch?v=0jljzrnhwoi

MITOCW watch?v=0jljzrnhwoi MITOCW watch?v=0jljzrnhwoi The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

Introducing: main Function, Comments, Statements

Introducing: main Function, Comments, Statements Once you're seated, please respond to the poll at pollev.com/compunc If you are not registered for PollEverywhere, please go ahead and do so before class begins! Lecture 01 Take on Me Practice: Primitive

More information

IERG 4080 Building Scalable Internet-based Services

IERG 4080 Building Scalable Internet-based Services Department of Information Engineering, CUHK MScIE 2 nd Semester, 2015/16 IERG 4080 Building Scalable Internet-based Services Lecture 9 Web Sockets for Real-time Communications Lecturer: Albert C. M. Au

More information

CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG

CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG 1 Notice Class Website http://www.cs.umb.edu/~jane/cs114/ Reading Assignment Chapter 1: Introduction to Java Programming

More information

Compiler Design Spring 2018

Compiler Design Spring 2018 Compiler Design Spring 2018 Thomas R. Gross Computer Science Department ETH Zurich, Switzerland 1 Logistics Lecture Tuesdays: 10:15 11:55 Thursdays: 10:15 -- 11:55 In ETF E1 Recitation Announced later

More information

Matrex Table of Contents

Matrex Table of Contents Matrex Table of Contents Matrex...1 What is the equivalent of a spreadsheet in Matrex?...2 Why I should use Matrex instead of a spreadsheet application?...3 Concepts...4 System architecture in the future

More information

WEB SECURITY WORKSHOP TEXSAW Presented by Solomon Boyd and Jiayang Wang

WEB SECURITY WORKSHOP TEXSAW Presented by Solomon Boyd and Jiayang Wang WEB SECURITY WORKSHOP TEXSAW 2014 Presented by Solomon Boyd and Jiayang Wang Introduction and Background Targets Web Applications Web Pages Databases Goals Steal data Gain access to system Bypass authentication

More information

6.033 Computer System Engineering

6.033 Computer System Engineering MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.033 2009 Lecture

More information

The Crossed Swords wargame: Catching NATO red teams with cyber deception

The Crossed Swords wargame: Catching NATO red teams with cyber deception The Crossed Swords wargame: Catching NATO red teams with cyber deception 2015-2018 Cymmetria Inc. All rights reserved. 2 BACKSTORY Once a year, the pentesters* and red teams of the countries of NATO descend

More information

A PROGRAM IS A SEQUENCE of instructions that a computer can execute to

A PROGRAM IS A SEQUENCE of instructions that a computer can execute to A PROGRAM IS A SEQUENCE of instructions that a computer can execute to perform some task. A simple enough idea, but for the computer to make any use of the instructions, they must be written in a form

More information

WEB SECURITY: XSS & CSRF

WEB SECURITY: XSS & CSRF WEB SECURITY: XSS & CSRF CMSC 414 FEB 22 2018 Cross-Site Request Forgery (CSRF) URLs with side-effects http://bank.com/transfer.cgi?amt=9999&to=attacker GET requests should have no side-effects, but often

More information

UI Review. The Good: Winamp

UI Review. The Good: Winamp UI Review The Good: Winamp Winamp is a music player like itunes or the Windows Media Player. It plays music, creates playlists, and lets you edit metadata for media files. I like the winamp interface for

More information

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 CIA Triad Confidentiality Prevent disclosure of information to unauthorized parties Integrity Detect data tampering Availability

More information

Xcode Encountered An Internal Logic Error >>>CLICK HERE<<<

Xcode Encountered An Internal Logic Error >>>CLICK HERE<<< Xcode Encountered An Internal Logic Error Choose Continue The biggest problem is that "XCODE" doesn't run and give the following error: Xcode encountered an internal logic error. Choose "Continue" to continue

More information

Improve WordPress performance with caching and deferred execution of code. Danilo Ercoli Software Engineer

Improve WordPress performance with caching and deferred execution of code. Danilo Ercoli Software Engineer Improve WordPress performance with caching and deferred execution of code Danilo Ercoli Software Engineer http://daniloercoli.com Agenda PHP Caching WordPress Page Caching WordPress Object Caching Deferred

More information

Creational. Structural

Creational. Structural Fitness for Future of Design Patterns & Architectural Styles Design patterns are difficult to teach, so we conducted a class collaboration where we all researched and reported on a variety of design patterns

More information

RKN 2015 Application Layer Short Summary

RKN 2015 Application Layer Short Summary RKN 2015 Application Layer Short Summary HTTP standard version now: 1.1 (former 1.0 HTTP /2.0 in draft form, already used HTTP Requests Headers and body counterpart: answer Safe methods (requests): GET,

More information

Screen Scraping. Screen Scraping Defintions ( Web Scraping (

Screen Scraping. Screen Scraping Defintions (  Web Scraping ( Screen Scraping Screen Scraping Defintions (http://www.wikipedia.org/) Originally, it referred to the practice of reading text data from a computer display terminal's screen. This was generally done by

More information

Security. SWE 432, Fall 2017 Design and Implementation of Software for the Web

Security. SWE 432, Fall 2017 Design and Implementation of Software for the Web Security SWE 432, Fall 2017 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Authorization oauth 2 Security Why is it important? Users data is

More information

1 Getting used to Python

1 Getting used to Python 1 Getting used to Python We assume you know how to program in some language, but are new to Python. We'll use Java as an informal running comparative example. Here are what we think are the most important

More information

TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series In Networking) Ebooks Free

TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series In Networking) Ebooks Free TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series In Networking) Ebooks Free With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands

More information

Unit 6 - Software Design and Development LESSON 4 DATA TYPES

Unit 6 - Software Design and Development LESSON 4 DATA TYPES Unit 6 - Software Design and Development LESSON 4 DATA TYPES Previously Paradigms Choice of languages Key features of programming languages sequence; selection eg case, if then else; iteration eg repeat

More information

Eventually, you'll be returned to the AVD Manager. From there, you'll see your new device.

Eventually, you'll be returned to the AVD Manager. From there, you'll see your new device. Let's get started! Start Studio We might have a bit of work to do here Create new project Let's give it a useful name Note the traditional convention for company/package names We don't need C++ support

More information

How Rust is Tilde s Competitive Advantage

How Rust is Tilde s Competitive Advantage Jan. 2018 Rust Case Study: How Rust is Tilde s Competitive Advantage The analytics startup innovates safely with the help of Rust Copyright 2018 The Rust Project Developers All rights reserved graphics

More information

CMPUT 396 Sliding Tile Puzzle

CMPUT 396 Sliding Tile Puzzle CMPUT 396 Sliding Tile Puzzle Sliding Tile Puzzle 2x2 Sliding Tile States Exactly half of the states are solvable, the other half are not. In the case of 2x2 puzzles, I can solve it if I start with a configuration

More information

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the I'm Andy Glover and this is the Java Technical Series of the developerworks podcasts. My guest is Brian Jakovich. He is the director of Elastic Operations for Stelligent. He and I are going to talk about

More information

Python Basics. level 1 Chris Roffey

Python Basics. level 1 Chris Roffey Coding Club Python Basics level 1 Chris Roffey Coding Club Python Basics level 1 Chris Roffey cambridge university press Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi,

More information

Graph Theory. 26 March Graph Theory 26 March /29

Graph Theory. 26 March Graph Theory 26 March /29 Graph Theory 26 March 2012 Graph Theory 26 March 2012 1/29 Graph theory was invented by a mathematician named Euler in the 18th century. We will see some of the problems which motivated its study. However,

More information

Introduction to Scientific Computing

Introduction to Scientific Computing Introduction to Scientific Computing Dr Hanno Rein Last updated: October 12, 2018 1 Computers A computer is a machine which can perform a set of calculations. The purpose of this course is to give you

More information

How To Test Your Code A CS 1371 Homework Guide

How To Test Your Code A CS 1371 Homework Guide Introduction After you have completed each drill problem, you should make it a habit to test your code. There are good ways of testing your code and there are bad ways of testing your code. This guide

More information

PROGRAMMING GOOGLE APP ENGINE WITH PYTHON: BUILD AND RUN SCALABLE PYTHON APPS ON GOOGLE'S INFRASTRUCTURE BY DAN SANDERSON

PROGRAMMING GOOGLE APP ENGINE WITH PYTHON: BUILD AND RUN SCALABLE PYTHON APPS ON GOOGLE'S INFRASTRUCTURE BY DAN SANDERSON PROGRAMMING GOOGLE APP ENGINE WITH PYTHON: BUILD AND RUN SCALABLE PYTHON APPS ON GOOGLE'S INFRASTRUCTURE BY DAN SANDERSON DOWNLOAD EBOOK : PROGRAMMING GOOGLE APP ENGINE WITH PYTHON: Click link bellow and

More information

Lesson 4 Transcript: DB2 Architecture

Lesson 4 Transcript: DB2 Architecture Lesson 4 Transcript: DB2 Architecture Slide 1: Cover Welcome to Lesson 4 of the DB2 on campus series. Today we are going to talk about the DB2 architecture. My name is Raul Chong and I am the DB2 on Campus

More information

Popcorn's ini Tutorial

Popcorn's ini Tutorial Popcorn's ini Tutorial Last update: November 30 th 2006. There are lot's of ways to save information into a file in The Games Factory 2 and Multimedia Fusion 2. This tutorial will teach you the basics

More information

Lab assignment 1. TI /18;; ti1506-students.slack.com

Lab assignment 1. TI /18;; ti1506-students.slack.com Lab assignment 1 TI1506 2017/18;; ti1506-students.slack.com Introduction The first part of this assignment gives you hands-on experience in http. In the second part you will make a head-start with the

More information

MITOCW watch?v=se4p7ivcune

MITOCW watch?v=se4p7ivcune MITOCW watch?v=se4p7ivcune The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

MongoDB Schema Design for. David Murphy MongoDB Practice Manager - Percona

MongoDB Schema Design for. David Murphy MongoDB Practice Manager - Percona MongoDB Schema Design for the Click "Dynamic to edit Master Schema" title World style David Murphy MongoDB Practice Manager - Percona Who is this Person and What Does He Know? Former MongoDB Master Former

More information

CSCI-1680 WWW Rodrigo Fonseca

CSCI-1680 WWW Rodrigo Fonseca CSCI-1680 WWW Rodrigo Fonseca Based partly on lecture notes by Scott Shenker and John Jannotti Precursors 1945, Vannevar Bush, Memex: a device in which an individual stores all his books, records, and

More information

Development of web applications using Google Technology

Development of web applications using Google Technology International Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16 Development of web applications using Google Technology Vaibhavi Nayak 1, Vinuta V Naik 2,Vijaykumar

More information

Azon Master Class. By Ryan Stevenson Guidebook #11 Squidoo Marketing

Azon Master Class. By Ryan Stevenson   Guidebook #11 Squidoo Marketing Azon Master Class By Ryan Stevenson https://ryanstevensonplugins.com/ Guidebook #11 Squidoo Marketing Table of Contents 1. Getting Started With Squidoo 2. Lens Research & Targeting 3. Lens Creation Tutorial

More information

BRING THE NOISE! MAKING SENSE OF A HAILSTORM OF METRICS. Abe Jon

BRING THE NOISE! MAKING SENSE OF A HAILSTORM OF METRICS. Abe Jon BRING THE NOISE! MAKING SENSE OF A HAILSTORM OF METRICS Abe Stanway @abestanway Jon Cowie @jonlives Ninety minutes is a long time. This talk: ~10 ~25 ~30 ~10 ~15 - motivations - skyline - oculus - demo!

More information

CSCI-1680 WWW Rodrigo Fonseca

CSCI-1680 WWW Rodrigo Fonseca CSCI-1680 WWW Rodrigo Fonseca Based partly on lecture notes by Sco2 Shenker and John Janno6 Administrivia HW3 out today Will cover HTTP, DNS, TCP TCP Milestone II coming up on Monday Make sure you sign

More information

Defining Done in User Stories

Defining Done in User Stories This article originally appeared on Artima Developer on Wednesday, January 6, 2010. To access it online, visit: http://www.artima.com/articl es/defining_done.html Defining Done in User Stories By Victor

More information

MITOCW ocw f99-lec12_300k

MITOCW ocw f99-lec12_300k MITOCW ocw-18.06-f99-lec12_300k This is lecture twelve. OK. We've reached twelve lectures. And this one is more than the others about applications of linear algebra. And I'll confess. When I'm giving you

More information

Lesson 3 Transcript: Part 2 of 2 Tools & Scripting

Lesson 3 Transcript: Part 2 of 2 Tools & Scripting Lesson 3 Transcript: Part 2 of 2 Tools & Scripting Slide 1: Cover Welcome to lesson 3 of the DB2 on Campus Lecture Series. Today we are going to talk about tools and scripting. And this is part 2 of 2

More information

tostatichtml() for Everyone!

tostatichtml() for Everyone! tostatichtml() for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both A talk by Dr.-Ing. Mario Heiderich, Cure53 mario@cure53.de @0x6D6172696F 1 of 45 Here is Alice. She wants

More information

Final Project Report

Final Project Report Jun Mak Sean Lee Bikas Tomkoria Fahd Elbolichikhi Final Project Report Project Title: ETA Electronic Travel Assistance for Group 4. Online Doc.: http://inst.eecs.berkeley.edu/~swlee/assignment5.html 1.

More information

Graphics Performance Benchmarking Framework ATI. Presented to: Jerry Howard. By: Drew Roberts, Nicholas Tower, Jason Underhill

Graphics Performance Benchmarking Framework ATI. Presented to: Jerry Howard. By: Drew Roberts, Nicholas Tower, Jason Underhill Graphics Performance Benchmarking Framework ATI Presented to: Jerry Howard By: Drew Roberts, Nicholas Tower, Jason Underhill Executive Summary The goal of this project was to create a graphical benchmarking

More information

UTF and Turkish. İstinye University. Representing Text

UTF and Turkish. İstinye University. Representing Text Representing Text Representation of text predates the use of computers for text Text representation was needed for communication equipment One particular commonly used communication equipment was teleprinter

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 08 Tutorial 2, Part 2, Facebook API (Refer Slide Time: 00:12)

More information

Application Layer -1- Network Tools

Application Layer -1- Network Tools EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2013, Lecture 06 Kaan Bür, Stefan Höst Previously on EITF25 Transport Layer Addressing above IP Ports, sockets Process-to-process

More information

Laboratory 5: Implementing Loops and Loop Control Strategies

Laboratory 5: Implementing Loops and Loop Control Strategies Laboratory 5: Implementing Loops and Loop Control Strategies Overview: Objectives: C++ has three control structures that are designed exclusively for iteration: the while, for and do statements. In today's

More information

PHP Programming With MySQL: The Web Technologies Series Ebooks Free

PHP Programming With MySQL: The Web Technologies Series Ebooks Free PHP Programming With MySQL: The Web Technologies Series Ebooks Free This book covers the basics of PHP and MySQL along with introductions to advanced topics including object-oriented programming and how

More information

2. On the ensuing screen provide any name you click and then click Create Survey:

2. On the ensuing screen provide any name you click and then click Create Survey: Creating a Qualtrics Survey These exercises assume that you have already created an account at Qualtrics. If not, please consult our separate documentation on how to create one. These exercises are divided

More information

Producer sends messages to the "hello" queue. The consumer receives messages from that queue.

Producer sends messages to the hello queue. The consumer receives messages from that queue. Simple Message Queue using the Pika Python client (From https://www.rabbitmq.com/tutorials/tutorial-one-python.html) A producer (sender) that sends a single message and a consumer (receiver) that receives

More information

Adobe InDesign CS4 Classroom In A Book Ebooks Free

Adobe InDesign CS4 Classroom In A Book Ebooks Free Adobe InDesign CS4 Classroom In A Book Ebooks Free The fastest, easiest, most comprehensive way to learn Adobe InDesign CS4 Adobe InDesign CS4 Classroom in a Book contains 14 lessons. The book covers the

More information

CONTENTS: What Is Programming? How a Computer Works Programming Languages Java Basics. COMP-202 Unit 1: Introduction

CONTENTS: What Is Programming? How a Computer Works Programming Languages Java Basics. COMP-202 Unit 1: Introduction CONTENTS: What Is Programming? How a Computer Works Programming Languages Java Basics COMP-202 Unit 1: Introduction Announcements Did you miss the first lecture? Come talk to me after class. If you want

More information

Profile Can't Be Found Jenkins

Profile Can't Be Found Jenkins Iphone Books Code Sign Error Provisioning Profile Can't Be Found Jenkins Code signing is required for product type Unit Test Bundle in SDK ios 8.0 profile accordingly, installed both, but can't get past

More information

Java: framework overview and in-the-small features

Java: framework overview and in-the-small features Chair of Software Engineering Carlo A. Furia, Marco Piccioni, Bertrand Meyer Java: framework overview and in-the-small features Chair of Software Engineering Carlo A. Furia, Marco Piccioni, Bertrand Meyer

More information

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.

More information

Week - 01 Lecture - 04 Downloading and installing Python

Week - 01 Lecture - 04 Downloading and installing Python Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and

More information

Representing Characters and Text

Representing Characters and Text Representing Characters and Text cs4: Computer Science Bootcamp Çetin Kaya Koç cetinkoc@ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2018 1 / 28 Representing Text Representation of text predates the

More information

Blitz2D Newbies: Definitive Guide to Types by MutteringGoblin

Blitz2D Newbies: Definitive Guide to Types by MutteringGoblin Blitz2D Newbies: Definitive Guide to Types by MutteringGoblin Types are probably the hardest thing to understand about Blitz Basic. If you're using types for the first time, you've probably got an uneasy

More information

eb Security Software Studio

eb Security Software Studio eb Security Software Studio yslin@datalab 1 OWASP Top 10 Security Risks in 2017 Rank Name 1 Injection 2 Broken Authentication and Session Management 3 Cross-Site Scripting (XSS) 4 Broken Access Control

More information

A Seminar report On LAMP Technology

A Seminar report On LAMP Technology A Seminar report On LAMP Technology Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED

More information

CHAPTER 3 RESOURCE MANAGEMENT

CHAPTER 3 RESOURCE MANAGEMENT CHAPTER 3 RESOURCE MANAGEMENT SUBTOPIC Understand Memory Management Understand Processor Management INTRODUCTION Memory management is the act of managing computer memory. This involves providing ways to

More information

P2_L8 - Hashes Page 1

P2_L8 - Hashes Page 1 P2_L8 - Hashes Page 1 Reference: Computer Security by Stallings and Brown, Chapter 21 In this lesson, we will first introduce the birthday paradox and apply it to decide the length of hash, in order to

More information

Software Testing Prof. Meenakshi D Souza Department of Computer Science and Engineering International Institute of Information Technology, Bangalore

Software Testing Prof. Meenakshi D Souza Department of Computer Science and Engineering International Institute of Information Technology, Bangalore Software Testing Prof. Meenakshi D Souza Department of Computer Science and Engineering International Institute of Information Technology, Bangalore Lecture 04 Software Test Automation: JUnit as an example

More information

Read & Download (PDF Kindle) Data Structures And Other Objects Using Java (4th Edition)

Read & Download (PDF Kindle) Data Structures And Other Objects Using Java (4th Edition) Read & Download (PDF Kindle) Data Structures And Other Objects Using Java (4th Edition) Data Structures and Other Objects Using Java is a gradual, "just-in-time" introduction to Data Structures for a CS2

More information

CS 360 Programming Languages Interpreters

CS 360 Programming Languages Interpreters CS 360 Programming Languages Interpreters Implementing PLs Most of the course is learning fundamental concepts for using and understanding PLs. Syntax vs. semantics vs. idioms. Powerful constructs like

More information

Week - 01 Lecture - 03 Euclid's Algorithm for gcd. Let us continue with our running example of gcd to explore more issues involved with program.

Week - 01 Lecture - 03 Euclid's Algorithm for gcd. Let us continue with our running example of gcd to explore more issues involved with program. Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 03 Euclid's Algorithm

More information

29-27 May 2013 CERN WEB FRAMEWORKS. Adrian Mönnich

29-27 May 2013 CERN WEB FRAMEWORKS. Adrian Mönnich First Indico Workshop 29-27 May 2013 CERN WEB FRAMEWORKS Adrian Mönnich Framework? What? Do we have one? Do we need one? A web application framework is a software framework that is designed to support

More information

Measuring in Pixels with Scratch

Measuring in Pixels with Scratch In the Primary division, a big mathematical idea is understanding how to measure correctly, using both non standard and standardized measurements. Many students struggle with measuring because they fail

More information

IntroductionToRobotics-Lecture02

IntroductionToRobotics-Lecture02 IntroductionToRobotics-Lecture02 Instructor (Oussama Khatib):Okay. Let's get started. So as always, the lecture starts with a video segment, and today's video segment comes from 1991, and from the group

More information

B - Broken Track Page 1 of 8

B - Broken Track Page 1 of 8 B - Broken Track There's a gap in the track! We need to make our robot even more intelligent so it won't get stuck, and can find the track again on its own. 2017 https://www.hamiltonbuhl.com/teacher-resources

More information

Functional Programming Invades Architecture. George Fairbanks SATURN May 2017

Functional Programming Invades Architecture. George Fairbanks SATURN May 2017 Functional Programming Invades Architecture George Fairbanks SATURN 2017 3 May 2017 1 Programming in the Large Yesterday: Functional Programming is PITS, i.e., just inside modules Today: FP is also PITL

More information

Shree.Datta Polytechnic College,Dattanagar, Shirol. Class Test- I

Shree.Datta Polytechnic College,Dattanagar, Shirol. Class Test- I Shree. Datta S.S.S.K. Charitable Trust s Shree.Datta Polytechnic College,Dattanagar, Shirol Class Test- I Course Code:CO6E Subject:-SOFTWARE TESTING Marks:-25 Semester:-VI Subject code:-12258 Date:- Institute

More information

Kaazing Gateway: An Open Source

Kaazing Gateway: An Open Source Kaazing Gateway: An Open Source HTML 5 Websocket Server Speaker Jonas Jacobi Co-Founder: Kaazing Co-Author: Pro JSF and Ajax, Apress Agenda Real-Time Web? Why Do I Care? Scalability and Performance Concerns

More information

Practical Rendering And Computation With Direct3D 11 Free Pdf Books

Practical Rendering And Computation With Direct3D 11 Free Pdf Books Practical Rendering And Computation With Direct3D 11 Free Pdf Books Direct3D 11 offers such a wealth of capabilities that users can sometimes get lost in the details of specific APIs and their implementation.

More information

Multimedia im Netz Online Multimedia Winter semester 2015/16. Tutorial 03 Minor Subject

Multimedia im Netz Online Multimedia Winter semester 2015/16. Tutorial 03 Minor Subject Multimedia im Netz Online Multimedia Winter semester 2015/16 Tutorial 03 Minor Subject Ludwig- Maximilians- Universität München Online Multimedia WS 2015/16 - Tutorial 03-1 Today s Agenda Quick test Server

More information

Cloud Foundry Bootcamp

Cloud Foundry Bootcamp Cloud Foundry Bootcamp GOTO 2012 Josh Long Spring Developer Advocate josh.long@springsource.com 2012 VMware, Inc. All rights reserved Josh Long Spring Developer Advocate josh.long@springsource.com About

More information

CPS 170: Artificial Intelligence Search

CPS 170: Artificial Intelligence   Search CPS 170: Artificial Intelligence http://www.cs.duke.edu/courses/spring09/cps170/ Search Instructor: Vincent Conitzer Search We have some actions that can change the state of the world Change resulting

More information

Datacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score

Datacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract

More information

Naming Things in Adafruit IO

Naming Things in Adafruit IO Naming Things in Adafruit IO Created by Adam Bachman Last updated on 2016-07-27 09:29:53 PM UTC Guide Contents Guide Contents Introduction The Two Feed Identifiers Name Key Aside: Naming things in MQTT

More information