2D 컴퓨터비젼에 대한 설명. 영상으로부터 정보를 추출해내는 공학/과학 분과인 컴퓨터비젼의 기술에 대한 쉬운 설명. 파이썬(Python)의 컴퓨터비젼/영상처리 라이브러리인 scikit-image를 주로 활용하였으며 코드를 함께 담음.
R컨퍼런스 발표본 (2014.5.30) 임.
The document discusses various Python data structures and modules for working with data structures efficiently. It covers the abc module for defining abstract base classes, the array module for efficient storage of homogeneous data, the bisect module for working with sorted lists, the collections module which provides high-performance container data types like deque and defaultdict, namedtuple for creating tuple subclasses with named fields, heapq for priority queue implementation, and itertools for functions generating efficient iterators.
You are valuable to God! In this latest message by Pastor Sam Hager, we discover that God creates masterpieces! Spoken at Shine.Church in Tulsa, Oklahoma.
Este documento presenta los principales hallazgos de un estudio sobre los retos del comercio electrónico en México en 2017. Identifica que el 79% de los internautas mexicanos han comprado productos u servicios en línea en el último año, aunque el porcentaje de ventas online sobre el total es menor que en otros países de Latinoamérica. Concluye que los 5 principales retos son mejorar la experiencia del consumidor, aumentar la oferta de productos y servicios, desarrollar mejores métodos de pago, optimizar los procesos de entreg
Este documento presenta una introducción al análisis PEST. Explica que PEST es un acrónimo que se refiere a los factores políticos, económicos, sociales y tecnológicos que afectan el entorno macro de una empresa. Luego, describe algunos usos comunes del análisis PEST y cuándo se puede realizar. Además, incluye un ejemplo de un análisis PEST para el sector educativo y resalta las ventajas y desventajas de utilizar esta herramienta de análisis.
Deep phenotyping to aid identification of coding & non-coding rare disease v...mhaendel
Whole-exome sequencing has revolutionized disease research, but many cases remain unsolved because ~100-1000 candidates remain after removing common or non-pathogenic variants. We present Genomiser to prioritize coding and non-coding variants by leveraging phenotype data encoded with the Human Phenotype Ontology and a curated database of non-coding Mendelian variants. Genomiser is able to identify causal regulatory variants as the top candidate in 77% of simulated whole genomes.
1. The document discusses RESTful APIs and gRPC, comparing their characteristics and use cases.
2. RESTful APIs typically use HTTP and JSON to access resources via URLs while gRPC uses protocol buffers and HTTP/2 for efficient streaming and RPC.
3. gRPC is better suited for microservices and mobile apps due to its ability to handle streaming and performance, while REST is more widely used due to its simplicity and support in most languages.
Hidden and more hideous faces of global poverty: Actually, there is more poverty in the world than we realize — than we officially acknowledge. And, ironically, we're all in it together.
10 more lessons learned from building Machine Learning systemsXavier Amatriain
1. Machine learning applications at Quora include answer ranking, feed ranking, topic recommendations, user recommendations, and more. A variety of models are used including logistic regression, gradient boosted decision trees, neural networks, and matrix factorization.
2. Implicit signals like watching and clicking tend to be more useful than explicit signals like ratings. However, both implicit and explicit signals combined can better represent long-term goals.
3. The outputs of machine learning models will often become inputs to other models, so models need to be designed with this in mind to avoid issues like feedback loops.
Why Sales and Content Are Important Skills For Students To LearnAli Hanif
This deck was part of the presentation made by Ali Hanif, founder of Hanali at inaugural GetConnected! 2017 Conference held at Communitech in Kitchener Waterloo. Presenting to an audience of University Waterloo students Ali spoke about the importance of selling and the use of content to grow in your personal and professional life.
To learn more visit www.hanali.co or email [email protected]
Mentioned here are HubSpot Sales, LinkedIn, Attach.io as tools for use. Photos are credited to Ryan McGuire.
This document presents a new dock design from JAMAS Enterprises that provides cost savings. The design uses prefabricated pit kits, Twins structures that integrate dock equipment mounting, and CentraAir levelers powered by compressed air rather than electricity. Electrical needs are limited and controls are integrated into the Twins. The design streamlines construction by eliminating steps like forming irregular pits and mounting equipment after walls are built.
Cybercrime in Russia: Trends and IssuesAlex Matrosov
This report focuses on the development of Russian cybercrime. Firstly, it summarizes the economic and geopolitical factors that underlie computer crime, and which must be taken into consideration by researchers seeking to predict upcoming developments in cybercrime and cybercrime targeting. It goes on to look at the other ways in which Russian presence in the criminal cybersphere can be tracked, considering the technical approaches used by hackers in the region, how they link with economic and geographic factors, as well as with the part played by law enforcement in the investigation of international computer crimes.
The presentation will cover the following topics:
1. How cybercrime is interlinked with economic and geographical factors in Russia. The implications of the banking and instant payment systems of the Russian Federation.
2. Law Enforcement. The laws that currently obtain in the area of Russian computer crime: Legal evasions and loopholes.
3. Technical trends. The use of botnets to steal money from the Internet banking system for corporate clients: Technological and statistical analysis of the malware families involved, the organizational structures of the perpetrators, and the calculation of damages.
4. Successfully prosecuted cases in 2010. Complex investigation: spam affiliates, the WinLock case and others.
5. How DDoS attacks and botnet operations in Russian networks were tracked in co-operation with the Russian honeynet Project.
"파이썬 성능 잠재력을 끌어내는 실용적인 개발 전략서"
미샤 고렐릭,이안 오스발트 지음 / 김영근,오현석 옮김 | 한빛미디어 | 2016년 8월 | 30,000원
★ 파이썬 3 대응
★ 프로토타이핑에서 실무 운영까지 살아가는 파이썬 코드의 비밀
아이디어 무한경쟁이 펼쳐지는 대(大)스타트업 시대! 높은 생산성으로 유명한 파이썬은 최우선 고려사항이다. 한 가지, 컴파일 언어 대비 느린 성능 때문에 성공한 서비스나 성능이 중요한 기능은 컴파일 언어로 다시 작성하곤 한다. 하지만 실무 운영까지 파이썬 코드를 계속 이어가는 방법이 있다면?
이 책은 파이썬을 둘러싼 설계와 작동 원리를 설명하고 이에 기반한 실용적인 구현 전략을 소개한다. 멀티코어 아키텍처와 클러스터의 이점을 활용하려면 어떻게 해야 하는가? 안정성을 잃지 않고 확장하는 방법은 무엇인가? 여러분은 이에 대한 명확한 해법을 찾고 방대한 소셜 데이터까지도 눈부신 속도로 처리해내는 파이썬 코드를 얻게 될 것이다.
★ 주요 내용
● numpy, Cython, 프로파일러 활용하기
● 파이썬의 시선으로 바라보는 컴퓨터 아키텍처 이해하기
● CPU 시간과 메모리 사용량을 프로파일링하여 병목 지점 찾기
● 상황에 맞는 컬렉션으로 효율적인 프로그램 작성하기
● 행렬과 벡터 연산 가속하기
● 네이티브 코드로 컴파일하기
● 대량의 I/O와 연산 동시 수행하기
● 원격 클러스터로 병렬 처리하기
● 적은 메모리로 대규모 데이터 처리하기
Understanding the black hat hacker eco systemDavid Sweigert
This document discusses how misaligned incentives work against cybersecurity. It finds that there are three levels of misaligned incentives:
1) Between attackers and defenders, where attackers are incentivized by a fluid criminal market while defenders are constrained by bureaucracy.
2) Within organizations, where cybersecurity strategies are not fully implemented, and where executives and operators measure success differently.
3) Individual incentives for "black hats" are clear in the criminal cyber market, which drives innovation, while defenders work within organizations with different goals and metrics for success.
The document reports on a survey that found cybersecurity is now a top priority for organizations due to losses from breaches. However, executives still see cybersecurity as
서비스 인프라를 만들때 고민되는 것들.
- 클라우드를 이용하면 모든 것이 해결될까?
- 사용자들이 겪는 어려움과 서비스 품질의 이슈는 무엇일까?
- 세계적으로 사랑받는 서비스들은 어떤 아키텍쳐를 가지고 있을까?
이런 고민들과 생각들을 몇 장의 슬라이드로 가볍게 풀어봅시다!
http://github.com/ipkn/crow
Crow 프로젝트에서 사용한 C++11 기법들을 실제 구현에 대한 설명을 포함하여 자세히 설명한 발표자료입니다.
C++11 features used in Crow
video:
http://youtu.be/MixS9c3mE6U
https://vimeo.com/119627253
Este documento presenta una introducción al análisis PEST. Explica que PEST es un acrónimo que se refiere a los factores políticos, económicos, sociales y tecnológicos que afectan el entorno macro de una empresa. Luego, describe algunos usos comunes del análisis PEST y cuándo se puede realizar. Además, incluye un ejemplo de un análisis PEST para el sector educativo y resalta las ventajas y desventajas de utilizar esta herramienta de análisis.
Deep phenotyping to aid identification of coding & non-coding rare disease v...mhaendel
Whole-exome sequencing has revolutionized disease research, but many cases remain unsolved because ~100-1000 candidates remain after removing common or non-pathogenic variants. We present Genomiser to prioritize coding and non-coding variants by leveraging phenotype data encoded with the Human Phenotype Ontology and a curated database of non-coding Mendelian variants. Genomiser is able to identify causal regulatory variants as the top candidate in 77% of simulated whole genomes.
1. The document discusses RESTful APIs and gRPC, comparing their characteristics and use cases.
2. RESTful APIs typically use HTTP and JSON to access resources via URLs while gRPC uses protocol buffers and HTTP/2 for efficient streaming and RPC.
3. gRPC is better suited for microservices and mobile apps due to its ability to handle streaming and performance, while REST is more widely used due to its simplicity and support in most languages.
Hidden and more hideous faces of global poverty: Actually, there is more poverty in the world than we realize — than we officially acknowledge. And, ironically, we're all in it together.
10 more lessons learned from building Machine Learning systemsXavier Amatriain
1. Machine learning applications at Quora include answer ranking, feed ranking, topic recommendations, user recommendations, and more. A variety of models are used including logistic regression, gradient boosted decision trees, neural networks, and matrix factorization.
2. Implicit signals like watching and clicking tend to be more useful than explicit signals like ratings. However, both implicit and explicit signals combined can better represent long-term goals.
3. The outputs of machine learning models will often become inputs to other models, so models need to be designed with this in mind to avoid issues like feedback loops.
Why Sales and Content Are Important Skills For Students To LearnAli Hanif
This deck was part of the presentation made by Ali Hanif, founder of Hanali at inaugural GetConnected! 2017 Conference held at Communitech in Kitchener Waterloo. Presenting to an audience of University Waterloo students Ali spoke about the importance of selling and the use of content to grow in your personal and professional life.
To learn more visit www.hanali.co or email [email protected]
Mentioned here are HubSpot Sales, LinkedIn, Attach.io as tools for use. Photos are credited to Ryan McGuire.
This document presents a new dock design from JAMAS Enterprises that provides cost savings. The design uses prefabricated pit kits, Twins structures that integrate dock equipment mounting, and CentraAir levelers powered by compressed air rather than electricity. Electrical needs are limited and controls are integrated into the Twins. The design streamlines construction by eliminating steps like forming irregular pits and mounting equipment after walls are built.
Cybercrime in Russia: Trends and IssuesAlex Matrosov
This report focuses on the development of Russian cybercrime. Firstly, it summarizes the economic and geopolitical factors that underlie computer crime, and which must be taken into consideration by researchers seeking to predict upcoming developments in cybercrime and cybercrime targeting. It goes on to look at the other ways in which Russian presence in the criminal cybersphere can be tracked, considering the technical approaches used by hackers in the region, how they link with economic and geographic factors, as well as with the part played by law enforcement in the investigation of international computer crimes.
The presentation will cover the following topics:
1. How cybercrime is interlinked with economic and geographical factors in Russia. The implications of the banking and instant payment systems of the Russian Federation.
2. Law Enforcement. The laws that currently obtain in the area of Russian computer crime: Legal evasions and loopholes.
3. Technical trends. The use of botnets to steal money from the Internet banking system for corporate clients: Technological and statistical analysis of the malware families involved, the organizational structures of the perpetrators, and the calculation of damages.
4. Successfully prosecuted cases in 2010. Complex investigation: spam affiliates, the WinLock case and others.
5. How DDoS attacks and botnet operations in Russian networks were tracked in co-operation with the Russian honeynet Project.
"파이썬 성능 잠재력을 끌어내는 실용적인 개발 전략서"
미샤 고렐릭,이안 오스발트 지음 / 김영근,오현석 옮김 | 한빛미디어 | 2016년 8월 | 30,000원
★ 파이썬 3 대응
★ 프로토타이핑에서 실무 운영까지 살아가는 파이썬 코드의 비밀
아이디어 무한경쟁이 펼쳐지는 대(大)스타트업 시대! 높은 생산성으로 유명한 파이썬은 최우선 고려사항이다. 한 가지, 컴파일 언어 대비 느린 성능 때문에 성공한 서비스나 성능이 중요한 기능은 컴파일 언어로 다시 작성하곤 한다. 하지만 실무 운영까지 파이썬 코드를 계속 이어가는 방법이 있다면?
이 책은 파이썬을 둘러싼 설계와 작동 원리를 설명하고 이에 기반한 실용적인 구현 전략을 소개한다. 멀티코어 아키텍처와 클러스터의 이점을 활용하려면 어떻게 해야 하는가? 안정성을 잃지 않고 확장하는 방법은 무엇인가? 여러분은 이에 대한 명확한 해법을 찾고 방대한 소셜 데이터까지도 눈부신 속도로 처리해내는 파이썬 코드를 얻게 될 것이다.
★ 주요 내용
● numpy, Cython, 프로파일러 활용하기
● 파이썬의 시선으로 바라보는 컴퓨터 아키텍처 이해하기
● CPU 시간과 메모리 사용량을 프로파일링하여 병목 지점 찾기
● 상황에 맞는 컬렉션으로 효율적인 프로그램 작성하기
● 행렬과 벡터 연산 가속하기
● 네이티브 코드로 컴파일하기
● 대량의 I/O와 연산 동시 수행하기
● 원격 클러스터로 병렬 처리하기
● 적은 메모리로 대규모 데이터 처리하기
Understanding the black hat hacker eco systemDavid Sweigert
This document discusses how misaligned incentives work against cybersecurity. It finds that there are three levels of misaligned incentives:
1) Between attackers and defenders, where attackers are incentivized by a fluid criminal market while defenders are constrained by bureaucracy.
2) Within organizations, where cybersecurity strategies are not fully implemented, and where executives and operators measure success differently.
3) Individual incentives for "black hats" are clear in the criminal cyber market, which drives innovation, while defenders work within organizations with different goals and metrics for success.
The document reports on a survey that found cybersecurity is now a top priority for organizations due to losses from breaches. However, executives still see cybersecurity as
서비스 인프라를 만들때 고민되는 것들.
- 클라우드를 이용하면 모든 것이 해결될까?
- 사용자들이 겪는 어려움과 서비스 품질의 이슈는 무엇일까?
- 세계적으로 사랑받는 서비스들은 어떤 아키텍쳐를 가지고 있을까?
이런 고민들과 생각들을 몇 장의 슬라이드로 가볍게 풀어봅시다!
http://github.com/ipkn/crow
Crow 프로젝트에서 사용한 C++11 기법들을 실제 구현에 대한 설명을 포함하여 자세히 설명한 발표자료입니다.
C++11 features used in Crow
video:
http://youtu.be/MixS9c3mE6U
https://vimeo.com/119627253
FPV Streaming server system built by Go with ffmpeg.
Receive analog video transmitted by drone, convert it to digital video and streaming to mobile devices.
Improving monitoring systems Interoperability with OpenMetricsChan Shik Lim
Introduction Prometheus with OpenMetrics for improving monitoring system interoperability.
- Introduction Prometheus
- Introduction OpenMetrics
- Demo: Prometheus and Datadog integration with OpenMetrics
This document discusses TimescaleDB, an open-source time-series database built on PostgreSQL. It provides an overview of TimescaleDB, including that it uses hypertables to store time-series data across partitions, allows for easy SQL queries, and scales both vertically and horizontally. The document then demonstrates how to install TimescaleDB, create a hypertable from an existing PostgreSQL table to store time-series data, insert sample data, and perform queries on the data. It concludes with references for more information.
Talk about Kubernetes cluster on baremetal servers for serve internal services.
Sharing my experiences about setup and manage kubernetes cluster on premise.
At first, start with single master kubernetes cluster and enhanced by many opensource softwares.
Add more master nodes for increase server availability.
Use Rook, MetalLB, Ceph, mysql-operator and more opensource projects.
17. 튜닝전략: 예외처리
get_item.py
def get_item_try(items, key):
try:
value = items[key]
except KeyError:
value = None
return value
def get_item_in(items, key):
if key in items:
value = items[key]
else:
value = None
return value
17