Going for a little Benoit B. Mandelbrot recursion joke here with the title.
Seth Juarez (github) recently spoke to Pasadena .NET user group on the topic of Practical Machine Learning using nuML. Seth is a wonderful speaker, educator and nuML is an excellent library to get started with machine learning in .NET. His explanations are very intuitive; even for people who have been working in the field for a while. During the talk and follow up discussions, there were various technical references made which went beyond the scope of talk. To be fair with Seth, he covered lot of material in an hour and a half; probably couple of weeks worth in a traditional ML course.
Therefore I decided to provide links to these underlying topics for the benefit of attendees in case anyone is interested in knowing more about them.
- No free lunch in search and optimization
- Probably approximately correct learning
- Kernalized Sorting for NLP Presentation - Paper by Seth
- QP Solver
- NP-Complete Problems
- Intuitive Explanation of Expectation Maximization
- Multi-class classification
- Rosylyn and Roslyn CTP Introduces Interactive Code for C#
- Expando Objects
- Cardinality vs Selectivity
- Microsoft Automatic Graph Layout Library
- Positive Definite Matrix
- Kernel Perceptron in Python
- Perceptrons and Kernels
- math.net numerics
- Matrix Slicing
- Vectors and Matrices
- CodeMash 2013 Repo and readme
- What is EM algorithm?
- k-means clustering
- Clustering Algorithms
- Bag of Words Model
- Cosine similarity vs Hamming distance
- Time series regression and generalized least squares
- Machine Learning Techniques for Stock Prediction
- Causality, Correlation and Browian Motion
Happy Machine Learning!
Andrew Karcher, SQL Server MVP invited me to speak to San Diego .NET user group this Tuesday. The topic of my talk was Secure Code Top 10 (OWASP) for Service Oriented Architectures and the presentation slides can be downloaded from here. Links from the talk follow.
Web Service Security Cheat Sheet
OWASP web Goat.NET
WCF Security Fundamentals
WebGoat.NET Github (Web Forms)
WebGoat.NET Github (MVC)
C is for cookie, H is for hacker – understanding HTTP only and Secure cookies
Advance SQL Injection - Havij
OWASP Top 10 for .NET
HTML encoding in ASP.NET / MVC
HTMLEncodig in Razor
How Hackers Stole 200,000+ Citi Accounts Just By Changing Numbers In The URL
6.5 Million Encrypted LinkedIn Passwords Leaked Online
Preventing Cross-Site Request Forgery (CSRF) Attacks
Abstract: Robert Scoble (Tech Savvy Social Butterfly) is calling the next age of computing the “Age of Context”. Mobile devices, wearables, and other sensors are starting to become commonplace everywhere we look.
In this talk I will show you how – for under $50 – you can get involved and start experimenting with hardware that can help you to prototype interesting solutions and ideas in this new era. Included will be both Arduino, as well as the Raspberry Pi.
About the Presenter: Jon is a member of the technical staff at MCW, where he focuses on connected systems technologies. He is also a regular speaker and trainer for Pluralsight. Jon is most at home spelunking, trying to figure out how things work from the inside out. He is the author of RESTful.NET from O’Reilly, as well as Essential ASP for Addison-Wesley, and was a co-author of Mastering Visual Studio.NET for O’Reilly. Jon’s current major interest is helping people to understand the advantages of REST, but he sees a bright future for modeling as a way to build complex systems.
* 6:00p Mixer/Networking/Pizza
* 6:30p Presentation Starts
* 8:00p Raffle
Last night I had the privilege to listen to Dr. John Preskill in Beckman Auditorium here at Caltech with fellow Quantum aficianado David Lazar. John Preskill is the Richard P. Feynman Professor of Theoretical Physics at Caltech. This was definitely one of the most accessible lecture on this topic of general audience which was very well received. Dr. Preskill is definitely a teacher and a communicator; as Feynman chair, he effectively summarized 50+ years of Quantum research and development into a one hour lecture. Quantum frontiers has some of the recorded lectures which readers may find interesting.
Dr. Preskill is also involved with IQIM, Institute for Quantum Information and Matter, at Caltech. Here is an IQIM Promotional video which was shown towards the end of the session.
The lecture addressed the opportunities and challenges in quantum computing, entanglements, speculation about future trends, quantum error correction and quantum information science.
Couple of his detailed lectures can be seen below.
Last night's LA Machine Learning event on Mining Time Series Data w/ Sylvia Halasz of YP at OpenX Pasadena was quite interesting and well attended. Dr. Halasz spoke about Adaptive Ensemble Kalman Filter and her work on building n-gram correlation with the flu outbreaks. Some of the associated papers follow.
- The ngram chief complaint classifier: A novel method of automatically creating chief complaint classifiers based on international classification of diseases groupings
- Detecting the start of the flu season
- Syndrome Surveillance - CDC
Recently attended Big Data Event @ Caltech. The topic was Big Data, Big Opportunities: Predicting the Future One Byte at a Time and the panel and speakers didn't disappoint. Following is the slidedeck and pictures from the event.
It’s raining data. Actually, it’s more like a hurricane.
Every website, email, SMS text, mouse click, download and online purchase generates data, a lot of data.
This data is being assembled into massive data sets and used by scientists, researchers, companies and the government to develop new products, predict epidemics, understand consumer behavior and formulate public policies.
Entrepreneurs are pursuing these “Big Data” opportunities in what is becoming the 21st century equivalent of the gold rush.
Our speakers will share their views on the opportunities and challenges entrepreneurs face in building a Big Data venture.
Saturday, November 17, 2012
California Institute of Technology
Program: 9:00 a.m. to 11:15 a.m. Baxter Lecture Hall
Networking: 11:15 a.m. to 12:00 p.m. Baxter Lecture Hall
Last week I spoke to Southern California .NET Architecture Group regarding implementation of Service Oriented Design Patterns with Windows Communication Foundation. The talk was an architectural overview of so called SOA tenants and how to implement these best practices using WCF. Being technologists, we tend to focus more on underlying technologies and have tendency to avoid topics like BPM, enterprise decision management, business rules engine, ESB, event stream processing, registry and discovery, component and composites, orchestration and mediation to name a few. Trying to avoid abstractions and TLA's (three letter acronyms), the focus of the talk was towards explaining the key-components of a generic, platform agnostic service oriented architecture and how WCF fulfills one part of this larger puzzle. In real-world SOA implementations, aside from usual Service ABC's (Address, Binding, Contracts) which are essential parts of service components and composites, there is lot of attention paid to tracking and monitoring the artifacts in a SOA, enforcing and ensuring compliance with the policies associated with the artifacts and measuring the outcomes related to their use. Following are some of the salient features of a comprehensive service oriented design.
- BPM - Business process management solution
- EDM - Enterprise decision management
- ESB - Enterprise Service Bus
- ESP - Event Stream Processing
- Service Orchestration
- Service components and composites
- web service mediation (Protocol mediation, Traffic management,Version rationalization, Runtime governance)
After introducing these fundamental entities as part of a comprehensive SOA platform, I spoke further about how component oriented architecture has evolved into SOA, the definition and importance of boundaries (machine, network, datacenter) and the connection between SOA and cloud. While answering a question about why WCF != SOA, I found the following geek & poke comic very useful.
As handbook of cloud computing notes,
Web Services and Service Oriented Architecture (SOA) are not new concepts; however they represent the base technologies for cloud computing. Cloud services are typically designed as Web services, which follow industry standards including WSDL, SOAP, and UDDI. A Service Oriented Architecture organizes and manages Web services inside clouds (Vouk, 2008). A SOA also includes a set of cloud services, which are available on various distributed platforms.
Therefore, it is fair to describe an SOA environment as enabler for cloud computing. This lead us to the SOA concepts and how it maps to WCF.
- SOA Entity corresponds to WCF DataContract
- SOA Message corresponds to WCF MessageContract
- SOA Interface corresponds to WCF ServiceContract
- SOA Transport corresponds to WCF Binding
- SOA Endpoint corresponds to WCF deployment model (service endpoint)
Next logical step was premier to a simple WCF service, wcf service library, client utility, metadata endpoint and what's new in WCF 4 to help leverage service oriented architecture. Don Box's infamous (and controversial) SOA tenants were discussed in context with the service oriented design.
- Boundaries are Explicit
- Services are Autonomous
- Services share schema and contract, not class
- Service compatibility is based upon policy
At this point, attendees were introduced to WCF 4 hands-on-lab and it's individual exercises on Simplified Configuration, Service Behavior, Protocol Mapping, Service Discovery, Metadata Extensions, Discovery Announcements, Discovery Proxy, Routing/Service Routing and Content Based Routing.
There’s a lot more to discuss including design of contracts, versioning, governance, Forward and backward compatibility, trade-offs associated with various deployment options, Integration and regression testing, Security (authentication, authorization, privacy), Reuse, High Availability, anti-Patterns, AppFabric's role in monitoring, caching and hosting etc but we had to conclude the talk in the interest of time.
Thank you Mike Vincent and David Wells for the invite.
References & Download Links:
and a Future title really looking forward to
Cloud camp LA happened couple of weeks ago at the coresite campus in downtown LA. The highlights of the evening were Dave Nielsen's intro, Lynn Langit's NOSQL session, Bret Statham's CQRS (Command Query Responsibility Segregation) talk and coresite's datacenter tour.
I have attended cloudcamps organized by Dave Nielsen in the past but this particular event wasn't as organized as the one at Microsoft campus couple of years ago (and through no fault of his own). Dave is a Co-Founder of CloudCamp and author of the book PayPal Hacks. The event started late and hence the unconference style sessions and panels were cut short and disrupted. Lots of echo so it was hard to hear and topics which came out of un-conference discussion weren't quite diverse and well organized even for an unconference. However, the data center tour was fun!
and a much nicer write-up by morphlaps on CloudCamp LA – Why Open Source (and OpenStack) Matters To the Enterprise
This Wednesday April 25th, I will be part of a panel at the OWASP LA Security Summit where Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on "Software (In)Security - Challenges to securing software". Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on "De-Anonymizing Anonymous". A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers and myself discussing different aspects of De-Anonymizing Anonymous.
The focus of the panel is upon Recruitment and communication i.e. how Anonymous leverages social networks to recruit its members and pick a target, application attack i.e sequence the steps Anonymous hackers deploy to take data and bring down websites, DDoS i.e. the DDoS techniques deployed to take down websites and finally the key mitigation steps that organizations need to take if they ever become a target.
Four Points by Sheraton Los Angeles
5990 Green Valley Cir
Culver City, CA 90230
RSVP at http://www.meetup.com/OWASP-Los-Angeles/