Using Elastiknn for exact and approximate nearest neighbor searchFaithWestdorp
Elastiknn (https://elastiknn.com/) is an open-source Elasticsearch plugin for exact and approximate nearest neighbor search.
Methods like word2vec and neural nets can convert various data modalities (text, images, users, items, etc.) into numerical vectors (i.e., embeddings), enabling data scientists and engineers to use nearest neighbor queries to search for semantically similar data (e.g., similar documents, images, users, etc.). Elasticsearch is a ubiquitous search solution, but its support for vector search is still evolving. Elastiknn fills the gap by bringing efficient exact and approximate vector search to Elasticsearch. This enables an enhanced search experience by combining traditional queries (e.g., products matching <some text query>) with nearest neighbor search queries (e.g., products with images similar to <a user-provided image>).
In this talk, Alex will present the features of Elastiknn, some example use-cases, and a few of the interesting engineering challenges in building it.
To say it has been interesting these last few months would be an understatement. I am sure everyone’s situation is different but many of you are facing similar challenges working from home. This includes Observing systems remotely with different tools. In this meetup we will have some fun and show how Elastic uses Observability to provide a unified view of your logs, metrics and APM!
Learn how Congress is starting to use Elasticsearch to modernize search, and how you can help to accelerate this change. Until just a decade ago, some of the most important precedents of Congress were stored and indexed on paper cards. This system was replaced by a slow, clunky SQL search and there was initially resistance when Xcential proposed to convert this to Elasticsearch (v1.7.2), because lawyers feared that ‘relevance’-based search would be less precise. With accurate results, 50 times faster, users were won over. Now there is a potential to use modern search, not only for precedents, but throughout the work of Congress and in state legislatures as well. We’ll talk about some of these projects, and how you could get involved (we’re hiring!).
Eliminate your zombie technology ray myers - 11-5-2020FaithWestdorp
Announcing the open source release of Zombie Technology Elimination Project (ZTEP), gamifying the retirement of deprecated tech, powered by Elasticsearch!
Model the progress of a code migration effort as zombies that are still left to defeat! Support a culture of recognition by publicly celebrating the contributions of Zombie Hunters (code migrators) by awarding points and featuring them on the Hunter Heroes Leaderboard.
Inspired by the original ZTEP project by Mike Finney (@FinneyCanHelp) and others at Carfax:
https://www.gamification.co/2013/09/11/gamifying-the-destruction-of-zombie-technology
Based on the behavioral science of Octalysis gamification framework:
https://yukaichou.com/gamification-examples/octalysis-complete-gamification-framework/
Elasticsearch enabled productive collaboration between product and engineering teams at GetSet Learning. It allowed them to quickly prototype and build key features like recommended tags, feeds, and products. Some lessons learned were that Elasticsearch provided a unified search framework, tools for syncing processes between teams, and hosted services through Elastic Cloud. These factors facilitated efficient collaboration between teams.
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsFaithWestdorp
This document discusses integrating MITRE ATT&CK intelligence into Logstash plugins to provide security analysts with more context about threats. It covers writing plugins to extract relevant data from logs and map detections to MITRE tactics and techniques. When data is missing, the plugin uses other intelligence sources to infer classifications. The document demonstrates connecting Logstash pipelines to leverage parsing and enrichment, and shows tools for viewing and debugging pipeline configurations.
Examining OpenData with a Search Index using ElasticsearchFaithWestdorp
Elastic is a search company that provides three main solutions - Elastic Enterprise Search, Elastic Security, and Elastic Observability. It has employees in over 40 countries and is a public company listed on the NYSE. Elastic focuses on fast, scalable search capabilities that are relevant to users. It provides unified visibility for logs, metrics and application performance monitoring. Elastic Security integrates endpoint protection and security information and event management. All solutions are powered by the Elastic Stack which allows ingestion, storage, search and analysis of data from any source.
From the trenches: scaling a large log management deploymentFaithWestdorp
This document discusses the deployment of Elastic Cloud Enterprise (ECE) for a large log management project. It summarizes the client's requirements of 120,000 events per second with 30-day retention across 500TB of logs from various sources. It then describes the ECE implementation using the client's existing hardware, including setting up availability zones, clusters, and determining storage density. It also covers shard sizing testing, Logstash architecture for ingesting from Kafka, and tuning Logstash for optimal ingestion performance.
Using Elastiknn for exact and approximate nearest neighbor searchFaithWestdorp
Elastiknn (https://elastiknn.com/) is an open-source Elasticsearch plugin for exact and approximate nearest neighbor search.
Methods like word2vec and neural nets can convert various data modalities (text, images, users, items, etc.) into numerical vectors (i.e., embeddings), enabling data scientists and engineers to use nearest neighbor queries to search for semantically similar data (e.g., similar documents, images, users, etc.). Elasticsearch is a ubiquitous search solution, but its support for vector search is still evolving. Elastiknn fills the gap by bringing efficient exact and approximate vector search to Elasticsearch. This enables an enhanced search experience by combining traditional queries (e.g., products matching <some text query>) with nearest neighbor search queries (e.g., products with images similar to <a user-provided image>).
In this talk, Alex will present the features of Elastiknn, some example use-cases, and a few of the interesting engineering challenges in building it.
To say it has been interesting these last few months would be an understatement. I am sure everyone’s situation is different but many of you are facing similar challenges working from home. This includes Observing systems remotely with different tools. In this meetup we will have some fun and show how Elastic uses Observability to provide a unified view of your logs, metrics and APM!
Learn how Congress is starting to use Elasticsearch to modernize search, and how you can help to accelerate this change. Until just a decade ago, some of the most important precedents of Congress were stored and indexed on paper cards. This system was replaced by a slow, clunky SQL search and there was initially resistance when Xcential proposed to convert this to Elasticsearch (v1.7.2), because lawyers feared that ‘relevance’-based search would be less precise. With accurate results, 50 times faster, users were won over. Now there is a potential to use modern search, not only for precedents, but throughout the work of Congress and in state legislatures as well. We’ll talk about some of these projects, and how you could get involved (we’re hiring!).
Eliminate your zombie technology ray myers - 11-5-2020FaithWestdorp
Announcing the open source release of Zombie Technology Elimination Project (ZTEP), gamifying the retirement of deprecated tech, powered by Elasticsearch!
Model the progress of a code migration effort as zombies that are still left to defeat! Support a culture of recognition by publicly celebrating the contributions of Zombie Hunters (code migrators) by awarding points and featuring them on the Hunter Heroes Leaderboard.
Inspired by the original ZTEP project by Mike Finney (@FinneyCanHelp) and others at Carfax:
https://www.gamification.co/2013/09/11/gamifying-the-destruction-of-zombie-technology
Based on the behavioral science of Octalysis gamification framework:
https://yukaichou.com/gamification-examples/octalysis-complete-gamification-framework/
Elasticsearch enabled productive collaboration between product and engineering teams at GetSet Learning. It allowed them to quickly prototype and build key features like recommended tags, feeds, and products. Some lessons learned were that Elasticsearch provided a unified search framework, tools for syncing processes between teams, and hosted services through Elastic Cloud. These factors facilitated efficient collaboration between teams.
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsFaithWestdorp
This document discusses integrating MITRE ATT&CK intelligence into Logstash plugins to provide security analysts with more context about threats. It covers writing plugins to extract relevant data from logs and map detections to MITRE tactics and techniques. When data is missing, the plugin uses other intelligence sources to infer classifications. The document demonstrates connecting Logstash pipelines to leverage parsing and enrichment, and shows tools for viewing and debugging pipeline configurations.
Examining OpenData with a Search Index using ElasticsearchFaithWestdorp
Elastic is a search company that provides three main solutions - Elastic Enterprise Search, Elastic Security, and Elastic Observability. It has employees in over 40 countries and is a public company listed on the NYSE. Elastic focuses on fast, scalable search capabilities that are relevant to users. It provides unified visibility for logs, metrics and application performance monitoring. Elastic Security integrates endpoint protection and security information and event management. All solutions are powered by the Elastic Stack which allows ingestion, storage, search and analysis of data from any source.
From the trenches: scaling a large log management deploymentFaithWestdorp
This document discusses the deployment of Elastic Cloud Enterprise (ECE) for a large log management project. It summarizes the client's requirements of 120,000 events per second with 30-day retention across 500TB of logs from various sources. It then describes the ECE implementation using the client's existing hardware, including setting up availability zones, clusters, and determining storage density. It also covers shard sizing testing, Logstash architecture for ingesting from Kafka, and tuning Logstash for optimal ingestion performance.
Logstash and Maxmind: not just for GEOIP anymoreFaithWestdorp
This document discusses using MaxMind databases to enrich log data in Logstash beyond just geoip information. It describes loading internal network and threat intelligence data into a custom MaxMind database for fast lookup and enrichment. While the current implementation supports 70K events per second, future work could include enriching on additional keys beyond IP addresses.
Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...FaithWestdorp
The document discusses improving natural language processing (NLP) for information retrieval. It notes the challenge of connecting users to relevant information and outlines some approaches to improve search, including focusing on fundamentals like query segmentation, using various tools like facets to provide additional options, and starting simply to address discrete use cases before expanding capabilities. The goal is to better understand users through an iterative process of learning from their experiences.
Introduction to machine learning using ElasticFaithWestdorp
This document summarizes an Elastic webinar on machine learning in Elastic Search. It introduces the speakers and provides an overview of Elastic's machine learning capabilities including anomaly detection, time series analysis, and forecasting. It also demonstrates anomaly detection and discusses how machine learning can be used for tasks like language identification, fraud detection, and user classification. The webinar explores both unsupervised and supervised machine learning techniques and how ML can help with search relevance, observability, and security use cases.
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...FaithWestdorp
Patrick Tierney gave a presentation about using the MITRE ATT&CK framework to model attacks and evaluate security defenses. He discussed how attack models have evolved over time from earlier models to the current MITRE ATT&CK framework, which captures over 300 attacker techniques. Tierney demonstrated how to map a hypothetical in-memory attack using Cobalt Strike to specific techniques in the MITRE ATT&CK matrix. He recommended that Atomic Red Team and AttackIQ can be used to test defenses against MITRE ATT&CK techniques.
George Kobar, a community advocate for Capgemini, shared information on observability at a Meetup for New Application Development. The document defines observability as the combination of monitoring, metrics, and logging. It presents a typical observability stack that collects data from various sources to provide visibility for development, operations, and business teams through tools that analyze application performance, uptime, logs, metrics, and business KPIs. The stack advocates an elastic approach to storing all operational data together in Elasticsearch for unified access and analysis.
This document discusses how application performance monitoring (APM) data from the Elastic Stack can be used for threat hunting. It describes how APM data can be combined with machine learning and security information and event management (SIEM) to more easily detect anomalies, pinpoint potential security threats, and reduce mean time to resolution for issues. The document provides examples of how APM metadata can be applied as filters across different Elastic solutions to focus analysis and identifies specific attack models and techniques that can be applied in APM-driven threat hunting rules.
This document provides an overview of data visualization in Kibana, including the types of visualizations and tools available. It discusses exploratory visualization for discovering patterns in unknown data, explanatory visualization for presenting findings to others, and operational visualization for monitoring systems. Some example tools in Kibana are listed for each type. The document concludes with a demo of visualizing an open NYC squirrel census dataset to illustrate exploratory, explanatory, and operational uses of Kibana.
Esctl in action elastic user group presentation aug 25 2020FaithWestdorp
Bio:
Jeff Moore is a Systems Engineer at Bandwidth with a focus on administering and extending Kubernetes, AWS, and the Elastic Stack to support internal customer use-cases. Originally a die-hard Kubernetes fan, his passions have now also extended to the Elastic Stack due to insights of the amazing things that can be done with well-architected data. He has lived in Raleigh for most of his life and currently has a love/hate relationship with the factory automation game Factorio. Jeff is a Certified Kubernetes Administrator with plans to complete the Elastic Certified Engineer exam.
Abstract:
In this talk, Jeff will talk about how he designed a command-line tool built on the go-elasticsearch project - making interactions with the elasticsearch APIs much easier. He will also go into the inspirations of the project, lessons learned, and future work.
Catalogo general tarifas 2024 Vaillant. Amado Salvador Distribuidor Oficial e...AMADO SALVADOR
Descarga el Catálogo General de Tarifas 2024 de Vaillant, líder en tecnología para calefacción, ventilación y energía solar térmica y fotovoltaica. En Amado Salvador, como distribuidor oficial de Vaillant, te ofrecemos una amplia gama de productos de alta calidad y diseño innovador para tus proyectos de climatización y energía.
Descubre nuestra selección de productos Vaillant, incluyendo bombas de calor altamente eficientes, fancoils de última generación, sistemas de ventilación de alto rendimiento y soluciones de energía solar fotovoltaica y térmica para un rendimiento óptimo y sostenible. El catálogo de Vaillant 2024 presenta una variedad de opciones en calderas de condensación que garantizan eficiencia energética y durabilidad.
Con Vaillant, obtienes más que productos de climatización: control avanzado y conectividad para una gestión inteligente del sistema, acumuladores de agua caliente de gran capacidad y sistemas de aire acondicionado para un confort total. Confía en la fiabilidad de Amado Salvador como distribuidor oficial de Vaillant, y en la resistencia de los productos Vaillant, respaldados por años de experiencia e innovación en el sector.
En Amado Salvador, distribuidor oficial de Vaillant en Valencia, no solo proporcionamos productos de calidad, sino también servicios especializados para profesionales, asegurando que tus proyectos cuenten con el mejor soporte técnico y asesoramiento. Descarga nuestro catálogo y descubre por qué Vaillant es la elección preferida para proyectos de climatización y energía en Amado Salvador.
Infografia TCP/IP (Transmission Control Protocol/Internet Protocol)codesiret
Los protocolos son conjuntos de
normas para formatos de mensaje y
procedimientos que permiten a las
máquinas y los programas de aplicación
intercambiar información.
La inteligencia artificial sigue evolucionando rápidamente, prometiendo transformar múltiples aspectos de la sociedad mientras plantea importantes cuestiones que requieren una cuidadosa consideración y regulación.
El uso de las TIC en la vida cotidiana.pptxjgvanessa23
En esta presentación, he compartido información sobre las Tecnologías de la Información y la Comunicación (TIC) y su aplicación en diversos ámbitos de la vida cotidiana, como el hogar, la educación y el trabajo.
He explicado qué son las TIC, las diferentes categorías y sus respectivos ejemplos, así como los beneficios y aplicaciones en cada uno de estos ámbitos.
Espero que esta información sea útil para quienes la lean y les ayude a comprender mejor las TIC y su impacto en nuestra vida cotidiana.
para programadores y desarrolladores de inteligencia artificial y machine learning, como se automatiza una cadena de valor o cadena de valor gracias a la teoría por Manuel Diaz @manuelmakemoney
Logstash and Maxmind: not just for GEOIP anymoreFaithWestdorp
This document discusses using MaxMind databases to enrich log data in Logstash beyond just geoip information. It describes loading internal network and threat intelligence data into a custom MaxMind database for fast lookup and enrichment. While the current implementation supports 70K events per second, future work could include enriching on additional keys beyond IP addresses.
Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...FaithWestdorp
The document discusses improving natural language processing (NLP) for information retrieval. It notes the challenge of connecting users to relevant information and outlines some approaches to improve search, including focusing on fundamentals like query segmentation, using various tools like facets to provide additional options, and starting simply to address discrete use cases before expanding capabilities. The goal is to better understand users through an iterative process of learning from their experiences.
Introduction to machine learning using ElasticFaithWestdorp
This document summarizes an Elastic webinar on machine learning in Elastic Search. It introduces the speakers and provides an overview of Elastic's machine learning capabilities including anomaly detection, time series analysis, and forecasting. It also demonstrates anomaly detection and discusses how machine learning can be used for tasks like language identification, fraud detection, and user classification. The webinar explores both unsupervised and supervised machine learning techniques and how ML can help with search relevance, observability, and security use cases.
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...FaithWestdorp
Patrick Tierney gave a presentation about using the MITRE ATT&CK framework to model attacks and evaluate security defenses. He discussed how attack models have evolved over time from earlier models to the current MITRE ATT&CK framework, which captures over 300 attacker techniques. Tierney demonstrated how to map a hypothetical in-memory attack using Cobalt Strike to specific techniques in the MITRE ATT&CK matrix. He recommended that Atomic Red Team and AttackIQ can be used to test defenses against MITRE ATT&CK techniques.
George Kobar, a community advocate for Capgemini, shared information on observability at a Meetup for New Application Development. The document defines observability as the combination of monitoring, metrics, and logging. It presents a typical observability stack that collects data from various sources to provide visibility for development, operations, and business teams through tools that analyze application performance, uptime, logs, metrics, and business KPIs. The stack advocates an elastic approach to storing all operational data together in Elasticsearch for unified access and analysis.
This document discusses how application performance monitoring (APM) data from the Elastic Stack can be used for threat hunting. It describes how APM data can be combined with machine learning and security information and event management (SIEM) to more easily detect anomalies, pinpoint potential security threats, and reduce mean time to resolution for issues. The document provides examples of how APM metadata can be applied as filters across different Elastic solutions to focus analysis and identifies specific attack models and techniques that can be applied in APM-driven threat hunting rules.
This document provides an overview of data visualization in Kibana, including the types of visualizations and tools available. It discusses exploratory visualization for discovering patterns in unknown data, explanatory visualization for presenting findings to others, and operational visualization for monitoring systems. Some example tools in Kibana are listed for each type. The document concludes with a demo of visualizing an open NYC squirrel census dataset to illustrate exploratory, explanatory, and operational uses of Kibana.
Esctl in action elastic user group presentation aug 25 2020FaithWestdorp
Bio:
Jeff Moore is a Systems Engineer at Bandwidth with a focus on administering and extending Kubernetes, AWS, and the Elastic Stack to support internal customer use-cases. Originally a die-hard Kubernetes fan, his passions have now also extended to the Elastic Stack due to insights of the amazing things that can be done with well-architected data. He has lived in Raleigh for most of his life and currently has a love/hate relationship with the factory automation game Factorio. Jeff is a Certified Kubernetes Administrator with plans to complete the Elastic Certified Engineer exam.
Abstract:
In this talk, Jeff will talk about how he designed a command-line tool built on the go-elasticsearch project - making interactions with the elasticsearch APIs much easier. He will also go into the inspirations of the project, lessons learned, and future work.
Catalogo general tarifas 2024 Vaillant. Amado Salvador Distribuidor Oficial e...AMADO SALVADOR
Descarga el Catálogo General de Tarifas 2024 de Vaillant, líder en tecnología para calefacción, ventilación y energía solar térmica y fotovoltaica. En Amado Salvador, como distribuidor oficial de Vaillant, te ofrecemos una amplia gama de productos de alta calidad y diseño innovador para tus proyectos de climatización y energía.
Descubre nuestra selección de productos Vaillant, incluyendo bombas de calor altamente eficientes, fancoils de última generación, sistemas de ventilación de alto rendimiento y soluciones de energía solar fotovoltaica y térmica para un rendimiento óptimo y sostenible. El catálogo de Vaillant 2024 presenta una variedad de opciones en calderas de condensación que garantizan eficiencia energética y durabilidad.
Con Vaillant, obtienes más que productos de climatización: control avanzado y conectividad para una gestión inteligente del sistema, acumuladores de agua caliente de gran capacidad y sistemas de aire acondicionado para un confort total. Confía en la fiabilidad de Amado Salvador como distribuidor oficial de Vaillant, y en la resistencia de los productos Vaillant, respaldados por años de experiencia e innovación en el sector.
En Amado Salvador, distribuidor oficial de Vaillant en Valencia, no solo proporcionamos productos de calidad, sino también servicios especializados para profesionales, asegurando que tus proyectos cuenten con el mejor soporte técnico y asesoramiento. Descarga nuestro catálogo y descubre por qué Vaillant es la elección preferida para proyectos de climatización y energía en Amado Salvador.
Infografia TCP/IP (Transmission Control Protocol/Internet Protocol)codesiret
Los protocolos son conjuntos de
normas para formatos de mensaje y
procedimientos que permiten a las
máquinas y los programas de aplicación
intercambiar información.
La inteligencia artificial sigue evolucionando rápidamente, prometiendo transformar múltiples aspectos de la sociedad mientras plantea importantes cuestiones que requieren una cuidadosa consideración y regulación.
El uso de las TIC en la vida cotidiana.pptxjgvanessa23
En esta presentación, he compartido información sobre las Tecnologías de la Información y la Comunicación (TIC) y su aplicación en diversos ámbitos de la vida cotidiana, como el hogar, la educación y el trabajo.
He explicado qué son las TIC, las diferentes categorías y sus respectivos ejemplos, así como los beneficios y aplicaciones en cada uno de estos ámbitos.
Espero que esta información sea útil para quienes la lean y les ayude a comprender mejor las TIC y su impacto en nuestra vida cotidiana.
para programadores y desarrolladores de inteligencia artificial y machine learning, como se automatiza una cadena de valor o cadena de valor gracias a la teoría por Manuel Diaz @manuelmakemoney
Todo sobre la tarjeta de video (Bienvenidos a mi blog personal)AbrahamCastillo42
Power point, diseñado por estudiantes de ciclo 1 arquitectura de plataformas, esta con la finalidad de dar a conocer el componente hardware llamado tarjeta de video..