Submit Search
Upload
KOF2013 Minecraft / Clojure
•
0 likes
•
1,062 views
U
ujihisa
Follow
Kansai Open Forum 2013
Read less
Read more
Technology
Report
Share
Report
Share
1 of 9
Download now
Download to read offline
Recommended
Vim presentation
Vim
Vim
alkeshv
for http://cotocoto.jp/event/46352
From Ruby to Haskell (Kansai Yami RubyKaigi)
From Ruby to Haskell (Kansai Yami RubyKaigi)
ujihisa
Introduction of bison
Introduction of bison
vip_du
vimconf2013
vimconf2013
ujihisa
Lexyacc
Lexyacc
Hina Tahir
vimshell
vimshell made other shells legacy
vimshell made other shells legacy
ujihisa
Introduction of flex
Introduction of flex
vip_du
Hacking Parse.y with ujihisa
Hacking Parse.y with ujihisa
ujihisa
Recommended
Vim presentation
Vim
Vim
alkeshv
for http://cotocoto.jp/event/46352
From Ruby to Haskell (Kansai Yami RubyKaigi)
From Ruby to Haskell (Kansai Yami RubyKaigi)
ujihisa
Introduction of bison
Introduction of bison
vip_du
vimconf2013
vimconf2013
ujihisa
Lexyacc
Lexyacc
Hina Tahir
vimshell
vimshell made other shells legacy
vimshell made other shells legacy
ujihisa
Introduction of flex
Introduction of flex
vip_du
Hacking Parse.y with ujihisa
Hacking Parse.y with ujihisa
ujihisa
Keynote ujihisa.vim#2
Keynote ujihisa.vim#2
ujihisa
Contrato alquiler de vehiculo
Contrato alquiler de vehiculo
luiscoloma60
Contrato de alquiler de vehiculo
Contrato de alquiler de vehiculo
NeNa Becerra
Modelo contrato de arrendamiento
Modelo contrato de arrendamiento
Gerley Arturo Estrada Angarita
Contrato privado de arrendamiento
Contrato privado de arrendamiento
pcfixbug
Contrato de arrendamiento elizabet
Contrato de arrendamiento elizabet
erick aranda sanchez
archivo guia
Contrato de arrendamiento
Contrato de arrendamiento
Monica Euridece Salazar
At Vancouver Haskell UnMeetup on Oct 11, 2011
Text Manipulation with/without Parsec
Text Manipulation with/without Parsec
ujihisa
CoffeeScript in hootsuite
CoffeeScript in hootsuite
ujihisa
HootSuite Dev 2
HootSuite Dev 2
ujihisa
Ruby Kansai49
Ruby Kansai49
ujihisa
Hootsuite dev 2011
Hootsuite dev 2011
ujihisa
LLVM in 20 minutes
LLVM Workshop Osaka Umeda, Japan
LLVM Workshop Osaka Umeda, Japan
ujihisa
termtter the ultimate twitter client
RubyConf 2009 LT "Termtter"
RubyConf 2009 LT "Termtter"
ujihisa
Nov 19, 2009
Hacking parse.y (RubyConf 2009)
Hacking parse.y (RubyConf 2009)
ujihisa
Hacking parse.y (RubyKansai38)
Hacking parse.y (RubyKansai38)
ujihisa
Ruby Kansai #35 About RubyKaigi2009 ujihisa
Ruby Kansai #35 About RubyKaigi2009 ujihisa
ujihisa
“Introduction to Lazy lists” How to use and construct lazy lists on Programming Langage Ruby.
Kof2008 Itll
Kof2008 Itll
ujihisa
All About Metarw -- VimM#2
All About Metarw -- VimM#2
ujihisa
Itc2008 Ujihisa
Itc2008 Ujihisa
ujihisa
Agile Web Posting With Ruby / Ruby Kaigi2008
Agile Web Posting With Ruby / Ruby Kaigi2008
ujihisa
第26回 Ruby/Rails勉強会@関西 で発表したもの
Agile Web Posting with Ruby (lang:ja)
Agile Web Posting with Ruby (lang:ja)
ujihisa
More Related Content
Viewers also liked
Keynote ujihisa.vim#2
Keynote ujihisa.vim#2
ujihisa
Contrato alquiler de vehiculo
Contrato alquiler de vehiculo
luiscoloma60
Contrato de alquiler de vehiculo
Contrato de alquiler de vehiculo
NeNa Becerra
Modelo contrato de arrendamiento
Modelo contrato de arrendamiento
Gerley Arturo Estrada Angarita
Contrato privado de arrendamiento
Contrato privado de arrendamiento
pcfixbug
Contrato de arrendamiento elizabet
Contrato de arrendamiento elizabet
erick aranda sanchez
archivo guia
Contrato de arrendamiento
Contrato de arrendamiento
Monica Euridece Salazar
Viewers also liked
(7)
Keynote ujihisa.vim#2
Keynote ujihisa.vim#2
Contrato alquiler de vehiculo
Contrato alquiler de vehiculo
Contrato de alquiler de vehiculo
Contrato de alquiler de vehiculo
Modelo contrato de arrendamiento
Modelo contrato de arrendamiento
Contrato privado de arrendamiento
Contrato privado de arrendamiento
Contrato de arrendamiento elizabet
Contrato de arrendamiento elizabet
Contrato de arrendamiento
Contrato de arrendamiento
More from ujihisa
At Vancouver Haskell UnMeetup on Oct 11, 2011
Text Manipulation with/without Parsec
Text Manipulation with/without Parsec
ujihisa
CoffeeScript in hootsuite
CoffeeScript in hootsuite
ujihisa
HootSuite Dev 2
HootSuite Dev 2
ujihisa
Ruby Kansai49
Ruby Kansai49
ujihisa
Hootsuite dev 2011
Hootsuite dev 2011
ujihisa
LLVM in 20 minutes
LLVM Workshop Osaka Umeda, Japan
LLVM Workshop Osaka Umeda, Japan
ujihisa
termtter the ultimate twitter client
RubyConf 2009 LT "Termtter"
RubyConf 2009 LT "Termtter"
ujihisa
Nov 19, 2009
Hacking parse.y (RubyConf 2009)
Hacking parse.y (RubyConf 2009)
ujihisa
Hacking parse.y (RubyKansai38)
Hacking parse.y (RubyKansai38)
ujihisa
Ruby Kansai #35 About RubyKaigi2009 ujihisa
Ruby Kansai #35 About RubyKaigi2009 ujihisa
ujihisa
“Introduction to Lazy lists” How to use and construct lazy lists on Programming Langage Ruby.
Kof2008 Itll
Kof2008 Itll
ujihisa
All About Metarw -- VimM#2
All About Metarw -- VimM#2
ujihisa
Itc2008 Ujihisa
Itc2008 Ujihisa
ujihisa
Agile Web Posting With Ruby / Ruby Kaigi2008
Agile Web Posting With Ruby / Ruby Kaigi2008
ujihisa
第26回 Ruby/Rails勉強会@関西 で発表したもの
Agile Web Posting with Ruby (lang:ja)
Agile Web Posting with Ruby (lang:ja)
ujihisa
From Java To Haskell P
From Java To Haskell P
ujihisa
Ruby Monad
Ruby Monad
ujihisa
Kanasan.JS - JS#2
From Javascript To Haskell
From Javascript To Haskell
ujihisa
進捗報告2007 11 09 15 31 39
進捗報告2007 11 09 15 31 39
ujihisa
ruby library kagemusha
How To Use Kagemusha
How To Use Kagemusha
ujihisa
More from ujihisa
(20)
Text Manipulation with/without Parsec
Text Manipulation with/without Parsec
CoffeeScript in hootsuite
CoffeeScript in hootsuite
HootSuite Dev 2
HootSuite Dev 2
Ruby Kansai49
Ruby Kansai49
Hootsuite dev 2011
Hootsuite dev 2011
LLVM Workshop Osaka Umeda, Japan
LLVM Workshop Osaka Umeda, Japan
RubyConf 2009 LT "Termtter"
RubyConf 2009 LT "Termtter"
Hacking parse.y (RubyConf 2009)
Hacking parse.y (RubyConf 2009)
Hacking parse.y (RubyKansai38)
Hacking parse.y (RubyKansai38)
Ruby Kansai #35 About RubyKaigi2009 ujihisa
Ruby Kansai #35 About RubyKaigi2009 ujihisa
Kof2008 Itll
Kof2008 Itll
All About Metarw -- VimM#2
All About Metarw -- VimM#2
Itc2008 Ujihisa
Itc2008 Ujihisa
Agile Web Posting With Ruby / Ruby Kaigi2008
Agile Web Posting With Ruby / Ruby Kaigi2008
Agile Web Posting with Ruby (lang:ja)
Agile Web Posting with Ruby (lang:ja)
From Java To Haskell P
From Java To Haskell P
Ruby Monad
Ruby Monad
From Javascript To Haskell
From Javascript To Haskell
進捗報告2007 11 09 15 31 39
進捗報告2007 11 09 15 31 39
How To Use Kagemusha
How To Use Kagemusha
Recently uploaded
What are drone anti-jamming systems? The drone anti-jamming systems and anti-spoof technology protect against interference, jamming, and spoofing of the UAVs. To protect their security, countries are beginning to research drone anti-jamming systems, also known as drone strike weapons. The anti-jam and anti-spoof technology protects against interference, jamming and spoofing. A drone strike weapon is a drone attack weapon that can attack and destroy enemy drones. So what is so unique about this amazing system?
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
45-60 minute session deck from introducing Google Apps Script to developers, IT leadership, and other technical professionals.
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
My presentation at the Lehigh Carbon Community College (LCCC) NSA GenCyber Cyber Security Day event that is intended to foster an interest in the cyber security field amongst college students.
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
As privacy and data protection regulations evolve rapidly, organizations operating in multiple jurisdictions face mounting challenges to ensure compliance and safeguard customer data. With state-specific privacy laws coming up in multiple states this year, it is essential to understand what their unique data protection regulations will require clearly. How will data privacy evolve in the US in 2024? How to stay compliant? Our panellists will guide you through the intricacies of these states' specific data privacy laws, clarifying complex legal frameworks and compliance requirements. This webinar will review: - The essential aspects of each state's privacy landscape and the latest updates - Common compliance challenges faced by organizations operating in multiple states and best practices to achieve regulatory adherence - Valuable insights into potential changes to existing regulations and prepare your organization for the evolving landscape
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
The presentation explores the development and application of artificial intelligence (AI) from its inception to its current status in the modern world. The term "artificial intelligence" was first coined by John McCarthy in 1956 to describe efforts to develop computer programs capable of performing tasks that typically require human intelligence. This concept was first introduced at a conference held at Dartmouth College, where programs demonstrated capabilities such as playing chess, proving theorems, and interpreting texts. In the early stages, Alan Turing contributed to the field by defining intelligence as the ability of a being to respond to certain questions intelligently, proposing what is now known as the Turing Test to evaluate the presence of intelligent behavior in machines. As the decades progressed, AI evolved significantly. The 1980s focused on machine learning, teaching computers to learn from data, leading to the development of models that could improve their performance based on their experiences. The 1990s and 2000s saw further advances in algorithms and computational power, which allowed for more sophisticated data analysis techniques, including data mining. By the 2010s, the proliferation of big data and the refinement of deep learning techniques enabled AI to become mainstream. Notable milestones included the success of Google's AlphaGo and advancements in autonomous vehicles by companies like Tesla and Waymo. A major theme of the presentation is the application of generative AI, which has been used for tasks such as natural language text generation, translation, and question answering. Generative AI uses large datasets to train models that can then produce new, coherent pieces of text or other media. The presentation also discusses the ethical implications and the need for regulation in AI, highlighting issues such as privacy, bias, and the potential for misuse. These concerns have prompted calls for comprehensive regulations to ensure the safe and equitable use of AI technologies. Artificial intelligence has also played a significant role in healthcare, particularly highlighted during the COVID-19 pandemic, where it was used in drug discovery, vaccine development, and analyzing the spread of the virus. The capabilities of AI in healthcare are vast, ranging from medical diagnostics to personalized medicine, demonstrating the technology's potential to revolutionize fields beyond just technical or consumer applications. In conclusion, AI continues to be a rapidly evolving field with significant implications for various aspects of society. The development from theoretical concepts to real-world applications illustrates both the potential benefits and the challenges that come with integrating advanced technologies into everyday life. The ongoing discussion about AI ethics and regulation underscores the importance of managing these technologies responsibly to maximize their their benefits while minimizing potential harms.
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
If you are a Domino Administrator in any size company you already have a range of skills that make you an expert administrator across many platforms and technologies. In this session Gab explains how to apply those skills and that knowledge to take your career wherever you want to go.
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Discover the advantages of hiring UI/UX design services! Our blog explores how professional design can enhance user experiences, boost brand credibility, and increase customer engagement. Learn about the latest design trends and strategies that can help your business stand out in the digital landscape. Elevate your online presence with Pixlogix's expert UI/UX design services.
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
In this session, we will delve into strategic approaches for optimizing knowledge management within Microsoft 365, amidst the evolving landscape of Copilot. From leveraging automatic metadata classification and permission governance with SharePoint Premium, to unlocking Viva Engage for the cultivation of knowledge and communities, you will gain actionable insights to bolster your organization's knowledge-sharing initiatives. In this session, we will also explore how to facilitate solutions to enable your employees to find answers and expertise within Microsoft 365. You will leave equipped with practical techniques and a deeper understanding of how there is more to effective knowledge management than just enabling Copilot, but building actual solutions to prepare the knowledge that Copilot and your employees can use.
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Enterprise Knowledge’s Urmi Majumder, Principal Data Architecture Consultant, and Fernando Aguilar Islas, Senior Data Science Consultant, presented "Driving Behavioral Change for Information Management through Data-Driven Green Strategy" on March 27, 2024 at Enterprise Data World (EDW) in Orlando, Florida. In this presentation, Urmi and Fernando discussed a case study describing how the information management division in a large supply chain organization drove user behavior change through awareness of the carbon footprint of their duplicated and near-duplicated content, identified via advanced data analytics. Check out their presentation to gain valuable perspectives on utilizing data-driven strategies to influence positive behavioral shifts and support sustainability initiatives within your organization. In this session, participants gained answers to the following questions: - What is a Green Information Management (IM) Strategy, and why should you have one? - How can Artificial Intelligence (AI) and Machine Learning (ML) support your Green IM Strategy through content deduplication? - How can an organization use insights into their data to influence employee behavior for IM? - How can you reap additional benefits from content reduction that go beyond Green IM?
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Join our latest Connector Corner webinar to discover how UiPath Integration Service revolutionizes API-centric automation in a 'Quote to Cash' process—and how that automation empowers businesses to accelerate revenue generation. A comprehensive demo will explore connecting systems, GenAI, and people, through powerful pre-built connectors designed to speed process cycle times. Speakers: James Dickson, Senior Software Engineer Charlie Greenberg, Host, Product Marketing Manager
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Three things you will take away from the session: • How to run an effective tenant-to-tenant migration • Best practices for before, during, and after migration • Tips for using migration as a springboard to prepare for Copilot in Microsoft 365 Main ideas: Migration Overview: The presentation covers the current reality of cross-tenant migrations, the triggers, phases, best practices, and benefits of a successful tenant migration Considerations: When considering a migration, it is important to consider the migration scope, performance, customization, flexibility, user-friendly interface, automation, monitoring, support, training, scalability, data integrity, data security, cost, and licensing structure Next Wave: The next wave of change includes the launch of Copilot, which requires businesses to be prepared for upcoming changes related to Copilot and the cloud, and to consolidate data and tighten governance ShareGate: ShareGate can help with pre-migration analysis, configurable migration tool, and automated, end-user driven collaborative governance
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Created by Mozilla Research in 2012 and now part of Linux Foundation Europe, the Servo project is an experimental rendering engine written in Rust. It combines memory safety and concurrency to create an independent, modular, and embeddable rendering engine that adheres to web standards. Stewardship of Servo moved from Mozilla Research to the Linux Foundation in 2020, where its mission remains unchanged. After some slow years, in 2023 there has been renewed activity on the project, with a roadmap now focused on improving the engine’s CSS 2 conformance, exploring Android support, and making Servo a practical embeddable rendering engine. In this presentation, Rakhi Sharma reviews the status of the project, our recent developments in 2023, our collaboration with Tauri to make Servo an easy-to-use embeddable rendering engine, and our plans for the future to make Servo an alternative web rendering engine for the embedded devices industry. (c) Embedded Open Source Summit 2024 April 16-18, 2024 Seattle, Washington (US) https://events.linuxfoundation.org/embedded-open-source-summit/ https://ossna2024.sched.com/event/1aBNF/a-year-of-servo-reboot-where-are-we-now-rakhi-sharma-igalia
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
ICT role in 21 century education. How to ICT help in education
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Details
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
MySQL Webinar, presented on the 25th of April, 2024. Summary: MySQL solutions enable the deployment of diverse Database Architectures tailored to specific needs, including High Availability, Disaster Recovery, and Read Scale-Out. With MySQL Shell's AdminAPI, administrators can seamlessly set up, manage, and monitor these solutions, ensuring efficiency and ease of use in their administration. MySQL Router, on the other hand, provides transparent routing from the application traffic to the backend servers in the architectures, requiring minimal configuration. Completely built in-house and supported by Oracle, these solutions have been adopted by enterprises of all sizes for their business-critical applications. In this presentation, we'll delve into various database architecture solutions to help you choose the right one based on your business requirements. Focusing on technical details and the latest features to maximize the potential of these solutions.
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Abhishek Deb(1), Mr Abdul Kalam(2) M. Des (UX) , School of Design, DIT University , Dehradun. This paper explores the future potential of AI-enabled smartphone processors, aiming to investigate the advancements, capabilities, and implications of integrating artificial intelligence (AI) into smartphone technology. The research study goals consist of evaluating the development of AI in mobile phone processors, analyzing the existing state as well as abilities of AI-enabled cpus determining future patterns as well as chances together with reviewing obstacles as well as factors to consider for more growth.
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
I've been in the field of "Cyber Security" in its many incarnations for about 25 years. In that time I've learned some lessons, some the hard way. Here are my slides presented at BSides New Orleans in April 2024.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Recently uploaded
(20)
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
KOF2013 Minecraft / Clojure
1.
Tatsuhiro Ujihisa @ujm ujihisa@gmail.com
2.
~2009 Osaka 2009~ Vancouver Ruby
Kansai vancouver.rb VanHask van-clj Photo from Google Earth
3.
Vancouver, BC Canada
4.
HootSuite Media Inc. "HootSuite" Web, iOS/Android,
etc Scala and many other languages/tools
5.
Standup desk
6.
7.
8.
(Digression) • Anti subjective adjective
prefix for naming • • e.g. simple, easy, or quick "Functional" programming is no longer concrete • see also: cloud
9.
→
Download now