url
stringlengths
11
2.25k
text
stringlengths
88
50k
ts
timestamp[s]date
2026-01-13 08:47:33
2026-01-13 09:30:40
https://www.linkedin.com/products/wallarm-api-security-for-the-cloudnative-era/?trk=products_seo_search
Advanced API Security | LinkedIn Skip to main content LinkedIn Wallarm: API Security Leader in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Advanced API Security Web Application Firewalls (WAF) by Wallarm: API Security Leader See who's skilled in this Add as skill Learn more Report this product About Wallarm is the platform Dev, Sec, and Ops teams choose to build cloud-native APIs securely, monitor them for modern threats, and get alerted when threats arise. Media Products media viewer No more previous content Protect Go beyond OWASP Top 10. Get full coverage for API specific threats, account takeover, malicious bots, L7 DDoS, and more — in one platform. Respond Stay up to even most sophisticated threats with full visibility, smart alerts, and automated incident response. Discover Map a complete picture of your API exposure and track changes with auto-discovery capabilities. Test Automate security testing of your APIs in CI/CD. Scan your cloud infrastucture for the critical issues. No more next content Featured customers of Advanced API Security USA TODAY Co., Inc. Newspaper Publishing 104,116 followers UZ Leuven Hospitals and Health Care 50,053 followers Tipalti Financial Services 62,166 followers Semrush Software Development 575,773 followers Omio Software Development 75,635 followers Wargaming Computer Games 148,852 followers Acronis Software Development 156,304 followers Panasonic Appliances, Electrical, and Electronics Manufacturing 321,024 followers Miro Software Development 475,946 followers Rappi Technology, Information and Media 735,177 followers WorkForce Software, an ADP company Software Development 32,719 followers Clinisys IT Services and IT Consulting 9,761 followers Show more Show less Similar products Cloudflare WAF Cloudflare WAF Web Application Firewalls (WAF) Akamai Web Application Protector Akamai Web Application Protector Web Application Firewalls (WAF) Imperva Web Application Firewall (WAF) Imperva Web Application Firewall (WAF) Web Application Firewalls (WAF) Radware Cloud WAF Radware Cloud WAF Web Application Firewalls (WAF) Alibaba Web Application Firewall Alibaba Web Application Firewall Web Application Firewalls (WAF) DNSFilter DNSFilter Web Application Firewalls (WAF) Sign in to see more Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/get-staked-tokens
GET Staked Tokens | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK GET Staked Tokens On this page GET Staked Tokens Get Staked Tokens ​ Web Flutter const smartWalletAddress = fuseSDK . wallet . getSender ( ) ; const stakedTokens = await fuseSDK . stakingModule . getStakedTokens ( smartWalletAddress ) ; final smartWalletAddress = fuseSDK . wallet . getSender ( ) ; final stakedTokensData = await fuseSDK . stakingModule . getStakedTokens ( smartWalletAddress ) ; stakedTokensData . pick ( onData : ( StakedTokenResponse data ) { // Do you magic here } , onError : ( err ) { // Handle errors } ) ; Edit this page Previous Stake and Unstake Tokens Next GET Token Price Get Staked Tokens Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/products/speridian-technologies-casexellence/?trk=products_seo_search
CaseXellence | LinkedIn Skip to main content LinkedIn Speridian Technologies in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in CaseXellence Business Process Management Software by Speridian Technologies See who's skilled in this Add as skill Learn more Report this product About Government agencies are in greater need for solutions to streamline processes, communications and workflows in order to manage their caseloads more efficiently. Leveraging decades of Speridian's expertise in developing solutions for the public sector, CaseXellence enables government agencies to take on this challenge and meet the ever-growing demands of public assistance programs. CaseXellence is a low-code intelligent process automation platform that enables public sector enterprises to modernize and transform their legacy infrastructure. CaseXellence has pre-built verticalized solutions designed specifically for public sector automation with security transparency, and traceability at the heart of the platform. This product is intended for Case Administrator Case Manager Case Specialist Senior Case Manager Caseworker Civil Servant Chief Information Officer Chief Technology Officer Nonprofit Coordinator of Volunteers Media Products media viewer No more previous content CaseXellence Video CaseXellence is a low-code intelligent process automation platform that enables public sector enterprises to modernize and transform their legacy infrastructure. CaseXellence has pre-built verticalized solutions designed specifically for public sector automation with security, transparency, and traceability at the heart of the platform. Verticalized Intelligent Process Automation Suite Intelligent Process Automation Suite : Process Automation, Rules and Decision Management Engine, Task Automation & Collaboration, Context and Behaviour History, Low-code solution, Easy Integration The CaseXellence Methodology CaseXellence : Streamline, Transform, Engage . Best case management software. Pre-Built Verticalized Solutions for the Public Sector Pre-Built Verticalized solution for public sector enterprises - Grants Management, Rental Assistance Program Management, Homeowner Assistance Program Management, Student Loan Financial Aid Program Management, Legal Case Management Platform, Court Management Software, Healthcare Case Management Software, Integrated Eligibility Management Portal, Licence & Permitting, Volunteer Management System. Software for case management. CaseXellence Platform OverView No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software Business Cockpit Business Cockpit Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less Speridian Technologies products BEACON Banking Solutions BEACON Banking Solutions Core Banking Systems O360 O360 Human Resources Management Systems (HRMS) LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/stake-and-unstake
Stake and Unstake Tokens | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Stake and Unstake Tokens On this page Stake and Unstake Tokens Stake ​ Web Flutter const nativeTokenAddress = Variables . NATIVE_TOKEN_ADDRESS ; const res = await fuseSDK . stakeToken ( new StakeRequestBody ( { accountAddress : fuseSDK . wallet . getSender ( ) , tokenAmount : "0.01" , tokenAddress : nativeTokenAddress , } ) ) ; console . log ( ` UserOpHash: ${ res ?. userOpHash } ` ) ; console . log ( "Waiting for transaction..." ) ; const ev = await res ?. wait ( ) ; console . log ( ` Transaction hash: https://explorer.fuse.io/tx/ ${ ev ?. transactionHash } ` ) ; final res = await fuseSDK . stakeToken ( StakeRequestBody ( accountAddress : fuseSDK . wallet . getSender ( ) , tokenAmount : '0.1' , tokenAddress : '0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE' , // Native Token Address ) , ) ; print ( 'UserOpHash: ${ res . userOpHash } ' ) ; print ( 'Waiting for transaction...' ) ; final ev = await res . wait ( ) ; print ( 'Transaction hash: ${ ev ? . transactionHash } ' ) ; Unstake ​ Web Flutter const nativeTokenAddress = "0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE" ; const res = await fuseSDK . unstakeToken ( new UnstakeRequestBody ( { accountAddress : fuseSDK . wallet . getSender ( ) , tokenAmount : "0.007" , tokenAddress : nativeTokenAddress , } ) , "0xb1DD0B683d9A56525cC096fbF5eec6E60FE79871" ) ; console . log ( ` UserOpHash: ${ res ?. userOpHash } ` ) ; console . log ( "Waiting for transaction..." ) ; const ev = await res ?. wait ( ) ; console . log ( ` Transaction hash: https://explorer.fuse.io/tx/ ${ ev ?. transactionHash } ` ) ; final res = await fuseSDK . unstakeToken ( UnstakeRequestBody ( accountAddress : fuseSDK . wallet . getSender ( ) , tokenAmount : '0.1' , tokenAddress : 'TOKEN_ADDRESS' , // "0x34Ef2Cc892a88415e9f02b91BfA9c91fC0bE6bD4" ) , EthereumAddress . fromHex ( '0xb1DD0B683d9A56525cC096fbF5eec6E60FE79871' ) , ) ; print ( 'UserOpHash: ${ res . userOpHash } ' ) ; print ( 'Waiting for transaction...' ) ; final ev = await res . wait ( ) ; print ( 'Transaction hash: ${ ev ? . transactionHash } ' ) ; Edit this page Previous GET Staking Options Next GET Staked Tokens Stake Unstake Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://pub.dev/packages/fuse_wallet_sdk
fuse_wallet_sdk | Dart package Sign in Help pub.dev Searching for packages Package scoring and pub points Flutter Using packages Developing packages and plugins Publishing a package Dart Using packages Publishing a package pub.dev Searching for packages Package scoring and pub points Flutter Using packages Developing packages and plugins Publishing a package Dart Using packages Publishing a package fuse_wallet_sdk 0.3.8 fuse_wallet_sdk: ^0.3.8 copied to clipboard Published 13 months ago • fuse.io SDK Dart Flutter Platform Android iOS Linux macOS web Windows 9 → Metadata Fuse Wallet SDK now has a Dart implementation, making it even easier to integrate blockchain technology into your mobile apps. More... Readme Changelog Example Installing Versions Scores Introduction Benefits of using Fuse Wallet SDK Purpose of the SDK Migration guides Instantiation Examples Get Address Send transactions Approve token Retry mechanism Send batch transactions Staking Unstake Trading Features Get Address Send transactions Send batch transactions Sponsored Transactions Staking Trading Troubleshooting Limitations Migrating to v0.2 Introduction Prerequisites Detailed Migration Steps Introduction # The Fuse Wallet SDK is a set of tools for creating, managing, and engaging with Fuse Wallet SDK in client applications. Fuse Wallet SDK lets users create smart contract wallets( Based on ERC-4337 ) associated with each user's Externally Owned Account (EOA) that provide added security compared to traditional EOAs with a single private key. With Fuse Wallet SDK, users can deposit funds that no one else can control and withdraw at any time. Benefits of using Fuse Wallet SDK # Using Fuse Wallet SDK provides several benefits, including: Enhanced security : Fuse Wallet SDK are non-custodial accounts that allow users to deposit funds that no one else can control and withdraw at any time. Each Fuse Smart Wallet is a smart contract associated with the user's EOA and can only be controlled by that user. Enhanced UX : Fuse Wallet SDK support gasless transactions, improving the user experience and making it more seamless to interact with the blockchain. Better developer experience : The Fuse Wallet SDK abstracts away the complexities of web3 development, such as cryptography, wallet management, and smart contract interactions, making it easier for developers to build blockchain-based applications Purpose of the SDK # The SDK is designed to make it easy for developers to create, manage, and engage with Fuse Wallet SDK in their applications. The SDK provides pre-built functions and utilities, allowing developers to interact with Fuse Wallet SDK securely and efficiently. Migration guides # Migrating to v0.2 Instantiation # import 'package:fuse_wallet_sdk/fuse_wallet_sdk.dart'; final apiKey = 'YOUR_PUBLIC_API_KEY'; final privateKey = EthPrivateKey.fromHex('YOUR_PRIVATE_KEY'); final fuseSDK = await FuseSDK.init(apiKey, privateKey); Examples # Get Address Send transactions Approve token Retry mechanism Send batch transactions Staking Unstake Trading Features # The Fuse Wallet SDK provides several features that allow developers to create, manage, and engage with Fuse Wallet SDK in their applications. Some of the key features include: Get Address Gets the address of the wallet created. print('Smart contract wallet address: ${fuseSDK.wallet.getSender()}'); Send transactions Send transactions, including ERC20 and NFT transfers and interaction with arbitrary smart contracts. final res = await fuseSDK.transferToken( EthereumAddress.fromHex('TOKEN_ADDRESS'), // For sending native token, use '0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE' EthereumAddress.fromHex('RECIPIENT_ADDRESS'), BigInt.parse('AMOUNT_IN_WEI'), ); print('UserOpHash: ${res.userOpHash}'); print('Waiting for transaction...'); final ev = await res.wait(); Send batch transactions The process of grouping multiple transactions into a single batch to be processed together. This is often done to optimize processing time and reduce transaction fees. final res = await fuseSDK.executeBatch( [ // Transfer Native Token call Call( to: EthereumAddress.fromHex('TARGET_ADDRESS'), value: BigInt.parse('AMOUNT_IN_WEI'), data: Uint8List(0), ), // Transfer ERC-20 Token call Call( to: EthereumAddress.fromHex('TOKEN_ADDRESS'), value: BigInt.zero, data: ContractsUtils.encodeERC20TransferCall( EthereumAddress.fromHex('TOKEN_ADDRESS'), EthereumAddress.fromHex('RECIPIENT_ADDRESS'), BigInt.parse('AMOUNT_IN_WEI'), ), ), ], ); print('UserOpHash: ${res.userOpHash}'); print('Waiting for transaction...'); final ev = await res.wait(); print('Transaction hash: ${ev?.transactionHash}'); Sponsored Transactions Sponsored transactions are the ability to pay for another user’s transaction fees. To do this, the Fuse operator must enable the sponsored feature in his project and deposit some funds into the paymaster contract. The SDK provides a middleware to check if the project is sponsored and the amount of funds available for sponsoring. To use this feature, you must first initialize the SDK with the withPaymaster parameter set to true . import 'package:fuse_wallet_sdk/fuse_wallet_sdk.dart'; final apiKey = 'YOUR_PUBLIC_API_KEY'; final privateKey = EthPrivateKey.fromHex('YOUR_PRIVATE_KEY'); final fuseSDK = await FuseSDK.init(apiKey, privateKey, withPaymaster: true); Staking The SDK provides a module for staking. This module allows users to stake their tokens and earn rewards. Currently, the SDK supports staking for the following tokens: Native Fuse & VoltToken final stakingOptions = await fuseSDK.stakingModule.getStakingOptions(); final res = await fuseSDK.stakeToken( StakeRequestBody( accountAddress: fuseSDK.wallet.getSender(), tokenAmount: '0.1', tokenAddress: '0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE', ), ); Trading Smart Wallet can buy and sell popular cryptocurrencies like Bitcoin and Ethereum, Stable-coins. Behind the scenes, it uses  voltage.finance  decentralized exchange. final nativeTokenAddress = '0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE'; final usdcTokenAddress = '0x28C3d1cD466Ba22f6cae51b1a4692a831696391A'; final res = await fuseSDK.swapTokens( TradeRequest( inputToken: nativeTokenAddress, outputToken: usdcTokenAddress, inputAmount: BigInt.parse('100000000000000000'), exactIn: true, ), ); Troubleshooting # User op cannot be replaced: fee too low. If you're getting the User op cannot be replaced: fee too low error, it means that the gas price you set is too low. You can increase the gas price by setting the TxOptions parameter when sending a transaction. To replace an user operation, a new user operation must have at least 10% higher maxPriorityFeePerGas and 10% higher maxPriorityFeePerGas than the one in the user operation mempool. To replace the user operation, the new gas price must be at least 10% higher. final res = await fuseSDK.transferToken( EthereumAddress.fromHex('TOKEN_ADDRESS'), EthereumAddress.fromHex('RECIPIENT_ADDRESS'), BigInt.parse('AMOUNT_IN_WEI'), FuseSDK.defaultTxOptions.copyWith( withRetry: true, feeIncrementPercentage: 11, ), ); print('UserOpHash: ${res.userOpHash}'); print('Waiting for transaction...'); final ev = await res.wait(); Limitations # The Fuse Wallet SDK works only on the Fuse & Fuse Sparknet networks, an EVM based chain L1 blockchain. Support for other blockchains is planned for the future. If you have any questions or feedback, please get in touch with our support team at support@fuse.io . Migrating to v0.2 # Introduction Welcome to the updated version of the fuse_wallet_sdk . Our primary objective for this migration is to seamlessly align our services with the evolving landscape of EVM-based chains. We are thrilled to introduce the incorporation of the new standard, EIP 4337, commonly known as "Account Abstraction". This latest protocol promises to enhance security, provide more consistent developer experiences, and offer improved user interactions in Ethereum-based environments. Major Changes at a Glance : Seamless Smart Wallet Creation : Gone are the days where we required an API request to the Fuse APIs to craft a smart wallet. With the renewed fuse_wallet_sdk , initiation not only sets the SDK in motion but also seamlessly creates a smart wallet for the given owner. This elevates user experience, reduces developer friction, and augments transactional efficiency. As we navigate through the details of this migration, we hope to provide you with a clear roadmap, making the transition as straightforward as possible. Embracing the future of Ethereum-based chains has never been this effortless. Prerequisites Before embarking on this migration journey with the new fuse_wallet_sdk , the process is made delightfully simple for our users. However, there's a minimal requirement you should be aware of: API Key : The only prerequisite to utilize the updated SDK is to have a valid API key. If you haven't create one yet or need a new one, don't fret! Simply head over to our Developer's Console at https://console.fuse.io/build/ and follow the straightforward steps to obtain your key. With your API key in hand, you're all set to integrate and experience the enhanced capabilities of the fuse_wallet_sdk . Detailed Migration Steps Initialization and Smart Wallet Creation Locate the Old Initialization : Start by finding your old SDK initialization in your code. This is typically where you have the FuseWalletSDK instantiation. Remove Wallet Creation Steps : In the old SDK, there were multiple steps involved in creating a smart wallet, including authenticating the credentials, creating a wallet, and handling the creation events. These steps are now greatly simplified in the new SDK. Identify and remove the following sections from your old SDK code: The authentication step: await fuseWalletSDK.authenticate(credentials); The wallet creation step: await fuseWalletSDK.createWallet(); The entire onSmartWalletEvent function and its associated event listening code. Update SDK Initialization : Replace the old initialization: final FuseWalletSDK fuseWalletSDK = FuseWalletSDK(publicApiKey); with the new one: final fuseSDK = await FuseSDK.init(publicApiKey, credentials); Access the Smart Contract Wallet Address : In the new SDK, you can obtain the smart contract wallet address directly after initialization. Replace the older method: print('Smart contract wallet address: ${fuseWalletSDK.smartWallet.smartWalletAddress}'); with the simplified new version: print('Smart contract wallet address: ${fuseSDK.wallet.getSender()}'); By following the steps above, developers can smoothly transition to the new SDK and take advantage of the more streamlined and simplified process provided by the update. It’s worth noting that the migration not only reduces the lines of code but also enhances clarity and reduces complexity, resulting in a more efficient and cleaner integration process. In summary, the new SDK code provides a more structured, modular, and extensive set of functions to interact with FuseBox. It allows for a broader range of operations, from basic token transfers to more complex operations like staking and swapping tokens. The design considerations (like separating modules) make the SDK more maintainable and scalable. 9 likes 135 points 87 downloads Publisher fuse.io Weekly Downloads Metadata Fuse Wallet SDK now has a Dart implementation, making it even easier to integrate blockchain technology into your mobile apps. Homepage Repository (GitHub) View/report issues Documentation API reference License MIT ( license ) Dependencies bip32 , bip39 , centrifuge , compute , data_channel , decimal , dio , freezed_annotation , hex , http , json_annotation , synchronized , userop , web3dart More Packages that depend on fuse_wallet_sdk ← Metadata 9 likes 135 points 87 downloads Publisher fuse.io Weekly Downloads Metadata Fuse Wallet SDK now has a Dart implementation, making it even easier to integrate blockchain technology into your mobile apps. Homepage Repository (GitHub) View/report issues Documentation API reference License MIT ( license ) Dependencies bip32 , bip39 , centrifuge , compute , data_channel , decimal , dio , freezed_annotation , hex , http , json_annotation , synchronized , userop , web3dart More Packages that depend on fuse_wallet_sdk Back Dart language Report package Policy Terms API Terms Security Privacy Help
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/#fusebox-sdk-features
SDK | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK On this page SDK The SDKs for both Flutter and JS offer a comprehensive toolkit for developing client applications on the Fuse Blockchain. The FuseBox SDK empowers developers to create Smart Contract Wallets ( based on the ERC-4337 standard) linked to each user's Externally Owned Account (EOA), enhancing security beyond the conventional EOA's reliance on a single private key. This SDK facilitates exclusive control over funds by users, allowing deposits that remain inaccessible to others and withdrawals that can be executed at any time. FuseBox SDK Features ​ The FuseBox SDK simplifies the incorporation of Account Abstraction on the Fuse Blockchain, offering features such as: Smart Contract Wallet Creation: Establish secure wallets based on smart contracts ( based on the ERC-4337 standard). Transaction Management: ERC20 and Native FUSE Transfers: Facilitate the transfer of ERC20 tokens and native FUSE currency. Non-Blocking Transactions: Ensure uninterrupted transaction processing. NFT Transfers: Enable the transfer of Non-Fungible Tokens (NFTs). Token Swaps: Allow for the exchange of different types of tokens. Data Services: Token Ownership: Retrieve a list of tokens owned by a specific address. Transaction History: Access records of past transactions. Token Details: Obtain detailed information about specific tokens. Smart Wallet Token Balances: Monitor token balances within smart contract wallets. Staking Capabilities: Staking Options: Explore available staking opportunities. Stake Management: Perform staking and unstaking actions. Staked Token Overview: View tokens that have been staked. Trading Functions: Token Pricing: Check the current price of tokens. Price Fluctuations: Track token price changes over the last 24 hours and at specified intervals. Supported Tokens: Access a list of tokens supported for trading. Sponsored Transactions: Facilitate transactions sponsored by third parties. Enhanced Transaction Processing: Further support for non-blocking transactions enhances the user experience by ensuring seamless transaction flow. Edit this page Previous FuseBox Next Installation And Setup FuseBox SDK Features Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/signup/cold-join?session_redirect=/products/tencentglobal-tencent-realtime-communication-trtc?viewConnections=true&source&%2361;products_details_guest_face-pile-cta
Sign Up | LinkedIn Join LinkedIn Make the most of your professional life Not you? Remove photo Join LinkedIn To create a LinkedIn account, you must understand how LinkedIn processes your personal information by selecting learn more for each item listed. Agree to all terms We collect and use personal information. Learn more We share personal information with third parties to provide our services. Learn more Further information is available in our Korea Privacy Addendum . Privacy Policy Addendum 1 of 2 2 of 2 Agree to the term Continue Back Agree to all terms By clicking Agree & Join, you agree to the LinkedIn User Agreement , Privacy Policy , and Cookie Policy . or Email Password Show First name Last name Agree & Join Security verification Already on LinkedIn? Sign in Looking to create a page for a business? Get help LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) Language Takes less than 2 minutes Join LinkedIn to connect with people, jobs and opportunities that matter Join now Leave
2026-01-13T09:29:16
https://scholar.google.com/citations?user=X5qafxAAAAAJ&hl=ko&oe=ASCII
Xiaoyu Cao - Google 학술 검색 로드 중... 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 연간 인용횟수 중복된 서지정보 다음 학술 문서는 학술검색에서 병합되어 있습니다. 총 인용 횟수가 첫 번째 학술 문서에 대해서만 계산됩니다. 병합된 서지정보 이 '인용' 횟수는 학술검색의 다음 학술 문서에 대한 인용문을 포함합니다. * 표시된 인용문은 프로필에 있는 학술 문서와 다를 수 있습니다. 공동 저자 추가 공동 저자 팔로우 이 저자의 새 학술자료 이 저자를 인용한 새 학술자료 이 저자의 연구와 관련된 새 학술자료 업데이트를 받을 이메일 주소 완료 죄송합니다. 현재 Internet Explorer 버전에서는 일부 기능이 작동하지 않을 수 있습니다. 최적의 상태로 사용하려면 Chrome 또는 Mozilla Firefox 를 사용해 주세요. 내 프로필 내 서재 통계 알리미 설정 로그인 로그인 내 프로필 만들기 인용 전체 2021년 이후 서지정보 5516 5307 h-index 19 19 i10-index 19 19 0 1800 900 450 1350 2018 2019 2020 2021 2022 2023 2024 2025 2026 25 35 133 334 619 1050 1535 1721 45 공개 액세스 모두 보기 모두 보기 자료 13개 자료 0개 공개 비공개 재정 지원 요구사항 기준 팔로우 Xiaoyu Cao PhD. Duke University duke.edu의 이메일 확인됨 Security and privacy Trustworthy AI 학술자료 인용 공개 액세스 제목 정렬 서지정보순 정렬 연도순 정렬 제목순 정렬 인용 인용 연도 Local Model Poisoning Attacks to Byzantine-Robust Federated Learning M Fang, X Cao, J Jia, NZ Gong USENIX Security Symposium , 2019 1923 2019 FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping X Cao, M Fang, J Liu, NZ Gong NDSS 2021 , 2021 1135 2021 FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients Z Zhang, X Cao, J Jia, N Zhenqiang Gong arXiv e-prints, arXiv: 2207.09209 , 2022 407 2022 Mitigating evasion attacks to deep neural networks via region-based classification X Cao, NZ Gong Proceedings of the 33rd Annual Computer Security Applications Conference�… , 2017 277 2017 MPAF: Model Poisoning Attacks to Federated Learning based on Fake Clients X Cao, NZ Gong Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern�… , 2022 259 2022 IPGuard: Protecting the Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary X Cao, J Jia, NZ Gong ACM ASIA Conference on Computer and Communications Security (ASIACCS) , 2021 230 2021 Provably Secure Federated Learning against Malicious Clients X Cao, J Jia, NZ Gong AAAI Conference on Artificial Intelligence (AAAI) , 2021 197 2021 Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks J Jia, X Cao, NZ Gong AAAI Conference on Artificial Intelligence (AAAI) , 2021 160 2021 Data Poisoning Attacks to Local Differential Privacy Protocols X Cao, J Jia, NZ Gong USENIX Security Symposium , 2021 139 2021 On Certifying Robustness against Backdoor Attacks via Randomized Smoothing B Wang, X Cao, NZ Gong CVPR 2020 Workshop on Adversarial Machine Learning in Computer Vision, 2020 , 2020 138 2020 Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing J Jia, X Cao, B Wang, NZ Gong ICLR 2020 , 2020 120 2020 Certified robustness of graph neural networks against adversarial structural perturbation B Wang, J Jia, X Cao, NZ Gong Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data�… , 2021 116 2021 Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing J Jia, B Wang, X Cao, NZ Gong The Web Conference (WWW) 2020 , 2020 106 2020 Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks J Jia, Y Liu, X Cao, NZ Gong AAAI , 2022 105 2022 Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data Y Wu, X Cao, J Jia, NZ Gong arXiv preprint arXiv:2111.11534 , 2021 70 2021 FaceGuard: Proactive Deepfake Detection Y Yang, C Liang, H He, X Cao, NZ Gong arXiv preprint arXiv:2109.05673 , 2021 40 2021 Understanding the Security of Deepfake Detection X Cao, NZ Gong International Conference on Digital Forensics and Cyber Crime, 360-378 , 2022 34 2022 Piano: Proximity-based user authentication on voice-powered internet-of-things devices NZ Gong, A Ozen, Y Wu, X Cao, R Shin, D Song, H Jin, X Bao 2017 IEEE 37th International Conference on Distributed Computing Systems�… , 2017 31 2017 Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations J Jia, B Wang, X Cao, H Liu, NZ Gong arXiv preprint arXiv:2011.07633 , 2020 29 2020 Certified Robustness of Nearest Neighbors against Data Poisoning Attacks J Jia, X Cao, NZ Gong arXiv preprint arXiv:2012.03765 , 2020 2020 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 학술자료 1–20 더보기 개인정보처리방침 약관 도움말 학술검색 정보 검색 도움말
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/content-delivery-network-software?trk=organization_guest_product_card_category_link
Best Content Delivery Network (CDN) Software | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Chief Technology Officer (7) Software Engineer (5) Chief Executive Officer (4) Information Technology Manager (3) Director of Operations (3) See all products Find top products in Content Delivery Network (CDN) Software category Software used to scale Internet bandwidth to improve delivery speed and reliability. - Access a geographically distributed network of proxy servers - Distribute content to users by location - Perform web caching, request routing, and load balancing - Monitor and optimize delivery speed of online content and media 73 results Google Cloud CDN Content Delivery Network (CDN) Software by Google Cloud Cloud CDN provides fast, reliable web and video content delivery with global scale and reach. View product Cloudflare CDN Content Delivery Network (CDN) Software by Cloudflare A fast, agile, and secure global network Cloudflare offers ultra-fast static and dynamic content delivery over our global edge network. Exercise precise control over how your content is cached, reduce bandwidth costs and take advantage of built-in unmetered DDoS protection. View product Aura Managed CDN Content Delivery Network (CDN) Software by Akamai Technologies Akamai Managed CDN Solutions provide network operators dedicated CDN capacity for streaming video & content applications or third party CDN services. View product Fastly CDN Content Delivery Network (CDN) Software by Fastly Fastly’s CDN provides the real-time observability, baked-in security, and programmatic control needed to deliver the fast, personalized experiences today’s global audiences demand. View product Imperva Secure CDN Content Delivery Network (CDN) Software by Imperva Imperva Secure CDN dynamically profiles website resources and identifies all cacheable content (dynamic and static) including content that other CDNs cannot. All Imperva PoPs are full-stack and globally dispersed to ensure the lowest latency possible. The global Imperva network lets organizations not only prevent unforeseen disruptions to their business, but also mitigate risk. Critical applications are secured against all OWASP Top 10 threats and the malicious effects of bad bots are mitigated through Imperva Cloud WAF. DDoS traffic is diverted to the global CDN with guaranteed 3-second mitigation, and load balancing ensures an optimal user experience. Load Balancer supports a variety of load balancing algorithms—with or without a persistence override option—to optimize traffic distribution across servers, maximize application performance and reduce server load. View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights Fastly Streaming Media Delivery Content Delivery Network (CDN) Software by Fastly Fastly helps the world’s leading media and entertainment brands — like A+E, Spotify, and Fox — reliably deliver live and on-demand streaming media experiences, quickly, securely, and at scale. View product CDNetworks CDN Content Delivery Network (CDN) Software by CDNetworks CDNetworks CDN guarantees fast, reliable, and secure delivery of web content, video, applications, and other digital resources, ensuring low-latency and high-speed content delivery. Powered by over 2,800 global PoPs in 87 countries and regions, CDNetworks CDN runs on a 200 Tbps+ network backbone, offering unmatched scalability and performance for businesses across the globe. View product Bunny CDN Content Delivery Network (CDN) Software by bunny.net Performance like never before. Supercharge your content delivery with a global distribution network with unparalleled speed, security, and stability. Deliver exceptional performance. For every request. Every time. Bunny CDN is powered by 108+ Global PoPs and runs on an 80 Tbps+ Network Backbone. Deliver your content worldwide with a sub 29 ms average latency. View product Squiz Delivery Content Delivery Network (CDN) Software by Squiz Squiz Delivery maximizes the impact of your experiences by delivering them the way users expect – securely, consistently, and lightning-fast – across web, mobile, IoT devices, and more. Features: - Accelerate site performance: Supercharge performance with Cloudflare’s vast Content Delivery Network (CDN). Increase load speed with content cached locally. Optimize performance, even during peak traffic, with a reverse proxy. - Safeguard your sites and data: Automatically identify and block malicious traffic with our Web Application Firewall (WAF). Get full threat protection against cyberattacks such as DDoS. The built-in Cloudflare shield ensures that your sites don’t get taken down by an attack. - Uninterrupted, secure access: Ensure legitimate users always have consistent, secure access to your sites. Squiz DXP takes a multi-layered approach, with the WAF, CDN, reverse proxy, and more, working together to safeguard your experiences and ensure they are always available. View product Leaseweb Multi-CDN (Content Delivery Network) Content Delivery Network (CDN) Software by Leaseweb We know that uptime, reliability, and speed are important for your business to deliver high-quality content and the best user experience. The Leaseweb Multi-CDN combines multiple Content Delivery Network (CDN) providers to increase your global reach. View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://www.linkedin.com/products/digitalocean-block-storage/?trk=products_details_guest_similar_products_section_similar_products_section_product_link_result-card_full-click
DigitalOcean Block Storage | LinkedIn Skip to main content LinkedIn DigitalOcean in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in DigitalOcean Block Storage Block Storage Software by DigitalOcean See who's skilled in this Add as skill Learn more Report this product About Block storage gives developers scalable and highly available SSD-based cloud storage to attach to Droplets. From 1GB to 16TB, priced at $0.10/GB per month. Media Products media viewer No more previous content No more next content Similar products Tencent Cloud Block Storage Tencent Cloud Block Storage Block Storage Software OVHcloud Block Storage OVHcloud Block Storage Block Storage Software Vultr Vultr Block Storage Software Vultr Bare Metal Vultr Bare Metal Block Storage Software DataCore SANsymphony DataCore SANsymphony Block Storage Software Vultr Block Storage Vultr Block Storage Block Storage Software Sign in to see more Show more Show less DigitalOcean products Spaces Spaces Object Storage Software LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
http://creativecommons.org/licenses/by/4.0/legalcode.sk
Legal Code - Uvedenie autora 4.0 medzinárodná - Creative Commons Skip to content Creative Commons Menu Who We Are What We Do Licenses and Tools Blog Support Us Languages available Bahasa Indonesia Basque dansk Deutsch eesti English español français frysk Hrvatski italiano latviešu Lietuviškai Māori Nederlands norsk polski Português Română Slovensky Slovenščina suomi svenska Türkçe česky Ελληνικά Русский Українська العربيّة 日本語 简体中文 繁體中文 한국어 Search Donate Explore CC Global Network Join a global community working to strengthen the Commons Certificate Become an expert in creating and engaging with openly licensed materials Global Summit Attend our annual event, promoting the power of open licensing Chooser Get help choosing the appropriate license for your work Search Portal Find engines to search openly licensed material for creative and educational reuse Open Source Help us build products that maximize creativity and innovation Help us protect the commons. Make a tax deductible gift to fund our work. Donate today! Uvedenie autora 4.0 medzinárodná CC BY 4.0 Legal Code Uvedenie autora 4.0 medzinárodná 1. časť — Definície. 2. časť — Obsah práv a povinností. 3. časť — Licenčné podmienky. 4. časť — Osobitné práva k databáze. 5. časť — Odopretie záruk a obmedzenie zodpovednosti. 6. časť — Trvanie a ukončenie. 7. časť — Ďalšie podmienky. 8. časť — Výklad. Canonical URL https://creativecommons.org/licenses/by/4.0/ Other formats Plain Text RDF/XML See the deed Verzia 4.0 • See the errata page for any corrections and the date of change About the license and Creative Commons Creative Commons Corporation ("Creative Commons") nie je advokátska kancelária ani neposkytuje právne služby alebo právne poradenstvo. Šírením textov verejných licencií Creative Commons nevzniká vzťah príkazného typu alebo iný obdobný vzťah. Creative Commons poskytuje texty verejných licencií a súvisejúce informácie tak, ako sú. Creative Commons nezodpovedá za texty verejných licencií ani za obsah licencovaný za týchto licenčných podmienok ani za súvisejúce informácie. Creative Commons v maximální možnej miere vylučuje všetku zodpovednosť za škodu, ktorá vznikne v dôsledku ich použitia. Používanie Verejných licencií Creative Commons Texty verejných licencií Creative Commons predstavujú štandardizovaný soubor licenčných podmienok, ktoré môžu autori alebo ďalší nositelia práv použiť pre zdieľanie chránených autorských diel a ďalšieho obsahu, ktorý podlieha autorským právam a ďalším právam, ktoré sú uvedené nižšie v tejto verejnej licencii. Nasledujúce upozornenia slúžia výhradne pre informačné účely, nie sú vyčerpávajúce a nie sú súčasťou týchto licencií. Upozornenia pre poskytovateľov Tieto verejné licencie sú určené osobám oprávneným poskytovať verejnosti oprávnenia k použitu obsahu spôsobom, ktorý je inak vyhradený vykonávateľom autorských a niektorých ďalších práv. Tieto licencie sú neodvolateľné. Poskytovatelia by si mali licenčné podmienky riadne preštudovať tak, aby im porozumeli skôr ako sa ich rozhodnú použiť. Poskytovatelia by si taktiež pred použitím týchto licencií mali zaistiť všetky potrebné práva tak, aby mohla verejnosť použiť obsah predpokladaným spôsobom. Poskytovatelia by mali jednoznačne označiť všetok obsah, na ktorý sa licencie nevzťahujú, a to vrátane ďalších diel poskytnutých pod licenciami CC alebo materiálov použitých na základe výnimky či obmedzenia autorských práv. Ďalšie upozornenia pre poskytovateľov. Upozornenia pre verejnosť Použitím niektorej z týchto verejných licencií poskytuje poskytovateľ verejnosti oprávnenie k použitiu licencovaného obsahu za stanovených licenčných podmienok. Pokiaľ z nejakého dôvodu nie je súhlas poskytovateľa nevyhnutný, napríklad z dôvodu uplatnenia niektorej výnimky alebo obmedzenia autorského práva, potom sa na dané použitie táto licencia nevzťahuje. Na základe týchto licencií sú poskytované výlučne oprávnenia k výkonu autorských a niektorých ďalších práv, ktoré je poskytovateľ oprávnený poskytovať. Použitie licencovaného obsahu môže byť napriek tomu obmedzené z ďalších dôvodov, napríklad preto, že nositeľom autorských, či ďalších práv k nemu sa vzťahujúcich, je niekto iný. Poskytovateľ môže vzniesť zvláštne požiadavky, napríklad požiadať o to, aby boli označené alebo popísané všetky zmeny. Hoci to tieto licencie nevyžadujú, nabádame Vás, aby ste tieto požiadavky rešpektovali, pokiaľ sú primerané. Ďalšie upozornenia pre verejnosť. Uvedenie autora 4.0 medzinárodná Výkonom práv, ku ktorému Vás oprávňuje nižšie uvedená licencia, vyjadrujete súhlas s podmienkami medzinárodnej verejnej licencie Creative Commons uvedenie autora 4.0 (ďalej len „Verejná licencia“), ku ktorej týmto zároveň pristupujete. Táto Verejná licencia by sa mala vykladať ako zmluva, ktorá Vás oprávňuje k výkonu Licencovaných práv na základe Vášho súhlasu s podmienkami stanovenými v tejto Verejnej licencii a Poskytovateľ Verejnej licencie Vám udeľuje predmetný súhlas za účelom dosiahnutia úžitkov zo sprístupnenia Predmetu Verejnej licencie verejnosti podľa podmienok stanovených touto Verejnou licenciou. 1. časť — Definície. Adaptovaný obsah je obsah chránený autorským alebo obdobným právom odvodený alebo založený na Predmete Verejnej licencie a v ktorom je Predmet Verejnej licencie preložený, upravený, zmenený alebo inak spracovaný spôsobom vyžadujúcim súhlas Poskytovateľa Verejnej licencie k výkonu autorských alebo obdobných práv. Na účely tejto Verejnej licencie v prípade, ak je Predmetom Verejnej licencie hudobné dielo, umelecký výkon hudobného diela alebo jeho zvukový záznam, adaptovaný obsah vzniká vždy aj pri časovo synchrónnom spojení s pohyblivou obrazovou zložkou. Spracovateľská licencia je licenciou, ktorú Vy uplatníte pri nakladaní s obsahom, ktorý je výsledkom Vášho spracovania Predmetu Verejnej licencie a ktorý je chránený Autorským alebo obdobným právom, a to podľa podmienok tejto Verejnej licencie. Autorské a obdobné práva sú autorské práva a/alebo obdobné práva blízko súvisiace s autorskými právami vrátane, nie však výlučne, práva k umeleckému výkonu, práva k vysielaniu, práva k zvukovému záznamu a osobitné práva k databáze, a to bez ohľadu na pomenovanie alebo kategorizáciu týchto práv. Na účely tejto Verejnej licencie sa práva uvedené v 2. časti písm. b. body 1 a 2 nepovažujú za autorské a obdobné práva. Účinné technologické opatrenia predstavujú opatrenia, ktoré nie je dovolené, bez súhlasu nositeľa práv alebo umožnenia zákonom, odstrániť v zmysle právnych úprav vychádzajúcich z čl. 11 Zmluvy WIPO o autorskom práve uzavretej dňa 20. decembra 1996 a/alebo z obdobných medzinárodných zmlúv. Výnimky a obmedzenia predstavujú uplatnenie doktrín „fair use“ a „fair dealing“, teda možnosti použitia predmetu ochrany bez súhlasu nositeľa práv pri zachovaní presne stanovených všeobecne platných a záväzných podmienok a/alebo uplatnenie iných výnimiek a obmedzení autorských a obdobných práv, ktoré sa uplatnia na Vaše použitie Predmetu Verejnej licencie. Predmet Verejnej licencie je umelecké alebo literárne dielo, databáza alebo iný obsah, na použitie ktorého Poskytovateľ uplatnil túto Verejnú licenciu. Licencované práva sú Autorské a obdobné práva Poskytovateľa, na výkon ktorých Vás oprávňuje táto Verejná licencia na základe súhlasu Poskytovateľa a za podmienok v nej vyjadrených, vzťahujúce sa na Vaše použitie Predmetu Verejnej licencie, a na udelenie súhlasu na výkon ktorých je Poskytovateľ oprávnený. Poskytovateľ je fyzická alebo právnická osoba (osoby), ktorá udelí súhlas na použitie Predmetu Verejnej licencie a výkon Licencovaných práv („licencia“) podľa tejto Verejnej licencie. Šírenie predstavuje poskytnutie obsahu verejnosti akýmkoľvek spôsobom, ktorý si vyžaduje dovolenie v zmysle Licencovaných práv, najmä vyhotovenie rozmnoženiny, verejné vystavenie, verejné vykonanie, verejné rozširovanie obsahu vrátane jeho dovozu, verejný prenos a sprístupňovanie verejnosti takým spôsobom, aby k obsahu mal jednotlivec prístup z miesta a v čase, ktorý si sám zvolí. Osobitné právo k databáze predstavuje práva odlišné od autorského práva, ktoré vyplýva zo Smernice Európskeho parlamentu a Rady 9/96/ES z 11. marca 1996 o právnej ochrane databáz v znení jej zmien a doplnení a/alebo nových právnych úprav, ktoré by ju nahradili, ako aj z iných porovnateľných práv platných kdekoľvek na svete. Vy, Vás, Vám, Vami označuje fyzickú alebo právnickú osobu, vykonávajúcu Licencované práva na základe tejto Verejnej licencie. Váš, Vaša, Vášho, Vášmu, Vašich, Vaším má obdobný význam. 2. časť — Obsah práv a povinností. Udelenie licencie . Podľa podmienok v tejto Verejnej licencii uvedených Vám týmto Poskytovateľ udeľuje celosvetovú, bezodplatnú, nevýhradnú, neodvolateľnú licenciu, bez možnosti udelenia sublicencie, na použitie Predmetu Verejnej licencie týmito spôsobmi: vyhotovením rozmnoženiny a Šírením Predmetu Verejnej licencie vcelku alebo jeho časti; a vytvorením, vyhotovením rozmnoženiny a Šírením Adaptovaného obsahu. Výnimky a obmedzenia . Na odstránenie akejkoľvek pochybnosti, na prípady, ak sa na Vaše použitie Predmetu verejnej licencie uplatnia Výnimky a obmedzenia, sa táto Verejná licencia nevzťahuje a Vy nie ste viazaný jej podmienkami. Trvanie . Trvanie tejto Verejnej licencie je upravené v 6. časti písm. a. Médiá a formáty; dovolenie technických úprav . Poskytovateľ Vás oprávňuje na výkon Licencovaných práv prostredníctvom všetkých médií a vo všetkých formátoch v súčasnosti známych alebo v budúcnosti vytvorených, ako aj na vykonanie technických úprav potrebných na riadny výkon Licencovaných práv. Poskytovateľ sa zdrží výkonu práv a/alebo nebude uplatňovať žiadne nároky na zákaz technických úprav potrebných na Váš výkon Licencovaných práv vrátane technických úprav potrebných na odstránenie Účinných technologických opatrení. Na účely tejto Verejnej licencie platí, že vykonanie výlučne úprav dovolených podľa 2. časti písm. a. bod 4 nikdy nezakladá vznik Adaptovaného obsahu. Následní používatelia . Ponuka od Poskytovateľa — Predmet Verejnej licencie . Každý používateľ Predmetu Verejnej licencie automaticky dostane ponuku na výkon Licencovaných práv podľa podmienok tejto Verejnej licencie od Poskytovateľa. Žiadne obmedzenia pre ďalšie použitie . Vy nie ste oprávnený na ponúknutie alebo zavádzanie žiadnych ďalších podmienok, ako ani na uplatnenie žiadnych Účinných technologických opatrení vo vzťahu k použitiu Predmetu Verejnej licencie, ak by takýmto konaním mohlo dôjsť k obmedzeniu Licencovaných práv akéhokoľvek používateľa Predmetu Verejnej licencie. Bez schválenia . Nič v tejto verejnej licencii nekonštituuje ani nemôže byť konštruované tak, aby zakladalo alebo v sebe obsahovalo vznik nároku vo Váš prospech na uvedenia autorstva, patriaceho Poskytovateľovi alebo iným určeným osobám podľa 3. časti písm. a. bod 1 písm. A. bod i. , alebo by, na základe Vášho použitia Predmetu Verejnej licencie, zakladalo status autora, ktorý by bol spojený, podporovaný, schválený alebo udelený Poskytovateľom alebo inou určenou osobou podľa 3. časti písm. a. bod 1 písm. A. bod i. Ďalšie práva . Osobnostné práva (ako napríklad právo na nedotknuteľnosť diela), právo na súkromie, rovnako ako ani iné všeobecné osobnostné práva nie sú predmetom licencie podľa tejto Verejnej licencie, avšak Poskytovateľ sa v najširšom možnom rozsahu zdrží výkonu týchto práv alebo si nebude uplatňovať tieto práva, a to výlučne v rozsahu, ktorý je nevyhnutný na umožnenie výkonu Licencovaných práv Vami a za žiadnym iným účelom. Patentové a známkové právo nie je predmetom licencie podľa tejto Verejnej licencie. Poskytovateľ sa v najširšom možnom rozsahu zdrží výkonu akýchkoľvek práv, na základe ktorých môže od Vás vyberať odmenu za výkon Licencovaných práv, a to bez ohľadu na to či priamo alebo prostredníctvom organizácie kolektívnej správy na základe výkonu dobrovoľnej, zákonnej alebo povinnej kolektívnej správy. V akýchkoľvek ďalších prípadoch si Poskytovateľ právo na výber odmeny za použitie diela výslovne vyhradzuje. 3. časť — Licenčné podmienky. Váš výkon Licencovaných práv podlieha výslovne nasledujúcim podmienkam. Uvedenie autora . Ak Šírite Predmet Verejnej licencie (vrátane jeho modifikácií) Ste povinný: v prípade ich uvedenia Poskytovateľom spolu s Predmetom Verejnej licencie, zachovať a uvádzať nasledujúce údaje: identifikácia autora (autorov) Predmetu Verejnej licencie, ako aj ďalších nositeľov práv oprávnených na ich uvádzanie, akýmkoľvek vhodným spôsobom požadovaným Poskytovateľom (vrátane pseudonymu ak je určený); vyhlásenie o autorských právach („copyrightová výhrada“); vyhlásenie odkazujúce na túto Verejnú licenciu; vyhlásenie odkazujúce na odopretie záruk; URI („jednotný identifikátor zdroja“) alebo hyperlink na Predmet Verejnej licencie v uskutočniteľnom rozsahu; uviesť či Ste upravili Predmet Verejnej licencie spolu s uvedením všetkých predchádzajúcich úprav; a uviesť, že Predmet Verejnej licencie je používaný a je predmetom licencie podľa tejto Verejnej licencie a pripojiť text, URI („jednotný identifikátor zdroja“) alebo hyperlink tejto Verejnej licencie. Podmienky určené podľa 3. časti písm. a. bod 1 môžete naplniť akýmkoľvek vhodným spôsobom v závislosti od média, spôsobu a kontextu Šírenia Predmetu Verejnej licencie. Vhodným spôsobom naplnenia podmienok môže byť napríklad uvedenie URI („jednotný identifikátor zdroja“) alebo hyperlinku zdroja obsahujúceho požadované informácie. Na požiadanie Poskytovateľa Ste povinný, v uskutočniteľnom rozsahu, odstrániť akékoľvek z informácií požadovaných podľa 3. časti písm. a. bod 1 písm. A . Ak Šírite Adaptovaný obsah, ktorý ste sami vytvorili, Spracovateľská licencia, ktorú k nemu uplatníte nesmie zamedzovať používateľom Adaptovaného obsahu konať v zhode s touto Verejnou licenciou. 4. časť — Osobitné práva k databáze. Ak obsahom Licencovaných práv je Osobitné právo k databáze, ktoré sa uplatní pri Vašom použití Predmetu Verejnej licencie: na odstránenie akýchkoľvek pochybností, Ste, podľa 2. časti písm. a. bod 1 , oprávnený na extrakciu, reutilizáciu, vyhotovenie rozmnoženiny a Šírenie celého obsahu databázy alebo jej podstatnej časti; ak spojíte celý obsah databázy alebo jej podstatnú časť s databázou, ku ktorej Vy vykonávate osobitné práva, databáza, ku ktorej Vy vykonávate osobitné práva (nie však jej individuálne obsahové zložky) sa stáva Adaptovaným obsahom; a pri Šírení obsahu databázy alebo jej podstatnej časti Ste viazaný podmienkami podľa 3(a) 3. časti písm. a. Na odstránenie akýchkoľvek pochybností, táto 4. časť dopĺňa a nenahrádza Vaše záväzky, podľa tejto Verejnej licencie v prípadoch, ak Licencované práva zahŕňajú ďalšie autorské a obdobné práva. 5. časť — Odopretie záruk a obmedzenie zodpovednosti. Pokiaľ nie je osobitne Poskytovateľom stanovené inak, Poskytovateľ v najširšom možnom rozsahu poskytuje Predmet Verejnej licencie ako stojí a leží a ako je prístupný a neposkytuje žiadne vyhlásenia a ani záruky vo vzťahu k Predmetu Verejnej licencie, a to ani výslovné ani odvodené, ani zákonné, ani iné. Uvedené zahŕňa aj, nie však výlučne, záruky právneho dôvodu, obchodného potenciálu, určenia pre konkrétny účel, neporušenia práv duševného vlastníctva, neexistencie vád tak zjavných ako aj skrytých, presnosti, existencie alebo neexistencie chýb zjavných alebo objaviteľných. Ak nie je odopretie záruk prípustné celkovo alebo v časti, toto odopretie sa na Vás nebude vzťahovať. V najširšom možnom rozsahu Poskytovateľ v žiadnom prípade nebude zodpovedný, a to v zmysle akejkoľvek právnej doktríny (vrátane, nie však výlučne v zmysle konceptu nedbanlivosti) či inak za akúkoľvek priamu, osobitnú, nepriamu, náhodnú, následnú, trestnoprávnu, exemplárnu či inú škodu, stratu, výdavok či náklad vychádzajúcu z uplatnenia tejto Verejnej licencie alebo použitie Predmetu Verejnej licencie, a to dokonca aj v prípade, ak bol Poskytovateľ poučený o možnosti vzniku takejto škody, straty, výdavku či nákladu. Ak nie je obmedzenie zodpovednosti prípustné celkovo alebo v časti, toto obmedzenie sa na Vás nebude vzťahovať. Odopretie záruk a obmedzenie zodpovednosti ako je vyššie uvedené je potrebné vykladať v najširšom možnom význame čo najbližšie k absolútnemu odopretiu a zrieknutia sa všetkej zodpovednosti. 6. časť — Trvanie a ukončenie. Táto Verejná licencia trvá počas trvania ochrany Autorských a obdobných práv, ktoré sú licencované. Avšak, ak konáte v rozpore s touto Verejnou licenciou, Vaše práva podľa tejto Verejnej licencie zanikajú automaticky. Ak Vaše právo použiť Predmet Verejnej licencie zaniklo podľa 6. časti písm. a., toto právo sa obnovuje: automaticky odo dňa odstránenia porušenia, ak je porušenie odstránené do 30 dní odo dňa, keď Ste sa o porušení dozvedeli; alebo na základe výslovného obnovenia Poskytovateľom. Na odstránenie akýchkoľvek pochybností, táto 6. časť písm. b. žiadnym spôsobom neobmedzuje právo Poskytovateľa domáhať sa od Vás nápravy porušení tejto Verejnej licencie. Na odstránenie akýchkoľvek pochybností je Poskytovateľ kedykoľvek oprávnený poskytovať Predmet Verejnej licencie na základe osobitných podmienok alebo zastaviť distribúciu Predmetu Verejnej licencie: avšak takéto konanie Poskytovateľa nepredstavuje ukončenie tejto Verejnej licencie. Ustanovenia 1. , 5. , 6. , 7. a 8. časti zostávajú v platnosti aj po skončení tejto Verejnej licencie. 7. časť — Ďalšie podmienky. Poskytovateľ nebude viazaný žiadnymi doplňujúcimi alebo inými Vami určenými podmienkami, iba ak by boli výslovne dohodnuté. Akékoľvek dojednania, porozumenia alebo dohody týkajúce sa Predmetu Verejnej licencie, ktoré nie sú obsahom tejto Verejnej licencie, sú oddelené a nezávislé na podmienkach tejto Verejnej licencie. 8. časť — Výklad. Na odstránenie akýchkoľvek pochybností túto Verejnú licenciu nemožno vykladať ako zakladajúcu obmedzenia, vylúčenia či ďalšie podmienky na použitie Predmetu Verejnej licencie v prípadoch, keď je jeho použitie právne možné aj bez súhlasu udeleného touto Verejnou licenciou. V najširšom možnom význame v prípade, ak akékoľvek ustanovenie tejto Verejnej licencie možno považovať za nevykonateľné, automaticky sa mení v najmenšom možnom rozsahu tak, aby bolo vykonateľné. Ak ustanovenie nemožno zmeniť, bude z tejto Verejnej licencie vypustené, a to bez vplyvu na vykonateľnosť zostávajúcich podmienok. Bez výslovného súhlasu Poskytovateľa nemožno upustiť od žiadnej podmienky tejto Verejnej licencie a nemožno konštatovať žiadne porušenie podmienky tejto Verejnej licencie. Nič v tejto Verejnej licencii nekonštituuje alebo nemôže byť vykladané ako obmedzenie alebo vzdanie sa akýchkoľvek výhod a výsad, ktoré sa dotýkajú Poskytovateľa alebo Vás, vrátane tých, ktoré vyplývajú z konaní v rámci akejkoľvek jurisdikcie alebo pred akýmikoľvek orgánmi. About Creative Commons Creative Commons nie je zmluvnou stranou svojich verejných licencií. Hoci, Creative Commons si môže vybrať aplikáciu niektorej zo svojich verejných licencií na obsah, ktorý zverejní a v takomto prípade bude považované za „Poskytovateľa". Texty verejných licencií Creative Commons sú uvoľnené do public domain podľa CC0 Public Domain Dedication . Okrem obmedzeného účelu použitia na určenie skutočnosti, že nejaký obsah je šírený podľa verejných licencií Creative Commons alebo ako je inak dovolené v rámci pravidiel Creative Commons zverejnených na creativecommons.org/policies , nemožno použiť ochrannú známku „Creative Commons" alebo inú ochrannú známku alebo logo, ktoré sú majetkom Creative Commons bez predchádzajúceho písomného súhlasu Creative Commons, a to najmä, nie však výlučne, v spojení s akoukoľvek neoprávnenou úpravou verejných licencií Creative Commons alebo pri iných dojednaniach či dohodách týkajúcich sa licencovaných obsahov. Na odstránenie akýchkoľvek pochybností ustanovenie tohto odseku nepredstavuje súčasť verejnej licencie. Creative Commons možno kontaktovať na creativecommons.org ( sk.creativecommons.org ). Creative Commons is the nonprofit behind the open licenses and other legal tools that allow creators to share their work. Our legal tools are free to use. Learn more about our work Learn more about CC Licensing Support our work Use the license for your own material. Licenses List Public Domain List Creative Commons Contact Newsletter Privacy Policies Terms Contact Us Creative Commons PO Box 1866, Mountain View, CA 94042 info@creativecommons.org +1-415-429-6753 Instagram --> Bluesky Mastodon LinkedIn Subscribe to our Newsletter Support Our Work Our work relies on you! Help us keep the Internet free and open. Donate Now Except where otherwise noted , content on this site is licensed under a Creative Commons Attribution 4.0 International license . Icons by Font Awesome .
2026-01-13T09:29:16
https://www.linkedin.com/products/speridian-technologies-casexellence/?trk=products_seo_search
CaseXellence | LinkedIn Skip to main content LinkedIn Speridian Technologies in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in CaseXellence Business Process Management Software by Speridian Technologies See who's skilled in this Add as skill Learn more Report this product About Government agencies are in greater need for solutions to streamline processes, communications and workflows in order to manage their caseloads more efficiently. Leveraging decades of Speridian's expertise in developing solutions for the public sector, CaseXellence enables government agencies to take on this challenge and meet the ever-growing demands of public assistance programs. CaseXellence is a low-code intelligent process automation platform that enables public sector enterprises to modernize and transform their legacy infrastructure. CaseXellence has pre-built verticalized solutions designed specifically for public sector automation with security transparency, and traceability at the heart of the platform. This product is intended for Case Administrator Case Manager Case Specialist Senior Case Manager Caseworker Civil Servant Chief Information Officer Chief Technology Officer Nonprofit Coordinator of Volunteers Media Products media viewer No more previous content CaseXellence Video CaseXellence is a low-code intelligent process automation platform that enables public sector enterprises to modernize and transform their legacy infrastructure. CaseXellence has pre-built verticalized solutions designed specifically for public sector automation with security, transparency, and traceability at the heart of the platform. Verticalized Intelligent Process Automation Suite Intelligent Process Automation Suite : Process Automation, Rules and Decision Management Engine, Task Automation & Collaboration, Context and Behaviour History, Low-code solution, Easy Integration The CaseXellence Methodology CaseXellence : Streamline, Transform, Engage . Best case management software. Pre-Built Verticalized Solutions for the Public Sector Pre-Built Verticalized solution for public sector enterprises - Grants Management, Rental Assistance Program Management, Homeowner Assistance Program Management, Student Loan Financial Aid Program Management, Legal Case Management Platform, Court Management Software, Healthcare Case Management Software, Integrated Eligibility Management Portal, Licence & Permitting, Volunteer Management System. Software for case management. CaseXellence Platform OverView No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software Business Cockpit Business Cockpit Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less Speridian Technologies products BEACON Banking Solutions BEACON Banking Solutions Core Banking Systems O360 O360 Human Resources Management Systems (HRMS) LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://opensource.guide/es/how-to-contribute/
Cómo Contribuir con el Código Abierto | Open Source Guides Acerca de Contribuir العربية Български Bangla Deutsch Ελληνικά English Español Farsi Français Hindi Magyar Indonesia Italiano 日本語 한국어 Malay Nederlands Pidgin Polski Português Romanian Русский संस्कृतम् Swahili தமிழ் Türkçe 简体中文 繁體中文 Open Source Guides Cómo Contribuir con el Código Abierto ¿Quieres colaborar con el código abierto? Una guía para hacer contribuciones al código abierto, para principiantes y veteranos. Tabla de contenidos ¿Para qué contribuir? Qué significa contribuir Orientándote a un nuevo proyecto Encontrando un proyecto donde contribuir Cómo enviar una contribución Qué pasa luego de que enviaste una contribución ¿Para qué contribuir? Trabajar en [freenode] me ha ayudado a conseguir muchas de las habilidades que luego he usado en mis estudios en la universidad y en mi actual trabajo. ¡Creo que trabajar en proyectos de código abierto me ayuda tanto como ayuda al proyecto! — @errietta, “Por qué me gusta contribuir con el software de código abierto” Contribuir en proyectos de código abierto puede ser una provechosa manera de aprender, enseñar, y conseguir experiencia en cualquier habilidad que puedas imaginar. ¿Para qué contribuye la gente en proyectos de código abierto? ¡Por muchas razones! Mejora tus habilidades existentes Ya sea codificación, diseño de interfaces de usuario, diseño gráfico, redacción u organización, si lo que estás buscando es práctica, hay una tarea esperándote en un proyecto de código abierto. Conoce personas que están interesadas en temas similares Los proyectos de código abierto con comunidades cálidas y acogedoras hacen que la gente regrese a través de los años. Muchas personas forman amistades de por vida a través de su participación en el código abierto, ya sea para presenciar exposiciones en conferencias entre pares o largas conversaciones nocturnas sobre burritos. Encuentra mentores y enseña a otros Trabajar con otros en un proyecto compartido significa que tendrás que explicar cómo haces las cosas, así como pedir ayuda. Los momentos de aprendizaje y enseñanza pueden ser actividades satisfactorias para todos los involucrados. Construye artefactos públicos que te ayudarán a construir una reputación (y una carrera) Por definición, todo tu código abierto es público, lo que significa que consigues ejemplos de manera gratuita para llevar a cualquier lugar como una demostración de lo que haces. Conoce las habilidades de las personas El código abierto ofrece oportunidades para practicar habilidades de liderazgo y gestión, a resolver conflictos, organizar equipos y a priorizar el trabajo. Es poderoso ser capaz de hacer cambios, incluso pequeños No necesitas convertirte en un colaborador de toda la vida para disfrutar la participación con el código abierto. ¿Alguna vez viste un error de tipografía, y deseaste que alguien pudiera corregirlo? En un proyecto de código abierto, es justamente lo que puedes hacer. El código abierto ayuda a las personas a sentir acción en sus vidas, en la forma en que experimentan al mundo y eso en si mismo es gratificante. Qué significa contribuir Si eres un colaborador de código abierto nuevo, el proceso puede ser intimidatorio. ¿Cómo encontrar el proyecto adecuado? ¿Qué hacer si no sabes cómo codificar? ¿Qué pasa si algo sale mal? ¡No debes preocuparte! Hay todo tipo de formas de involucrarse con un proyecto de código abierto, y unos pocos consejos te ayudarán a sacar el máximo provecho de tu experiencia. No necesitas contribuir con código Un error conceptual común acerca de contribuir con el código abierto es que debes contribuir con código. De hecho, son a menudo las otras partes de un proyecto las más descuidadas o pasadas por alto . ¡Le harás un enorme favor al proyecto si te ofreces a trabajar en este tipo de contribuciones! Me han reconocido por mi trabajo en CocoaPods, pero la mayoría de las personas no conoce que en realidad yo no realizo ningún trabajo real en la propia herramienta CocoaPods. Mi tiempo en el proyecto se dedica principalmente a hacer cosas como documentar y a trabajar en la marca. — @orta, “Moviéndose al Software de código abierto por defecto” Incluso si te gusta codificar, otro tipo de contribuciones son una gran manera de involucrarse con un proyecto y conocer a otros miembros de la comunidad. Construir esas relaciones te dará oportunidades de trabajar en otras partes del proyecto. ¿Te gusta planificar eventos? Organiza workshops o reuniones acerca del proyecto, como hizo @fzamperin para NodeSchool Organiza la conferencia del proyecto (si es que tienen una) Ayuda a la comunidad de miembros a encontrar las conferencias apropiadas y a presentar propuestas para disertar ¿Te gusta diseñar? Reestructura los diseños para mejorar la usabilidad del proyecto Dirige la investigación de los usuarios para reorganizar y refinar la navegación del proyecto o sus menús, como lo sugiere Drupal Reúne una guía de estilos para ayudar al proyecto a tener un diseño con consistencia visual Crea diseños para las remeras o un nuevo logo, como hicieron los colaboradores de hapi.js’s ¿Te gusta escribir? Escribe y mejora la documentación del proyecto Sanea la carpeta de ejemplos para mostrar cómo se usa el proyecto Inicia el boletín informativo para el proyecto, o aspectos más destacados a enviar a la lista de correos Escribe tutoriales para el proyecto, como hicieron los colaboradores de pypa’s Escribe una traducción de la documentación del proyecto De verdad, [documentation] es super-importante. Por lejos la documentación ha sido enorme y fue el factor que terminó con la torre de Babel. Hay secciones que ciertamente podrían mejorar con algo de trabajo e incluso la adición de un párrafo aquí o allá es extremadamente apreciada. — @kittens, “Llamado a los colaboradores” ¿Te gusta organizar? Vincula los problemas duplicados, y sugiere nuevas etiquetas para los problemas, para mantener todo organizado Recorre los problemas abiertos y sugiere cerrar los más antiguos, como hizo @nzakas para eslint Realiza preguntas clarificadoras en los problemas recientemente abiertos para hacer que la discusión avance ¿Te gusta programar? Encuentra un problema abierto para entrar, como lo hizo @dianjin para Leaflet Pregunta si puedes ayudar a escribir alguna nueva funcionalidad Automatiza la configuración del proyecto Mejora las herramientas y las pruebas ¿Te gusta ayudar a las personas? Responde las preguntas acerca del proyecto en, por ejemplo, Stack Overflow ( como este ejemplo Postgres ) o en reddit Responde preguntas a las personas en los problemas abiertos Ayuda a moderar los foros de discusión o canales de conversación ¿Te gusta ayudar a otros a programar? Revisa el código que otras personas presentan Escribe tutoriales sobre cómo puede usarse un proyecto Ofrécete como tutor de otro colaborador, como lo hizo @ereichert para @bronzdocen on Rust ¡No tienes que trabajar solamente en proyectos de software! Mientras que el “código abierto” a menudo se refiere a software, puedes colaborar en casi cualquier cosa. Existen libros, recetas, listas y clases que se desarrollan como proyectos de código abierto. Por ejemplo: @sindresorhus sanea una lista de “asombrosos” @h5bp mantiene una lista de preguntas potenciales para entrevistas para desarrolladores candidatos de front-end @stuartlynn y @nicole-a-tesla hicieron una colección de hechos graciosos sobre puffins Incluso si no eres un desarrollador de software, trabajar en la documentación de un proyecto puede ayudar a comenzar en el código abierto. Es con frecuencia menos intimidante trabajar en proyectos que no involucran código, y ese proceso de colaboración te dará confianza y experiencia. Orientándote a un nuevo proyecto Si vas tras un rastreador de problemas y las cosas parecen confusas, no eres solo tu. Esas herramientas requieren mucho conocimiento implícito, pero las personas puede ayudarte a navegarlo y tu puedes hacerles preguntas. — @shaunagm, “Cómo Contribuir con el Código Abierto” Para cualquier otra cosa distinta de una corrección de error tipográfico, contribuir con el código abierto es como caminar hacia un grupo de extraños en una fiesta. Si comienzas a hablar sobre las llamas, mientras ellos están muy involucrados en una discusión sobre el pez dorado, es probable que te miren de manera un poco extraña. Antes de lanzarte con los ojos cerrados con tus propias sugerencias, comienza aprendiendo cómo leer a la sala. Si lo haces, aumentan las probabilidades de que tus ideas se noten y sean escuchadas. Anatomía de un proyecto de código abierto Todas las comunidades de código abierto son diferentes. Luego de pasar años en un proyecto de código abierto significa que aprendiste a conocer un proyecto de código abierto. Si te mueves a un proyecto diferente encontrarás que el vocabulario, las normas, y los estilos de comunicación son completamente diferentes. Dicho esto, muchos proyectos de código abierto siguen una estructura organizacional similar. Entender los roles de las diferentes comunidades y el proceso en general te ayudará a estar rapidamente orientado para cualquier proyecto nuevo. Un proyecto de código abierto tiene los siguientes tipos de personas: Autor: La/s persona/s u organización que creó/crearon el proyecto. Dueño: La/s persona/s que tiene/n la propiedad administrativa sobre la organización o el repositorio (no siempre es la misma que el autor original) Encargados: Colaboradores que son responsables de dirigir la visión y de administrar aspectos organizacionales del proyecto. (Pueden también ser autores o dueños del proyecto.) Colaboradores: Cualquiera que haya contribuido con algo al proyecto. Miembros de la comunidad: Las personas que utilizan al proyecto. Pueden tener un rol activo en las conversaciones o expresar su opinión sobre la dirección que toma el proyecto. Los proyectos más grandes pueden tener también subcomisiones o grupos de trabajo enfocados en tareas diferentes, como herramientas, priorización de urgencias, moderación de la comunidad, y organización de eventos. Busca en el sitio web del proyecto una página del “equipo”, o en su repositorio para encontrar la documentación política de gobierno, para encontrar esta documentación. Un proyecto también tiene documentación. Estos archivos están normalmente listados en un nivel alto del repositorio. LICENSE: Por definición, cada proyecto de código abierto debe tener una licencia open source . Si el proyecto no tiene una licencia, entonces no es de código abierto. README: El archivo README es un manual de instrucción que da la bienvenida al proyecto a los nuevos miembros de la comunidad. Explica por qué el proyecto es útil y cómo comenzar. CONTRIBUTING: Mientras que el archivo README ayuda a las personas a usar el proyecto, el archivo CONTRIBUTING ayuda a las personas a contribuir con el proyecto. Explica qué tipo de contribuciones son necesarias y cómo llevar adelante el trabajo. Si bien no todos los proyectos tienen un archivo CONTRIBUTING, su presencia señala que se trata de un buen proyecto para contribuir. CODE_OF_CONDUCT: Sienta sólidas reglas sobre la conducta de los participantes asociados y ayuda a facilitar un entorno acogedor y amistoso. Si bien no todos los proyectos tienen un archivo CODE_OF_CONDUCT, su presencia señala que se trata de un buen proyecto para contribuir. Otra documentación: Puede haber documentación adicional, como tutoriales, recorridos o políticas de gobierno, especialmente en proyectos de mayor envergadura. Finalmente, los proyectos de código abierto utilizan las siguientes herramientas para organizar la discusión. La lectura de estos archivos te darán una buena imagen de cómo piensa y trabaja la comunidad. Seguidor de problemas (Issue tracker): Es donde las personas discuten los problemas relacionados con el proyecto. Pull requests: Es donde las personas discuten y revisan los cambios que están en progreso. Foros de discusión o lista de correos electrónicos: Algunos proyectos pueden utilizar estos canales de conversación para tópicos de conversación (por ejemplo “Cómo hago para… o “Qué piensas sobre…“ en luga de reportes de errores o pedido de requerimientos). Otros utilizan un rastreador de problemas para todas las conversaciones. Canal de chat síncrono: Algunos proyectos utilizan canales de chat (como Slack o IRC) para conversaciones casuales, colaboración e intercambios rápidos. Encontrando un proyecto donde contribuir ¡Ahora que ya has descubierto cómo funcionan los proyectos de código abierto, es tiempo de encontrar un proyecto con el que contribuir! Si nunca antes contribuiste al código abierto, acepta algunos consejos del presidente de los Estados Unidos, John F. Kennedy, quien una vez dijo, “No preguntes qué es lo que tu país puede hacer por ti; pregúntate qué es lo que tú puedes hacer por él” Las contribuciones al código abierto ocurren en todos los niveles a lo largo de los proyectos. No necesitas pensar demasiado cuál será tu primera colaboración, o cómo se verá. En su lugar, comienza pensando sobre el proyecto que ya estás utilizando o que quisieras utilizar. Los proyectos con los que contribuirás activamente son aquellos a los que volverás. En esos proyectos, cuando te encuentres pensando que algo podría hacerse mejor o diferente, actúa siguiendo tu instinto. El código abierto no es un club exclusivo; está hecho de personas igual a tí. El término de fantasía “Código abierto” es solo un nombre para tratar a los problemas del mundo como resolubles. Puedes recorrer un archivo README y encontrar un vínculo roto o un error tipográfico. O tal vez eres un nuevo usuario y te diste cuenta de que algo está roto, o hay un problema que crees que realmente debería estar en la documentación. En lugar de ignorarlo y continuar, o solicitar que alguien lo solucione, observa si puedes ayudar lanzándote sobre él. ¡De eso se trata el código abierto! El 28% de las contribuciones casuales a la documentación del código abierto se trata de documentación, como correcciones tipográficas, reformateos o redacción de una traducción. Puedes también utilizar algunos de los siguientes recursos para ayudarte a descubrir nuevos proyectos: GitHub Explore Open Source Friday First Timers Only CodeTriage 24 Pull Requests Up For Grabs First Contributions SourceSort OpenSauced Una lista de verificación antes de que contribuyas Una vez que hayas encontrado un proyecto con el que quisieras contribuir, realiza un recorrido rápido para asegurarte de que el proyecto es adecuado para aceptar contribuciones. De otra manera, tu duro trabajo puede no tener nunca una respuesta. Aquí tienes una lista práctica para evaluar si un proyecto es conveniente para nuevos colaboradores. Satisface la definición de código abierto ¿Tiene una licencia? Usualmente, es un archivo ubicado LICENSE en la raíz del repositorio. El proyecto acepta contribuciones activamente Observa la actividad de los commit en la rama principal. En GitHub, puedes ver esta información en la página del repositorio. ¿Cuándo ocurrió el último commit? ¿Cuántos colaboradores tiene el proyecto? ¿Con qué frecuencia las personas hacen un commit? (En GitHub, puedes encontrar esta información haciendo click en "Commits", en la barra superior.) Luego, busca en los problemas del proyecto. ¿Cuántos problemas abiertos existen? ¿Los responsables responden rápidamente a los problemas cuando son abiertos? ¿Existe una discusión activa en los problemas? ¿Se abrieron recientemente nuevos problemas? ¿Se están cerrando los problemas? (En GitHub, haz click en el vínculo "closed" de la página de problemas para ver los problemas cerrados.) Ahora haz lo mismo para los pull requests del proyecto. ¿Cuántos pull requests existen? ¿Los responsables responden rápidamente a los pull requests cuando se abren? ¿Existe una discusión activa en los pull requests? ¿Existen pull requests recientes? ¿Cómo de reciente ocurrió la entrada (merge) de un pull request? (En GitHub, haz click en el vínculo "closed" en la página de pull requests para ver los PRs cerrados.) El proyecto es acogedor Un proyecto que es amigable y acogedor indica que será receptivo de nuevos colaboradores. ¿Los encargados responden de manera colaborativa a las preguntas en los problemas? Las personas son amigables en los problemas, foros de discusión y chat (por ejemplo IRC o Slack)? ¿Los pull requestes son revisados? ¿Los encargados agradecen a las personas por sus contribuciones? Siempre que veas un hilo largo, comprueba las respuestas de los principales desarrolladores que llegan más tarde al hilo. ¿Están resumiendo de forma constructiva y tomando medidas para llevar el hilo hacia una decisión y al mismo tiempo continúan siendo educados? Si ves que se agitan banderas de guerra pasando en frente, frecuentemente indica que la energía se está encaminando a discutir más que en desarrollar. — @kfogel, Produciendo Software de código abierto Cómo enviar una contribución Ya encontraste un proyecto que te gustaba, y estás listo para hacer una contribución. ¡Por fin! A continuación te mostramos cómo hacer que tu contribución siga por el buen camino. Comunicándote de manera efectiva Sin importar si eres un colaborador para una sola vez o estás intentando unirte a una comunidad, trabajar con otras personas es una de las habilidades más importantes que desarrollarás en un proyecto de código abierto. [Como un nuevo colaborador,] me di cuenta rápidamente que necesitaba hacer preguntas si quería poder cerrar el problema. Recorrí el código base. Una vez que comprendí lo que estaba ocurriendo, pregunté que me orientaran. ¡Y voilà! Pude resolver el problema luego de conseguir todos los detalles relevantes que necesitaba. — @shubheksha, El Muy Accidentado Viaje de un Principiante a través del Mundo del Código Abierto Antes de abrir un problema o un pull request, o de hacer una pregunta en un chat, ten en cuenta los siguientes puntos para ayudar a que tus ideas lleguen a buen puerto de manera efectiva. Da contexto. Ayuda a los demás a ponerse al día rápidamente. Si tienes un error, explica lo que estás tratando de hacer y cómo reproducirlo. Si estás sugiriendo una nueva idea, explica por qué crees que sería útil para el proyecto (¡no solamente para tí¡). 😇 “No ocurre X cuando yo hago Y” 😢 “¡X se ha roto! Por favor repárenlo.” Haz tu tarea de antemano. Está bien desconocer cosas, pero mostrando que lo intentaste. Antes de solicitar ayuda, asegúrate de comprobar el README, la documentación, los problemas (abiertos o cerrados), la lista de correos, y de buscar en internet por una respuesta. Las personas agradecerán cuando demuestres que estás tratando de aprender. 😇 “No estoy seguro de cómo implementar X. Verifiqué en los documentos de ayuda y no encontré ninguna mención.” 😢 “¿Cómo soluciono X?” Mantén tus solicitudes cortas y directas. Al igual que el envío de un correo, cualquier contribución, sin importar lo simple o útil que sea, requiere la revisión de parte de otra persona. Muchos proyectos tienen más solicitudes de entrada que personas disponibles para ayudar. Sé conciso. Aumentarás las probabilidades de que alguien pueda ayudarte. 😇 “Me gustaría escribir un tutorial para una API.” 😢 “Días atrás estaba manejando por la autopista y me detuve para cargar combustible, y entonces tuve la gran idea de algo que deberíamos estar haciendo pero antes de explicarlo, permítanme mostrarles…“ Mantén todas las comunicaciones públicas. Pese a que es tentador, no te dirijas a los responsables de manera privada a menos que necesites compartir información sensible (como un problema de seguridad o violaciones a la conducta serias). Cuando mantienes las conversaciones públicas, más personas pueden aprender y verse beneficiadas de tu intercambio. La discusión puede ser, en sí misma, una contribución. 😇 (como un comentario) “@-responsable ¡Qué tal! ¿Cómo deberíamos proceder con este PR?” 😢 (como un correo electrónico) “Que tal, disculpa que te moleste con un correo electrónico, pero me estaba preguntando si tendrás la oportunidad de revisar mi PR” Está bien hacer preguntas (¡pero sé paciente!). Todos fueron nuevos en el proyecto en algún momento, e incluso los colaboradores experimentados necesitan ponerse al día cuando miran un nuevo proyecto. Por lo mismo, incluso responsables de mucha antigüedad no están siempre familiarizados con todas las partes del proyecto. Muéstrales la misma paciencia que quieres que ellos tengan contigo. 😇 “Gracias por estudiar éste error. Seguí tus sugerencias. Esta es la salida.” 😢 “¿Por qué no pueden solucionar mi problema? ¿No es este acaso su proyecto?” Respeta las decisiones de la comunidad. Tus ideas pueden ser diferentes a las prioridades de la comunidad o a la visión. Pueden devolverte alguna retroalimentación o decidir no continuar con tu idea. Mientras que tu buscas atención y compromiso, los responsables deben convivir con tu decisión por más tiempo que tú. Si no estás de acuerdo con la dirección tomada, siempre puedes trabajar en tu propio fork o comenzar tu propio proyecto. 😇 “Lamento que no puedan dar soporte a mi situación, pero como lo explicas solo afecta a una minoría de usuarios, y lo entiendo. Gracias por escuchar.” 😢 “¿Por qué no dan soporte a mi situación? ¡Es inaceptable!” Por encima de todo mantenlo con clase. El código abierto está formado por colaboradores de todo el mundo. El contexto se pierde a través de idiomas, culturas, geografías y zonas horarias. Además, la comunicación escrita hace más difícil transmitir un tono o estado de ánimo. Asume buenas intenciones en esas conversaciones. Está bien, tratando de volver a una idea, solicitar más contexto, o aclarar más tu posición. Trata de dejar a Internet como un lugar mejor del que tú lo encontraste. Dando contexto Antes de hacer nada, haz una rápida verificación para asegurarte que tu idea no se haya discutido anteriormente. Navega por el README del proyecto, los problemas (abiertos y cerrados), lista de correos electrónicos, y en Stack Overflow. No necesitas dedicar horas para todo esto, pero una mirada rápida buscando algunas palabras clave resolverá gran parte de la tarea. Si no puedes encontrar tu idea en ningún otro lado, estás listo para dar el paso. Si el proyecto está en GitHub, es probable que lo comuniques abriendo un problema o un pull request: Problemas (Issues) son como comenzar una conversación o discusión. Pull requests son para comenzar a trabajar en una solución. Para una comunicación ligera, como una explicación o una pregunta de “cómo”, trata preguntando en Stack Overflow, IRC, Slack u otro canal de chat, si el proyecto tiene alguno. Antes de abrir un problema o un pull request, verifica los documentos de verificación del proyecto (comúnmente es un archivo que se llama CONTRIBUTING), para ver si se necesitan incluir algo específico, puede ser que soliciten que respetes un modelo, o requerir que utilices pruebas. Si quieres hacer una contribución sustancial, abre un problema para preguntar antes de ponerte a trabajar en ello. Es de gran ayuda observar el proyecto por un tiempo (en GitHub, puedes hacer click en “Watch” para ser notificado de todas las conversaciones), y conocer a los miembros de la comunidad, antes de realizar trabajo alguno que pueda no ser aceptado. Aprenderás mucho tomando un proyecto que utilizas activamente, “observarlo” en GitHub y leyendo cada problema y PR. — @gaearon sobre la adhesión a proyectos Abriendo un problema Frecuentemente deberías abrir un problema en las siguientes situaciones: Reportar un error que tú no puedes resolver. Discutir un tópico o idea de alto nivel (por ejemplo sobre la comunidad, la visión o políticas). Proponer una nueva característica u otra idea del proyecto. Consejos para comunicar los problemas: Si ves un problema abierto en el que quieres entrar, coméntalo en el problema, para permitir que las personas sepan que te preocupa. De esa manera, es menos probable que se duplique el trabajo en la comunidad. Si un problema fue abierto hace mucho tiempo, es posible que se esté tratando en otro lugar o que ya haya sido resuelto, de modo que primero pregunta por una confirmación antes de ponerte a trabajar. Si abriste un problema, pero más tarde descubriste que estaba resuelto, comenta en tu propio problema, para que las personas lo sepan, y luego cierra el problema. Incluso documentar ese resultado es una contribución al proyecto. Abriendo un pull request Usualmente deberías abrir un pull request en las siguientes situaciones: Enviar arreglos triviales (por ejemplo una corrección tipográfica, un enlace caído o un error obvio). Comenzar a trabajar en una contribución que ya fue solicitada, o que ya discutiste en un problema. Un pull request no representa trabajo terminado. Usualmente es mejor abrir un pull request de forma temprana, de manera que otros puedan observar o dar retroalimentación a tu progreso. Solo márcalo como “trabajo en proceso” (WIP por sus siglas en inglés, work in progress) en la línea del tema. Siempre puedes agregar más commits después. Si el proyecto está alojado en GITHUB, acá te explicamos los pasos para enviar un pull request: Abre un fork del repositorio y haz un clon local. Conecta tu repositorio local con el repositorio “superior” original agregándolo como remoto. Descarga los cambios desde el repositorio superior con frecuencia de manera que puedas mantener al día, de forma que cuando tu envíes tu pull request, sea menos probable que haya conflictos. (ver más instrucciones detalladas aquí .) Crea una rama para tus ediciones. Haz referencia a cualquier problema relevante o documentación de soporte en tu PR (por ejemplo “Cierra #37.”) Incluye capturas de pantalla del antes y del después si tus cambios incluyen diferencias en el HTML o CSS. Arrastra y suelta las imágenes en el cuerpo de tu pull request. ¡Haz pruebas de tus cambios! Corre tus cambios contra las pruebas existentes si realmente existen, y crea nuevas pruebas si es necesario. Sin importar que existan o no las pruebas, asegúrate que tus cambios no produzcan roturas del proyecto existente. Contribuye con el estilo del proyecto con el máximo de tus capacidades. Esto significa utilizar indentación, punto y comas o comentarios de manera diferente a lo que harías en tu repositorio, pero que hacen más sencillo para los responsables combinar y para otros de entender y mantener el proyecto en el futuro. Si se trata de tu primer pull request, verifica Haz un Pull Request , que fue creado por @kentcdodds como un recurso de recorrido gratuito. Qué pasa luego de que enviaste una contribución ¡Lo hiciste! Felicitaciones por convertirte en un colaborador open source. Esperamos que ésta sea la primera de muchas. Luego de que enviaste tu contribución, una de las siguientes situaciones puede ocurrir: 😭 No tienes una respuesta. Ojalá que hayas verificado el proyecto buscando signos de actividad antes de hacer cualquier contribución. Incluso en proyectos activos, de cualquier manera, es posible que tu contribución no tenga una respuesta. Si no tuviste una respuesta en más de una semana, es justo responder en el mismo hilo, preguntando a alguien por una revisión. Si conoces el nombre de la persona correcta para que revise tu contribución, puedes hacer una @-mención en ese hilo. No contactes a esa persona de manera privada; recuerda que las comunicaciones públicas son vitales para los proyectos de código abierto. Si haces una llamada educada y todavía nadie responde, es posible que nadie te responda jamás. No es un sentimiento agradable, pero no dejes que te desanime. ¡Les pasa a todos! Existen muchas razones posibles por las que no tuviste tu respuesta, incluyendo circunstancias personales que pueden estar fuera de control. Trata de encontrar otro proyecto u otra forma de contribuir. En todo caso, ésta es una buena razón para no invertir mucho tiempo en hacer contribuciones antes de ver que existen otros miembros en la comunidad que están comprometidos y responden. 🚧 Alguien pide cambios a tu colaboración. Es común que te pidan hacer cambios a tu contribución, ya sea una retroalimentación sobre el alcance de tu idea, o cambios en tu código. Cuando alguien te pide cambios, compórtate de manera sensible, se tomaron el tiempo necesario para revisar tu contribución. Abrir un pull request y luego alejarse es de malos modales. Si no sabes cómo hacer los cambios, investiga el problema, y luego pregunta por ayuda si la necesitas. Si no tienes el tiempo para volver a trabajar en ese problema (por ejemplo, si la conversación tuvo lugar durante meses, y tus circunstancias cambiaron), permite que el responsable lo sepa, de manera que no quede a la espera de una respuesta. Alguien puede sentirse complacido de hacerse cargo. 👎 Tu contribución no es aceptada. Al final tu contribución puede o no ser aceptada. Con suerte, no hayas necesitado poner demasiado esfuerzo en ella. Si no estás seguro de por qué no fue aceptada, es completamente razonable preguntar al responsable por retroalimentación y esclarecimiento. De cualquier manera, al final debes aceptar que se trata de su decisión. No discutas ni adoptes una postura hostil. ¡Siempre serás bienvenido a hacer un fork y trabajar en tu propia versión si no estás de acuerdo! 🎉 Tu contribución es aceptada. ¡Hurra! ¡Hiciste una contribución al código abierto exitosamente! ¡Lo hiciste! Si acabas de hacer tu primera contribución al código abierto, o si estás buscando nuevas formas de contribuir, esperamos que esté inspirado para continuar la acción. Si tu contribución no fue aceptada, no te olvides de dar las gracias cuando un responsable puso esfuerzo en ayudarte. El código abierto es llevado adelante por personas como tu: un problema, un pull request, un comentario o choca esos cinco por vez. Volver a todas las guías Guías relacionadas Comenzando un proyecto de Código Abierto Aprende más acerca del mundo del Código Abierto y prepárate a lanzar tu propio proyecto. Construyendo Comunidades de Bienvenida Construyendo una comunidad que anime a al gente a usar, contribuir y educar con su proyecto Scroll to Top Contribuir ¿Tienes alguna sugerencia? Este contenido es de código abierto. Ayúdanos a mejorarlo. Contribuir Suscribirse para novedades Sea el primero en enterarse de los últimos consejos y recursos de código abierto. Dirección de correo fine print con hecho por y amigos
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/get-list-of-tokens-owned-by-address
GET List of Tokens Owned by Address | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK GET List of Tokens Owned by Address On this page GET List of Tokens Owned by Address Get the list of Tokens owned by Address ​ The getTokenList() function allows you to get the list of tokens owned by a specific address. You can use this function to retrieve information such as the token name, symbol, and balance. The function returns a TokenList object that contains a list of Token objects, each of which represents a token owned by the specified address. Web Flutter const address = "ADDRESS" ; const tokenList = await fuseSDK . explorerModule . getTokenList ( address ) ; final String address = 'ADDRESS' ; final tokenListData = await fuseSDK . explorerModule . getTokenList ( address , ) ; tokenListData . pick ( onData : ( TokenList tokenList ) { // Do you magic here } , onError : ( err ) { // Handle errors } , ) ; Edit this page Previous Swap Tokens Next GET Historical Transactions Get the list of Tokens owned by Address Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/migration
Migration from Old Versions | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Migration from Old Versions On this page Migration guides Migrating to v0.2 ​ Introduction ​ Welcome to the updated version of the fuse_wallet_sdk . Our primary objective for this migration is to seamlessly align our services with the evolving landscape of EVM-based chains. We are thrilled to introduce the incorporation of the new standard, EIP 4337, commonly known as "Account Abstraction". This latest protocol promises to enhance security, provide more consistent developer experiences, and offer improved user interactions in Ethereum-based environments. Major Changes at a Glance : Seamless Smart Wallet Creation : Gone are the days where we required an API request to the Fuse APIs to craft a smart wallet. With the renewed fuse_wallet_sdk , initiation not only sets the SDK in motion but also seamlessly creates a smart wallet for the given owner. This elevates user experience, reduces developer friction, and augments transactional efficiency. As we navigate through the details of this migration, we hope to provide you with a clear roadmap, making the transition as straightforward as possible. Embracing the future of Ethereum-based chains has never been this effortless. Prerequisites ​ Before embarking on this migration journey with the new fuse_wallet_sdk , the process is made delightfully simple for our users. However, there's a minimal requirement you should be aware of: API Key : The only prerequisite to utilize the updated SDK is to have a valid API key. If you haven't create one yet or need a new one, don't fret! Simply head over to our Developer's Console at https://console.fuse.io/build and follow the straightforward steps to obtain your key. With your API key in hand, you're all set to integrate and experience the enhanced capabilities of the fuse_wallet_sdk . Detailed Migration Steps ​ Initialization and Smart Wallet Creation Locate the Old Initialization : Start by finding your old SDK initialization in your code. This is typically where you have the FuseWalletSDK instantiation. Remove Wallet Creation Steps : In the old SDK, there were multiple steps involved in creating a smart wallet, including authenticating the credentials, creating a wallet, and handling the creation events. These steps are now greatly simplified in the new SDK. Identify and remove the following sections from your old SDK code: The authentication step: await fuseWalletSDK.authenticate(credentials); The wallet creation step: await fuseWalletSDK.createWallet(); The entire onSmartWalletEvent function and its associated event listening code. Update SDK Initialization : Replace the old initialization: final FuseWalletSDK fuseWalletSDK = FuseWalletSDK ( apiKey ) ; with the new one: final fuseSDK = await FuseSDK . init ( apiKey , credentials ) ; Access the Smart Contract Wallet Address : In the new SDK, you can obtain the smart contract wallet address directly after initialization. Replace the older method: print ( 'Smart contract wallet address: ${ fuseWalletSDK . smartWallet . smartWalletAddress } ' ) ; with the simplified new version: print ( 'Smart contract wallet address: ${ fuseSDK . wallet . getSender ( ) } ' ) ; By following the steps above, developers can smoothly transition to the new SDK and take advantage of the more streamlined and simplified process provided by the update. It’s worth noting that the migration not only reduces the lines of code but also enhances clarity and reduces complexity, resulting in a more efficient and cleaner integration process. In summary, the new SDK code provides a more structured, modular, and extensive set of functions to interact with FuseBox. It allows for a broader range of operations, from basic token transfers to more complex operations like staking and swapping tokens. The design considerations (like separating modules) make the SDK more maintainable and scalable. Migrating to v0.1 ​ The new Smart Wallets SDK uses the same smart contract wallet architecture. Therefore, the migration to the SDK will be seamless for existing projects. We have already migrated all previously created wallets, but some breaking changes must be considered. Changes from Charge Wallet SDK to Smart Wallets SDK ​ Field name changes ​ The following field names have changed in Smart Wallets SDK: accountAddress field name has changed to ownerAddress and the new field contains a checksum value instead of an all-lowercase string. walletAddress field name has changed to smartWalletAddress Removed fields ​ The following fields were removed and do not exist in the smart wallet schema: backup balancesOnForeign apy Deprecated APIs ​ Job API was deprecated, and instead, an event-driven architecture was implemented. Therefore to check the status of relay jobs, developers now need to use the SDK events, which also improve the overall experience and performance of the SDK. Sign-up and Login APIs were deprecated, and Smart Wallets SDK no longer provides end-user authentication. If needed, developers must implement end-user authentication and map created Smart Wallets with their users’ accounts on their backend. Backup API was deprecated, and developers must implement a backup of private keys for their users if needed. Contacts API was deprecated and developers need to implement any contacts-related features in their apps. Migration ​ If you have an app that uses Charge Wallets SDK and you would like to migrate to the new Smart Wallets SDK and allow your users to access their existing wallets, all you have to do is to get your users to recover their wallets by importing their credentials they had in the old version to the new version. The Smart Wallet SDK will return the same wallet as before with the recovered credentials. Here’s an example of how the migration would work for a wallet that was created in the old SDK to the new SDK: Create a wallet with the old SDK ​ import 'dart:convert' ; import 'dart:io' ; import 'package:charge_wallet_sdk/charge_wallet_sdk.dart' ; void main ( ) async { // Your public API key (<https://chargeweb3.com>) final String apiKey = 'API_KEY' ; // generate mnemonic String mnemonic = Web3 . generateMnemonic ( ) ; print ( 'mnemonic: $ mnemonic ' ) ; // get private key from mnemonic String privateKey = Web3 . privateKeyFromMnemonic ( mnemonic ) ; print ( 'privateKey: $ privateKey ' ) ; // init web3 module final Web3 web3 = Web3 ( ) ; // set web3 credentials with private key await web3 . setCredentials ( privateKey ) ; // get account address String accountAddress = await web3 . getAddress ( ) ; print ( 'account address: $ accountAddress ' ) ; // init api module ChargeApi chargeApi = ChargeApi ( apiKey ) ; // login print ( 'enter phone number and press ENTER' ) ; String phoneNumber = stdin . readLineSync ( encoding : Encoding . getByName ( 'utf-8' ) ! ) ! ; await chargeApi . loginWithSMS ( phoneNumber ) ; // verify print ( 'enter sms verification code and press ENTER' ) ; String verificationCode = stdin . readLineSync ( encoding : Encoding . getByName ( 'utf-8' ) ! ) ! ; String jwtToken = await chargeApi . verifySMS ( verificationCode , phoneNumber , accountAddress , ) ; print ( 'jwtToken: $ jwtToken ' ) ; // create wallet Map < String , dynamic > response = await chargeApi . createWallet ( ) ; Map < String , dynamic > walletData ; if ( ! response . containsKey ( 'job' ) ) { print ( 'Wallet already created for $ accountAddress ' ) ; walletData = response ; } else { print ( 'Creating wallet for $ accountAddress ' ) ; final Map jobData = response [ 'job' ] [ 'data' ] ; walletData = Map < String , dynamic > . from ( { . . . jobData , 'networks' : [ 'fuse' ] , } ) ; } final WalletModules walletModules = WalletModules . fromJson ( walletData [ 'walletModules' ] , ) ; // Initiate wallet modules web3 . setModules ( walletModules ) ; // get wallet dynamic wallet = await chargeApi . getWallet ( ) ; print ( 'wallet: $ wallet ' ) ; String walletAddress = wallet [ "walletAddress" ] ; print ( 'walletAddress: $ walletAddress ' ) ; } Fetching a wallet that was already created with Smart Wallets SDK ​ The following code example shows how to either fetch an existing wallet for the authenticated user if one exists or create a new one if it does not. import 'dart:convert' ; import 'dart:io' ; import 'package:fuse/fuse_wallet_sdk.dart' ; void main ( ) async { // Create a project: https://chargeweb3.com final String apiKey = 'YOUR_PUBLIC_API_KEY' ; print ( 'Enter privateKey:' ) ; String privateKey = stdin . readLineSync ( encoding : Encoding . getByName ( 'utf-8' ) ! ) ! ; final EthPrivateKey credentials = EthPrivateKey . fromHex ( privateKey ) ; print ( 'privateKey: $ privateKey ' ) ; print ( 'address: ${ credentials . address . hexEip55 } ' ) ; // Initialize FuseWalletSDK final FuseWalletSDK fuseWalletSDK = FuseWalletSDK ( apiKey ) ; final DC < Exception , String > authRes = await fuseWalletSDK . authenticate ( credentials , ) ; if ( authRes . hasError ) { print ( "Error occurred in authenticate" ) ; print ( authRes . error ) ; } else { final walletData = await fuseWalletSDK . fetchWallet ( ) ; walletData . pick ( onData : ( SmartWallet smartWallet ) { print ( 'Smart Wallet fetched successfully: ${ smartWallet . toString ( ) } ' ) } , onError : ( Exception exception ) async { print ( 'Failed to fetch' ) ; print ( 'Trying to create...' ) ; // Create wallet subscriptions fuseWalletSDK . on ( 'smartWalletCreationStarted' , ( eventData ) { print ( 'smartWalletCreationStarted ${ eventData . toString ( ) } ' ) ; } ) ; fuseWalletSDK . on ( 'transactionHash' , ( eventData ) { print ( 'transactionHash ${ eventData . toString ( ) } ' ) ; } ) ; fuseWalletSDK . on ( 'smartWalletCreationSucceeded' , ( eventData ) { print ( 'smartWalletCreationSucceeded ${ eventData . toString ( ) } ' ) ; exit ( 1 ) ; } ) ; fuseWalletSDK . on ( 'smartWalletCreationFailed' , ( eventData ) { print ( 'smartWalletCreationFailed ${ eventData . toString ( ) } ' ) ; exit ( 1 ) ; } ) ; // Create Wallet await fuseWalletSDK . createWallet ( ) ; } , ) ; } } Edit this page Previous Sponsored Transactions Next Limitations Migrating to v0.2 Introduction Prerequisites Detailed Migration Steps Migrating to v0.1 Changes from Charge Wallet SDK to Smart Wallets SDK Field name changes Removed fields Deprecated APIs Migration Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/managed-dns-services-software?trk=organization_guest_products_modal_category_link
Best Managed DNS Services Software | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Information Technology Manager (5) Domain Manager (3) Chief Technology Officer (2) Director of Information Technology (2) Cyber Security Engineer (2) See all products Find top products in Managed DNS Services Software category Software used to manage Domain Name Systems (DNS) traffic through specified protocols. - Generate traffic analysis, usage analytics, and other DNS log data - Authenticate visitors via SMTP Authentication and prevent failover via DNS Failover - Facilitate intelligent traffic routing (i.e. geolocation and policy) using GeoDNS 67 results Cisco Umbrella Secure Web Gateways by Cisco Cisco Umbrella is cloud-delivered enterprise network security which provides users with a first line of defense against cyber security threats. View product Akamai Edge DNS Managed DNS Services Software by Akamai Technologies Akamai Edge DNS is a robust, reliable, and scalable enhanced DNS web security solution to dependably direct end users to your applications & websites. View product Cloudflare DNS Managed DNS Services Software by Cloudflare DNS is a mission-critical component for any online business. Yet this component is often overlooked and forgotten, until something breaks. Cloudflare DNS is an enterprise-grade authoritative DNS service that offers the fastest response time, unparalleled redundancy, and advanced security with built-in DDoS mitigation and DNSSEC. View product Cloudflare Registrar Managed DNS Services Software by Cloudflare Finally, a domain registrar you can love. Cloudflare Registrar securely registers and manages your domain names with transparent, no-markup pricing that eliminates surprise renewal fees and hidden add-on charges. You pay what we pay — you won’t find a better value. View product Infoblox Core Network Services Managed DNS Services Software by Infoblox Automate and consolidate core network services, including DNS, DHCP, and IP Address Management. As your network evolves to support rapidly multiplying applications and devices, your core network services need to scale with minimal management overhead. View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights Advanced DNS Protection Managed DNS Services Software by Infoblox Distributed denial of service (DDoS) and other external and internal DNS-based threats can flood your DNS server with malicious requests, bringing down your network. With Infoblox Advanced DNS Protection, you can comprehensively defend your DNS server from DNS attacks. View product DNSi Big Data Connector Managed DNS Services Software by Akamai Technologies DNS resolution data provides a subscriber and content-centric view of network activity. View product DNSi AuthServe Managed DNS Services Software by Akamai Technologies Akamai DNSi AuthServe is an authoritative DNS server that enables highly resilient, secure, always-on name services. View product DNS Blast Managed DNS Services Software by EfficientIP Our hardened DNS Blast security appliance combines the world’s fastest cache & advanced built-in security to intelligently provide DDoS attack protection. View product DNS Cloud Managed DNS Services Software by EfficientIP DNS Cloud from EfficientIP offers a unique solution to extend in just a few minutes and easily manage your public and private DNS services on AWS Route 53 and Microsoft Azure DNS, global network, providing unique benefits in securing your online business availability and maximizing its performance View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://eips.ethereum.org/EIPS/eip-4337
ERC-4337: Account Abstraction Using Alt Mempool Ethereum Improvement Proposals All Core Networking Interface ERC Meta Informational Alert Source Discuss ⚠️ Review Standards Track: ERC ERC-4337: Account Abstraction Using Alt Mempool Account abstraction without consensus-layer protocol changes, instead relying on higher-layer infrastructure. Authors Vitalik Buterin ( @vbuterin ), Yoav Weiss ( @yoavw ), Dror Tirosh ( @drortirosh ), Shahaf Nacson ( @shahafn ), Alex Forshtat ( @forshtat ), Kristof Gazso ( @kristofgazso ), Tjaden Hess ( @tjade273 ) Created 2021-09-29 Requires EIP-712 This EIP is in the process of being peer-reviewed. If you are interested in this EIP, please participate using this discussion link. Table of Contents Abstract Motivation Specification Definitions The UserOperation structure EntryPoint interface Smart Contract Account Interface Semi-abstracted Nonce Support Required EntryPoint contract functionality JSON-RPC API for ERC-4337 Support for EIP-712 signatures Support for EIP-7702 authorizations Extension: paymasters Bundler behavior upon receiving a UserOperation UserOperation Simulation Estimating preVerificationGas Alternative Mempools Bundling Error codes. Rationale Validation Rules Rationale Reputation Rationale Paymasters First-time Smart Contract Account creation Backwards Compatibility Security Considerations Factory contracts Paymasters contracts Aggregator contracts EIP-7702 delegated Smart Contract Accounts Smart Contract Accounts Transient Storage Copyright Abstract An account abstraction proposal which completely avoids the need for consensus-layer protocol changes. Instead of adding new protocol features and changing the bottom-layer transaction type, this proposal instead introduces a higher-layer pseudo-transaction object called a UserOperation . Users send UserOperation objects into a separate mempool. A special class of actor called bundlers package up a set of these objects into a transaction making a handleOps call to a special contract, and that transaction then gets included in a block. Motivation Historically, introducing Account Abstraction has been a long-standing goal of the Ethereum protocol. A number of proposals have been thoroughly discussed, but so far none of them have been implemented in the protocol. This proposal takes a different approach, avoiding any adjustments to the consensus layer. It seeks to achieve the following goals: Achieve the key goal of Account Abstraction : allow users to use Smart Contract Accounts containing arbitrary verification logic instead of EOAs as their primary account. Completely remove any need at all for users to also have EOAs, as required by both status quo Smart Contract Accounts and EIP-7702 . Decentralization Allow any bundler (think: block builder) to participate in the process of including account-abstracted UserOperations Work with all activity happening over a public mempool; users do not need to know the direct communication addresses (eg. IP, onion) of any specific actors Avoid trust assumptions on bundlers Do not require any Ethereum consensus changes : Ethereum consensus layer development is focusing on scalability-oriented features, and there may not be any opportunity for further protocol changes for a long time. Hence, to increase the chance of faster adoption, this proposal avoids Ethereum consensus changes. Support other use cases Privacy-preserving applications Atomic multi-operations (similar goal to EIP-7702 ) Pay tx fees with ERC-20 tokens, allow developers to pay fees for their users, and EIP-7702 -like sponsored transaction use cases more generally abstracting the validation allows the contract to use different signature schemes, multisig configuration, custom recovery, and more. abstracting gas payments allows easy onboarding by 3rd party payments, paying with tokens, cross-chain gas payments abstracting execution allows bundled transactions Specification Definitions UserOperation - a structure that describes a transaction to be sent on behalf of a user. To avoid confusion, it is not named “transaction”. Like a transaction, it contains to , calldata , maxFeePerGas , maxPriorityFeePerGas , nonce , signature . Unlike a transaction, it contains several other fields, described below. Notably, the signature field usage is not defined by the protocol, but by the Smart Contract Account implementation. Sender - the Smart Contract Account sending a UserOperation . EntryPoint - a singleton contract to execute bundles of UserOperations . Bundlers should whitelist the supported EntryPoint . Bundler - a node (block builder) that can handle UserOperations , create a valid entryPoint.handleOps() transaction, and add it to the block while it is still valid. This can be achieved by a number of ways: Bundler can act as a block builder itself. If the bundler is not a block builder, it should work with the block builder through an infrastructure such as mev-boost , or any other kind of proposer-builder separation. Paymaster - a helper contract that agrees to pay for the transaction, instead of the sender itself. Factory - a helper contract that performs a deployment for a new sender contract if necessary. Aggregator - also known as “authorizer contract” - a contract that enables multiple UserOperations to share a single validation. The full design of such contracts is outside the scope of this proposal. Canonical UserOperation mempool - a decentralized permissionless P2P network where bundlers exchange UserOperations that are valid and conform with the same shared set of rules applied to the validation code. The full specification of such rules is outside the scope of this proposal. Alternative UserOperation mempool - any other P2P mempool where the validity of UserOperations is determined by rules that are different from the shared set of rules, applied to the validation code, in any way. Deposit - an amount of Ether (or any L2 native currency) that a Sender or Paymaster contract has transferred to the EntryPoint contract intended to pay gas costs of the future UserOperations . The UserOperation structure To avoid Ethereum consensus changes, we do not attempt to create new transaction types for account-abstracted transactions. Instead, users package up the action they want their Smart Contract Account to take in a struct named UserOperation : Field Type Description sender address The Account making the UserOperation nonce uint256 Anti-replay parameter (see “Semi-abstracted Nonce Support” ) factory address Account Factory for new Accounts OR 0x7702 flag for EIP-7702 Accounts, otherwise address(0) factoryData bytes data for the Account Factory if factory is provided OR EIP-7702 initialization data, or empty array callData bytes The data to pass to the sender during the main execution call callGasLimit uint256 The amount of gas to allocate the main execution call verificationGasLimit uint256 The amount of gas to allocate for the verification step preVerificationGas uint256 Extra gas to pay the bundler maxFeePerGas uint256 Maximum fee per gas (similar to EIP-1559 max_fee_per_gas ) maxPriorityFeePerGas uint256 Maximum priority fee per gas (similar to EIP-1559 max_priority_fee_per_gas ) paymaster address Address of paymaster contract, (or empty, if the sender pays for gas by itself) paymasterVerificationGasLimit uint256 The amount of gas to allocate for the paymaster validation code (only if paymaster exists) paymasterPostOpGasLimit uint256 The amount of gas to allocate for the paymaster post-operation code (only if paymaster exists) paymasterData bytes Data for paymaster (only if paymaster exists) signature bytes Data passed into the sender to verify authorization Users send UserOperation objects to a dedicated UserOperation mempool. To prevent replay attacks, either cross-chain or with multiple EntryPoint contract versions, the signature MUST depend on chainid and the EntryPoint address. Note that one EIP-7702 “authorization tuple” value can be provided alongside the UserOperation struct, but “authorization tuples” are not included in the UserOperation itself. EntryPoint interface When passed on-chain, to the EntryPoint contract, the Account and the Paymaster , a “packed” version of the above structure called PackedUserOperation is used: Field Type Description sender address   nonce uint256   initCode bytes concatenation of factory address and factoryData (or empty), or EIP-7702 data callData bytes   accountGasLimits bytes32 concatenation of verificationGasLimit (16 bytes) and callGasLimit (16 bytes) preVerificationGas uint256   gasFees bytes32 concatenation of maxPriorityFeePerGas (16 bytes) and maxFeePerGas (16 bytes) paymasterAndData bytes concatenation of paymaster fields (or empty) signature bytes   The core interface of the EntryPoint contract is as follows: function handleOps ( PackedUserOperation [] calldata ops , address payable beneficiary ); The beneficiary is the address that will be paid with all the gas fees collected during the execution of the bundle. Smart Contract Account Interface The core interface required for the Smart Contract Account to have is: interface IAccount { function validateUserOp ( PackedUserOperation calldata userOp , bytes32 userOpHash , uint256 missingAccountFunds ) external returns ( uint256 validationData ); } The userOpHash is a hash over the userOp (except signature ), entryPoint and chainId . The Smart Contract Account: MUST validate the caller is a trusted EntryPoint MUST validate that the signature is a valid signature of the userOpHash , and SHOULD return SIG_VALIDATION_FAILED ( 1 ) without reverting on signature mismatch. Any other error MUST revert. SHOULD not return early when returning SIG_VALIDATION_FAILED ( 1 ). Instead, it SHOULD complete the normal flow to enable performing a gas estimation for the validation function. MUST pay the EntryPoint (caller) at least the missingAccountFunds (which might be zero, in case the current sender ’s deposit is sufficient) The sender MAY pay more than this minimum to cover future transactions. It can also call withdrawTo to retrieve it later at any time. The return value MUST be packed of aggregator / authorizer , validUntil and validAfter timestamps. aggregator / authorizer - 0 for valid signature, 1 to mark signature failure. Otherwise, an address of an aggregator / authorizer contract. validUntil is 6-byte timestamp value, or zero for “infinite”. The UserOperation is valid only up to this time. validAfter is 6-byte timestamp. The UserOperation is valid only after this time. In order to specify a validity range using block numbers, both the validUntil and validAfter need to set their highest bit to 1. Note: The validity range can be expressed by two block timestamps or two block numbers, but one timestamp and one block number cannot be mixed in the same UserOperation’s validity range. The Smart Contract Account MAY implement the interface IAccountExecute interface IAccountExecute { function executeUserOp ( PackedUserOperation calldata userOp , bytes32 userOpHash ) external ; } This method will be called by the EntryPoint with the current UserOperation, instead of executing the callData itself directly on the sender . Semi-abstracted Nonce Support In Ethereum protocol, the sequential transaction nonce value is used as a replay protection method as well as to determine the valid order of transaction being included in blocks. It also contributes to the transaction hash uniqueness, as a transaction by the same sender with the same nonce may not be included in the chain twice. However, requiring a single sequential nonce value is limiting to the senders’ ability to define their custom logic with regard to transaction ordering and replay protection. Instead of sequential nonce we implement a nonce mechanism that uses a single uint256 nonce value in the UserOperation , but treats it as two values: 192-bit “key” 64-bit “sequence” These values are represented on-chain in the EntryPoint contract. We define the following method in the EntryPoint interface to expose these values: function getNonce ( address sender , uint192 key ) external view returns ( uint256 nonce ); For each key the sequence is validated by the EntryPoint for each UserOperation. If the nonce validation fails the UserOperation is considered invalid and the bundle is reverted. The sequence value is incremented sequentially and monotonically for the sender for each UserOperation. A new key can be introduced with an arbitrary value at any point, with its sequence starting at 0 . This approach maintains the guarantee of UserOperation hash uniqueness on-chain on the protocol level while allowing Accounts to implement any custom logic they may need operating on a 192-bit “key” field, while fitting the 32 byte word. Reading and validating the nonce When preparing the UserOperation bundlers may make a view call to this method to determine a valid value for the nonce field. Bundler’s validation of a UserOperation SHOULD start with getNonce to ensure the transaction has a valid nonce field. If the bundler is willing to accept multiple UserOperations by the same sender into their mempool, this bundler is supposed to track the key and sequence pair of the UserOperations already added in the mempool. Usage examples Classic sequential nonce. In order to require the Account to have classic, sequential nonce, the validation function MUST perform: require ( userOp . nonce < type ( uint64 ). max ) Ordered administrative events In some cases, an account may need to have an “administrative” channel of operations running in parallel to normal operations. In this case, the account may use a specific key when calling methods on the account itself: bytes4 sig = bytes4 ( userOp . callData [ 0 : 4 ]); uint key = userOp . nonce >> 64 ; if ( sig == ADMIN_METHODSIG ) { require ( key == ADMIN_KEY , "wrong nonce-key for admin operation" ); } else { require ( key == 0 , "wrong nonce-key for normal operation" ); } Required EntryPoint contract functionality The EntryPoint method is handleOps , which handles an array of UserOperations The EntryPoint ’s handleOps function must perform the following steps (we first describe the simpler non-paymaster case). It must make two loops, the verification loop and the execution loop . In the verification loop, the handleOps call must perform the following steps for each UserOperation : Create the sender Smart Contract Account if it does not yet exist , using the initcode provided in the UserOperation . If the factory address is “0x7702”, then the sender MUST be an EOA with an EIP-7702 authorization designation. The EntryPoint validates the authorized address matches the one specified in the UserOperation signature (see Support for [EIP-7702] authorizations ). If the sender does not exist, and the initcode is empty, or does not deploy a contract at the “sender” address, the call must fail. WARNING : If the sender does exist, and the initcode is not empty, then the initcode is ignored. calculate the maximum possible fee the sender needs to pay based on validation and call gas limits, and current gas values. calculate the fee the sender must add to its “deposit” in the EntryPoint Call validateUserOp on the sender contract , passing in the UserOperation , its hash and the required fee. The Smart Contract Account MUST verify the UserOperation ’s signature parameter, and pay the fee if the sender considers the UserOperation valid. If any validateUserOp call fails, handleOps must skip execution of at least that UserOperation , and may revert entirely. Validate the account’s deposit in the EntryPoint is high enough to cover the max possible cost (cover the already-done verification and max execution gas) In the execution loop, the handleOps call must perform the following steps for each UserOperation : Call the account with the UserOperation ’s calldata . It’s up to the account to choose how to parse the calldata; an expected workflow is for the account to have an execute function that parses the remaining calldata as a series of one or more calls that the account should make. If the calldata starts with the methodsig IAccountExecute.executeUserOp , then the EntryPoint must build a calldata by encoding executeUserOp(userOp,userOpHash) and call the account using that calldata. After the call, refund the account’s deposit with the excess gas cost that was pre-charged. A penalty of 10% ( UNUSED_GAS_PENALTY_PERCENT ) is applied on the amounts of callGasLimit and paymasterPostOpGasLimit gas that remains unused . This penalty is only applied if the amount of the remaining unused gas is greater than or equal 40000 ( PENALTY_GAS_THRESHOLD ). This penalty is necessary to prevent the UserOperations from reserving large parts of the gas space in the bundle but leaving it unused and preventing the bundler from including other UserOperations . After the execution of all calls, pay the collected fees from all UserOperations to the beneficiary address provided by the bundler. Before accepting a UserOperation , bundlers SHOULD use an RPC method to locally call the handleOps function on the EntryPoint , to verify that the signature is correct and the UserOperation actually pays fees; see the Simulation section below for details. A node/bundler MUST reject a UserOperation that fails the validation, meaning not adding it to the local mempool and not propagating it to other peers. JSON-RPC API for ERC-4337 In order to support sending UserOperation objects to bundlers, which in turn propagate them through the P2P mempool, we introduce a set of JSON-RPC APIs including eth_sendUserOperation and eth_getUserOperationReceipt . The full definition of the new JSON-RPC API is outside the scope of this proposal. Support for EIP-712 signatures The userOpHash is calculated as an [EIP-712] typed message hash with the following parameters: bytes32 constant TYPE_HASH = keccak256 ( "EIP712Domain(string name,string version,uint256 chainId,address verifyingContract)" ); bytes32 constant PACKED_USEROP_TYPEHASH = keccak256 ( "PackedUserOperation(address sender,uint256 nonce,bytes initCode,bytes callData,bytes32 accountGasLimits,uint256 preVerificationGas,bytes32 gasFees,bytes paymasterAndData)" ); Support for EIP-7702 authorizations On networks with EIP-7702 enabled, the eth_sendUserOperation method accepts an extra eip7702Auth parameter. If this parameter is set, it MUST be a valid EIP-7702 authorization tuple, and signed by the sender address. The bundler MUST add all required eip7702Auth of all UserOperations in a bundle to the authorizationList and execute the bundle using a transaction type SET_CODE_TX_TYPE . Additionally, the UserOperation hash calculation is updated to include the desired EIP-7702 delegation address. If the initCode field starts with 0x7702 right-padded with 18 zeros, and this account was deployed using an EIP-7702 transaction, then the hash is calculated as follows: For the purpose of hash calculation, the first 20 bytes of the initCode field of the UserOperation are set to account’s EIP-7702 delegate address (fetched with EXTCODECOPY) The initCode is not used to call a factory contract. If the initCode is longer than 20 bytes, then the rest of the initCode is used to call an initialization function in the account itself. Note that a UserOperation may still be executed without such initCode . In this case the EntryPoint doesn’t hash the current EIP-7702 delegate , and can be potentially executed against a modified account. Additionally, EIP-7702 defines the gas cost of executing an authorization equal to PER_EMPTY_ACCOUNT_COST = 25000 . This gas consumption is not observable on-chain by the EntryPoint contract and MUST be included in the preVerificationGas value. Extension: paymasters We extend the EntryPoint logic to support paymasters that can sponsor transactions for other users. This feature can be used to allow application developers to subsidize fees for their users, allow users to pay fees with [ERC-20] tokens and many other use cases. When the paymasterAndData field in the UserOperation is not empty, the EntryPoint implements a different flow for that UserOperation: During the verification loop, in addition to calling validateUserOp , the handleOps execution also must check that the paymaster has enough ETH deposited with the EntryPoint to pay for the UserOperation , and then call validatePaymasterUserOp on the paymaster to verify that the paymaster is willing to pay for the UserOperation . Note that in this case, the validateUserOp is called with a missingAccountFunds of 0 to reflect that the account’s deposit is not used for payment for this UserOperation . If the paymaster’s validatePaymasterUserOp returns a non-empty context byte array, then handleOps must call postOp on the paymaster after making the main execution call. Otherwise, no call is done to the postOp function. Maliciously crafted paymasters could pose a risk of a DoS attack against the system and bundlers should take steps to mitigate it. As a mitigation, bundlers should use a reputation system for contracts they serve, and the paymaster must either limit its storage usage, or deposit a stake in a reputation system. Full specification of a reputation system is outside the scope of this proposal. The paymasterAndData field encoding and paymasterSignature The paymasterAndData field is a byte array that contains a non-standard encoding of the following fields: paymasterAddress - 20 bytes — the address of the paymaster contract paymasterVerificationGasLimit - 16 bytes - the gas limit for the verification function postOpGasLimit - 16 bytes - the gas limit for the postOp function paymasterData - the data that the paymaster contract will receive in the validatePaymasterUserOp call The following data can optionally be appended to the paymasterAndData field: paymasterSignature - the “signature” value byte array to be checked by the paymaster contract; this value can be provided without affecting the UserOperation hash paymasterSignatureLength - 2 bytes - the exact length of the paymasterSignature parameter byte array PAYMASTER_SIG_MAGIC ( 0x22e325a297439656 ) - the magic value that is appended to indicate the use of the paymasterSignature feature by the UserOperation Note that as both the signature and the paymasterSignature fields do not affect the UserOperation hash, the signing by the Sender and the Paymaster can be performed in parallel. The paymaster interface is as follows: function validatePaymasterUserOp ( PackedUserOperation calldata userOp , bytes32 userOpHash , uint256 maxCost ) external returns ( bytes memory context , uint256 validationData ); function postOp ( PostOpMode mode , bytes calldata context , uint256 actualGasCost , uint256 actualUserOpFeePerGas ) external ; enum PostOpMode { opSucceeded , // UserOperation succeeded opReverted // UserOperation reverted. paymaster still has to pay for gas. } The EntryPoint must implement the following API to let entities like paymasters have a stake, and thus have more flexibility in their storage access. // add a stake to the calling entity function addStake ( uint32 _unstakeDelaySec ) external payable ; // unlock the stake (must wait unstakeDelay before can withdraw) function unlockStake () external ; // withdraw the unlocked stake function withdrawStake ( address payable withdrawAddress ) external ; The paymaster must also have a deposit, which the EntryPoint will charge UserOperation costs from. The deposit (for paying gas fees) is separate from the stake (which is locked). The EntryPoint must implement the following interface to allow Paymasters (and optionally Accounts) to manage their deposit: // return the deposit of an account function balanceOf ( address account ) public view returns ( uint256 ); // add to the deposit of the given account function depositTo ( address account ) public payable ; // add to the deposit of the calling account receive () external payable ; // withdraw from the deposit of the current account function withdrawTo ( address payable withdrawAddress , uint256 withdrawAmount ) external ; // get the currently executing UserOperation hash, or 0 if not called during the execution function getCurrentUserOpHash () public view returns ( bytes32 ); Bundler behavior upon receiving a UserOperation Similar to an Ethereum transaction, the offchain flow of a UserOperation can be described as follows: Client sends a UserOperation to the bundler through an RPC call eth_sendUserOperation . Before including the UserOperation in the mempool, the bundler runs the first validation of the newly received UserOperation. If the UserOperation fails validation, the bundler drops it and returns an error in response to eth_sendUserOperation . Later, once building a bundle, the bundler takes UserOperations from the mempool and runs the second validation of a single UserOperation on each of them. If it succeeds, it is scheduled for inclusion in the next bundle, and dropped otherwise. Before submitting the new bundle onchain, the bundler performs the third validation of the entire UserOperations bundle. If any of the UserOperations fail validation, the bundler drops them. The bundler should keep track of the peers’ reputation. The full design of such a reputation system is outside the scope of this proposal. When a bundler receives a UserOperation , it must first run some basic sanity checks, namely that: Either the sender is an existing contract, or the initCode is not empty (but not both) If initCode is not empty, parse its first 20 bytes as a factory address or an EIP-7702 flag. Record whether the factory is staked, in case the later simulation indicates that it needs to be. If the factory accesses the global state, it must be staked. The verificationGasLimit and paymasterVerificationGasLimits are lower than MAX_VERIFICATION_GAS ( 500000 ) and the preVerificationGas is high enough to pay for the calldata gas cost of serializing the UserOperation plus PRE_VERIFICATION_OVERHEAD_GAS ( 50000 ). The paymasterAndData is either empty, or starts with the paymaster address, which is a contract that (i) currently has nonempty code on chain, (ii) has a sufficient deposit to pay for the UserOperation, and (iii) is not currently banned. During simulation, the paymaster’s stake is also checked, depending on its storage usage. The callGasLimit is at least the cost of a CALL with non-zero value. The maxFeePerGas and maxPriorityFeePerGas are above a configurable minimum value that the bundler is willing to accept. At the minimum, they are sufficiently high to be included with the upcoming block.basefee . The sender doesn’t have another UserOperation already present in the mempool (or it replaces an existing entry with the same sender and nonce, with a higher maxPriorityFeePerGas and an equally increased maxFeePerGas ). Only one UserOperation per sender may be included in a single bundle. A sender is exempt from this rule and may have multiple UserOperations in the mempool and in a bundle if it is staked. UserOperation Simulation We define UserOperation simulation, as the offchain view call (or trace call) to the EntryPoint contract with the UserOperation , and the enforcement of the shared set of rules applied to the validation code, as part of the UserOperation validation. Simulation Rationale To validate a normal Ethereum transaction tx , the bundler performs static checks, like: ecrecover(tx.v, tx.r, tx.s) has to return a valid EOA tx.nonce has to be the current nonce of the recovered EOA balance of the recovered EOA has to be sufficient to pay for the transaction tx.gasLimit has to be sufficient to cover the intrinsic gas cost of a transaction chainId has to match the current chain All of these checks do not rely on EVM state, and cannot be affected by other Accounts’ transactions. In contrast, UserOperation validation rely on EVM state (calls to validateUserOp , validatePaymasterUserOp ), can be changed by other UserOperations (or normal Ethereum transactions). Therefore, we introduce simulation as a new mechanism to check its validity. Intuitively, the aim of the simulation is to ensure the onchain validation code of a UserOperation is sandboxed, isolated from other UserOperations in the same bundle. Simulation Specification: To simulate a UserOperation validation, the bundler makes a view call to the handleOps() method with the UserOperation to check. Simulation should run only on the validation section of the sender and paymaster , and is not required for the UserOperation ’s execution. A bundler MAY add second “always failed” UserOperation to the bundle, so that the simulation will end as soon as the first UserOperation’s validation complete. The bundler MUST drop the UserOperation if the simulation reverts The simulated call performs the full validation, by calling: If initCode is present, create the sender Account. account.validateUserOp . if specified a paymaster: paymaster.validatePaymasterUserOp . Either sender or paymaster may return a time-range ( validAfter / validUntil ). The UserOperation MUST be valid at the current time to be considered valid, defined as validAfter<=block.timestamp . A bundler MUST drop a UserOperation if it expires too soon and is likely to become invalid before the next block. To decode the returned time-ranges, the bundler MUST run the validation using tracing, to decode the return value from the validateUserOp and validatePaymasterUserOp methods. To prevent DoS attacks on bundlers, they must make sure the validation methods above pass the validation rules, which constrain their usage of opcodes and storage. The full design of such a shared set of rules, applied to the validation code, is outside the scope of this proposal. Estimating preVerificationGas This document does not specify a canonical way to estimate this value, as it depends on non-permanent network properties such as operation and data gas pricing and the expected bundle size. However, the requirement is for the estimated value to be sufficient to cover the following costs: Base bundle transaction cost. On Ethereum, 21000 gas divided by the number of UserOperations . The calldata gas cost related to the UserOperation as defined in EIP-2028 . Static EntryPoint contract code execution. Static memory cost when loading the fixed size fields of the UserOperation into EVM memory Memory cost (including expansion cost) due to context returned by paymaster validatePaymasterUserOp function, if relevant. External call to the innerHandleOp() function which is a major part of the EntryPoint implementation. Note that this value is not static and depends on the UserOperation ’s position in the bundle. [EIP-7702] authorization cost, if any. EIP-7623 calldata floor price increase is estimated as follows: Apply the new formula for tx.gasUsed , replacing the execution_gas_used value with an estimate for value made for this UserOperation. The estimate is calculated as a sum of all verification gas used during simulation (account creation, validation and paymaster validation) and 10% of the sum of execution and postOp gas limit. The bundler MUST require a slack in PreVerificationGas value, to accommodate memory expansion costs in the future bundle, and the expected position of the UserOperation in it. Alternative Mempools The simulation rules above are strict and prevent the ability of paymasters to grief the system. However, there might be use cases where specific paymasters can be validated (through manual auditing) and verified that they cannot cause any problem, while still require relaxing of the opcode rules. A bundler cannot simply “whitelist” a request from a specific paymaster: if that paymaster is not accepted by all bundlers, then its support will be sporadic at best. Instead, we introduce the term “alternate mempool”: a modified validation rules, and procedure of propagating them to other bundlers. The procedure of using alternate mempools is outside the scope of this proposal. Bundling Bundling is the process where a node/bundler collects multiple UserOperations and creates a single transaction to submit on-chain. During bundling, the bundler MUST: Exclude UserOperations that access any sender address of another UserOperation in the same bundle. Exclude UserOperations that access any address created by another UserOperation validation in the same bundle (via a factory). For each paymaster used in the bundle, keep track of the balance while adding UserOperations . Ensure that it has sufficient deposit to pay for all the UserOperations that use it. After creating the bundle, before including the transaction in a block, the bundler SHOULD: Run debug_traceCall with maximum possible gas, to enforce the validation rules on opcode and storage access, as well as to verify the entire handleOps bundle transaction, and use the consumed gas for the actual transaction execution. If the call reverted, the bundler MUST use the trace result to find the entity that reverted the call. This is the last entity that is CALL’ed by the EntryPoint prior to the revert. (the bundler cannot assume the revert is FailedOp ) If any verification context rule was violated the bundlers MUST treat it the same as if this UserOperation reverted. Remove the offending UserOperation from the current bundle and from mempool. If the error is caused by a factory or a paymaster , and the sender of the UserOperation is not a staked entity, then issue a “ban” for the guilty factory or paymaster. If the error is caused by a factory or a paymaster , and the sender of the UserOperation is a staked entity, do not ban the factory / paymaster from the mempool. Instead, issue a “ban” for the staked sender entity. Repeat until debug_traceCall succeeds. As staked entries may use some kind of transient storage to communicate data between UserOperations in the same bundle, it is critical that the exact same opcode and precompile banning rules as well as storage access rules are enforced for the handleOps validation in its entirety as for individual UserOperations . Otherwise, attackers may be able to use the banned opcodes to detect running on-chain and trigger a FailedOp revert. When a bundler includes a bundle in a block it must ensure that earlier transactions in the block don’t make any UserOperation fail. Error codes. While performing validation, the EntryPoint must revert on failures. During simulation, the calling bundler MUST be able to determine which entity ( sender , factory or paymaster ) caused the failure. The attribution of a revert to an entity is done using call-tracing: the last entity called by the EntryPoint prior to the revert is the entity that caused the revert. For diagnostic purposes, the EntryPoint must only revert with explicit SignatureValidationFailed() , FailedOp() or FailedOpWithRevert() errors. The message of the error starts with event code, AA## Event code starting with “AA1” signifies an error during sender creation Event code starting with “AA2” signifies an error during sender validation ( validateUserOp ) Event code starting with “AA3” signifies an error during paymaster validation ( validatePaymasterUserOp ) Rationale The main challenge with a purely “Smart Contract Accounts” based Account Abstraction system is DoS safety: how can a block builder including an operation make sure that it will actually pay fees, without having to first execute the entire operation? Requiring the block builder to execute the entire operation opens a DoS attack vector, as an attacker could easily send many operations that pretend to pay a fee but then revert at the last moment after a long execution. Similarly, to prevent attackers from cheaply clogging the mempool, nodes in the P2P network need to check if an operation will pay a fee before they are willing to forward it. The first step is a clean separation between validation (acceptance of UserOperation, and acceptance to pay) and execution. In this proposal, we expect Accounts to have a validateUserOp method that takes as input a UserOperation , verifies the signature and pays the fee. Only if this method returns successfully, the execution will happen. The EntryPoint -based approach allows for a clean separation between verification and execution, and keeps Smart Contract Accounts’ logic simple. It enforces the simple rule that only after validation is successful and the UserOperation can pay, the execution is done and only done once, and also guarantees the fee payment. Validation Rules Rationale The next step is protecting the bundlers from denial-of-service attacks by a mass number of UserOperations that appear to be valid (and pay) but that eventually revert, and thus block the bundler from processing valid UserOperations . There are two types of UserOperations that can fail validation: UserOperations that succeed in initial validation (and accepted into the mempool), but rely on the environment state to fail later when attempting to include them in a block. UserOperations that are valid when checked independently but fail when bundled together to be put on-chain. To prevent such rogue UserOperations , the bundler is required to follow a set of shared set of rules applied to the validation code, to prevent such denial-of-service attacks. Reputation Rationale UserOperation’s storage access rules prevent them from interfering with each other. But “global” entities - paymasters and factories are accessed by multiple UserOperations , and thus might invalidate multiple previously valid UserOperations . To prevent abuse, we throttle down (or completely ban for a period of time) an entity that causes invalidation of a large number of UserOperations in the mempool. To prevent such entities from “Sybil-attack”, we require them to stake with the system, and thus make such DoS attack very expensive. Note that this stake is never slashed. There is no slashing mechanism involved and the only use for the stake in sybil attack prevention. The stake can be withdrawn at any time after the specified unstake delay. Unstaked entities are allowed, under the rules below. When staked, an entity is less restricted in its use of contract storage. The stake value is not enforced on-chain, but specifically by each bundler while simulating a transaction. Paymasters Paymaster contracts allow the abstraction of gas: having a contract, that is not the sender of the transaction, to pay for the transaction fees. Paymaster architecture allows them to follow the model of “pre-charge, and later refund”. E.g. a token-paymaster may pre-charge the user with the max possible price of the transaction, and refund the user with the excess afterwards. First-time Smart Contract Account creation NOTE: for contracts using EIP-7702 this flow is described in Support for [EIP-7702] authorizations . It is an important design goal of this proposal to replicate the key property of EOAs that users do not need to perform some custom action or rely on an existing user to create their Smart Contract Account; they can simply generate an address locally and immediately start accepting funds. The Smart Contract Account creation itself is done by a “factory” contract, with some Account-specific data. The Factory is expected to use CREATE2 0xF5 (not CREATE 0xF0 ) to create the Account, so that the order of creation of the Accounts doesn’t interfere with the generated addresses. The initCode field (if non-zero length) is parsed as a 20-byte factory address, followed by calldata to pass to this address. This method call is expected to create the Account and return its address. If the factory does use CREATE2 0xF5 or some other deterministic method to create the Account, it’s expected to return the Account address even if it had already been created. This comes to make it easier for bundlers to query the address without knowing if the Account has already been deployed, by simulating a call to entryPoint.getSenderAddress() , which calls the factory under the hood. When initCode is specified, if either the sender address points to an existing contract or the sender address still does not exist after calling the initCode , then the operation is aborted. The initCode MUST NOT be called directly from the EntryPoint , but from another address. The contract created by this factory method MUST accept a call to validateUserOp to validate the UserOperation ’s signature. For security reasons, it is important that the generated contract address will depend on the initial signature. This way, even if someone can deploy an Account at that address, he can’t set different credentials to control it. The Factory has to be staked if it accesses global storage. NOTE: In order for the Wallet Application to determine the “counterfactual” address of the Account prior to its creation, it SHOULD make a static call to the entryPoint.getSenderAddress() Backwards Compatibility This ERC does not change the consensus layer, so there are no backwards compatibility issues for Ethereum as a whole. Unfortunately it is not easily compatible with pre- ERC-4337 Smart Contract Accounts, because those Accounts do not have a validateUserOp function. If the Smart Contract Account has a function for authorizing a trusted UserOperation submitter, then this could be fixed by creating an ERC-4337 compatible Account that re-implements the verification logic as a wrapper and setting it to be the original Account’s trusted UserOperation submitter. Security Considerations The EntryPoint contract will need to be audited and formally verified, because it will serve as a central trust point for all [ERC-4337]. In total, this architecture reduces auditing and formal verification load for the ecosystem, because the amount of work that individual accounts have to do becomes much smaller (they need only verify the validateUserOp function and its “check signature and pay fees” logic) and check that other functions are msg.sender == ENTRY_POINT gated (perhaps also allowing msg.sender == self ), but it is nevertheless the case that this is done precisely by concentrating security risk in the EntryPoint contract that needs to be verified to be very robust. Verification would need to cover two primary claims (not including claims needed to protect paymasters, and claims needed to establish p2p-level DoS resistance): Safety against arbitrary hijacking : The EntryPoint only calls to the sender with userOp.calldata and only if validateUserOp to that specific sender has passed. Safety against fee draining : If the EntryPoint calls validateUserOp and passes, it also must make the generic call with calldata equal to userOp.calldata Factory contracts All factory contracts MUST check that all calls to the createAccount() function originate from the entryPoint.senderCreator() address. Paymasters contracts All paymaster contracts MUST check that all calls to the validatePaymasterUserOp() and postOp() functions originate from the EntryPoint . Aggregator contracts All aggregator contracts MUST check that all calls to the validateSignatures() function originates from the EntryPoint . EIP-7702 delegated Smart Contract Accounts All EIP-7702 delegated Smart Contract Account implementations MUST check that all calls to the initialization function originate from the entryPoint.senderCreator() address. There is no way for the EntryPoint contract to know whether an EIP-7702 account has been initialized or not, and therefore the EIP-7702 account initialization code, can be called multiple times through EntryPoint . The Account code SHOULD only allow calling it once and the Wallet Application SHOULD NOT pass the initCode repeatedly. Smart Contract Accounts Storage layout collisions It is expected that most of ERC-4337 Smart Contract Account will be upgradeable, either via on-chain delegate proxy contracts or via EIP-7702. When changing the underlying implementation, all Accounts MUST ensure that there are no conflicts in the storage layout of the two contracts. One common approach to this problem is often referred to as “diamond storage” and is fully described in ERC-7201 . Transient Storage Contracts using the EIP-1153 transient storage MUST take into account that ERC-4337 allows multiple UserOperations from different unrelated sender addresses to be included in the same underlying transaction. The transient storage MUST be cleaned up manually if contains any sensitive information or is used for access control. Copyright Copyright and related rights waived via CC0 . Citation Please cite this document as: Vitalik Buterin ( @vbuterin ), Yoav Weiss ( @yoavw ), Dror Tirosh ( @drortirosh ), Shahaf Nacson ( @shahafn ), Alex Forshtat ( @forshtat ), Kristof Gazso ( @kristofgazso ), Tjaden Hess ( @tjade273 ), "ERC-4337: Account Abstraction Using Alt Mempool [DRAFT]," Ethereum Improvement Proposals , no. 4337, September 2021. [Online serial]. Available: https://eips.ethereum.org/EIPS/eip-4337. Ethereum Improvement Proposals Ethereum Improvement Proposals ethereum/EIPs Ethereum Improvement Proposals (EIPs) describe standards for the Ethereum platform, such as core protocol specifications.
2026-01-13T09:29:16
https://telegram.org/ass…n/favicon-32.png
Telegram Messenger English Bahasa Indonesia Bahasa Melayu Deutsch Español Français Italiano Nederlands O‘zbek Polski Português (Brasil) Türkçe Беларуская Русский Українська Қазақша العربية فارسی 한국어 Twitter Home FAQ Apps API Moderation Recent News Jan 3 AI Summaries, New Design and More Dec 12 Passkeys, Gift Purchase Offers and More Nov 19 Live Stories, Repeated Messages, Auctions for Gifts and More a new era of messaging Telegram for Android Telegram for iPhone / iPad Telegram for Windows / Mac / Linux Browse more Telegram apps Telegram for PC / Linux Telegram for macOS Recent News AI Summaries, New Design and More Telegram's first update of 2026 brings even more Liquid Glass interfaces on iOS and AI summaries for channel posts and Instant View pages — built to maximize privacy and protect user… Jan 3, 2026 Passkeys, Gift Purchase Offers and More In today's update, we add secure passkeys for instant login without SMS codes, gift purchase offers with built-in scam protection, and a simple way to add audio from your profile to… Dec 12, 2025 Why Telegram? Simple Telegram is so simple you already know how to use it. Private Telegram messages are heavily encrypted and can self-destruct. Synced Telegram lets you access your chats from multiple devices. Fast Telegram delivers messages faster than any other application. Powerful Telegram has no limits on the size of your media and chats. Open Telegram has an open API and source code free for everyone. Secure Telegram keeps your messages safe from hacker attacks. Social Telegram groups can hold up to 200,000 members. Expressive Telegram lets you completely customize your messenger. Telegram Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. About FAQ Privacy Press Mobile Apps iPhone/iPad Android Mobile Web Desktop Apps PC/Mac/Linux macOS Web-browser Platform API Translations Instant View About Blog Press Moderation
2026-01-13T09:29:16
https://confluence.atlassian.com/bamboo/bamboo-data-center-1087516791.html
Bamboo Data Center | Bamboo Data Center 12.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo latest Documentation Unable to load Atlassian Support Bamboo 12.1 Documentation Bamboo Data Center Data Center 12.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Bamboo Data Center Bamboo documentation Getting started with Bamboo Installing and upgrading Using Bamboo Bamboo Best Practice Administering Bamboo Bamboo Specs Bamboo FAQ Exporting existing plan configuration to Bamboo YAML Specs Bamboo Data Center On this page In this section Installing Bamboo Data Center Running Bamboo Data Center on a single node Clustering with Bamboo Data Center Improving instance stability with rate limiting Build resiliency in Bamboo Data Center Migrating Bamboo 7.X.X to Bamboo 8.X.X Elastic agent supervisor Running Bamboo Data Center on a Kubernetes cluster Upgrading Bamboo Data Center Disaster recovery guide for Bamboo Data Center Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community Data Center is our self-managed edition of Bamboo built for enterprises. It provides the deployment flexibility and administrative control you need to manage mission-critical Bamboo sites. Data Center deployment options You can deploy Bamboo Data Center in two ways: Non-clustered (single node) Run Bamboo Data Center on a single node, just like a Server installation. This option doesn’t require any changes to your infrastructure, but it does allow you to take advantage of Data Center-only features. Quick and easy.  Learn more Clustered Run Bamboo Data Center in a cluster with multiple nodes, and a load balancer to distribute traffic. Clustering is designed for large, or mission-critical, Bamboo instances, allowing you to provide high availability, and maintain performance as you scale.  Learn more Last modified on Feb 19, 2024 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section Installing Bamboo Data Center Running Bamboo Data Center on a single node Clustering with Bamboo Data Center Improving instance stability with rate limiting Build resiliency in Bamboo Data Center Migrating Bamboo 7.X.X to Bamboo 8.X.X Elastic agent supervisor Running Bamboo Data Center on a Kubernetes cluster Upgrading Bamboo Data Center Disaster recovery guide for Bamboo Data Center Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://www.linkedin.com/products/tencentglobal-cloud-object-storage-cos/
Cloud Object Storage (COS) | LinkedIn Skip to main content LinkedIn Tencent in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Cloud Object Storage (COS) Object Storage Software by Tencent See who's skilled in this Add as skill Learn more Report this product About A secure and reliable massive cloud storage service at low cost Similar products Amazon Simple Storage Service (S3) Amazon Simple Storage Service (S3) Object Storage Software Google Cloud Storage Google Cloud Storage Object Storage Software Spaces Spaces Object Storage Software OVHcloud Object Storage OVHcloud Object Storage Object Storage Software MinIO MinIO Object Storage Software Cribl Lake Cribl Lake Object Storage Software Sign in to see more Show more Show less Tencent products Cloud Native Database TDSQL-C Cloud Native Database TDSQL-C Relational Database Management Systems Cloud Virtual Machine (CVM) Cloud Virtual Machine (CVM) Server Virtualization Software Simple Email Service (SES) Simple Email Service (SES) Email Marketing Software Tencent Cloud Automation Tools Tencent Cloud Automation Tools Build Automation Tools Tencent Cloud Block Storage Tencent Cloud Block Storage Block Storage Software Tencent Cloud Instant Messaging (IM) Tencent Cloud Instant Messaging (IM) Cloud Communications Platforms Tencent Cloud Lighthouse Tencent Cloud Lighthouse Enterprise Cloud Platforms Tencent Effect SDK Tencent Effect SDK Software Development Kits (SDK) Tencent Real-Time Communication (TRTC) Tencent Real-Time Communication (TRTC) Live Streaming Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://www.linkedin.com/products/cisco--hybrid-cloud/?trk=products_details_guest_similar_products_section_similar_products_section_product_link_result-card_image-click
Cisco+ Hybrid Cloud | LinkedIn Skip to main content LinkedIn Cisco in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Cisco+ Hybrid Cloud Enterprise Cloud Platforms by Cisco See who's skilled in this Add as skill Learn more Report this product About Cisco+ Hybrid Cloud invites you to experience a new way to manage hybrid cloud with a simplified, consumption-based solution Similar products Workday Workday Enterprise Cloud Platforms Oracle Cloud Infrastructure (OCI) Oracle Cloud Infrastructure (OCI) Enterprise Cloud Platforms Cloud transformation Cloud transformation Enterprise Cloud Platforms Nutanix Central Nutanix Central Enterprise Cloud Platforms Nutanix Kubernetes Platform Nutanix Kubernetes Platform Enterprise Cloud Platforms Nutanix Enterprise AI Nutanix Enterprise AI Enterprise Cloud Platforms Sign in to see more Show more Show less Cisco products Cisco Anyconnect Secure Mobility Client Cisco Anyconnect Secure Mobility Client Virtual Private Network (VPN) Software Cisco Cloudlock Cisco Cloudlock Cloud Access Security Broker (CASB) Software Cisco Meraki Systems Manager Cisco Meraki Systems Manager Mobile Device Management (MDM) Software Cisco Secure Malware Analytics Cisco Secure Malware Analytics Threat Intelligence Platforms Cisco Security Cloud Cisco Security Cloud Cloud Workload Protection Platforms Cisco ThousandEyes Cisco ThousandEyes Application Performance Monitoring (APM) Software Cisco Umbrella Cisco Umbrella Secure Web Gateways Cisco Unified IP Interactive Voice Response Cisco Unified IP Interactive Voice Response Interactive Voice Response (IVR) Software Cisco Webex Meetings Cisco Webex Meetings Video Conferencing Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://huggingface.co/datasets?format=format%3Atext
Datasets in text – Hugging Face Hugging Face Models Datasets Spaces Community Docs Enterprise Pricing Log In Sign Up 1T","label":"> 1T","type":"size_categories"}],"format":[{"id":"format:json","label":"json","type":"format"},{"id":"format:csv","label":"csv","type":"format"},{"id":"format:parquet","label":"parquet","type":"format"},{"id":"format:optimized-parquet","label":"optimized-parquet","type":"format"},{"id":"format:imagefolder","label":"imagefolder","type":"format"},{"id":"format:audiofolder","label":"soundfolder","type":"format"},{"id":"format:webdataset","label":"webdataset","type":"format"},{"id":"format:text","label":"text","type":"format"},{"id":"format:arrow","label":"arrow","type":"format"}],"benchmark":[{"id":"benchmark:official","label":"Benchmark","type":"benchmark"}]},"numItemsPerPage":30,"numTotalItems":7046,"pageIndex":0,"searchQuery":"","sortBy":""}}"> Edit Datasets filters Main Tasks Libraries Languages Licenses Other Modalities 3D Audio Document Geospatial Image Tabular Text Time-series Video Size (rows) Reset Size < 1K > 1T Format Reset Format json csv parquet optimized-parquet imagefolder soundfolder webdataset text arrow Evaluation Benchmark Apply filters Datasets 7,046 Full-text search Edit filters Sort:  Trending Active filters: text Clear all tsazan/ikea-us-commercetxt Viewer • Updated 5 days ago • 1.11M • 369 • 6 agentlans/high-quality-english-sentences Viewer • Updated Oct 1, 2024 • 1.71M • 2.54k • 30 perler/ppsurf Viewer • Updated Feb 15, 2024 • 5.2k • 4.17k • 3 X779/Danbooruwildcards Viewer • Updated Nov 23, 2024 • 38.6M • 19.8k • 9 maimai11/MNV_17 Viewer • Updated Oct 13, 2025 • 2.6k • 4.91k • 15 ShiroOnigami23/hyper-scenery-sketches-dataset Viewer • Updated 2 days ago • 1k • 220 • 3 alexgshaw/terminal-bench-2-leaderboard Viewer • Updated about 13 hours ago • 22.8k • 1.22k • 3 ecnu-icalk/PsychEval Viewer • Updated 12 minutes ago • 10.5k • 259 • 2 Sunain-Labs/sunain-gameplay Viewer • Updated about 23 hours ago • 14.8k • 150 • 2 nlpufg/brwac Viewer • Updated Aug 4, 2021 • 3.53M • 91 • 3 KGraph/FB15k-237 Viewer • Updated Oct 21, 2022 • 310k • 752 • 9 athirababu0988/human_chat.txt Viewer • Updated Jun 22, 2023 • 1.5k • 26 • 1 goendalf666/sales-textbook_for_convincing_and_selling Viewer • Updated Oct 4, 2023 • 1.46k • 89 • 20 alexandreteles/alexandria Viewer • Updated May 27, 2024 • 24.7k • 417 • 4 SamPIngram/tinyshakespeare Viewer • Updated Jan 6, 2024 • 40k • 28 • 1 kafkaon/splat_examples Viewer • Updated Mar 12, 2025 • 106 • 12 • 1 sanbu/tianji-chinese Viewer • Updated Dec 21, 2024 • 13.1k • 231 • 16 tiiuae/visper Viewer • Updated Apr 17, 2025 • 73.6k • 328 • 6 PengYu-Team/S3E Viewer • Updated May 15, 2025 • 806k • 823 • 4 shubhamtr/llama2_diet_planner Viewer • Updated Mar 15, 2025 • 1k • 6 • 2 Moleys/Filtered-Japanese-English-Parallel-Corpus Viewer • Updated Mar 3, 2025 • 31.3M • 10 • 3 EdoVaira/Encyclopedia-Britannica Viewer • Updated Jan 5, 2025 • 72.5k • 27 • 4 amodaresi/NoLiMa Viewer • Updated Jun 10, 2025 • 47.9k • 98 • 14 Multilingual-NLP/M-ABSA Viewer • Updated May 24, 2025 • 310k • 1.09k • 10 Kuugo/Chinese_Law Viewer • Updated Apr 24, 2025 • 19.3k • 265 • 8 pkgforge-security/domains Viewer • Updated about 7 hours ago • 28.4B • 785 • 3 nvidia/PhysicalAI-Robotics-GraspGen Viewer • Updated Jun 21, 2025 • 25.5k • 516 • 27 nvidia/PhysicalAI-Robotics-GR00T-Eval Viewer • Updated Jun 14, 2025 • 126 • 348 • 4 zhaoyiww/Rockfall_Simulator Viewer • Updated Jul 7, 2025 • 12.3M • 35 • 1 autob/human-conversation Viewer • Updated Jul 26, 2025 • 2.99k • 6 • 1 Previous 1 2 3 ... 100 Next System theme Company TOS Privacy About Careers Website Models Datasets Spaces Pricing Docs
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/sponsored-txn
Sponsored Transactions | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Sponsored Transactions On this page Sponsored Transactions Sponsored Transactions ​ Sponsored transactions are the ability to pay for another user’s transaction fees. To do this, the Fuse operator must enable the sponsored feature in his project and deposit some funds into the paymaster contract. The SDK provides a middleware to check if the project is sponsored and the amount of funds available for sponsoring. To use this feature, you must first initialize the SDK with the withPaymaster parameter set to true . Web Flutter import { FuseSDK } from "@fuseio/fusebox-web-sdk" ; const apiKey = "API_KEY" ; const fuseSDK = await FuseSDK . init ( apiKey , credentials , { withPaymaster : true , } ) ; import 'package:fuse_wallet_sdk/fuse_wallet_sdk.dart' ; final apiKey = 'API_KEY' ; final privateKey = EthPrivateKey . fromHex ( 'YOUR_PRIVATE_KEY' ) ; final fuseSDK = await FuseSDK . init ( apiKey , privateKey , withPaymaster : true ) ; Edit this page Previous GET the list of Supported Tokens Next Migration from Old Versions Sponsored Transactions Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/signup/cold-join?session_redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Fsearch%2Fresults%2Fpeople%2F%3FfacetCurrentCompany%3D%255B55067600%255D&trk=org-employees_cta_face-pile-cta
Sign Up | LinkedIn Make the most of your professional life Not you? Remove photo Join LinkedIn To create a LinkedIn account, you must understand how LinkedIn processes your personal information by selecting learn more for each item listed. Agree to all terms We collect and use personal information. Learn more We share personal information with third parties to provide our services. Learn more Further information is available in our Korea Privacy Addendum . Privacy Policy Addendum 1 of 2 2 of 2 Agree to the term Continue Back Agree to all terms Email Password Show First name Last name By clicking Agree & Join, you agree to the LinkedIn User Agreement , Privacy Policy , and Cookie Policy . Agree & Join or Security verification Already on LinkedIn? Sign in Looking to create a page for a business? Get help LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) Language Takes less than 2 minutes Join LinkedIn to connect with people, jobs and opportunities that matter Join now Leave
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/create-scw
Create Smart Contract Wallet | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Create Smart Contract Wallet On this page Create Smart Contract Wallet Initialization ​ The init method is a fundamental feature of the SDK that enables you to setup a wallet & authenticate the user's provided credentials. The method requires the use of a PRIVATE_KEY which you can get in the Fuse Developer Console here . When you send a request to the server using this method, it verifies the credentials and if the credentials are valid, developers can use the getSender() to return an address. Web Flutter import { ethers } from "ethers" ; import { FuseSDK } from "@fuseio/fusebox-web-sdk" ; const apiKey = "API_KEY" ; const credentials = new ethers . Wallet ( "PRIVATE_KEY" ) ; const fuseSDK = await FuseSDK . init ( apiKey , credentials ) ; Access the wallet ​ // Create Wallet const smartContractAddress = fuseSDK . wallet . getSender ( ) ; console . log ( ` Sender Address is $ { smartContractAddress } ` ) ; //Enter your Fuse Developer API Key final apiKey = 'API_KEY' ; // Generate a random Ethereum private key final String privateKey = await Mnemonic . generatePrivateKey ( ) ; final EthPrivateKey credentials = EthPrivateKey . fromHex ( privateKey ) ; final fuseSDK = await FuseSDK . init ( apiKey , credentials ) ; Access the wallet ​ // Create Wallet final smartContractAddress = fuseSDK . wallet . getSender ( ) ; print ( 'Smart contract wallet address: $ smartContractAddress ' ) ; Edit this page Previous Installation And Setup Next Send Native/ERC20 Transactions Initialization Access the wallet Access the wallet Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://confluence.atlassian.com/bamboo/installing-and-upgrading-289276552.html
Installing and upgrading | Bamboo Data Center 12.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo latest Documentation Unable to load Atlassian Support Bamboo 12.1 Documentation Installing and upgrading Data Center 12.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Installing and upgrading Bamboo documentation Getting started with Bamboo Installing and upgrading Using Bamboo Bamboo Best Practice Administering Bamboo Bamboo Specs Bamboo FAQ Exporting existing plan configuration to Bamboo YAML Specs Bamboo Data Center On this page In this section Supported platforms Install a Bamboo Data Center trial Bamboo installation guide Bamboo upgrade guide End of support announcements for Bamboo Running the Setup Wizard Bamboo remote agent installation guide Running Bamboo as a service Get a Bamboo Data Center trial license Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community Installing Installing Bamboo on Linux Installing Bamboo on Mac OS X Installing Bamboo on Windows Connect Bamboo to an external database Bamboo remote agent installation guide Supported platforms Upgrading Bamboo upgrade guide Last modified on Apr 11, 2022 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section Supported platforms Install a Bamboo Data Center trial Bamboo installation guide Bamboo upgrade guide End of support announcements for Bamboo Running the Setup Wizard Bamboo remote agent installation guide Running Bamboo as a service Get a Bamboo Data Center trial license Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://confluence.atlassian.com/bamboo/exporting-existing-plan-configuration-to-bamboo-yaml-specs-1018270696.html
Exporting existing plan configuration to Bamboo YAML Specs | Bamboo Data Center 12.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo latest Documentation Unable to load Atlassian Support Bamboo 12.1 Documentation Exporting existing plan configuration to Bamboo YAML Specs Data Center 12.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Exporting existing plan configuration to Bamboo YAML Specs Bamboo documentation Getting started with Bamboo Installing and upgrading Using Bamboo Bamboo Best Practice Administering Bamboo Bamboo Specs Bamboo FAQ Exporting existing plan configuration to Bamboo YAML Specs Bamboo Data Center On this page Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community To ease migration of your Bamboo plans to configuration as code, we have prepared the export feature. Note: This will not export historical data for the plans. In order to export an existing build plan to Bamboo Specs source code: If you don't have Bamboo Specs project,  create one .  Go to your build plan and select  Actions > Configure plan. On the plan configuration page, select  Actions > View plan as YAML Specs. Copy generated YAML code to your code editor by putting it into the bamboo-specs/bamboo.yaml file. To export an existing deployment plan to Bamboo Specs source code: If you don't have Bamboo Specs project,  create one .  Go to your deployment project and select  ... > Edit project. On the deployment project configuration page, select  ... > View project as YAML Specs. Copy generated YAML code to your code editor by putting it into the bamboo-specs/bamboo.yaml. The code is ready to be put into repository, with a few exceptions: manually created branches are not exported - you can add them manually in the UI We advise you to cross-check the generated code with  Bamboo Specs reference manual  and to compare original and generated plan. Sensitive data such as passwords or keys are exported as values encrypted using Bamboo's  System-wide encryption  algorithm. You will see  BAMSCRT@0@ ... exported in place of the secret string. For details on generating encrypted secrets for new values, see  Bamboo Specs encryption . You will find equivalent classes for the vast majority of Bamboo concepts in the generated code, such as: plans, stages, jobs, tasks of different kinds, permissions, deployments. The export feature doesn't handle all tasks known to Bamboo. Export of such tasks should be implemented by apps vendors. Last modified on Jul 21, 2020 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://group.mantle.xyz/ja
Mantle: Blockchain for Banking & On-Chain Finance ホーム Mantle イノベーションの柱 リソース JA 銀行のためのブロックチェーン 暗号資産を、あなたの日常に。 さらに詳しく Mantleのビジョン トークン化された技術によって支えられ、誰もが参加できる、自由で効率的かつアクセス可能な金融の世界。 主要事業分野 イノベーションの柱 MNT MNTはMantleのエコシステムを強化し、ガバナンス、ステーキング、分散型経済全体のイノベーションを推進する礎石としての役割を果たしています。 Mantle Network モジュール設計を採用し、EigenLayerとEigenDAをいち早く導入したイーサリアムのレイヤー2ソリューションであり、Mantleの多岐にわたるプロダクトとアプリケーションを支える基盤となっています。 mETH Protocol 収益を最大化する流動性ETHステーキングおよびリステーキングプロトコル。CEXとDeFiアプリ、マネーマーケットで担保として広く普及しています。 Function BTCとWeb3の経済をつなぎ、新たな金融を創出する分散型ビットコインソリューション。 Mantle Index Four 主要な暗号資産のバスケットに分散投資し、利回りを生む、機関投資家グレードのプロダクト。 UR URは、支払いもオフランプもひとつのアプリで完結できる、国境を越えたスマートマネーアプリです。 MantleX 人工知能(AI)を活用して、分散型システムの未来を切り開く。 戦略的提携 パートナーシップ 総資産額 $3,709,130,507 Mantle Treasuryは、Mantleの金融エコシステムの中核として、安定性の確保と戦略的な成長の推進を担っています。 Treasury 76.23 % MNT $2,827,718,541 8.97 % ETH, mETH & cmETH $333,041,395 7.32 % BTC $271,610,101 7.02 % Stables $260,627,009 金額は米ドルで表示されています。13 Jan 2026, 04:56 UTCに更新されました Ecofund仲介資金プール 200,000,000ドル Mantle EcoFundは、Mirana Venturesの専門家によるサポートのもと、革新的なプロジェクトへの投資を通じてエコシステムの成長を促進します。PolychainやDragonflyといった有力VC20社との連携により、質の高い投資機会を提供しています。 さらに詳しく ニュースルーム 注目 ブログ 11 Jul, 2025 UR Early Beta Access: Now Live With Weekly $3,000 Lottery Prize Pool Ecosystem Mantle UR Users can now sign up for a UR account with limited and exclusive, by-invite-only, codes shared by selected participants of the UR Early program from July 11, 2025, 10AM UTC to Aug. 8, 10AM UTC. 詳細はこちら 10 Jul, 2025 Mantle Becomes Strategic Investor of Digital Asset Management Firm ReserveOne Ecosystem Mantle Proud to announce our strategic investment in newly-formed digital asset management firm ReserveOne, an institutionally-governed digital asset reserve anchored in a diverse treasury strategy including Bitcoin, Ethereum and Solana. 詳細はこちら 09 Jul, 2025 Letter to Token Holders Q3 2025 Mantle Network UR Q3 2025 onwards will be a transformative moment for Mantle and our role in the evolving global financial landscape. 詳細はこちら 18 Jun, 2025 Mantle Launches UR (Early Contributors' Access Live) Ecosystem UR Beta testing access now live for UR — a borderless smart money app that makes it easy to spend and off-ramp, all in one place. UR is powered by Mantle Network. 詳細はこちら Mantle ガバナンス Treasury EcoFund スカウトプログラム MNTを入手 MNTとは何ですか イノベーションの柱 Mantle Network mETH Protocol Function Mantle Index Four UR MantleX リソース ブログ イベント 採用情報 ブランドアセット © Mantle 2026 . All rights reserved. プライバシーポリシー 用語
2026-01-13T09:29:16
https://www.linkedin.com/company/23andme?trk=products_details_guest_organization_image
23andMe | LinkedIn Skip to main content LinkedIn Top Content People Learning Jobs Games Sign in Join now for free 23andMe Non-profit Organizations Palo Alto, California 81,297 followers A nonprofit advancing health through the power of genetics and crowdsourced research. See jobs Follow Discover all 561 employees Report this company About us 23andMe Research Institute is a nonprofit medical research organization that enables people everywhere to access their genetic information, learn about themselves and participate in the world's largest crowdsourced research initiative. The Institute aims to be the world's most significant contributor to scientific advancement, uniting people with the common goal of improving health and deepening our understanding of DNA — the code of life. Website https://www.23andme.com External link for 23andMe Industry Non-profit Organizations Company size 201-500 employees Headquarters Palo Alto, California Type Nonprofit Specialties genetic research, consumer genetics, direct-to-consumer genetic testing, telehealth, healthcare, wellness, nonprofit, research, and Research Institute Locations Primary Palo Alto, California, US Get directions Employees at 23andMe Fred Shue Jim Davis Pierre-Eric Leibovici Daniel Chu See all employees Updates 23andMe 81,297 followers 1mo Report this post Please join us in welcoming John McLeod to the team as our new General Counsel & Chief Risk Officer. John’s experience and leadership will be invaluable as we continue to grow and shape our nonprofit path forward. Read more here: https://lnkd.in/gsAN_CaE 57 2 Comments Like Comment Share 23andMe 81,297 followers 1mo Report this post A landmark expansion of our genetic ancestry reports and features now includes more than 250 high-resolution genetic groups across Africa. This significant update provides members with African heritage the most detailed and scientifically rigorous look at their roots currently available. Made possible by the willing participation of thousands of research-consented 23andMe Research Institute members with documented ancestry in Africa and the diaspora. Their participation enabled the development of a more inclusive and detailed map of human history for everyone. The expanded groups, which span Eastern, Middle, Southern, and Western Africa, include: *57 Nigerian genetic groups *44 Angolan & Congolese genetic groups *40 Ethiopian & Eritrean genetic groups *32 Ghanaian, Liberian & Sierra Leonean genetic groups *And a total of 28 Somali, 22 Senegambian & Guinean, and 9 Sudanese genetic groups, among others. You can learn more about this latest update and the science behind it here: https://23and.me/4pdkRiV . The majority of Black and African American 23andMe Research Institute members on the latest genotyping chip will receive results to one or more of these new groups. While we are excited about this significant step forward, we remain committed to expanding our reference panels and using our industry-leading science to bring this level of detail to all members. 86 1 Comment Like Comment Share 23andMe 81,297 followers 1mo Edited Report this post November is Lung Cancer Awareness Month. On yesterday’s Lost Women of Science podcast, our Founder and CEO Anne Wojcicki and her sister Janet opened up about their sister Susan and her battle with lung cancer. You can listen here: https://lnkd.in/gGi-B6xp Lung cancer is consistently one of the world’s deadliest cancers, responsible for more cancer deaths globally each year than any other type. This is due in part to late detection and the aggressive nature of many lung cancers. In July 2024, we collaborated with Troper Wojcicki Philanthropies and 20+ patient and research advocacy organizations to launch the Lung Cancer Genetics Study. Our goal is to understand more about how genetics influence lung cancer so that we can work to improve detection, risk reduction, and care. More on the study here: https://lnkd.in/gr5i2h3U 67 4 Comments Like Comment Share 23andMe 81,297 followers 2mo Edited Report this post We are delighted to welcome Kael Reicin to the 23andMe Research Institute as our new CFO. Kael brings financial and operational nonprofit expertise as we continue to evolve into a nonprofit medical research organization. His financial insight and deep understanding of mission-driven stewardship will help us translate our ideals into sustainable action. Read more here: https://lnkd.in/gqAGFKqf 85 8 Comments Like Comment Share 23andMe 81,297 followers 2mo Edited Report this post Welcome Peggy Bodin , Fred Cate , and Jonathan Zittrain to the 23andMe Research Institute Privacy Advisory Board. These leading experts in health data privacy, data ethics, and consumer advocacy, will provide strategic guidance on the protection of member information and the organization’s responsible stewardship of personal data. Read more here: https://lnkd.in/gqpfW6yX 59 1 Comment Like Comment Share 23andMe 81,297 followers 2mo Edited Report this post We are proud to welcome Brad Margus and Stephen Quake, D.Phil. to the 23andMe Research Institute Board of Directors. Their deep experience in genetics, biomedical innovation, and translational science will help advance discoveries that improve human health for all. Honored to have their guidance as we shape the future of human genetics and research. 🧬 Read more here: https://lnkd.in/gjHufjHk 102 Like Comment Share 23andMe 81,297 followers 3mo Report this post We are proud to share that 23andMe has been named to the TIME's Best Inventions Hall of Fame! This milestone is made possible by the trust of our 13+ million customers and their commitment to advancing genetics and science. 🧬 🌎 A big thank you to TIME for this honor, and to our community for shaping the future of genetics and research. TIME Best Inventions Hall of Fame time.com 150 3 Comments Like Comment Share 23andMe 81,297 followers 3mo Report this post One of the most depressing aspects of depression is that treatments often don’t work, at least initially. A staggering 60% of patients with major depressive disorder don’t find relief from their first medication, and one-third eventually face what’s called Treatment-Resistant Depression (TRD). Using advanced machine learning techniques, researchers at Johnson & Johnson and the 23andMe Research Institute developed a predictive model that identifies individuals most likely to have Treatment-Resistant Depression, without relying on lab tests or genetic data. The research, published in the journal Nature, used only self-reported information with eight key predictive factors, including such things as residual symptoms, the duration of depression episodes, stress levels, and suicidal thoughts. Using this predictive model, researchers were able to accurately predict those at the highest risk for TRD 78% of the time. Why this matters: Clinicians could pivot faster to other treatments when one fails Care could be more personalized and effective Health systems could allocate resources more efficiently For millions living with depression, this work represents a step toward precision mental health care—and a shorter path to relief. If you or someone you know is struggling, please reach out to a mental health professional. In the U.S., the Suicide & Crisis Lifeline is available by dialing 988. https://lnkd.in/ejMWe5Px Predicting Treatment-Resistant Depression Using the 23andMe Survey Data blog.23andme.com 45 1 Comment Like Comment Share 23andMe 81,297 followers 3mo Report this post As we start Breast Cancer Awareness Month, scientists at the 23andMe Research Institute and Dana-Farber Cancer Institute published a study with a surprising finding: Breast cancer patients with higher genetic risk scores actually showed longer average survival times compared to those with lower risk scores. Why this happens isn’t yet clear. One possibility is that inherited breast cancers driven by genetic risk may develop more slowly than cancers triggered by environmental factors, known as somatic mutations. This study builds on nearly 15 years of 23andMe’s breast cancer research and collaborations, including: - Discovering genetic factors linked to breast size and cancer risk - Understanding how people respond to learning their genetic risk - Revealing gaps in current screening criteria that miss many at-risk individuals - Receiving the first FDA authorization for a direct-to-consumer BRCA1/BRCA2 - Genetic Health Risk report, later expanded to include 44 variants and full exome sequencing across 33 cancer-related genes Breast Cancer Awareness Month is about highlighting the impact of early detection, access, and research. Findings like this one underscore how genetic science can continue to uncover new dimensions of risk, survival, and treatment. https://lnkd.in/eXSqraw5 Study Reveals an Unexpected Link Between Genetic Cancer Risk Scores and Survival blog.23andme.com 54 Like Comment Share 23andMe 81,297 followers 3mo Report this post A massive new genetic study of dyslexia using data from the 23andMe Research Institute uncovered dozens of previously unknown genetic factors linked to the condition that affects between 5-10% of school-age children. Many of the genetic associations play a role in early brain development and neuronal pathways. The study, the largest of its kind, advances our understanding of how the brain is wired for reading. https://lnkd.in/eY5zBaQY #Dyslexia #Genetics #23andMe New Study Expands Our Understanding of the Genetics of Dyslexia blog.23andme.com 72 1 Comment Like Comment Share Join now to see what you are missing Find people you know at 23andMe Browse recommended jobs for you View all updates, news, and articles Join now Similar pages Ancestry Software Development Lehi, UT Regeneron Biotechnology Tarrytown, New York FamilySearch Non-profit Organization Management Salt Lake City, UT Lemonaid Health Medical Practices San Francisco, California 10x Genomics Biotechnology Research Pleasanton, California MyHeritage Software Development Or Yehuda, Israel Illumina Biotechnology Research San Diego, CA Genentech Biotechnology Research South San Francisco, California Nucleus Genomics Biotechnology New York, NY Natera Biotechnology Research Austin, Texas Show more similar pages Show fewer similar pages Browse jobs Scientist jobs 48,969 open jobs Manager jobs 1,880,925 open jobs Analyst jobs 694,057 open jobs 23andMe jobs 96 open jobs Intern jobs 71,196 open jobs Engineer jobs 555,845 open jobs Project Manager jobs 253,048 open jobs Data Manager jobs 114,435 open jobs Director jobs 1,220,357 open jobs Data Scientist jobs 264,158 open jobs Medical Science Liaison jobs 2,540 open jobs Bioinformatician jobs 18,406 open jobs Product Manager jobs 199,941 open jobs Senior Scientist jobs 19,214 open jobs Clinical Research jobs 103,468 open jobs Data Science Specialist jobs 2,441 open jobs Writer jobs 26,384 open jobs Research Assistant jobs 43,677 open jobs Copywriter jobs 17,206 open jobs Associate Scientist jobs 19,864 open jobs Show more jobs like this Show fewer jobs like this Funding 23andMe 14 total rounds Last Round Post IPO equity Jul 17, 2021 External Crunchbase Link for last round of funding US$ 250.0M See more info on crunchbase More searches More searches 23andMe jobs Scientist jobs Engineer jobs Analyst jobs Intern jobs Manager jobs Computational Biologist jobs Product Manager jobs Medical Science Liaison jobs Specialist jobs Project Manager jobs Director of Testing jobs Marketing Manager jobs Trading Assistant jobs Associate Product Manager jobs Software Engineer jobs Process Integration Engineer jobs Bioinformatician jobs Account Executive jobs Human Resources Business Partner jobs Art Curator jobs Security Engineer jobs Mechanical Engineer jobs Supervisor jobs Senior Scientist jobs Data Analyst jobs Biostatistician jobs Policy Advisor jobs Consultant jobs Data Scientist jobs Healthcare Consultant jobs Associate jobs Geneticist jobs Account Manager jobs Senior Process Engineer jobs Investor Relations Specialist jobs Control Engineer jobs Workforce Manager jobs Designer jobs Technical Editor jobs Tester jobs Health Specialist jobs Organizational Psychologist jobs Investor jobs Writer jobs Instructor jobs Support Engineer jobs Investment Analyst jobs Talent Management Specialist jobs Director jobs Developer jobs Project Associate jobs Grants Coordinator jobs Financial Services Professional jobs Director of Development jobs Manufacturing Engineer jobs Learning And Development Specialist jobs Marketing Specialist jobs Senior Writer jobs Head of Human Resources jobs LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) Language Agree & Join LinkedIn By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . Sign in to see who you already know at 23andMe Sign in Welcome back Email or phone Password Show Forgot password? Sign in or By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . New to LinkedIn? Join now or New to LinkedIn? Join now By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy .
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/relational-database-management-systems
Best Relational Database Management Systems | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Database Administrator (8) Chief Technology Officer (8) Chief Information Officer (5) Data Scientist (3) Information Technology Manager (3) See all products Find top products in Relational Database Management Systems category Software used to manage, maintain, and access data stored in structured tables. - Store and organize data in columns and rows - Manage simultaneous access of the same data by multiple users - Use Structured Query Language (SQL) to manipulate and view data - Establish ACID (Atomicity, Consistency, Isolation, Durability) compliance of stored data 70 results Amazon Aurora Relational Database Management Systems by Amazon Web Services (AWS) Amazon Aurora is a MySQL and PostgreSQL compatible relational database built for the cloud, that combines the performance and availability of high-end commercial databases with the simplicity and cost-effectiveness of open source databases. View product Amazon RDS Relational Database Management Systems by Amazon Web Services (AWS) With Amazon RDS, set up, operate and scale a commercial or open source relational database in the cloud in just a few clicks while automating time-consuming administrative tasks. View product Google Cloud SQL Relational Database Management Systems by Google Cloud Cloud SQL is a fully managed service that makes it easy to set up, manage, and administer relational databases: PostgreSQL, MySQL, and SQL Server. View product Teradata Vantage Relational Database Management Systems by Teradata Teradata Vantage™ is the most complete cloud analytics and data platform for AI at scale. It combines the scalability of public clouds with the control of private clouds, all on the same portable software stack. Vantage works on public clouds like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud; hybrid multi-cloud setups; on premises; or on commodity hardware with VMware. It emphasizes fit-for-purpose compute connected through a unified data foundation, ensuring optimal performance and cost efficiency while enabling seamless data flow and collaboration across the organization. With no up-front costs and pay-as-you-go pricing, Vantage adapts to emerging needs, especially in the era of generative AI. Teradata Vantage® is the only platform with the massively parallel processing and multidimensional scalability to handle complex data workloads with the ease and flexibility needed to drive faster ROI across your enterprise. View product Cloud Native Database TDSQL-C Relational Database Management Systems by Tencent A cloud native database with high performance, storage capacity, and compatibility View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights SQL Server Relational Database Management Systems by Microsoft SQL Server Get the flexibility you need to use integrated solutions, apps, and innovations in technology with your data—wherever it lives—in the cloud, on-premises, or at the edge. View product CockroachDB Relational Database Management Systems by Cockroach Labs Run your business-critical applications across any environment — whether in the cloud, on-premises, or hybrid — with global scale and unmatched resilience. -> Scale to meet demand: as demand shifts, your CockroachDB clusters will automatically rebalance to ensure peak performance. -> Deliver always-on experiences: eliminate downtime & protect your data w/ multi-active availability & custom survival goals -> Ensure low-latency access to accurate data across the globe -> Simplify database operations CockroachDB delivers the reliability, robust consistency and ACID transactions of RDBMS, while offering the horizontal scaling and distributed architecture of NoSQL. All of this is built to thrive in any environment, ensuring effortless scalability, global availability and distribution, and continuous uptime all with a familiar, compliant SQL interface. Integrate across many systems including applications, analytics, streaming, security, logging, and observability. View product YugabyteDB Relational Database Management Systems by Yugabyte Open source is at the heart of YugabyteDB, a distributed SQL database. Join our community and see how our users are using YugabyteDB for their applications. View product SingleStoreDB Relational Database Management Systems by SingleStore SingleStore is a cloud database available on leading public clouds and delivers elastic scalability, high availability and exceptional price-performance for your applications, without the burden of managing your data infrastructure. SingleStore scales storage independently of compute and includes Jupyter notebooks, data integration services and a compute service for running AI workloads — meaning developers, ML engineers and data engineers can quickly build awesome things together. View product MariaDB Enterprise Platform Relational Database Management Systems by MariaDB MariaDB Enterprise Platform is engineered to deliver best-in-class performance, data security, replication, clustering and high availability for production workloads. MariaDB Enterprise Platform empowers modern data strategies with an end-to-end database solution, delivering consistent performance and unwavering stability for mission-critical applications in demanding environments. Eliminate database sprawl and simplify your data landscape by running all your workloads in a single, robust MariaDB environment, powered by open source technology and fortified with enterprise-grade reliability, security and support. View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/network-management-software?trk=organization_guest_product_card_category_link
Best Network Management Software | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Network Engineer (32) Network Specialist (23) Network Administrator (21) Information Technology Manager (15) Chief Technology Officer (10) See all products Find top products in Network Management Software category Software used to automate administrative control of large computer networks. - Provision new devices and control configuration and updates - Detect performance bottlenecks, compliance issues, and misconfigured nodes - Map and discover network features to improve administrative remediation, maintenance, and reporting 132 results LG Electronics Private Network Solutions Network Management Software by LG Electronics LG Private Network Solutions offers a secure, scalable, and cost-effective on-premise Private 5G network designed to meet the connectivity demands of modern enterprises and system integrators. Our comprehensive approach ensures that businesses can harness the full potential of 5G technology without compromising on security or efficiency. For system integrators, our fully virtualized solution significantly reduces the Total Cost of Ownership (TCO). Use our innovative Front Haul Multiplexer to simplify RF design and flexible Cell-to-RU mapping to streamline deployment, accelerating timelines and boosting efficiency. Enterprise IT managers can gain unparalleled control over their private networks through our intuitive Private 5G Total Management System (PTMS). With a single, unified interface, you can effortlessly manage devices, diverse use cases, and network resources. Leverage LG's top-tier R&D and design for robust support, optimized performance, and reduced costs. View product Argo Smart Routing Network Management Software by Cloudflare The public Internet does its best to deliver your content — but it can’t account for network congestion, leading to slow load times and a degraded end-user experience. The Cloudflare network is different. It routes over 10 trillion global requests per month — providing Argo Smart Routing with a unique vantage point to detect real-time congestion and route web traffic across the fastest and most reliable network paths. On average, web assets perform 30% faster. View product Juniper Sky Enterprise Network Management Software by Juniper Networks Learn how Juniper Sky Enterprise simplifies cloud network management. Eliminate software maintenance cycles and dedicated hardware, and quickly manage your network through our intuitive UI. View product A2P SMS Network Management Software by Monty Mobile Reach customers directly, securely, and at scale. Our A2P messaging routes are built for reliability and deliverability. View product Network 360 Network Management Software by İnnova Bilişim Network 360 ile ağınıza bağlı tüm ekipmanları gerçek zamanlı izleyebilir ve yönetebilirsiniz. Ağa bağlı yönlendirici, anahtar, erişim noktası, Linux ve Windows sunucuların performansını gerçek zamanlı takip eden Network 360, ağ ekipmanların verimini, bellek kullanımını, disk alanını ve ICMP, SNMP veya WMI protokolleriyle algılanabilen tüm verilerini raporlar. View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights Progress WhatsUp Gold Network Management Software by Progress Software WhatsUp Gold provides complete visibility into the status and performance of applications, network devices and servers in the cloud or on-premises. Discover Your Network: WhatsUp Gold’s powerful layer 2/3 discovery results in a detailed interactive map of your entire networked infrastructure. Monitor and map everything from the edge to the cloud including devices, wireless controllers, servers, virtual machines, applications, traffic flows and configurations across Windows, LAMP and Java environments. Get Real-time Alerts: Ensure optimal performance and availability to meet or beat SLAs. Manage networks, traffic, physical servers, VMs and applications with easy-to-use and customizable maps, dashboards and alerts. Click on any device in WhatsUp Gold to get immediate access to a wealth of related network monitoring settings and reports. Resolve Issues Quickly: Intuitive workflows and easy customization help you reduce MTTRs. WhatsUp Gold streamlines network monitoring workflows by let View product Entuity Network Management Software by Park Place Technologies With Entuity™ Software you can discover, monitor, manage, and optimize your entire network across countless devices supplied by a whole host of different vendors. Entuity™ supports thousands of devices out of the box across hundreds of vendors. The Entuity network monitoring tool automates network discovery and uses intuitive workflows that make it easy to see when something has gone wrong. Responsive dashboards allow you to take a high-level view to gauge your network health or drill down to the component level to quickly and efficiently fix network problems. View product NetworkAccess Network Management Software by Lepton Software NetworkAccess by Lepton offers fiber network management and engineering services to support informed business decisions throughout the organization. A true digital twin for your Fiber Network, NetworkAccess lets you plan, design, and roll out your network in a flash by: - Proactively planning the network to avoid any customer complaints - Delighting the customers and shortening your sales cycle - Encouraging maintenance teams to collaborate–plan, provision, and deploy on time - Optimizing operations using automation to remove inefficiencies and lower network downtimes Lepton’s NetworkAccess Fiber GeoSuite includes: - SmartLocator for enhanced customer experience - SmartSQ for client acquisition - SmartOps for operational efficiency - SmartInventory for network modeling and inventory management NetworkAccess is a unified GIS-based platform that enables telecom businesses to plan and design end-to-end networks. View product RUCKUS AI Network Management Software by RUCKUS Networks RUCKUS AI brings AI-driven service assurance, predictive analytics, and AIOps automation to enterprise networks. It continuously learns and optimizes performance, turning complex data into actionable insights for faster resolution and smarter operations. Powered by Machine Learning, Graph AI, and Digital Twin modeling, it delivers: - Proactive health monitoring - Predictive issue detection - Automated remediation - Explainable AI insights Seamlessly integrated across RUCKUS wired and wireless solutions, RUCKUS AI ensures exceptional performance, visibility, and reliability for any environment, from campuses and arenas to hotels and enterprises. View product nGeniusPULSE Network Management Software by NETSCOUT nGeniusPULSE provides 24x7 monitoring of critical applications and services from anywhere in the enterprise; in the Data Center, at remote branches, with remote workers, for IoT devices, and more. View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://docs.oasis.io/build/sapphire/develop/security#__docusaurus_skipToContent_fallback
Security | Oasis Documentation Skip to main content Build Learn Get Involved Run Node Develop Core Overview Use cases Cross-Chain Key Generation Trustless AI Agent Trustless Price Oracle Private Telegram Chat Bot ROFL Quickstart Workflow Features Troubleshooting Sapphire Quickstart Network information Sapphire vs Ethereum Develop Concepts Browser Support View-Call Authentication Gasless Transactions Encrypted Events Deployment Patterns Security Testing End-to-End Testing Examples Contract Addresses and Deployments Oasis Privacy Layer Tools & Services On this page Security This page is focused on best practices for writing secure confidential smart contracts. It outlines potential attacks and how we should prevent or mitigate them. Simulation Attack ​ Suppose you store a secret in a smart contract which you reveal after some amount of tokens is transferred to the contract: SecretBox.sol // SPDX-License-Identifier: MIT pragma solidity ^ 0.8.0 ; contract SecretBox { address public immutable owner ; uint256 public immutable DEPOSIT_AMOUNT ; string private secret ; address private payer ; constructor ( uint256 amount ) { owner = msg . sender ; DEPOSIT_AMOUNT = amount ; } function setSecret ( string calldata s ) external { require ( msg . sender == owner , "not owner" ) ; secret = s ; } function getSecret ( ) external view returns ( string memory ) { require ( msg . sender == payer , "not payer" ) ; return secret ; } receive ( ) external payable { require ( msg . value >= DEPOSIT_AMOUNT , "amount too low" ) ; payer = msg . sender ; } } The same principle can be applied to encumbered wallets, gasless transactions and cross-chain DeFi contracts where the secret is a signing key for transactions and getSecret() generates a signed transaction and returns it to the user for submission. The simulation attack can leak the secret above without user sending any assets to the SecretBox contract. The attacker can use the following helper contract: SecretBoxAttack.sol // SPDX-License-Identifier: MIT pragma solidity ^ 0.8.0 ; import { SecretBox } from "./SecretBox.sol" ; contract SecretBoxAttack { address private attacker ; function getSecret ( address secretBoxAddr ) external returns ( string memory ) { SecretBox sb = SecretBox ( payable ( secretBoxAddr ) ) ; secretBoxAddr . call { value : address ( this ) . balance } ( "" ) ; return sb . getSecret ( ) ; } receive ( ) external payable { require ( attacker == address ( 0 ) , "already paid" ) ; attacker = msg . sender ; } function withdraw ( ) external { payable ( attacker ) . transfer ( address ( this ) . balance ) ; } } The attacker then sends funds to the helper contract, simulates the getSecret() call to obtain the secret and withdraws the funds back: attackSecretBox.ts import { ethers } from 'hardhat' const SecretBox = await ethers . getContractFactory ( 'SecretBox' ) const sb = await SecretBox . deploy ( 1_000_000_000 ) await sb . waitForDeployment ( ) const secretTx = await sb . setSecret ( "very secret message" ) ; await secretTx . wait ( ) const SecretBoxAttack = await ethers . getContractFactory ( 'SecretBoxAttack' ) const sba = await SecretBoxAttack . deploy ( ) await sba . waitForDeployment ( ) const transferTx = await ( await ethers . getSigners ( ) ) [ 0 ] . sendTransaction ( { to : await sba . getAddress ( ) , value : 1_000_000_000 , } ) await transferTx . wait ( ) const secret = await sba . getSecret . staticCall ( await sb . getAddress ( ) ) console . log ( ` Secret: ${ secret } ` ) const withdrawTx = await sba . withdraw ( ) await withdrawTx . wait ( ) Running the script above will leak the secret: Secret: very secret message Mitigation ​ The design of the Ethereum Virtual Machine is such that a smart contract cannot detect whether it is being executed within a finalized transaction vs a static call (including gas estimation). To overcome this, a developer needs to store the proof of finality in form of a block number when the payment was received. Then, when obtaining the secret (or performing other actions that require the payment), we require a one block delay. Since a static call cannot span across multiple blocks, this effectively prevents the simulation attack. Required changes: SecretBoxDelay.sol // SPDX-License-Identifier: MIT pragma solidity ^ 0.8.0 ; contract SecretBoxDelay { address public immutable owner ; uint256 public immutable DEPOSIT_AMOUNT ; string private secret ; address private payer ; uint256 private paidBlock ; constructor ( uint256 amount ) { owner = msg . sender ; DEPOSIT_AMOUNT = amount ; } function setSecret ( string calldata s ) external { require ( msg . sender == owner , "not owner" ) ; secret = s ; } function getSecret ( ) external view returns ( string memory ) { require ( msg . sender == payer , "not payer" ) ; require ( block . number > paidBlock , "not finalized yet" ) ; return secret ; } receive ( ) external payable { require ( msg . value >= DEPOSIT_AMOUNT , "amount too low" ) ; payer = msg . sender ; paidBlock = block . number ; } } Running the script with the new safeguards yields: execution reverted: not finalized yet Storage Access Patterns ​ You can use a tool such as hardhat-tracer to examine the base EVM state transitions under the hood. npm pnpm Yarn npm install -D hardhat-tracer pnpm add -D hardhat-tracer yarn add --dev hardhat-tracer and add hardhat-tracer to your config.ts file, import "hardhat-tracer" in order to test and show call traces. npx hardhat test --vvv --opcodes SSTORE,SLOAD You can also trace a particular transaction, once you know its hash. npx hardhat trace --hash 0xTransactionHash For both gas usage and confidentiality purposes, we recommend using non-unique data size . E.g. 64-byte value will still be distinct from a 128-byte value. Inference based on access patterns SSTORE keys from one transaction may be linked to SLOAD keys of another transaction. Order of Operations ​ When handling errors, gas usage patterns not only can reveal the code path taken, but sometimes the balance of a user as well (in the case of a diligent attacker using binary search). function transferFrom ( address who , address to , uint amount ) external { require ( balances [ who ] >= amount ) ; require ( allowances [ who ] [ msg . sender ] >= amount ) ; // ... } Modifying the order of error checking can prevent the accidental disclosure of balance information in the example above. function transferFrom ( address who , address to , uint amount ) external { require ( allowances [ who ] [ msg . sender ] >= amount ) ; require ( balances [ who ] >= amount ) ; // ... } Speed Bump ​ If we would like to prevent off-chain calls from being chained together, we can ensure that the block has been finalized. contract Secret { uint256 private _height ; bytes private _secret ; address private _buyer ; constructor ( bytes memory _text ) { _secret = _text ; } function recordPayment ( ) external payable { require ( msg . value == 1 ether ) ; // set and lock buyer _height = block . number ; _buyer = msg . sender ; } /// @notice Reveals the secret. function revealSecret ( ) view external returns ( bytes memory ) { require ( block . number > _height , "not settled" ) ; require ( _buyer != address ( 0 ) , "no recorded buyer" ) ; // TODO: optionally authenticate call from buyer return _secret ; } } Gas Padding ​ Gas padding lets you equalize EVM execution gas across private code paths to reduce side‑channel leakage. Sapphire provides a precompile ( Sapphire.padGas ) that burns execution gas so that your function’s execution cost is brought up to a target amount. The gas padding call is usually done somewhere at the end of the executed code to cover all possible execution paths. Scope & limits: Pads only the EVM engine (execution) gas spent by your contract’s code path. It does not include the intrinsic/transaction‑size component (calldata bytes, signature, envelope, etc.). The transaction size and the fee attributable to it remains public. Practically: if you pad to 10_000 , the total fee is tx_size_gas + exec_gas_padded(≈10_000) . Padding is intentionally limited to the execution layer. If total gas were fully padded, an attacker could vary transaction size to leak information; therefore only the EVM execution portion is padded. padGas protects the code path within your contract . Gas used by external calls can still differ unless those contracts also pad. Example attack (leaky code path) ​ contract Leaky { bytes32 private secret ; bytes32 private tmp ; // Returns true on correct guess; success path does extra work // (leaks via fee). function guess ( bytes32 candidate ) external returns ( bool ok ) { if ( candidate == secret ) { for ( uint i = 0 ; i < 10 _000 ; ++ i ) { tmp = keccak256 ( abi . encodePacked ( tmp , i ) ) ; } return true ; } return false ; } } An observer (or the caller) can compare total fees and infer whether candidate == secret . Fix with padding ​ contract Padded { bytes32 private secret ; bytes32 private tmp ; function guess ( bytes32 candidate ) external returns ( bool ok ) { if ( candidate == secret ) { for ( uint i = 0 ; i < 10 _000 ; ++ i ) { tmp = keccak256 ( abi . encodePacked ( tmp , i ) ) ; } ok = true ; } // Equalize execution cost across branches. Pads execution only // tx size cost stays visible. Sapphire . padGas ( 100 _000 ) ; } } Choose a target that is greater or equal to the worst‑case execution for the function, with a safety margin. You can measure worst‑case cost in tests (e.g., with tracers) and read the current execution gas via Sapphire.gasUsed() . When to use ​ Branches depend on confidential state/input and have materially different execution cost. Success vs. revert paths would leak acceptance via fee differences. Before returning from functions that conditionally perform heavy computation. When not to rely on it (alone) ​ It does not hide transaction size (calldata length). Different‑length inputs will still lead to different total fees. It does not pad external contracts you call unless they also pad. It is not a replacement for constant‑time logic where feasible. Masking input size (guidance) ​ Prefer fixed‑size ABI types ( bytes32 instead of bytes ) and pass hashes of variable‑length data rather than the data itself. If variable‑length bytes/ciphertext must be sent, pad client‑side to a fixed length or to bucketized sizes (e.g., 256/512/1024 bytes) before encrypting/sending; strip padding inside the contract. Bundle multiple fields into a fixed‑size envelope and parse lengths inside the confidential execution. Simple example ​ contract GasExample { bytes32 tmp ; function constantMath ( bool doMath , uint128 padTo ) external { if ( doMath ) { bytes32 x ; for ( uint256 i = 0 ; i < 100 ; i ++ ) { x = keccak256 ( abi . encodePacked ( x , tmp ) ) ; } tmp = x ; } // Pads EVM execution only; tx size cost remains public. Sapphire . padGas ( padTo ) ; } } Both calls below will consume the same execution gas , while the transaction‑size gas may still differ if calldata sizes differ. You can also query the execution gas with Sapphire.gasUsed() . await contract . constantMath ( true , 100000 ) ; await contract . constantMath ( false , 100000 ) ; Edit this page Last updated on Jan 9, 2026 Previous Deployment Patterns Next Testing Simulation Attack Mitigation Storage Access Patterns Order of Operations Speed Bump Gas Padding Example attack (leaky code path) Fix with padding When to use When not to rely on it (alone) Masking input size (guidance) Tools Explorer Wallet CLI Status Build Testnet Faucet Playground API Node Mainnet Testnet Community Discord Telegram Youtube GitHub Copyright © 2026 by Oasis Protocol Foundation . We respect your privacy . Unless otherwise specified, all text and images on this website are licensed under CC BY 4.0 . This does not include the Oasis software and the code examples, both of which are licensed under Apache 2.0 . Built with ♥ and Docusaurus.
2026-01-13T09:29:16
https://scholar.google.com/citations?user=SoOztcEAAAAJ&hl=ko&oe=ASCII
Binghui Wang - Google 학술 검색 로드 중... 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 연간 인용횟수 중복된 서지정보 다음 학술 문서는 학술검색에서 병합되어 있습니다. 총 인용 횟수가 첫 번째 학술 문서에 대해서만 계산됩니다. 병합된 서지정보 이 '인용' 횟수는 학술검색의 다음 학술 문서에 대한 인용문을 포함합니다. * 표시된 인용문은 프로필에 있는 학술 문서와 다를 수 있습니다. 공동 저자 추가 공동 저자 팔로우 이 저자의 새 학술자료 이 저자를 인용한 새 학술자료 이 저자의 연구와 관련된 새 학술자료 업데이트를 받을 이메일 주소 완료 죄송합니다. 현재 Internet Explorer 버전에서는 일부 기능이 작동하지 않을 수 있습니다. 최적의 상태로 사용하려면 Chrome 또는 Mozilla Firefox 를 사용해 주세요. 내 프로필 내 서재 통계 알리미 설정 로그인 로그인 내 프로필 만들기 인용 모두 보기 전체 2021년 이후 서지정보 5339 4551 h-index 34 32 i10-index 62 57 0 1400 700 350 1050 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 16 17 43 115 194 370 579 704 835 1093 1310 29 공개 액세스 모두 보기 모두 보기 자료 47개 자료 9개 공개 비공개 재정 지원 요구사항 기준 공동 저자 모두 보기 Neil Zhenqiang Gong Associate Professor, Duke University duke.edu의 이메일 확인됨 Jinyuan Jia Assistant Professor, Penn State psu.edu의 이메일 확인됨 Yiran Chen John Cocke Distinguished Professor of Electrical and Computer Engineering, Duke University duke.edu의 이메일 확인됨 ANG LI Assistant Professor, Department of Electrical and Computer Engineering, University of Maryland umd.edu의 이메일 확인됨 Hai Li Marie Foote Reel E'46 Distinguished Professor of ECE Dept, Duke Univ. duke.edu의 이메일 확인됨 Yiu-ming Cheung, PhD, Chair Profess... Department of Computer Science, Hong Kong Baptist University comp.hkbu.edu.hk의 이메일 확인됨 Xiaoyu Cao PhD. Duke University duke.edu의 이메일 확인됨 Pan Zhou Professor, School of Cyber Science and Engineering, Huazhong University and Science and Technology hust.edu.cn의 이메일 확인됨 Le Zhang PhD Student, Iowa State University iastate.edu의 이메일 확인됨 Bihan Wen Associate Professor, Nanyang Technological University ntu.edu.sg의 이메일 확인됨 Zaixi Zhang Princeton University princeton.edu의 이메일 확인됨 Huanrui Yang Assistant Professor, ECE, University of Arizona arizona.edu의 이메일 확인됨 Ning Jiang West China Hospital, Sichuan University ieee.org의 이메일 확인됨 Prof. Dr. Dario Farina Professor and Chair in Neurorehabilitation Engineering, Dept. Bioengineering, Imperial College imperial.ac.uk의 이메일 확인됨 Peng Gao Assistant Professor, Department of Computer Science, Virginia Tech vt.edu의 이메일 확인됨 Prateek Mittal Professor, Princeton University princeton.edu의 이메일 확인됨 Kurt Thomas Research Scientist @ Google google.com의 이메일 확인됨 Sanjeev Kulkarni Professor of Electrical and Computer Engineering, Princeton University princeton.edu의 이메일 확인됨 Risheng Liu Professor, Dalian University of Technology dlut.edu.cn의 이메일 확인됨 tianxiang zhou Postgraduate of Telecommunications, Huazhong University of Science and Technology hust.edu.cn의 이메일 확인됨 모두 보기 팔로우 Binghui Wang Assistant Professor, Illinois Institute of Technology iit.edu의 이메일 확인됨 - 홈페이지 Trustworthy Machine Learning Machine Learning Data Science 학술자료 인용 공개 액세스 공동 저자 제목 정렬 서지정보순 정렬 연도순 정렬 제목순 정렬 인용 인용 연도 Stealing hyperparameters in machine learning B Wang, NZ Gong 2018 IEEE symposium on security and privacy (SP), 36-52 , 2018 714 2018 Backdoor attacks to graph neural networks Z Zhang, J Jia, B Wang, NZ Gong SACMAT2021 , 2021 320 2021 Poisonedrag: Knowledge corruption attacks to retrieval-augmented generation of large language models W Zou, R Geng, B Wang, J Jia arXiv preprint arXiv:2402.07867 , 2024 282 2024 Soteria: Provable defense against privacy leakage in federated learning from representation perspective J Sun, A Li, B Wang, H Yang, H Li, Y Chen Proceedings of the IEEE/CVF conference on computer vision and pattern�… , 2021 257 2021 Preparation of a novel composite phase change material (PCM) and its locally enhanced heat transfer for power battery module D Zou, X Liu, R He, SX Zhu, J Bao, J Guo, Z Hu, B Wang Energy Conversion and Management 180, 1196-1202 , 2019 212 2019 Attacking Graph-based Classification via Manipulating the Graph Structure B Wang, NZ Gong ACM Conference on Computer and Communications Security (CCS) , 2019 210 2019 Lotteryfl: Personalized and communication-efficient federated learning with lottery ticket hypothesis on non-iid datasets A Li, J Sun, B Wang, L Duan, S Li, Y Chen, H Li arXiv preprint arXiv:2008.03371 , 2020 196 2020 Graphfl: A federated learning framework for semi-supervised node classification on graphs B Wang, A Li, M Pang, H Li, Y Chen 2022 IEEE International Conference on Data Mining (ICDM), 498-507 , 2022 181 2022 Random walk based fake account detection in online social networks J Jia, B Wang, NZ Gong 2017 47th annual IEEE/IFIP international conference on dependable systems�… , 2017 175 2017 On Certifying Robustness against Backdoor Attacks via Randomized Smoothing B Wang, X Cao, J Jia, NZ Gong 2020 CVPR Workshop - Best Abstract Award , 2020 150 2020 AttriInfer: Inferring user attributes in online social networks using markov random fields J Jia, B Wang, L Zhang, NZ Gong Proceedings of the 26th International Conference on World Wide Web, 1561-1569 , 2017 128 2017 Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing J Jia, X Cao, B Wang, NZ Gong International Conference on Learning Representations (ICLR) , 2020 125 2020 Sybilfuse: Combining local attributes with global structure to perform robust sybil detection P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal 2018 IEEE conference on communications and network security (CNS), 1-9 , 2018 125 * 2018 SybilSCAR: Sybil detection in online social networks via local rule based propagation B Wang, L Zhang, NZ Gong IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9 , 2017 123 2017 GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs B Wang, NZ Gong, H Fu IEEE International Conference on Data Mining (ICDM) , 2017 120 2017 Certified robustness of graph neural networks against adversarial structural perturbation B Wang, J Jia, X Cao, NZ Gong ACM SIGKDD'21 , 2021 116 2021 Lotteryfl: Empower edge intelligence with personalized and communication-efficient federated learning A Li, J Sun, B Wang, L Duan, S Li, Y Chen, H Li 2021 IEEE/ACM Symposium on Edge Computing (SEC), 68-79 , 2021 107 2021 Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability N Inkawhich, KJ Liang, B Wang, M Inkawhich, L Carin, Y Chen NeurIPS , 2020 106 2020 Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing B Wang*, J Jia*, X Cao, NZ Gong The Web Conference (WWW) , 2020 106 2020 A turn-on fluorescence probe Eu3+ functionalized Ga-MOF integrated with logic gate operation for detecting ppm-level ciprofloxacin (CIP) in urine B Wang, B Yan Talanta 208, 120438 , 2020 97 2020 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 학술자료 1–20 더보기 개인정보처리방침 약관 도움말 학술검색 정보 검색 도움말
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/get-list-of-supported-tokens
GET the list of Supported Tokens | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK GET the list of Supported Tokens On this page GET the list of Supported Tokens Get the list of Supported Tokens ​ Web Flutter const tokenList = await fuseSDK . tradeModule . fetchTokens ( ) ; console . log ( ` Tokens: ${ tokenList . length } ` ) ; final tokensData = await fuseSDK . tradeModule . fetchTokens ( ) ; tokensData . pick ( onData : ( List < TokenDetails > tokens ) { // Do you magic here } , onError : ( err ) { // Handle errors } , ) ; Edit this page Previous GET the Price Change in Interval Next Sponsored Transactions Get the list of Supported Tokens Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/live-streaming-software?trk=organization_guest_product_card_category_link
Best Live Streaming Software | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Video Producer (12) Video Streamer (4) Video Production Specialist (4) Digital Marketing Manager (4) Video Editor (3) See all products Find top products in Live Streaming Software category Software used to broadcast live video content online. - Transmit content on company websites or across social media platforms - Engage audience with interactive tools such as comment threads and polls - Restrict live stream access using authentication tokens, geoblocking, and password protections - Track number of viewers, location, and other audience analytics 201 results Cloudflare Stream Live Streaming Software by Cloudflare Cloudflare Stream is an affordable, scalable, on-demand video platform Streaming video on the Internet reliably at scale can be difficult. Cloudflare Stream lets you spend less time integrating and managing disparate video solutions and more time building your product by offering video encoding, storage, delivery, and playback in a single unified platform. Stream offers simple, comprehensive APIs for developers that are building for the long term. View product Tencent Real-Time Communication (TRTC) Live Streaming Software by Tencent Enable audio/video calls and interactive live streaming in your application in 30 minutes View product Tango Live Streaming Software by Tango The top live-streaming platform for content creators to share their talents and monetize their supporters. View, engage and support your favorite Broadcasters. View product BOCC Live Streaming Software by Akamai Technologies Akamai's Broadcast Operations Control Center (BOCC) is a managed solution to maintain and improve the quality, reliability and availability of your media streams. View product Media Services Live Live Streaming Software by Akamai Technologies Akamai Media Services Live enables live streaming video with our liveOrigin solution to provide broadcast reliability and scale to live streaming. View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights Liveu Live Streaming Software by Mogi I/O : OTT/Podcast/Short Video Apps for you Reach millions of users, with effortless and lightweight streams accessible anywhere! View product Kaltura AI Video Experience Cloud Live Streaming Software by Kaltura Driving virtual events, communication, learning, and TV experiences for millions of users daily. View product Muvi Live Live Streaming Software by Muvi.com Deliver brand-defining live video & audio experiences with Muvi Live. Stay empowered with a Do-It-Yourself webcast flow and securely deliver stunning buffer-free content from multiple cameras, multiple screens & platforms without any external support. View product Wowza Live Streaming Software by Wowza Wowza helps organizations harness the power of streaming by reducing the complexities of video and audio delivery to any device. Our full-service platform delivers reliable, secure, low-latency video delivery for companies worldwide. With more than a decade of experience working with 35,000+ organizations, Wowza provides the performance and flexibility today’s businesses require. Our streaming technology is trusted by market leaders in industries ranging from media and entertainment to healthcare and emergency response. And by offering a full-service platform and customized solutions, we work with each customer to ensure their success. View product OnTheFly.Stream Live Streaming Software by Contus Tech OnTheFly is a modern live-streaming platform designed for brands, streamers, creators, and more. With OnTheFly, you can multistream to over 50 channels at once and connect with a broader audience. Setting up and starting your streams takes just 5 minutes, so you can spend less time on tech and more time on creating. Hosting online webinars or conferences is made simple, and you can easily record your streams to reuse them later for marketing purposes. The platform is built to save you time, expand your reach, and make streaming as smooth as possible. Whether you’re a brand wanting to engage with your customers or a creator looking to grow your online community, OnTheFly is your go-to solution. The benefits are clear: faster setup, greater audience engagement, and the ability to repurpose content for future use. Stream with ease and focus on what matters most—your content and your audience. View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://scholar.google.com/citations?user=rejzeocAAAAJ&hl=ko&oe=ASCII
Elaine Shi - Google 학술 검색 로드 중... 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 연간 인용횟수 중복된 서지정보 다음 학술 문서는 학술검색에서 병합되어 있습니다. 총 인용 횟수가 첫 번째 학술 문서에 대해서만 계산됩니다. 병합된 서지정보 이 '인용' 횟수는 학술검색의 다음 학술 문서에 대한 인용문을 포함합니다. * 표시된 인용문은 프로필에 있는 학술 문서와 다를 수 있습니다. 공동 저자 추가 공동 저자 팔로우 이 저자의 새 학술자료 이 저자를 인용한 새 학술자료 이 저자의 연구와 관련된 새 학술자료 업데이트를 받을 이메일 주소 완료 죄송합니다. 현재 Internet Explorer 버전에서는 일부 기능이 작동하지 않을 수 있습니다. 최적의 상태로 사용하려면 Chrome 또는 Mozilla Firefox 를 사용해 주세요. 내 프로필 내 서재 통계 알리미 설정 로그인 로그인 내 프로필 만들기 인용 모두 보기 전체 2021년 이후 서지정보 41779 17210 h-index 88 64 i10-index 191 171 0 3900 1950 975 2925 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 117 247 294 416 381 534 701 833 1080 1388 1824 2211 2851 3494 3803 3842 3595 3535 3471 3320 3195 88 공개 액세스 모두 보기 모두 보기 자료 95개 자료 1개 공개 비공개 재정 지원 요구사항 기준 공동 저자 T-H. Hubert Chan Department of Computer Science, The University of Hong Kong cs.hku.hk의 이메일 확인됨 팔로우 Elaine Shi Carnegie Mellon University cs.cmu.edu의 이메일 확인됨 - 홈페이지 Cryptography Algorithms Security Distributed Systems 학술자료 인용 공개 액세스 공동 저자 제목 정렬 서지정보순 정렬 연도순 정렬 제목순 정렬 인용 인용 연도 Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858 , 2016 3528 2016 The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Proceedings of the 3rd international symposium on Information processing in�… , 2004 2214 2004 On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125 , 2016 1947 2016 Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas Journal of the ACM (JACM) 65 (4), 1-26 , 2018 1421 2018 Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90 , 2009 1270 2009 The honey badger of BFT protocols A Miller, Y Xia, K Croman, E Shi, D Song Proceedings of the 2016 ACM SIGSAC conference on computer and communications�… , 2016 1255 2016 Bitter to better—how to make bitcoin a better currency S Barber, X Boyen, E Shi, E Uzun International conference on financial cryptography and data security, 399-414 , 2012 1043 2012 Privacy-preserving aggregation of time-series data E Shi, THH Chan, E Rieffel, R Chow, D Song Network and Distributed System Security Symposium (NDSS) , 2011 1012 2011 Town crier: An authenticated data feed for smart contracts F Zhang, E Cecchetti, K Croman, A Juels, E Shi Proceedings of the 2016 aCM sIGSAC conference on computer and communications�… , 2016 958 2016 Designing secure sensor networks E Shi, A Perrig IEEE Wireless Communications 11 (6), 38-43 , 2004 908 2004 Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi International conference on financial cryptography and data security, 79-94 , 2016 836 2016 Practical dynamic searchable encryption with small leakage E Stefanov, C Papamanthou, E Shi Cryptology ePrint Archive , 2013 832 2013 Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364 , 2007 780 2007 Stubborn mining: Generalizing selfish mining and combining with an eclipse attack K Nayak, S Kumar, A Miller, E Shi 2016 ieee european symposium on security and privacy (euros&P), 305-320 , 2016 714 2016 Private and continual release of statistics THH Chan, E Shi, D Song ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-24 , 2011 703 2011 Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems A Seshadri, M Luk, E Shi, A Perrig, L Van Doorn, P Khosla Proceedings of the twentieth ACM symposium on Operating systems principles, 1-16 , 2005 602 2005 Oblivious RAM with O ((log N ) 3 ) Worst-Case Cost E Shi, THH Chan, E Stefanov, M Li International Conference on The Theory and Application of Cryptology and�… , 2011 575 2011 Hybrid consensus: Efficient consensus in the permissionless model R Pass, E Shi Cryptology ePrint Archive , 2016 568 2016 Predicate privacy in encryption systems E Shen, E Shi, B Waters Theory of Cryptography Conference, 457-473 , 2009 564 2009 Fruitchains: A fair blockchain R Pass, E Shi Proceedings of the ACM symposium on principles of distributed computing, 315-324 , 2017 525 2017 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 학술자료 1–20 더보기 개인정보처리방침 약관 도움말 학술검색 정보 검색 도움말
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/web-application-firewalls
Best Web Application Firewalls (WAF) | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Chief Information Security Officer (13) Chief Information Officer (7) Security Professional (6) Information Technology Specialist (6) Chief Technology Officer (5) See all products Find top products in Web Application Firewalls (WAF) category Software used to protect web-based applications and application programming interfaces from threats. - Monitor and filter traffic to and from web applications - Automatically block malicious or anomalous application access and activity 79 results Cloudflare WAF Web Application Firewalls (WAF) by Cloudflare Built for the modern enterprise architecture An intelligent, integrated, and scalable solution to protect your business-critical web applications from malicious attacks, with no changes to your existing infrastructure. View product Akamai Web Application Protector Web Application Firewalls (WAF) by Akamai Technologies Web Application Protector is designed to meet the needs of enterprises to easily protect web assets from web application attacks and DDoS attacks with much less maintenance than traditional firewalls. View product Imperva Web Application Firewall (WAF) Web Application Firewalls (WAF) by Imperva Imperva's Web Application Firewall (WAF) provides out-of-the-box security for your web applications. It detects and prevents cyber threats, ensuring seamless operations and peace of mind. Protect your digital assets with Imperva's robust, industry-leading solution. Awards: Imperva has been recognized as a 7-time Leader in the Gartner Magic Quadrant for Web Application Firewalls. View product Advanced API Security Web Application Firewalls (WAF) by Wallarm: API Security Leader Wallarm is the platform Dev, Sec, and Ops teams choose to build cloud-native APIs securely, monitor them for modern threats, and get alerted when threats arise. View product Radware Cloud WAF Web Application Firewalls (WAF) by Radware Radware’s Cloud WAF Service is a web application firewall that provides continuous adaptive web application security protection and full coverage of OWASP Top 10 threats. View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights Alibaba Web Application Firewall Web Application Firewalls (WAF) by Alibaba Cloud Web Application Firewall (WAF) protects your website servers against intrusions, detects and blocks malicious traffic directed to your websites and applications. View product DNSFilter Web Application Firewalls (WAF) by DNSFilter DNSFilter protects every click, leveraging AI-driven content filtering and threat protection to block threats 10 days earlier than competitors and secure users everywhere they work. View product AppTrana WAAP Web Application Firewalls (WAF) by Indusface AppTrana WAAP - A unified platform to discover, protect, and monitor your public websites & APIs in real time. 1. Discover all public IPs, apps, sub-domains, websites and other assets 2. Scan websites, APIs and mobile apps for vulnerabilities and malware 3. Protect websites and APIs from vulnerability, DDoS, and bot attacks 4. Monitor anomalies in site traffic and take preventive actions View product Medianova WAF Web Application Firewalls (WAF) by Medianova Protect Your Web Application and APIs with Medianova WAF without Compromising performance Types of Attacks We Protect You From SQL Injection Cross-Site Scripting (XSS) Local File Inclusion Remote File Inclusion PHP Code Injection Java Code Injection Shellshock Unix/Windows Shell Injection and more. Security at The Edge Extend your security perimeter and block attacks at the edge, before they ever reach the origin. Improve your defense with Medianova WAF, which runs on our powerful global edge network that is distributed among 50+ data centers. Managed Rulesets & Customized Rules Protect your Apps and APIs against sophisticated attacks reported by OWASP “Top 10 Security Risks” list, such as Cross-Site-Scripting (XSS) and SQL Injection. Define customized rules for tailored protection and prevent false-positives. Continuous Update of WAF Rulesets Maintain effective protection against emerging threats and vulnerabilities. View product Drupal Steward Web Application Firewalls (WAF) by Drupal Association Drupal Steward is a web application firewall that bridges the gap between the time when a security release is announced and when your site is fully updated with the new security patch. This globally distributed service from the Drupal Security Team and the Drupal Association provides immediate, affordable protection for your website, while giving your IT team the flexibility to implement site updates without disrupting other priorities. View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://confluence.atlassian.com/bamboo/administering-bamboo-289277113.html
Administering Bamboo | Bamboo Data Center 12.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo latest Documentation Unable to load Atlassian Support Bamboo 12.1 Documentation Administering Bamboo Data Center 12.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Administering Bamboo Bamboo documentation Getting started with Bamboo Installing and upgrading Using Bamboo Bamboo Best Practice Administering Bamboo Bamboo Specs Bamboo FAQ Exporting existing plan configuration to Bamboo YAML Specs Bamboo Data Center On this page In this section System settings Agents and capabilities Working with Elastic Bamboo Quick filters Users and permissions Connect Bamboo to an external database Connect Bamboo to an H2 database Apps Data and backups Security Advanced actions Collecting analytics for Bamboo Bamboo Instance Health check Lockout recovery process Configuring announcement banner Bamboo guardrails Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community Bamboo is a continuous integration (CI) and deployment server. Bamboo assists software development teams by providing: automated building and testing of software source-code status. updates on successful/failed builds. reporting tools for statistical analysis. visibility into, and control over, release artifacts and environments. This administration guide has information about managing the Bamboo server itself. Please see Using Bamboo for help with setting up CI builds and deployments. Administering System settings Configuring the Bamboo server. Agents and capabilities Setting up services, including Elastic Bamboo, to perform builds. Users and permissions Managing users, groups and their permissions. Apps Extending Bamboo. Data and backups Managing databases, data and backups. Security Managing security for agents and Elastic Bamboo. Installing Installing Bamboo on Linux Bamboo installation guide for Mac OS X Installing Bamboo on Windows Connect Bamboo to an external database Bamboo remote agent installation guide Supported platforms See also Getting started Using Bamboo Bamboo Release Notes Bamboo security advisories Last modified on Jun 24, 2020 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section System settings Agents and capabilities Working with Elastic Bamboo Quick filters Users and permissions Connect Bamboo to an external database Connect Bamboo to an H2 database Apps Data and backups Security Advanced actions Collecting analytics for Bamboo Bamboo Instance Health check Lockout recovery process Configuring announcement banner Bamboo guardrails Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://bit.ly/49argpv?trk=organization_guest_main-feed-card-text
Investigate Live Chainalysis Webinar - Chainalysis This site requires JavaScript to function correctly. Webinar 29 Jan 2026, 11:00 AM GMT+8 | 2:00 PM GMT+11 | 4:00 PM GMT+13 Investigate Live with Chainalysis: Inside Ryan Wedding’s Billion-Dollar Cocaine Empire Once an Olympian-caliber snowboarder, Ryan Wedding is now alleged to be one of the most significant cocaine traffickers operating across Colombia, Mexico, the United States, and Canada. According to an unsealed U.S. Department of Justice indictment, investigators believe Wedding led a billion-dollar drug trafficking organization, laundering hundreds of millions of dollars through cash, cryptocurrency, and luxury assets. As law enforcement pressure mounted – shipments seized, couriers arrested, and a long-time associate turned informant – the enterprise reportedly escalated to extreme violence to protect the operation. In this Investigate Live with Chainalysis webinar, our investigations team picks up the story where the money trail moves on-chain, examining wallet addresses cited in the indictment and demonstrating how blockchain intelligence was used to uncover laundering patterns tied to large-scale narcotics trafficking. Register now What You’ll Learn How transnational drug cartels use cryptocurrency to launder proceeds Real on-chain laundering patterns linked to narcotics trafficking How investigators analyze high-value wallets and stablecoin flows Practical investigative techniques using Chainalysis Reactor (next-gen) Why blockchain transparency is increasingly critical to modern investigations Who Should Attend Law enforcement and investigative agencies Financial intelligence units (FIUs) Compliance, AML, and fraud professionals Regulators and prosecutors Crypto exchanges and financial institutions Speakers Nathan Ackarie Investigations Chainalysis Michelle Rizal Training Chainalysis
2026-01-13T09:29:16
https://huggingface.co/datasets?format=format%3Ajson
Datasets in json – Hugging Face Hugging Face Models Datasets Spaces Community Docs Enterprise Pricing Log In Sign Up 1T","label":"> 1T","type":"size_categories"}],"format":[{"id":"format:json","label":"json","type":"format"},{"id":"format:csv","label":"csv","type":"format"},{"id":"format:parquet","label":"parquet","type":"format"},{"id":"format:optimized-parquet","label":"optimized-parquet","type":"format"},{"id":"format:imagefolder","label":"imagefolder","type":"format"},{"id":"format:audiofolder","label":"soundfolder","type":"format"},{"id":"format:webdataset","label":"webdataset","type":"format"},{"id":"format:text","label":"text","type":"format"},{"id":"format:arrow","label":"arrow","type":"format"}],"benchmark":[{"id":"benchmark:official","label":"Benchmark","type":"benchmark"}]},"numItemsPerPage":30,"numTotalItems":60305,"pageIndex":0,"searchQuery":"","sortBy":""}}"> Edit Datasets filters Main Tasks Libraries Languages Licenses Other Modalities 3D Audio Document Geospatial Image Tabular Text Time-series Video Size (rows) Reset Size < 1K > 1T Format Reset Format json csv parquet optimized-parquet imagefolder soundfolder webdataset text arrow Evaluation Benchmark Apply filters Datasets 60,305 Full-text search Edit filters Sort:  Trending Active filters: json Clear all xiuhuywh/DRIM-VisualReasonHard Viewer • Updated 4 days ago • 17.1k • 1.8k • 96 MiniMaxAI/OctoCodingBench Viewer • Updated about 5 hours ago • 72 • 68 TeichAI/glm-4.7-2000x Viewer • Updated 21 days ago • 1.98k • 339 • 71 Anthropic/hh-rlhf Viewer • Updated May 26, 2023 • 169k • 22.7k • 1.63k TeichAI/claude-4.5-opus-high-reasoning-250x Viewer • Updated Nov 28, 2025 • 250 • 8.33k • 161 m-a-p/COIG-CQIA Viewer • Updated Apr 18, 2024 • 44.7k • 5.12k • 691 Bingguang/HardGen Viewer • Updated 5 days ago • 17k • 281 • 65 LEMAS-Project/LEMAS-Dataset-train Viewer • Updated 4 days ago • 125M • 3.62k • 15 proj-persona/PersonaHub Viewer • Updated Sep 26, 2025 • 375k • 14.1k • 702 Logics-MLLM/Logics-STEM-SFT-Dataset-2.2M Viewer • Updated 7 days ago • 1.07M • 1.25k • 9 FreedomIntelligence/medical-o1-reasoning-SFT Viewer • Updated Apr 22, 2025 • 90.1k • 5.48k • 1.04k Mxode/Chinese-Instruct Viewer • Updated May 9, 2025 • 4.85M • 1.18k • 141 oolongbench/oolong-real Viewer • Updated Nov 5, 2025 • 13.2k • 800 • 9 nvidia/Nemotron-Math-Proofs-v1 Viewer • Updated 8 days ago • 925k • 2.01k • 95 HuggingFaceH4/MATH-500 Benchmark • Updated 29 days ago • 500 • 97.8k • 278 nvidia/Llama-Nemotron-Post-Training-Dataset Viewer • Updated May 8, 2025 • 3.91M • 5.27k • 641 TeichAI/MiniMax-M2.1-8800x Viewer • Updated 4 days ago • 8.82k • 165 • 8 NousResearch/hermes-function-calling-v1 Viewer • Updated 10 days ago • 11.6k • 1.71k • 370 nvidia/Nemotron-Instruction-Following-Chat-v1 Viewer • Updated 29 days ago • 288k • 5.25k • 112 nvidia/Nemotron-Cascade-SFT-Stage-1 Viewer • Updated 26 days ago • 3.62M • 2.14k • 15 google/mobile-actions Viewer • Updated 26 days ago • 9.65k • 7.48k • 225 yahma/alpaca-cleaned Viewer • Updated Apr 10, 2023 • 51.8k • 23.8k • 757 databricks/databricks-dolly-15k Viewer • Updated Jun 30, 2023 • 15k • 18.2k • 899 BelleGroup/train_3.5M_CN Viewer • Updated Aug 16, 2023 • 3.61M • 1.03k • 147 nvidia/Granary Viewer • Updated Aug 14, 2025 • 116M • 3.42k • 169 neurlang/Minecraft-Skins-Captioned-1M Viewer • Updated Oct 14, 2025 • 1M • 79 • 5 MuskumPillerum/General-Knowledge Viewer • Updated Dec 7, 2025 • 37.6k • 315 • 32 teknium/trismegistus-project Viewer • Updated Oct 14, 2023 • 13.5k • 141 • 77 BoKelvin/SLAKE Viewer • Updated Feb 28, 2024 • 14k • 2.13k • 45 RZ412/PokerBench Viewer • Updated 5 days ago • 574k • 1.14k • 31 Previous 1 2 3 ... 100 Next System theme Company TOS Privacy About Careers Website Models Datasets Spaces Pricing Docs
2026-01-13T09:29:16
https://huggingface.co/datasets?modality=modality%3Aaudio
Audio Datasets – Hugging Face Hugging Face Models Datasets Spaces Community Docs Enterprise Pricing Log In Sign Up 1T","label":"> 1T","type":"size_categories"}],"format":[{"id":"format:json","label":"json","type":"format"},{"id":"format:csv","label":"csv","type":"format"},{"id":"format:parquet","label":"parquet","type":"format"},{"id":"format:optimized-parquet","label":"optimized-parquet","type":"format"},{"id":"format:imagefolder","label":"imagefolder","type":"format"},{"id":"format:audiofolder","label":"soundfolder","type":"format"},{"id":"format:webdataset","label":"webdataset","type":"format"},{"id":"format:text","label":"text","type":"format"},{"id":"format:arrow","label":"arrow","type":"format"}],"benchmark":[{"id":"benchmark:official","label":"Benchmark","type":"benchmark"}]},"numItemsPerPage":30,"numTotalItems":25944,"pageIndex":0,"searchQuery":"","sortBy":""}}"> Edit Datasets filters Main Tasks Libraries Languages Licenses Other Modalities Reset Modalities 3D Audio Document Geospatial Image Tabular Text Time-series Video Size (rows) Reset Size < 1K > 1T Format json csv parquet optimized-parquet imagefolder soundfolder webdataset text arrow Evaluation Benchmark Apply filters Datasets 25,944 Full-text search Edit filters Sort:  Trending Active filters: audio Clear all MLCommons/peoples_speech Viewer • Updated Nov 20, 2024 • 8.05M • 13.6k • 246 OmniAICreator/ASMR-Archive-Processed Viewer • Updated 4 days ago • 17.2M • 24.9k • 60 nvidia/AudioSkills Preview • Updated 5 days ago • 2.77k • 36 openslr/librispeech_asr Viewer • Updated Jul 25, 2025 • 585k • 46.9k • 205 openai/gdpval Viewer • Updated Sep 25, 2025 • 220 • 26.3k • 436 yfish/WESR-Bench Viewer • Updated 4 days ago • 927 • 41 • 6 gaia-benchmark/GAIA Viewer • Updated Oct 28, 2025 • 932 • 16.3k • 588 Flux9665/BibleMMS Viewer • Updated Jun 16, 2024 • 736k • 2.86k • 80 SparkAudio/voxbox Viewer • Updated Apr 15, 2025 • 23.8M • 14.3k • 69 facebook/omnilingual-asr-corpus Viewer • Updated Nov 14, 2025 • 548k • 7.79k • 185 simon3000/genshin-voice Viewer • Updated Apr 22, 2025 • 424k • 5.77k • 210 riotu-lab/ARCADE-full Viewer • Updated 1 day ago • 6.91k • 68 • 4 FBK-MT/MCIF Viewer • Updated 29 days ago • 3.84k • 5.13k • 67 Atnafu/Afri-MCQA Viewer • Updated about 18 hours ago • 14.6k • 183 • 4 joujiboi/japanese-anime-speech Viewer • Updated Sep 6, 2024 • 73k • 1.86k • 140 IntelLabs/Intel_Robotic_Welding_Multimodal_Dataset Updated Sep 23, 2025 • 23 • 15 amphion/Emilia-Dataset Viewer • Updated Feb 28, 2025 • 54.8M • 65.1k • 411 SPRINGLab/IndicTTS-Hindi Viewer • Updated Nov 5, 2024 • 11.8k • 529 • 30 nyuuzyou/suno Preview • Updated Nov 20, 2024 • 109 • 80 MrDragonFox/Elise Viewer • Updated Mar 27, 2025 • 1.2k • 1.25k • 119 pnnbao-ump/VieNeu-TTS-1000h Viewer • Updated Nov 25, 2025 • 421k • 89 • 11 tencent/VCB-Bench Preview • Updated 20 days ago • 1.08k • 7 MohamedRashad/MGB-3-Arabic Viewer • Updated 16 days ago • 6.55k • 104 • 6 AAdonis/multilingual_audio_alignments Viewer • Updated 3 days ago • 13.5M • 3.23k • 3 ShiroOnigami23/emotion-voice-dataset Viewer • Updated 2 days ago • 7.7k • 78 • 3 ccmusic-database/acapella Viewer • Updated Feb 17, 2025 • 132 • 261 • 33 MikhailT/hifi-tts Viewer • Updated Nov 30, 2023 • 648k • 2.27k • 32 TingChen-ppmc/Shanghai_Dialect_Conversational_Speech_Corpus Viewer • Updated May 31, 2024 • 3.79k • 24 • 6 mythicinfinity/libritts Viewer • Updated Feb 9, 2024 • 756k • 2.47k • 27 fixie-ai/common_voice_17_0 Viewer • Updated Jan 17, 2025 • 11.4M • 19.3k • 14 Previous 1 2 3 ... 100 Next System theme Company TOS Privacy About Careers Website Models Datasets Spaces Pricing Docs
2026-01-13T09:29:16
https://www.linkedin.com/products/t-systems-business-cockpit/?trk=products_seo_search
Business Cockpit | LinkedIn Skip to main content LinkedIn T-Systems International in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Business Cockpit Business Process Management Software by T-Systems International See who's skilled in this Add as skill Learn more Report this product About Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. This product is intended for Manager Process Manager Automotive Manager Business Analyst Senior Business Analyst Project Manager Automotive Consultant Logistics Specialist Media Products media viewer No more previous content Business Cockpit Erklärvideo Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Onepager Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Interview Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software CaseXellence CaseXellence Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less T-Systems International products CARbon Footprint Fleet Optimizer CARbon Footprint Fleet Optimizer Sustainability Software Content as a Service (CaaS) Content as a Service (CaaS) Enterprise Content Management (ECM) Software DocuSign DocuSign E-Signature Software ImageMaster ImageMaster Enterprise Content Management (ECM) Software Limago Limago Translation Management Software MatchMaker MatchMaker Automotive Marketing Software Open Telekom Cloud Open Telekom Cloud Infrastructure as a Service (IaaS) Recycling App Recycling App Sustainability Software TypeMaster TypeMaster Enterprise Content Management (ECM) Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://scholar.google.com/citations?user=XpHwrPsAAAAJ&hl=ko&oe=ASCII
Ninghui Li - Google 학술 검색 로드 중... 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 연간 인용횟수 중복된 서지정보 다음 학술 문서는 학술검색에서 병합되어 있습니다. 총 인용 횟수가 첫 번째 학술 문서에 대해서만 계산됩니다. 병합된 서지정보 이 '인용' 횟수는 학술검색의 다음 학술 문서에 대한 인용문을 포함합니다. * 표시된 인용문은 프로필에 있는 학술 문서와 다를 수 있습니다. 공동 저자 추가 공동 저자 팔로우 이 저자의 새 학술자료 이 저자를 인용한 새 학술자료 이 저자의 연구와 관련된 새 학술자료 업데이트를 받을 이메일 주소 완료 죄송합니다. 현재 Internet Explorer 버전에서는 일부 기능이 작동하지 않을 수 있습니다. 최적의 상태로 사용하려면 Chrome 또는 Mozilla Firefox 를 사용해 주세요. 내 프로필 내 서재 통계 알리미 설정 로그인 로그인 내 프로필 만들기 인용 모두 보기 전체 2021년 이후 서지정보 29420 9947 h-index 81 47 i10-index 194 123 0 2100 1050 525 1575 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 82 178 275 428 582 680 937 1009 1152 1091 1149 1170 1271 1306 1326 1467 1466 1595 1805 1937 1888 2087 2057 1927 48 공개 액세스 모두 보기 모두 보기 자료 59개 자료 6개 공개 비공개 재정 지원 요구사항 기준 팔로우 Ninghui Li Professor of Computer Science, Purdue University cs.purdue.edu의 이메일 확인됨 - 홈페이지 Privacy 학술자료 인용 공개 액세스 제목 정렬 서지정보순 정렬 연도순 정렬 제목순 정렬 인용 인용 연도 t-closeness: Privacy beyond k-anonymity and l-diversity N Li, T Li, S Venkatasubramanian 2007 IEEE 23rd international conference on data engineering, 106-115 , 2006 5295 2006 Design of a role-based trust-management framework N Li, JC Mitchell, WH Winsborough Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130 , 2002 1127 2002 Locally differentially private protocols for frequency estimation T Wang, J Blocki, N Li, S Jha 26th USENIX security symposium (USENIX Security 17), 729-745 , 2017 793 2017 Purpose based access control of complex data for privacy protection JW Byun, E Bertino, N Li Proceedings of the tenth ACM symposium on Access control models and�… , 2005 719 2005 Delegation logic: A logic-based approach to distributed authorization N Li, BN Grosof, J Feigenbaum ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171 , 2003 612 2003 Distributed credential chain discovery in trust management N Li, WH Winsborough, JC Mitchell Proceedings of the 8th ACM Conference on Computer and Communications�… , 2001 583 2001 Using probabilistic generative models for ranking risks of android apps H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ... Proceedings of the 2012 ACM conference on Computer and communications�… , 2012 555 2012 Efficient k -Anonymization Using Clustering Techniques JW Byun, A Kamra, E Bertino, N Li International conference on database systems for advanced applications, 188-200 , 2007 551 2007 Android permissions: a perspective combining risks and benefits BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy Proceedings of the 17th ACM symposium on Access Control Models and�… , 2012 474 2012 On the tradeoff between privacy and utility in data publishing T Li, N Li Proceedings of the 15th ACM SIGKDD international conference on Knowledge�… , 2009 473 2009 Slicing: A new approach for privacy preserving data publishing T Li, N Li, J Zhang, I Molloy IEEE transactions on knowledge and data engineering 24 (3), 561-574 , 2010 450 2010 Privacy at scale: Local differential privacy in practice G Cormode, S Jha, T Kulkarni, N Li, D Srivastava, T Wang Proceedings of the 2018 international conference on management of data, 1655�… , 2018 421 2018 On sampling, anonymization, and differential privacy or, k -anonymization meets differential privacy N Li, W Qardaji, D Su Proceedings of the 7th ACM Symposium on Information, Computer and�… , 2012 391 2012 Differentially private grids for geospatial data W Qardaji, W Yang, N Li 2013 IEEE 29th international conference on data engineering (ICDE), 757-768 , 2013 384 2013 A study of probabilistic password models J Ma, W Yang, M Luo, N Li 2014 IEEE Symposium on Security and Privacy, 689-704 , 2014 378 2014 RT: A role-based trust-management framework N Li, JC Mitchell Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212 , 2003 373 2003 Purpose based access control for privacy protection in relational database systems JW Byun, N Li The VLDB Journal 17 (4), 603-619 , 2008 368 2008 Towards practical automated trust negotiation WH Winsborough, N Li Proceedings Third International Workshop on Policies for Distributed Systems�… , 2002 368 2002 Datalog with Constraints: A Foundation for Trust Management Languages N Li, JC Mitchell International Symposium on Practical Aspects of Declarative Languages, 58-73 , 2002 366 2002 Security analysis in role-based access control N Li, MV Tripunitara ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420 , 2006 324 2006 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 학술자료 1–20 더보기 개인정보처리방침 약관 도움말 학술검색 정보 검색 도움말
2026-01-13T09:29:16
https://www.linkedin.com/products/digitalocean-block-storage/?trk=products_details_guest_similar_products_section_similar_products_section_product_link_result-card_image-click
DigitalOcean Block Storage | LinkedIn Skip to main content LinkedIn DigitalOcean in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in DigitalOcean Block Storage Block Storage Software by DigitalOcean See who's skilled in this Add as skill Learn more Report this product About Block storage gives developers scalable and highly available SSD-based cloud storage to attach to Droplets. From 1GB to 16TB, priced at $0.10/GB per month. Media Products media viewer No more previous content No more next content Similar products Tencent Cloud Block Storage Tencent Cloud Block Storage Block Storage Software OVHcloud Block Storage OVHcloud Block Storage Block Storage Software Vultr Vultr Block Storage Software Vultr Bare Metal Vultr Bare Metal Block Storage Software DataCore SANsymphony DataCore SANsymphony Block Storage Software Vultr Block Storage Vultr Block Storage Block Storage Software Sign in to see more Show more Show less DigitalOcean products Spaces Spaces Object Storage Software LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://www.atlassian.com/trust/security
Comprehensive Data Protection | Atlassian Close View this page in your language ? All languages Choose your language 中文 Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Português Pусский Polski Get it free Products Featured Developers Product Managers IT professionals Business Teams Leadership Teams Featured Developers Product Managers IT professionals Business Teams Leadership Teams See all apps Featured FEATURED APPS Jira Flexible project management Confluence Collaborative knowledge workspace Jira Service Management High-velocity service delivery ATLASSIAN COLLECTIONS Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Optimize strategy and outcomes confidently Focus • Talent • Align Deliver service at high-velocity Jira Service Management • Customer Service Management • Assets • Rovo Ship high-quality software fast Rovo Dev • DX • Pipelines • Bitbucket • Compass POWERED BY Rovo AI-powered apps – driven by your team's knowledge. Developers Jira Flexible project management Compass Software catalog for teams Pipelines Scalable CI/CD automation Bitbucket Source code and CI/CD DX Measure productivity and AI impact Rovo Dev Agentic AI for developers Ship high-quality software fast Rovo Dev • DX • Pipelines • Bitbucket • Compass Rovo AI-powered apps – driven by your team's knowledge. Product Managers Jira Flexible project management Confluence Knowledge, all in one place Jira Product Discovery Capture & prioritize ideas Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Rovo AI-powered apps – driven by your team's knowledge. IT professionals Jira Service Management High-velocity service delivery Guard Enhanced cloud security Rovo AI-powered apps – driven by your team's knowledge. Business Teams Jira Flexible project management Confluence Knowledge, all in one place Trello Organized & visualized work Loom Quick, async video updates Jira Service Management High-velocity service delivery Customer Service Management Customer experiences reimagined Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Rovo AI-powered apps – driven by your team's knowledge. Leadership Teams Focus Enterprise-scale strategic planning Talent Knowledge workforce planning Jira Align Enterprise-wide work planning & value Optimize strategy and outcomes confidently Focus • Talent • Align Rovo AI-powered apps – driven by your team's knowledge. Back Solutions Solutions By use case Team collaboration Strategy and planning Service management Software development By team Software Marketing IT By size Enterprise Small business Startup Non-profit By industry Retail Telecommunications Professional services Government Rovo AI-powered apps – driven by your team's knowledge. Back Why Atlassian Why Atlassian System of Work New Atlassian's blueprint for how teams work together Integrations Connect thousands of apps to your Atlassian products Customers Case studies & stories powered by teamwork FedRAMP Compliant solutions for the public sector Resilience Enterprise-grade & highly performant infrastructure Platform Our deeply integrated, reliable & secure platform Trust center Ensure your data’s security, compliance & availability Back Resources Resources Customer Support Ask questions, report bugs & give us feedback Find Partners Consulting, training & product customization support Atlassian Ascend Resources and support for your transformation Community Learn, connect and grow with the Atlassian Community support General inquiries Product Advice Partner support Enterprise support Technical Support Pricing and Billing Developer support Purchasing & Licensing Resources Project Management Agile Atlassian Learning Get Started Project Collaboration Team Playbook Product Documentation Back Enterprise More + Less - Get it free Jira Flexible project management Jira Service Management High-velocity service delivery Confluence Knowledge, all in one place See all products Get it free Back Get it free Trust Center Resilience Security Compliance AI More + Less - Comprehensive data protection Protect your organization by partnering with Atlassian to help ensure your data is secure, private, compliant, and available. A layered approach to data protection Empower your teams to do their best work — without compromising your data. Security IAM Privacy Recovery Security IAM Privacy Recovery Data security Our platform and processes follow security best practices for a layered approach to protect your data. We have tools such as the detections program , secure software development , and external penetration testing, paired with a growing set of controls to help you safeguard your data. See security practices Security and risk responses Download pre-filled vendor security assessment questionnaires. Access the questionnaires Data protection whitepaper Learn how you can partner with Atlassian to protect your most vital assets. Download the whitepaper Security advisories Stay in the know on current security advisories. See security advisories Identity and access management Limit privileged access and take a zero trust approach to protect your users and data. Apply the same organization-wide IAM principles across Atlassian products using Atlassian Guard to connect an identity provider, enforce SSO and MFA, manage external user security, and more. Zero trust principles Take a zero trust approach to reduce the risk of data compromise. Learn about zero trust Effective user management Manage users in Atlassian Cloud with confidence. Learn about user management Organization-wide IAM Extend your IAM policies in Atlassian Cloud. Set up Atlassian Guard Data privacy We’re committed to maintaining trust through transparent policies. With multiple layers of protection, you stay in the driver’s seat to manage how and where your data is accessed. Review our privacy program Privacy policy Learn about how we collect, use, and disclose personal data. View our privacy policy Data processing addendum Review how we process personal data across our products. View our DPA and FAQs Security Measures We maintain appropriate technical and organizational measures to protect personal data. View our security measures Teamwork solutions built on trust If you feel like privacy laws are evolving quickly, you’re not alone. Subscribe to get updates whenever we make changes to our privacy policy and get the latest on how we’re addressing changes in the market. Sign up for updates Data recovery Atlassian maintains a standby replica in different availability zones for redundancy and failover capability. You are empowered with data recovery capabilities, such as backup and restore manager, site/product delayed deletion, and site resurrection. High-availability and failover Understand how Atlassian manages customer data. Review platform resilience Reliability at scale Review Atlassian’s Service Level Agreement. See our SLA policy Architecture Hosted on AWS to provide additional resiliency and recovery capabilities. Learn about cloud architecture enterprise-level compliance Our compliance certifications Stay on top of evolving regulatory expectations worldwide with our growing list of compliance certifications. Our cloud apps regularly undergo independent verification of their security, privacy, and compliance controls to ensure they meet global standards. Learn more about compliance Customers trust us to protect their data 1/3 “We trust Atlassian to take care of security, availability, and scalability, freeing up time for us to focus on more strategic topics. Moving to the cloud has been a chance to improve today and prepare for our future.” Tim Brutscher Enterprise IT Architect, Software AG Read their story 2/3 “We’ve been able to put in place security parameters to ensure vendor data integrity and security where necessary, while having a holistic view across the enterprise.” Said Berrahil Vice President of 5G Technology, DISH Wireless Read their story 3/3 “With automatic updates, we always know the system is up to date. We don’t have to worry about security and vulnerabilities or spend resources on them. The peace of mind is a big deal.” Marty Hagewood Software Development Manager, EMC Insurance Read their story ← → Have questions? Contact us. Reach out to our sales team for questions about our products and capabilities. Contact sales Company Careers Events Blogs Investor Relations Atlassian Foundation Press kit Contact us products Rovo Jira Jira Align Jira Service Management Confluence Loom Trello Bitbucket See all products Resources Technical support Purchasing & licensing Atlassian Community Knowledge base Marketplace My account Create support ticket Learn Partners Training & certification Documentation Developer resources Enterprise services See all resources Copyright © 2025 Atlassian Privacy Policy Terms Impressum Choose language Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Polski Português русский 中文
2026-01-13T09:29:16
https://support.atlassian.com/products/
Atlassian Support Skip to main content Support Apps Resources Contact us Sign in Sign in How can we help? Find answers via Atlassian support resources Featured content Change Atlassian account email addresses Deactivate a managed account Give users admin permissions Control how users get access to apps Configure SAML single sign-on with an identity provider Understand user provisioning What are permission schemes in Jira? Verify a domain to manage accounts IP addresses and domains for Atlassian cloud apps Browse by apps Cloud Data Center Jira Software Jira Service Management Confluence Bitbucket Trello See all other apps Jira Software Jira Service Management Jira Core Confluence Bitbucket See all other apps Browse resources Community Find answers, support, and inspiration from other Atlassian users. Visit Atlassian Community System Status Check the health of our cloud apps and services. View system status Suggestions and bug reports Find existing feature suggestions and bug reports. View suggestions and bugs Marketplace apps Find features to customize your apps. View Marketplace Billing and licensing See FAQs about billing and licensing. View FAQs Training and Certification Develop new skills, improve your team’s work, and advance your professional career. View training Developers Find API documentation and guides for developing apps and integrations. View developer docs Enterprise Learn about Atlassian Enterprise and its Data Center products. View enterprise documentation Government Cloud Support Get technical and migration support for an Atlassian Government project. Log in to contact support Success Central Get help adopting your apps with a library of content authored by Atlassian and partner experts. View Success Central Not finding the help you need? Copyright © 2026 Atlassian
2026-01-13T09:29:16
https://confluence.atlassian.com/bamboo/bamboo-best-practice-388401018.html
Bamboo Best Practice | Bamboo Data Center 12.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo latest Documentation Unable to load Atlassian Support Bamboo 12.1 Documentation Bamboo Best Practice Data Center 12.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Bamboo Best Practice Bamboo documentation Getting started with Bamboo Installing and upgrading Using Bamboo Bamboo Best Practice Administering Bamboo Bamboo Specs Bamboo FAQ Exporting existing plan configuration to Bamboo YAML Specs Bamboo Data Center On this page In this section Bamboo Best Practice - System Requirements Bamboo Best Practice - Using stages Bamboo Best Practice - Branching and DVCS Bamboo Best Practice - Sharing artifacts Bamboo Best Practice - Using Agents Bamboo integrations Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community Bamboo is a fantastic tool for continuous integration and deployment. It offers a powerful tool for automating software development, however knowledge of some of the tips and tricks that our Bamboo masters use can help reduce friction within your own development cycles. This user guide has information about how to get the best out of Bamboo, and includes a number of scenarios and best practice approaches. Please see  Using Bamboo for more information on specific Bamboo installation, configuration, and usage. Best practice topics Using stages Branching & DVCS System Requirements Sharing artifacts Using Agents Installing Bamboo upgrade guide Installing Bamboo on Linux Installing Bamboo on Mac OS X Installing Bamboo on Windows Connect Bamboo to an external database Bamboo remote agent installation guide Supported platforms Last modified on Aug 25, 2021 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section Bamboo Best Practice - System Requirements Bamboo Best Practice - Using stages Bamboo Best Practice - Branching and DVCS Bamboo Best Practice - Sharing artifacts Bamboo Best Practice - Using Agents Bamboo integrations Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://www.linkedin.com/company/broadcom?trk=products_details_guest_organization_name
Broadcom | LinkedIn Skip to main content LinkedIn Top Content People Learning Jobs Games Sign in Join for free Broadcom Semiconductor Manufacturing Palo Alto, California 608,798 followers See jobs Follow View all 56,005 employees Report this company Overview Jobs Life About us A global infrastructure technology leader built on more than 60 years of innovation, collaboration and engineering excellence. Website http://www.broadcom.com External link for Broadcom Industry Semiconductor Manufacturing Company size 10,001+ employees Headquarters Palo Alto, California Type Public Company Specialties Bluetooth® Solutions, Cable Modems, Knowledge-based Processors, Satellite & IPTV STBs, xDSL, EPON, Enterprise/SMB/Core Switching, GbE, GPS, Mobile Communications, Network Infrastructure, PowerLine Communications, NFC, Wireless Networks, GPON, and Software Products No more previous content Asset Management Suite, IT Asset Management Software Asset Management Suite IT Asset Management Software CA Database Management for DB2 for z/OS, Database Management Systems (DBMS) CA Database Management for DB2 for z/OS Database Management Systems (DBMS) CloudSOC CASB, Cloud Access Security Broker (CASB) Software CloudSOC CASB Cloud Access Security Broker (CASB) Software No more next content Locations Primary 3401 Hillview Ave Palo Alto, California 94304, US Get directions Employees at Broadcom Jesse Tilly Viki Paige Ghazzali Majeed Stephen P. See all employees Updates Broadcom 608,798 followers 2d Edited Report this post Security teams carry a level of pressure that is often underestimated—higher attack volume, limited response time, and direct business impact when incidents occur. Jason Rolleston examines what security teams faced in 2025, what proved effective, and where organizations should focus as they plan for the year ahead. 133 3 Comments Like Comment Share Broadcom 608,798 followers 3d Report this post AI at the edge depends on the ability to move data quickly, securely, and efficiently across devices, networks, and sometimes back to the cloud. Along that journey, every millisecond matters. Intelligence is as good as as the speed it reaches end users. Learn more from Vijay Nagarajan on how Broadcom is enabling Edge AI and why connectivity plays such a critical role. …more 130 3 Comments Like Comment Share Broadcom 608,798 followers 4d Report this post Federal agencies see the promise of agentic AI, but adoption depends on control, trust, and operational readiness. Lewis Shepherd , Federal CTO at Broadcom, outlines how integrating agent creation into a private AI operating model could accelerate adoption while reducing risk across government networks. 95 3 Comments Like Comment Share Broadcom 608,798 followers 4d Report this post Broadcom partner evoila shares how they're addressing Europe’s demand for sovereign cloud. Chief Commercial Officer Lars Göbel explains their hyperlocal approach to deploying and managing VMware Cloud Foundation (VCF) , empowering customers with control, compliance, and speed. https://brcm.tech/49dslNk A hyperlocal approach to sovereign cloud: VMware Cloud Foundation across Europe https://evoila.com 142 5 Comments Like Comment Share Broadcom 608,798 followers 5d Report this post Reducing vendor lock-in of sovereignty providers requires practical, verifiable controls. In her follow-on guest blog, Bola Rotibi , Chief of Enterprise Research at CCS Insight , shares practical steps the European Commission can take now to make sovereignty pro-competition, pro-investment and pro-resilience. Read more 🔗 https://brcm.tech/4pr4gHy View C2PA information 74 4 Comments Like Comment Share Broadcom 608,798 followers 6d Report this post Introducing Broadcom’s Unified Wi-Fi 8 Platform—designed for a world where connectivity is no longer just about speed, but intelligence. As homes support more connected devices, AI-driven applications, and always-on experiences, wireless networks need to do more than move data. They need to manage it efficiently, reliably, and at scale. The brain of the platform is the BCM4918 Accelerated Processing Unit (APU), which unifies high-performance computing, networking, and AI acceleration, integrating a Neural Engine to turbo-charge the whole-home wireless broadband experience. This platform can be configured with our second wave of Wi-Fi 8 chips, the BCM6719 - the world’s most tightly integrated chip, enabling both 2.4 GHz and 5GHz on a single piece of silicon and/or our previously announced BCM6718 which can be configured to operate as a 2.4 GHz, 5 GHz, or 6 GHz radio. Learn how Broadcom is defining the next generation of wireless performance and efficiency with Whole-Home AI Connectivity 👇 https://brcm.tech/49kcj2N …more 388 5 Comments Like Comment Share Broadcom 608,798 followers 1w Report this post A connected home is always doing more than one thing at once. Calls, streams, updates, and everyday tasks depend on a network with little room for interruption. Wi-Fi 8 strengthens your ability to multitask with smarter coordination, multiple access points act as one unified system. Explore what unified connectivity looks like with Wi-Fi 8: https://lnkd.in/gdte9Jwq …more 88 5 Comments Like Comment Share Broadcom 608,798 followers 1w Report this post Broadcom is working hand-in-hand with European cloud service providers to deliver uncompromising data protection and control. Learn more at https://brcm.tech/4qF4qfE 359 8 Comments Like Comment Share Broadcom 608,798 followers 1w Report this post Across EMEA, customers are re-evaluating their cloud strategies to focus on cost, resilience, and simplicity. This has led to a need to refocus our reseller partner ecosystem toward a more specialized group of partners who can deliver focused expertise and consistent high-quality execution and unlock the value in VMware Cloud Foundation (VCF) offerings. Discover how this focused approach enables customers to reduce complexity and accelerate value, particularly in light of increasing data sovereignty and compliance requirements. Read more from Aytek Karagozoglu , Vice President, EMEA Partners and Commercial Sales, Broadcom, in his latest blog. https://brcm.tech/3NqVxHV View C2PA information 306 6 Comments Like Comment Share Broadcom 608,798 followers 1w Report this post Broadcom Knights are at the very top of our technical structure, alongside our engineers and architects. This means that when customers engage with a Broadcom Knight, they’re working with elite professionals who have the knowledge, insight, and influence to help them succeed. Learn more form Brian Moats, SVP Global Commercial Sales and Partners 👇 …more 178 3 Comments Like Comment Share Join now to see what you are missing Find people you know at Broadcom Browse recommended jobs for you View all updates, news, and articles Join now Affiliated pages Symantec Software Development San Jose, California Broadcom's ValueOps® Value Stream Management Software Development San Jose, CA Broadcom Mainframe Software Software Development San Jose, CA Automation by Broadcom Software Development Broadcom Wired Connectivity Computer Networking Broadcom Wi-Fi Wireless Services San Jose, CA Arcot Financial Services Broadcom Software Academy Software Development Broadcom Software AIOps Software Development Show more affiliated pages Show fewer affiliated pages Similar pages VMware Software Development Palo Alto, CA Qualcomm Semiconductor Manufacturing San Diego, CA NVIDIA Computer Hardware Manufacturing Santa Clara, CA AMD Semiconductor Manufacturing Santa Clara, California Marvell Technology Semiconductor Manufacturing Santa Clara, CA Intel Corporation Semiconductor Manufacturing Santa Clara, California Cisco Software Development San Jose, CA Micron Technology Semiconductor Manufacturing Boise, Idaho Google Software Development Mountain View, CA TSMC Semiconductor Manufacturing Hsinchu, Taiwan Show more similar pages Show fewer similar pages Browse jobs Engineer jobs 555,845 open jobs Analyst jobs 694,057 open jobs Manager jobs 1,880,925 open jobs Developer jobs 258,935 open jobs Intern jobs 71,196 open jobs Support Engineer jobs 294,729 open jobs Director jobs 1,220,357 open jobs Project Manager jobs 253,048 open jobs Software Engineer jobs 300,699 open jobs Account Manager jobs 121,519 open jobs Design Verification Engineer jobs 5,299 open jobs Embedded Software Engineer jobs 7,943 open jobs Scientist jobs 48,969 open jobs Design Engineer jobs 129,783 open jobs Associate jobs 1,091,945 open jobs Senior Software Engineer jobs 78,145 open jobs Account Director jobs 75,061 open jobs Specialist jobs 768,666 open jobs Mechanical Engineer jobs 46,392 open jobs Marketing Manager jobs 106,879 open jobs Show more jobs like this Show fewer jobs like this Funding Broadcom 1 total round Last Round Post IPO equity Dec 1, 2017 External Crunchbase Link for last round of funding See more info on crunchbase More searches More searches Engineer jobs Analyst jobs Intern jobs Manager jobs Software Engineer jobs Director jobs Developer jobs Project Manager jobs Account Manager jobs Scientist jobs Senior Software Engineer jobs Account Executive jobs Design Engineer jobs Associate jobs Design Verification Engineer jobs Support Engineer jobs Sales Manager jobs Sales Director jobs Marketing Manager jobs Product Manager jobs Partner jobs Recruiter jobs Embedded Software Engineer jobs Engineering Manager jobs Manufacturing Engineer jobs Program Manager jobs Specialist jobs Solutions Architect jobs User Experience Designer jobs Validation Engineer jobs Account Director jobs Vice President jobs Java Software Engineer jobs Executive jobs Data Analyst jobs Site Reliability Engineer jobs President jobs Data Engineer jobs Principal Engineer jobs Machine Learning Engineer jobs Marketing Specialist jobs Consultant jobs Firmware Engineer jobs Summer Intern jobs Product Designer jobs Lead jobs Mechanical Engineer jobs Analog Design Engineer jobs Industrial Engineer jobs Hardware Intern jobs Test Engineer jobs Full Stack Engineer jobs Technical Account Manager jobs Technician jobs Principal Software Engineer jobs Human Resources Specialist jobs Designer jobs Senior Product Manager jobs Key Account Manager jobs Technical Lead jobs LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) Language Agree & Join LinkedIn By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . Sign in to see who you already know at Broadcom Sign in Welcome back Email or phone Password Show Forgot password? Sign in or By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . New to LinkedIn? Join now or New to LinkedIn? Join now By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy .
2026-01-13T09:29:16
https://www.linkedin.com/products/tencentglobal-tencent-cloud-lighthouse/?trk=products_details_guest_other_products_by_org_section_product_link_result-card_full-click#main-content
Tencent Cloud Lighthouse | LinkedIn Skip to main content LinkedIn Tencent in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Tencent Cloud Lighthouse Enterprise Cloud Platforms by Tencent See who's skilled in this Add as skill Learn more Report this product About Tencent Cloud Lighthouse is an out-of-the-box cloud server service for lightweight scenarios Similar products Workday Workday Enterprise Cloud Platforms Cisco+ Hybrid Cloud Cisco+ Hybrid Cloud Enterprise Cloud Platforms Oracle Cloud Infrastructure (OCI) Oracle Cloud Infrastructure (OCI) Enterprise Cloud Platforms Cloud transformation Cloud transformation Enterprise Cloud Platforms Nutanix Central Nutanix Central Enterprise Cloud Platforms Nutanix Kubernetes Platform Nutanix Kubernetes Platform Enterprise Cloud Platforms Sign in to see more Show more Show less Tencent products Cloud Native Database TDSQL-C Cloud Native Database TDSQL-C Relational Database Management Systems Cloud Object Storage (COS) Cloud Object Storage (COS) Object Storage Software Cloud Virtual Machine (CVM) Cloud Virtual Machine (CVM) Server Virtualization Software Simple Email Service (SES) Simple Email Service (SES) Email Marketing Software Tencent Cloud Automation Tools Tencent Cloud Automation Tools Build Automation Tools Tencent Cloud Block Storage Tencent Cloud Block Storage Block Storage Software Tencent Cloud Instant Messaging (IM) Tencent Cloud Instant Messaging (IM) Cloud Communications Platforms Tencent Effect SDK Tencent Effect SDK Software Development Kits (SDK) Tencent Real-Time Communication (TRTC) Tencent Real-Time Communication (TRTC) Live Streaming Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://huggingface.co/datasets/Salesforce/wikitext
Salesforce/wikitext · Datasets at Hugging Face Hugging Face Models Datasets Spaces Community Docs Enterprise Pricing Log In Sign Up Datasets: Salesforce / wikitext like 616 Follow Salesforce 2.04k Tasks: Text Generation Fill-Mask Modalities: Text Formats: parquet Sub-tasks: language-modeling masked-language-modeling Languages: English Size: 1M - 10M ArXiv: arxiv: 1609.07843 Libraries: Datasets Dask Polars + 1 License: cc-by-sa-3.0 gfdl Dataset card Data Studio Files Files and versions xet Community 12 Dataset Viewer Auto-converted to Parquet API Embed Duplicate Data Studio Subset (4) wikitext-103-raw-v1 · 1.81M rows wikitext-103-raw-v1 (1.81M rows) wikitext-103-v1 (1.81M rows) wikitext-2-raw-v1 (44.8k rows) wikitext-2-v1 (44.8k rows) Split (3) train · 1.8M rows train (1.8M rows) validation (3.76k rows) test (4.36k rows) SQL Console text string lengths 0 7.07k = Valkyria Chronicles III = Senjō no Valkyria 3 : Unrecorded Chronicles ( Japanese : 戦場のヴァルキュリア3 , lit . Valkyria of the Battlefield 3 ) , commonly referred to as Valkyria Chronicles III outside Japan , is a tactical role @-@ playing video game developed by Sega and Media.Vision for the PlayStation Portable . Released in January 2011 in Japan , it is the third game in the Valkyria series . Employing the same fusion of tactical and real @-@ time gameplay as its predecessors , the story runs parallel to the first game and follows the " Nameless " , a penal military unit serving the nation of Gallia during the Second Europan War who perform secret black operations and are pitted against the Imperial unit " Calamaty Raven " . The game began development in 2010 , carrying over a large portion of the work done on Valkyria Chronicles II . While it retained the standard features of the series , it also underwent multiple adjustments , such as making the game more forgiving for series newcomers . Character designer Raita Honjou and composer Hitoshi Sakimoto both returned from previous entries , along with Valkyria Chronicles II director Takeshi Ozawa . A large team of writers handled the script . The game 's opening theme was sung by May 'n . It met with positive sales in Japan , and was praised by both Japanese and western critics . After release , it received downloadable content , along with an expanded edition in November of that year . It was also adapted into manga and an original video animation series . Due to low sales of Valkyria Chronicles II , Valkyria Chronicles III was not localized , but a fan translation compatible with the game 's expanded edition was released in 2014 . Media.Vision would return to the franchise with the development of Valkyria : Azure Revolution for the PlayStation 4 . = = Gameplay = = As with previous Valkyira Chronicles games , Valkyria Chronicles III is a tactical role @-@ playing game where players take control of a military unit and take part in missions against enemy forces . Stories are told through comic book @-@ like panels with animated character portraits , with characters speaking partially through voiced speech bubbles and partially through unvoiced text . The player progresses through a series of linear missions , gradually unlocked as maps that can be freely scanned through and replayed as they are unlocked . The route to each story location on the map varies depending on an individual player 's approach : when one option is selected , the other is sealed off to the player . Outside missions , the player characters rest in a camp , where units can be customized and character growth occurs . Alongside the main story missions are character @-@ specific sub missions relating to different squad members . After the game 's completion , additional episodes are unlocked , some of them having a higher difficulty than those found in the rest of the game . There are also love simulation elements related to the game 's two main heroines , although they take a very minor role . The game 's battle system , the BliTZ system , is carried over directly from Valkyira Chronicles . During missions , players select each unit using a top @-@ down perspective of the battlefield map : once a character is selected , the player moves the character around the battlefield in third @-@ person . A character can only act once per @-@ turn , but characters can be granted multiple turns at the expense of other characters ' turns . Each character has a field and distance of movement limited by their Action Gauge . Up to nine characters can be assigned to a single mission . During gameplay , characters will call out if something happens to them , such as their health points ( HP ) getting low or being knocked out by enemy attacks . Each character has specific " Potentials " , skills unique to each character . They are divided into " Personal Potential " , which are innate skills that remain unaltered unless otherwise dictated by the story and can either help or impede a character , and " Battle Potentials " , which are grown throughout the game and always grant boons to a character . To learn Battle Potentials , each character has a unique " Masters Table " , a grid @-@ based skill table that can be used to acquire and link different skills . Characters also have Special Abilities that grant them temporary boosts on the battlefield : Kurt can activate " Direct Command " and move around the battlefield without depleting his Action Point gauge , the character Reila can shift into her " Valkyria Form " and become invincible , while Imca can target multiple enemy units with her heavy weapon . Troops are divided into five classes : Scouts , Shocktroopers , Engineers , Lancers and Armored Soldier . Troopers can switch classes by changing their assigned weapon . Changing class does not greatly affect the stats gained while in a previous class . With victory in battle , experience points are awarded to the squad , which are distributed into five different attributes shared by the entire squad , a feature differing from early games ' method of distributing to different unit types . = = Plot = = The game takes place during the Second Europan War . Gallian Army Squad 422 , also known as " The Nameless " , are a penal military unit composed of criminals , foreign deserters , and military offenders whose real names are erased from the records and thereon officially referred to by numbers . Ordered by the Gallian military to perform the most dangerous missions that the Regular Army and Militia will not do , they are nevertheless up to the task , exemplified by their motto , Altaha Abilia , meaning " Always Ready . " The three main characters are No.7 Kurt Irving , an army officer falsely accused of treason who wishes to redeem himself ; Ace No.1 Imca , a female Darcsen heavy weapons specialist who seeks revenge against the Valkyria who destroyed her home ; and No.13 Riela Marcellis , a seemingly jinxed young woman who is unknowingly a descendant of the Valkyria . Together with their fellow squad members , these three are tasked to fight against a mysterious Imperial unit known as Calamity Raven , consisting of mostly Darcsen soldiers . As the Nameless officially do not exist , the upper echelons of the Gallian Army exploit the concept of plausible deniability in order to send them on missions that would otherwise make Gallia lose face in the war . While at times this works to their advantage , such as a successful incursion into Imperial territory , other orders cause certain members of the 422nd great distress . One such member , Gusurg , becomes so enraged that he abandons his post and defects into the ranks of Calamity Raven , attached to the ideal of Darcsen independence proposed by their leader , Dahau . At the same time , elements within Gallian Army Command move to erase the Nameless in order to protect their own interests . Hounded by both allies and enemies , and combined with the presence of a traitor within their ranks , the 422nd desperately move to keep themselves alive while at the same time fight to help the Gallian war effort . This continues until the Nameless 's commanding officer , Ramsey Crowe , who had been kept under house arrest , is escorted to the capital city of Randgriz in order to present evidence exonerating the weary soldiers and expose the real traitor , the Gallian General that had accused Kurt of Treason . Partly due to these events , and partly due to the major losses in manpower Gallia suffers towards the end of the war with the Empire , the Nameless are offered a formal position as a squad in the Gallian Army rather than serve as an anonymous shadow force . This is short @-@ lived , however , as following Maximilian 's defeat , Dahau and Calamity Raven move to activate an ancient Valkyrian super weapon within the Empire , kept secret by their benefactor . Without the support of Maximilian or the chance to prove themselves in the war with Gallia , it is Dahau 's last trump card in creating a new Darcsen nation . As an armed Gallian force invading the Empire just following the two nations ' cease @-@ fire would certainly wreck their newfound peace , Kurt decides to once again make his squad the Nameless , asking Crowe to list himself and all under his command as killed @-@ in @-@ action . Now owing allegiance to none other than themselves , the 422nd confronts Dahau and destroys the Valkyrian weapon . Each member then goes their separate ways in order to begin their lives anew . = = Development = = Concept work for Valkyria Chronicles III began after development finished on Valkyria Chronicles II in early 2010 , with full development beginning shortly after this . The director of Valkyria Chronicles II , Takeshi Ozawa , returned to that role for Valkyria Chronicles III . Development work took approximately one year . After the release of Valkyria Chronicles II , the staff took a look at both the popular response for the game and what they wanted to do next for the series . Like its predecessor , Valkyria Chronicles III was developed for PlayStation Portable : this was due to the team wanting to refine the mechanics created for Valkyria Chronicles II , and they had not come up with the " revolutionary " idea that would warrant a new entry for the PlayStation 3 . Speaking in an interview , it was stated that the development team considered Valkyria Chronicles III to be the series ' first true sequel : while Valkyria Chronicles II had required a large amount of trial and error during development due to the platform move , the third game gave them a chance to improve upon the best parts of Valkyria Chronicles II due to being on the same platform . In addition to Sega staff from the previous games , development work was also handled by Media.Vision. The original scenario was written Kazuki Yamanobe , while the script was written by Hiroyuki Fujii , Koichi Majima , Kishiko Miyagi , Seiki Nagakawa and Takayuki Shouji . Its story was darker and more somber than that of its predecessor . The majority of material created for previous games , such as the BLiTZ system and the design of maps , was carried over . Alongside this , improvements were made to the game 's graphics and some elements were expanded , such as map layouts , mission structure , and the number of playable units per mission . A part of this upgrade involved creating unique polygon models for each character 's body . In order to achieve this , the cooperative elements incorporated into the second game were removed , as they took up a large portion of memory space needed for the improvements . They also adjusted the difficulty settings and ease of play so they could appeal to new players while retaining the essential components of the series ' gameplay . The newer systems were decided upon early in development . The character designs were done by Raita Honjou , who had worked on the previous Valkyria Chronicles games . When creating the Nameless Squad , Honjou was faced with the same problem he had had during the first game : the military uniforms essentially destroyed character individuality , despite him needing to create unique characters the player could identify while maintaining a sense of reality within the Valkyria Chronicles world . The main color of the Nameless was black . As with the previous Valkyria games , Valkyria Chronicles III used the CANVAS graphics engine . The anime opening was produced by Production I.G. = = = Music = = = The music was composed by Hitoshi Sakimoto , who had also worked on the previous Valkyria Chronicles games . When he originally heard about the project , he thought it would be a light tone similar to other Valkyria Chronicles games , but found the themes much darker than expected . An early theme he designed around his original vision of the project was rejected . He redid the main theme about seven times through the music production due to this need to reassess the game . The main theme was initially recorded using orchestra , then Sakimoto removed elements such as the guitar and bass , then adjusted the theme using a synthesizer before redoing segments such as the guitar piece on their own before incorporating them into the theme . The rejected main theme was used as a hopeful tune that played during the game 's ending . The battle themes were designed around the concept of a " modern battle " divorced from a fantasy scenario by using modern musical instruments , constructed to create a sense of atonality . While Sakimoto was most used to working with synthesized music , he felt that he needed to incorporate live instruments such as orchestra and guitar . The guitar was played by Mitsuhiro Ohta , who also arranged several of the later tracks . The game 's opening theme song , " If You Wish for ... " ( もしも君が願うのなら , Moshimo Kimi ga Negauno Nara ) , was sung by Japanese singer May 'n . Its theme was the reason soldiers fought , in particular their wish to protect what was precious to them rather than a sense of responsibility or duty . Its lyrics were written by Seiko Fujibayashi , who had worked on May 'n on previous singles . = = = Release = = = In September 2010 , a teaser website was revealed by Sega , hinting at a new Valkyria Chronicles game . In its September issue , Famitsu listed that Senjō no Valkyria 3 would be arriving on the PlayStation Portable . Its first public appearance was at the 2010 Tokyo Game Show ( TGS ) , where a demo was made available for journalists and attendees . During the publicity , story details were kept scant so as not to spoil too much for potential players , along with some of its content still being in flux at the time of its reveal . To promote the game and detail the story leading into the game 's events , an episodic Flash visual novel written by Fujii began release in January 2011 . The game was released January 27 , 2011 . During an interview , the development team said that the game had the capacity for downloadable content ( DLC ) , but that no plans were finalized . Multiple DLC maps , featuring additional missions and recruitable characters , were released between February and April 2011 . An expanded edition of the game , Valkyria Chronicles III Extra Edition , released on November 23 , 2011 . Packaged and sold at a lower price than the original , Extra Edition game with seven additional episodes : three new , three chosen by staff from the game 's DLC , and one made available as a pre @-@ order bonus . People who also owned the original game could transfer their save data between versions . Unlike its two predecessors , Valkyria Chronicles III was not released in the west . According to Sega , this was due to poor sales of Valkyria Chronicles II and the general unpopularity of the PSP in the west . An unofficial fan translation patch began development in February 2012 : players with a copy of Valkyria Chronicles III could download and apply the patch , which translated the game 's text into English . Compatible with the Extra Edition , the patch was released in January 2014 . = = Reception = = On its day of release in Japan , Valkyria Chronicles III topped both platform @-@ exclusive and multi @-@ platform sales charts . By early February , the game sold 102 @,@ 779 units , coming in second overall to The Last Story for the Wii . By the end of the year , the game had sold just over 152 @,@ 500 units . Famitsu enjoyed the story , and were particularly pleased with the improvements to gameplay . Japanese gaming site Game Watch Impress , despite negatively noting its pacing and elements recycled from previous games , was generally positive about its story and characters , and found its gameplay entertaining despite off @-@ putting difficulty spikes . 4Gamer.net writer Naohiko Misuosame , in a " Play Test " article based on the game 's PSN demo , felt that Valkyria Chronicles III provided a " profound feeling of closure " for the Valkyria Chronicles series . He praised its gameplay despite annoying limitations to aspects such as special abilities , and positively noted its shift in story to a tone similar to the first game . PlayStation Official Magazine - UK praised the story 's blurring of Gallia 's moral standing , art style , and most points about its gameplay , positively noting the latter for both its continued quality and the tweaks to balance and content . Its one major criticism were multiple difficulty spikes , something that had affected the previous games . Heath Hindman of gaming website PlayStation Lifestyle praised the addition of non @-@ linear elements and improvements or removal of mechanics from Valkyria Chronicles II in addition to praising the returning gameplay style of previous games . He also positively noted the story 's serious tone . Points criticized in the review were recycled elements , awkward cutscenes that seemed to include all characters in a scene for no good reason , pacing issues , and occasional problems with the game 's AI . In a preview of the TGS demo , Ryan Geddes of IGN was left excited as to where the game would go after completing the demo , along with enjoying the improved visuals over Valkyria Chronicles II . Kotaku 's Richard Eisenbeis was highly positive about the game , citing is story as a return to form after Valkyria Chronicles II and its gameplay being the best in the series . His main criticisms were its length and gameplay repetition , along with expressing regret that it would not be localized . = = Legacy = = Kurt and Riela were featured in the Nintendo 3DS crossover Project X Zone , representing the Valkyria series . Media.Vision would return to the series to develop Valkyria : Azure Revolution , with Ozawa returning as director . Azure Revolution is a role @-@ playing video game for the PlayStation 4 that forms the beginning of a new series within the Valkyria franchise . = = = Adaptations = = = Valkyria Chronicles 3 was adapted into a two @-@ episode original video animation series in the same year of its release . Titled Senjō no Valkyria 3 : Taga Tame no Jūsō ( 戦場のヴァルキュリア3 誰がための銃瘡 , lit . Valkyria of the Battlefield 3 : The Wound Taken for Someone 's Sake ) , it was originally released through PlayStation Network and Qriocity between April and May 2011 . The initially @-@ planned release and availability period needed to be extended due to a stoppage to PSN during the early summer of that year . It later released for DVD on June 29 and August 31 , 2011 , with separate " Black " and " Blue " editions being available for purchase . The anime is set during the latter half of Valkyria Chronicles III , detailing a mission by the Nameless against their Imperial rivals Calamity Raven . The anime was first announced in November 2010 . It was developed by A @-@ 1 Pictures , produced by Shinji Motoyama , directed by Nobuhiro Kondō , and written by Hiroshi Ōnogi . Sakimoto 's music for the game was used in the anime . The anime 's title was inspired by the principle purpose of the Nameless : to suffer in battle for the goals of others . A subtitle attached to the project during development was " The Road to Kubinka " , which referenced the Kubinka Tank Museum in Moscow . The game 's main theme was how the characters regained their sense of self when stripped of their names and identities , along with general themes focused on war and its consequences . While making the anime , the production team were told by Sega to make it as realistic as possible , with the consequence that the team did extensive research into aspects such as what happened when vehicles like tanks were overturned or damaged . Due to it being along the same timeline as the original game and its television anime adaptation , the cast of Valkyria Chronicles could make appearances , which pleased the team . The opening theme , " Akari ( Light ) -Tomoshibi- " ( 灯 @-@ TOMOSHIBI- ) , was sung by Japanese singer Faylan . The ending theme , " Someday the Flowers of Light Will Bloom " ( いつか咲く光の花 , Itsuka Saku Hikari no Hana ) , was sung by Minami Kuribayashi . Both songs ' lyrics were written by their respective artists . Two manga adaptations were produced , following each of the game 's main female protagonists Imca and Riela . They were Senjō no Valkyria 3 : Namo naki Chikai no Hana ( 戦場のヴァルキュリア3 名もなき誓いの花 , lit . Valkyria of the Battlefield 3 : The Flower of the Nameless Oath ) , illustrated by Naoyuki Fujisawa and eventually released in two volumes after being serialized in Dengeki Maoh between 2011 and 2012 ; and Senjō no Valkyria 3 : -Akaki Unmei no Ikusa Otome- ( 戦場のヴァルキュリア3 -赤き運命の戦乙女- , lit . Valkyria of the Battlefield 3 -The Valkyrie of the Crimson Fate ) , illustrated by Mizuki Tsuge and eventually released in a single volume by Kadokawa Shoten in 2012 . = Tower Building of the Little Rock Arsenal = The Tower Building of the Little Rock Arsenal , also known as U.S. Arsenal Building , is a building located in MacArthur Park in downtown Little Rock , Arkansas . Built in 1840 , it was part of Little Rock 's first military installation . Since its decommissioning , The Tower Building has housed two museums . It was home to the Arkansas Museum of Natural History and Antiquities from 1942 to 1997 and the MacArthur Museum of Arkansas Military History since 2001 . It has also been the headquarters of the Little Rock Æsthetic Club since 1894 . The building receives its name from its distinct octagonal tower . Besides being the last remaining structure of the original Little Rock Arsenal and one of the oldest buildings in central Arkansas , it was also the birthplace of General Douglas MacArthur , who became the supreme commander of US forces in the South Pacific during World War II . It was also the starting place of the Camden Expedition . In 2011 it was named as one of the top 10 attractions in the state of Arkansas by Arkansas.com. = = Construction = = The arsenal was constructed at the request of Governor James Sevier Conway in response to the perceived dangers of frontier life and fears of the many Native Americans who were passing through the state on their way to the newly established Oklahoma Territory . Thirty @-@ six acres were appropriated on the outskirts of Little Rock by Major Robert B. Lee of the U.S. Army . The land had been previously used as a racetrack by the local jockey club . John Wormley Walker , a builder for the Federal Government , supervised the construction . Originally $ 14 @,@ 000 was allocated for the construction of the arsenal , but proved inadequate . The budget was later increased to $ 30 @,@ 000 . Work began on the Tower Building in 1840 , and it was the first permanent structure of the arsenal to be built . Being originally constructed to store ammunition , the building was designed with 3 @-@ foot @-@ thick ( 0 @.@ 91 m ) exterior walls . The original plans called for it to be built of stone , however , masonry was used instead . The Arkansas Gazette referred to the structure as " A splendid specimen of masonry " . = = Civil War = = For several years the arsenal , which was owned by the federal government , served as a simple arms depot and was staffed with only a handful of soldiers . But in November 1860 , with the American Civil War on the horizon , a company of the Second United States Artillery , consisting of sixty @-@ five men , was transferred to Little Rock under the command of Captain James Totten . On January 15 , 1861 , the state legislature decided to hold a referendum to determine if a state convention should be held to consider the issue of secession and to elect delegates to such a convention . It was planned for February 18 ; however , events at the arsenal , would not wait . On January 28 , then Governor Henry Massey Rector informed Captain Totten that he and his soldiers would be " permitted to remain in the possession of the Federal officers until the State , by authority of the people , shall have determined to sever their connection with the General Government , " Totten responded to this by telling the Governor that his orders came from the United States Government and began a desperate but ultimately futile dispatch of letters and telegrams asking for reinforcements , although rumors were widely spread that they were already coming . The first telegraph wire to span between Little Rock and Memphis had recently been completed . Local attorney John M Harrel was asked to compose the first telegraph dispatched from Arkansas 's capital . In his message , Harrel reported unconfirmed rumors that more federal troops had been sent to reinforce the Little Rock Arsenal . The United States troops at the outposts of the western frontier of the state and in the Indian nation have all been recalled from winter quarters to reinforce the garrison at Fort Smith . The garrison at Fort Smith had been previously transferred to the United States Arsenal in this city ( Little Rock ) . The arsenal is one of the richest depositories of military stores in the United States and is supposed to be the ultimate destination of the tropps [ sic ] ordered from the frontier . -John M Harrel Telegram , January 31 , 1861 The item was intended simply as a piece of news , but telegraph lines quickly spread the news throughout the state , fueling procession sentiment . The rumor was interpreted by some Arkansans as a call from the governor to assemble to help expel the federal troops from the arsenal . By February 5 , six militia units , consisting of 1 @,@ 000 men , with a guarantee that the numbers could be increased to 5 @,@ 000 if the situations deemed it necessary , had assembled in Little Rock . Governor Rector vehemently denied ordering the troops to assemble or giving any order at all in connection with the troops . Faced with the fact that the military had assembled believing they were following his orders and the consensus of the citizens of Little Rock against any armed conflict between the civilian army and federal troops , Governor Rector was forced to take control of the situation . On February 6 , he sent a formal demand for surrender of the arsenal to Captain Totten , This movement is prompted by the feeling that pervades the citizens of this State that in the present emergency the arms and munitions of war in the Arsenal should be under the control of the State authorities , in order to their security . This movement , although not authorized by me , has assumed such an aspect that it becomes my duty , as the executive of this Sate , to interpose my official authority to prevent a collision between the people of the State and the Federal troops under your command . I therefore demand in the name of the State the delivery of the possession of the Arsenal and munitions of war under your charge to the State authorities , to be held subject to the action of the convention to be held on the 4th of March next . Perhaps because Abraham Lincoln had not yet been inaugurated as President , Captain Totten received no instructions from his superiors and was forced to withdraw his troops . He agreed to surrender the arsenal as long as the governor agreed to three provisions : The governor would take possession of the arsenal in the name of the United States . The soldiers would be allowed safe passage in any direction carrying any personal and public property besides munitions of war . The soldiers would be allowed to march away as men leaving under orders , not as conquered and surrendering soldiers . On the morning of February 8 , 1861 , Rector and Totten signed an agreement placing the arsenal in the hands of state officials . That afternoon , the citizen militia marched to the arsenal with Governor Rector at its head . All of the federal troops had left at this point , except Totten who had stayed behind to listen to the Governor 's speech and to hand the arsenal over in person . The Little Rock Arsenal was classified in 1860 as an " arsenal of deposit , " meaning that it was simply a warehouse for the storage of weapons intended for the use of the state militia in times of crisis . Thus there were no substantial operations for ordnance fabrication or repairs , nor for the manufacture of cartridges at the time the Arsenal fell into State hands . Most of these operations were started from scratch through the efforts of the Arkansas Military Board . Inside the Little Rock Arsenal after its seizure in February , 1861 , the Confederates inventoried some 10 @,@ 247 weapons , 250 @,@ 000 musket cartridges , and 520 @,@ 000 percussion caps , as well as the four bronze cannon of Totten 's battery . Long arms in the Arsenal 's inventory consisted of : M1822 .69 cal ( flintlock ) 5 @,@ 625 M1822 .69 cal ( percussion @-@ converted ) 53 M1842 .69 cal smoothbore ( percussion ) 357 M1855 .58 cal rifle @-@ muskets 900 M1817 common rifles 125 M1841 rifle ( " Mississippi Rifle " ) 54 M1847 musketoon 2 Hall 's carbines 267 Hall 's rifles ( flintlock ) 2 @,@ 864 Total 10 @,@ 247 Of this number , approximately 9600 weapons were serviceable , or ready @-@ for @-@ issue . Note there were only 1 @,@ 364 percussion weapons available . Disposition of the weapons found in the Arsenal is somewhat sketchy , but from various records it can be surmised that the 5th , 6th , 7th , and 8th Arkansas Infantry Regiments , mustered in June , 1861 , were issued M1816 / M1822 .69 caliber flintlocks . The 9th and 10th Arkansas , four companies of Kelly 's 9th Arkansas Battalion , and the 3rd Arkansas Cavalry Regiment were issued flintlock Hall 's Rifles . The units comprising the infantry force of Van Dorn 's Army of the West were the 1st and 2nd Arkansas Mounted Rifles were also armed with M1822 flintlocks from the Little Rock Arsenal . By the time the 11th and 12th Arkansas Infantry Regiments mustered in at Little Rock , the supply of arms had been almost completely exhausted , and only old " junker " weapons were left . Most of the equipment , arms , and machinery at the Little Rock Arsenal was removed to east of the Mississippi River by order of Maj. Gen. Earl Van Dorn in April and May 1862 , and accountability for it is lost at that point . By all appearances , the equipment was sent down the river to Napoleon , Arkansas , and from there to Jackson Mississippi , where it was probably destroyed during the Vicksburg campaign in the early summer of 1863 . Major General Thomas C. Hindman , sent to command the district of Arkansas in May , 1862 , found the state nearly destitute of military material . Hindman established another armory at Arkadelphia , and revived the Little Rock Arsenal as a collection point and depot for armaments and ammunition manufacture for small arms . Hindman recorded : " Machinery was made for manufacturing percussion caps and small arms , and both were turned out in small quantity , but of excellent quality . Lead mines were opened and worked , and a chemical laboratory was established and successfully operated in aid of the Ordnance Department and in the manufacture of calomel , castor oil , spirits of nitre , the various tinctures of iron , and other valuable medicines . Most of these works were located at or near Arkadelphia on the Ouachita River , 75 miles south from Little Rock . The tools , machinery , and the material were gathered piecemeal or else made by hand labor . Nothing of this sort had been before attempted on Government account in Arkansas to my knowledge , except for the manufacture of small arms , the machinery for which was taken away by General Van Dorn and there was neither capital nor sufficient enterprise among the citizens to engage in such undertakings � A further supply , along with lead and caps , was procured from the citizens of Little Rock and vicinity by donation , purchases , and impressments . This ammunition , and that which I brought with me , was rapidly prepared for use at the Laboratory established at the Little Rock Arsenal for that purpose . As illustrating as the pitiful scarcity of material in the country , the fact may be stated that it was found necessary to use public documents of the State Library for cartridge paper . Gunsmiths were employed or conscripted , tools purchased or impressed , and the repair of the damaged guns I brought with me and about an equal number found at Little Rock commenced at once . But , after inspecting the work and observing the spirit of the men I decided that a garrison 500 strong could hold out against Fitch and that I would lead the remainder - about 1500 - to Gen 'l Rust as soon as shotguns and rifles could be obtained from Little Rock instead of pikes and lances , with which most of them were armed . Two days elapsed before the change could be effected . " The Confederate ordnance establishment at Little Rock was reactivated in August , 1862 . Looking around for a suitable person to head this activity , General Hindman turned to the Confederate Navy and borrowed Lieutenant John W. Dunnington . Lt. Dunnington was the commander of the gunboat C.S.S. Ponchartrain , which had been brought to Little Rock in hopes of converting it to an ironclad . Dunnington was selected to head the ordnance works at Little Rock , and although he continued to draw his pay from the Confederate Navy Department , he was placed in charge of all Confederate ordnance activities ( which included artillery functions ) there with the rank of lieutenant colonel . Lt. Col. Dunnington 's " Returns for the month of August , 1862 , at Little Rock Arsenal , C.S.A. , " are found in Vol . 149 , Chapter IV of the " Captured Rebel Ordnance Records , " and are most enlightening as to the scope of Confederate ordnance activities at Little Rock during this crucial time . According to Dunnington , " When I assumed command at this Post , all material had been removed to Arkadelphia . There were no persons employed . No shops were open for repair of arms or for fabricating ammunition . Material , tools , etc . , had to be procured as well as the employment of laborers . Work commenced the last part of the month . " The military force at Little Rock under Dunnington 's command consisted of four officers : himself , Major John B. Lockman , Captain C.C. Green , and 2nd Lt. W.W. Murphy . In addition to these , he had 20 enlisted men and a civilian force composed of a foreman , 2 clerks , 3 gunsmiths for repairing small arms , a laboratorian , 26 laborers in the ammunition laboratory , and a carpenter for making packing boxes . During the month of August , 1862 , the following work was performed : " Fabricated : one pair of musket bullet moulds ; 10 @,@ 000 buck & ball shot cartridges ; repaired : 750 muskets , shotguns , and rifles ; received and repaired : ordnance stores and ordnances ; performed : guard , office , and police duties ; inspected : Posts at Camden and Arkadelphia . " Lt. Col. Dunnington continued to build up his works at Little Rock until November 1862 , when Captain Sanford C. Faulkner ( composer of The Arkansas Traveler ) was placed in charge of the Arsenal . Dunnington presumably returned to his naval duties and the Ponchartrain . A " Summary of the Work Done for November , 1862 , Little Rock Arsenal " shows : Fabrication : 75 @,@ 000 buck & ball cartridges - percussion 14 @,@ 000 buck & ball cartridges - flint 275 paper fuzes 117 rounds , 6 @-@ pounder canister shot 130 rounds , 6 @-@ pounder ball shot End of preview. Expand in Data Studio Previous 1 2 3 ... 18,014 Next Dataset Structure Data Instances Data Fields Data Splits Dataset Creation Curation Rationale Source Data Annotations Personal and Sensitive Information Considerations for Using the Data Social Impact of Dataset Discussion of Biases Other Known Limitations Additional Information Dataset Curators Licensing Information Citation Information Contributions Dataset Card for "wikitext" Dataset Summary The WikiText language modeling dataset is a collection of over 100 million tokens extracted from the set of verified Good and Featured articles on Wikipedia. The dataset is available under the Creative Commons Attribution-ShareAlike License. Compared to the preprocessed version of Penn Treebank (PTB), WikiText-2 is over 2 times larger and WikiText-103 is over 110 times larger. The WikiText dataset also features a far larger vocabulary and retains the original case, punctuation and numbers - all of which are removed in PTB. As it is composed of full articles, the dataset is well suited for models that can take advantage of long term dependencies. Each subset comes in two different variants: Raw (for character level work) contain the raw tokens, before the addition of the (unknown) tokens. Non-raw (for word level work) contain only the tokens in their vocabulary (wiki.train.tokens, wiki.valid.tokens, and wiki.test.tokens). The out-of-vocabulary tokens have been replaced with the the token. Supported Tasks and Leaderboards More Information Needed Languages More Information Needed Dataset Structure Data Instances wikitext-103-raw-v1 Size of downloaded dataset files: 191.98 MB Size of the generated dataset: 549.42 MB Total amount of disk used: 741.41 MB An example of 'validation' looks as follows. This example was too long and was cropped: { "text": "\" The gold dollar or gold one @-@ dollar piece was a coin struck as a regular issue by the United States Bureau of the Mint from..." } wikitext-103-v1 Size of downloaded dataset files: 190.23 MB Size of the generated dataset: 548.05 MB Total amount of disk used: 738.27 MB An example of 'train' looks as follows. This example was too long and was cropped: { "text": "\" Senjō no Valkyria 3 : <unk> Chronicles ( Japanese : 戦場のヴァルキュリア3 , lit . Valkyria of the Battlefield 3 ) , commonly referred to..." } wikitext-2-raw-v1 Size of downloaded dataset files: 4.72 MB Size of the generated dataset: 13.54 MB Total amount of disk used: 18.26 MB An example of 'train' looks as follows. This example was too long and was cropped: { "text": "\" The Sinclair Scientific Programmable was introduced in 1975 , with the same case as the Sinclair Oxford . It was larger than t..." } wikitext-2-v1 Size of downloaded dataset files: 4.48 MB Size of the generated dataset: 13.34 MB Total amount of disk used: 17.82 MB An example of 'train' looks as follows. This example was too long and was cropped: { "text": "\" Senjō no Valkyria 3 : <unk> Chronicles ( Japanese : 戦場のヴァルキュリア3 , lit . Valkyria of the Battlefield 3 ) , commonly referred to..." } Data Fields The data fields are the same among all splits. wikitext-103-raw-v1 text : a string feature. wikitext-103-v1 text : a string feature. wikitext-2-raw-v1 text : a string feature. wikitext-2-v1 text : a string feature. Data Splits name train validation test wikitext-103-raw-v1 1801350 3760 4358 wikitext-103-v1 1801350 3760 4358 wikitext-2-raw-v1 36718 3760 4358 wikitext-2-v1 36718 3760 4358 Dataset Creation Curation Rationale More Information Needed Source Data Initial Data Collection and Normalization More Information Needed Who are the source language producers? More Information Needed Annotations Annotation process More Information Needed Who are the annotators? More Information Needed Personal and Sensitive Information More Information Needed Considerations for Using the Data Social Impact of Dataset More Information Needed Discussion of Biases More Information Needed Other Known Limitations More Information Needed Additional Information Dataset Curators More Information Needed Licensing Information The dataset is available under the Creative Commons Attribution-ShareAlike License (CC BY-SA 4.0) . Citation Information @misc{merity2016pointer, title={Pointer Sentinel Mixture Models}, author={Stephen Merity and Caiming Xiong and James Bradbury and Richard Socher}, year={2016}, eprint={1609.07843}, archivePrefix={arXiv}, primaryClass={cs.CL} } Contributions Thanks to @thomwolf , @lewtun , @patrickvonplaten , @mariamabarham for adding this dataset. Downloads last month 792,535 Use this dataset Homepage: blog.einstein.ai Paper: Pointer Sentinel Mixture Models Point of Contact: Stephen Merity Size of downloaded dataset files: 644 MB Size of the auto-converted Parquet files: 644 MB Number of rows: 3,708,608 Models trained or fine-tuned on Salesforce/wikitext markussagen/xlm-roberta-longformer-base-4096 Fill-Mask • Updated Mar 30, 2022 • 7.04k • • 40 geoffmunn/Qwen3-0.6B-f16 Text Generation • 0.8B • Updated about 9 hours ago • 6.31k • 1 robowaifudev/megatron-gpt2-345m Text Generation • 0.4B • Updated Apr 8, 2023 • 4.48k • 9 geoffmunn/Qwen3-1.7B-f16 Text Generation • 2B • Updated 2 days ago • 2.65k • 4 MeridianAlgo/Fin.AI Text Generation • 16M • Updated 2 days ago • 901 pavfi-at-m/gpt2GPTQ Text Generation • Updated Oct 27, 2023 • 861 Browse 185 models trained on this dataset Spaces using Salesforce/wikitext 24 🤖 DataDiva88/AutomatedProblemSolver_Final_Assignment 😻 Guy24/inner_lexicon 🏃 antonovmaxim/text-generation-webui-space 🚀 luis112/text-generation-webui 👁 dorkai/text-generation-webui-main 👀 yaoshining/text-generation-webui 👀 xuxw98/TAPA 🚀 xsigus24/text-generation-webui 🚀 W404NET/My-Chat 🌍 XS5217/text-classification 🚀 ashercn97/AsherTesting 🚀 pikto/Elite-text-gen-web + 19 Spaces + 12 Spaces Paper for Salesforce/wikitext Pointer Sentinel Mixture Models Paper • 1609.07843 • Published Sep 26, 2016 System theme Company TOS Privacy About Careers Website Models Datasets Spaces Pricing Docs
2026-01-13T09:29:16
https://www.linkedin.com/products/hclsoftware-hcl-domino/?trk=products_seo_search
HCL Domino | LinkedIn Skip to main content LinkedIn HCLSoftware in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in HCL Domino Business Process Management Software by HCLSoftware See who's skilled in this Add as skill Learn more Report this product About HCL Domino is an enterprise-grade and secure application development platform designed to solve workflow and process challenges — fast. It powers more than 10 million apps transforming the business of more than 15,000 customers. Domino is more modern and offers more value and lower TCO than ever. Now you can make your apps mobile with zero effort and build new ones 70% faster than before. Domino also provides an enterprise-grade mail, calendar, and contacts platform. The platform is associated with Notes, a professional secure on-premises client which allows users to execute the enterprise applications from their desktop (including the mail client), in a connected or disconnected way.  This product is intended for Application Architect Application Development Manager Chief Technical Officer Head Business System Lotus Notes Consultant Domino Administrator Business Application Consultant Lotus Domino Administrator Domino Developer Lotus Notes Domino Developer Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software Business Cockpit Business Cockpit Business Process Management Software CaseXellence CaseXellence Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less HCLSoftware products HCL BigFix HCL BigFix Endpoint Detection & Response (EDR) Software HCL Commerce+ HCL Commerce+ E-Commerce Platforms HCL Connections HCL Connections Enterprise Social Networking Software HCL Digital Experience HCL Digital Experience Digital Experience Platforms (DXP) HCL Mainframe Solutions HCL Mainframe Solutions Mainframe Management Software HCL Sametime HCL Sametime Employee Communications Software HCL Software DevOps HCL Software DevOps DevOps Software HCL Unica HCL Unica Marketing Automation Software HCL Volt MX HCL Volt MX Low-Code Development Platforms Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://www.linkedin.com/checkpoint/rp/request-password-reset?session_redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Fcompany%2Ffuseio&trk=organization_guest_nav-header-signin
Reset Password | LinkedIn Sign in Join now Forgot password We’ll send a verification code to this email or phone number if it matches an existing LinkedIn account. Email or Phone We don’t recognize that email. Did you mean {:emailSuggestion} ? We’ll send a verification code to this email or phone number if it matches an existing LinkedIn account. Next or Back LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional))
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/get-price-change-in-interval
GET the Price Change in Interval | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK GET the Price Change in Interval On this page GET the Price Change in Interval Get Price Change in Interval ​ Web Flutter const tokenAddress = "TOKEN_ADDRESS" ; const intervalData = await fuseSDK . tradeModule . interval ( tokenAddress , TimeFrame . day ) ; final tokenAddress = 'TOKEN_ADDRESS' ; final intervalData = await fuseSDK . tradeModule . interval ( tokenAddress , TimeFrame . day ) ; intervalData . pick ( onData : ( List < IntervalStats > stats ) { // Do you magic here } , onError : ( err ) { // Handle errors } , ) ; Edit this page Previous GET Token Price Change in the Last 24 hours Next GET the list of Supported Tokens Get Price Change in Interval Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/products/t-systems-business-cockpit/?trk=products_seo_search
Business Cockpit | LinkedIn Skip to main content LinkedIn T-Systems International in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Business Cockpit Business Process Management Software by T-Systems International See who's skilled in this Add as skill Learn more Report this product About Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. This product is intended for Manager Process Manager Automotive Manager Business Analyst Senior Business Analyst Project Manager Automotive Consultant Logistics Specialist Media Products media viewer No more previous content Business Cockpit Erklärvideo Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Onepager Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Interview Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software CaseXellence CaseXellence Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less T-Systems International products CARbon Footprint Fleet Optimizer CARbon Footprint Fleet Optimizer Sustainability Software Content as a Service (CaaS) Content as a Service (CaaS) Enterprise Content Management (ECM) Software DocuSign DocuSign E-Signature Software ImageMaster ImageMaster Enterprise Content Management (ECM) Software Limago Limago Translation Management Software MatchMaker MatchMaker Automotive Marketing Software Open Telekom Cloud Open Telekom Cloud Infrastructure as a Service (IaaS) Recycling App Recycling App Sustainability Software TypeMaster TypeMaster Enterprise Content Management (ECM) Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://confluence.atlassian.com/spaces/BAMBOO0906/pages/1376027430/Bamboo+documentation
Bamboo documentation | Bamboo Data Center 9.6 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo Data Center 9.6 Documentation Unable to load Atlassian Support Bamboo 9.6 Documentation Data Center 9.6 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Bamboo documentation Bamboo is a continuous integration and delivery tool that ties automated builds, tests, and releases into a single workflow. Get started New to using Bamboo? Get started with some introductory information.   Let's start What’s new Read all about the latest changes in Bamboo. Have a look Last modified on Jun 19, 2025 Installing and upgrading See here if you're a new user or you want to move to a newer version. View topics Using Bamboo Learn about the essentials of using Bamboo. View topics Bamboo Best Practice Find out more tips and tricks of using Bamboo. View topics Administering Bamboo Learn more about managing the Bamboo server. View topics Bamboo Specs Learn more about this feature that lets you store build plans configuration as code. View topics Bamboo FAQ Browse through questions frequently asked about Bamboo. View topics Exporting existing plan configuration to Bamboo YAML Specs View topics Bamboo Data Center View topics Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/limitations
Limitations | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Limitations On this page Limitations Limitations ​ The Fuse SDK works only on the Fuse & Fuse Sparknet networks, an EVM-based L1 blockchain. Support for other blockchains is planned for the future. If you have any questions or feedback, please get in touch with our support team at support@fuse.io . Edit this page Previous Migration from Old Versions Next Troubleshooting Limitations Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/uas/login?fromSignIn=true&session_redirect=https%3A%2F%2Fuk.linkedin.com%2Fcompany%2F320mediamatthewhussey&trk=top-card_ellipsis-menu-semaphore-sign-in-redirect&guestReportContentType=COMPANY&_f=guest-reporting
LinkedIn Login, Sign in | LinkedIn Sign in Sign in with Apple Sign in with a passkey By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . or Email or phone Password Show Forgot password? Keep me logged in Sign in We’ve emailed a one-time link to your primary email address Click on the link to sign in instantly to your LinkedIn account. If you don’t see the email in your inbox, check your spam folder. Resend email Back New to LinkedIn? Join now Agree & Join LinkedIn By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional))
2026-01-13T09:29:16
https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Fcompany%2Fthis-naked-mind-llc&fromSignIn=true&trk=top-card_top-card-secondary-button-top-card-secondary-cta
LinkedIn Login, Sign in | LinkedIn Sign in Sign in with Apple Sign in with a passkey By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . or Email or phone Password Show Forgot password? Keep me logged in Sign in We’ve emailed a one-time link to your primary email address Click on the link to sign in instantly to your LinkedIn account. If you don’t see the email in your inbox, check your spam folder. Resend email Back New to LinkedIn? Join now Agree & Join LinkedIn By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional))
2026-01-13T09:29:16
https://www.linkedin.com/uas/login?fromSignIn=true&session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthis-naked-mind-llc&trk=top-card_ellipsis-menu-semaphore-sign-in-redirect&guestReportContentType=COMPANY&_f=guest-reporting
LinkedIn Login, Sign in | LinkedIn Sign in Stay updated on your professional world. Email or phone Password Show Forgot password? Keep me logged in Sign in or By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . Sign in with Apple Sign in with a passkey We’ve emailed a one-time link to your primary email address Click on the link to sign in instantly to your LinkedIn account. If you don’t see the email in your inbox, check your spam folder. Resend email Back New to LinkedIn? Join now Agree & Join LinkedIn By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional))
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/block-storage-software?trk=products_details_guest_similar_products_section_similar_products_section_product_link_result-card_subtitle-click
Best Block Storage Software | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Information Technology Manager (3) Storage Engineer (2) Information Technology Specialist (2) Information Communication Technology Manager (1) Information Technology Consultant (1) See all products Find top products in Block Storage Software category Software used to store large scalable volumes of structured data in blocks. - Store data in separate, fixed-size blocks with distinct addresses - Configure and move data blocks and edit individual components - Use inbuilt security features such as data encryption and restricted access 27 results Tencent Cloud Block Storage Block Storage Software by Tencent A stable, low-latency, scalable, and persistent block storage service. View product OVHcloud Block Storage Block Storage Software by OVHcloud With Block Storage, you can use secure and flexible storage volumes that are available on demand. Block Storage is based on Ceph, an open-source technology. View product DigitalOcean Block Storage Block Storage Software by DigitalOcean Block storage gives developers scalable and highly available SSD-based cloud storage to attach to Droplets. From 1GB to 16TB, priced at $0.10/GB per month. View product Vultr Block Storage Software by Vultr View details and pricing information for the entire suite of Vultr products, including cloud compute, cloud GPU, bare metal, Kubernetes, and more. View product Vultr Bare Metal Block Storage Software by Vultr Stay in full control of your environment with high performance single-tenant dedicated servers, accelerated by AMD and NVIDIA GPUs and high-performance CPUs from AMD and Intel. View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights DataCore SANsymphony Block Storage Software by DataCore Software DataCore SANsymphony is a software-defined storage platform that unifies and safeguards diverse storage systems across SAN and HCI environments. It delivers continuous data availability and cyber resilience through automated business continuity and disaster recovery workflows and continuous data protection. SANsymphony keeps your infrastructure secure and recoverable from outages, hardware failures, or ransomware—ensuring mission-critical workloads stay online and your data always remains in control. Built for flexibility, performance, and efficiency, SANsymphony lets you modernize without disruption—integrating new storage technologies seamlessly while maximizing the value of existing assets. Its intelligent caching, auto-tiering, and parallel I/O acceleration drive consistent high-speed performance, while centralized management and automation reduce operational overhead and lower TCO. DataCore SANsymphony gives enterprises true storage freedom—resilient, optimized, and future-ready. View product Vultr Block Storage Block Storage Software by Vultr Create expandable HDD or NVMe SSD storage volumes and mount them directly to your compute instances. View product Software-Defined Block Storage Block Storage Software by Lightbits Labs Lightbits Labs invented the NVMe over TCP protocol and offers best-of-breed software-defined block storage that enables data center infrastructure modernization for organizations building a private or public cloud. Built from the ground up for low consistent latency, scalability, resiliency, and cost-efficiency, Lightbits software delivers the best price/performance for real-time analytics, transactional, and AI/ML workloads. View product Ceph Block Storage Block Storage Software by Ceph Ceph’s object storage system isn’t limited to native binding or RESTful APIs. You can mount Ceph as a thinly provisioned block device! When you write data to Ceph using a block device, Ceph automatically stripes and replicates the data across the cluster. Ceph’s RADOS Block Device (RBD) also integrates with Kernel Virtual Machines (KVMs), bringing Ceph’s virtually unlimited storage to KVMs running on your Ceph clients. View product Open-E Software Defined Storage Block Storage Software by Pardis Co. سیستم عامل ذخیره سازی Open-E مبتنی بر ZFS شرکت Oracle است. این تکنولوژی برای ذخیره سازی اطلاعات در پروژههای مجازیسازی و پشتیبانگیری با Performance بسیار بالا پیشنهاد میگردد. این محصول قابلیت رقابت با سیستمهای SAN Storage سنتی همچون EMC Unity و HP 3PAR را دارای میباشد. https://www.open-e.com/where-to-buy/partners/pardis-virtualization-solutions-provider/ View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/get-token-price
GET Token Price | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK GET Token Price On this page GET Token Price Get Token Price ​ Web Flutter const tokenAddress = "TOKEN_ADDRESS" ; const price = await fuseSDK . tradeModule . price ( tokenAddress ) ; console . log ( ` Token: ${ tokenAddress } price: ${ price } ` ) ; final tokenAddress = 'TOKEN_ADDRESS' ; final priceData = await fuseSDK . tradeModule . price ( tokenAddress ) ; priceData . pick ( onData : ( String tokenPrice ) { // Do you magic here } , onError : ( err ) { // Handle errors } , ) ; Edit this page Previous GET Staked Tokens Next GET Token Price Change in the Last 24 hours Get Token Price Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/send-batch-txn
Send Batch Transactions | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Send Batch Transactions Send Batch Transactions A batch refers to a group of calls inside a single user operation. This can be an approve and send transaction in one call. The executeBatch() method is used. Parameter Type Status Description to address required The address where the user want to send Tokens. value number required The amount of Tokens the user is sending data Function Encoded Function Data for Smart Contract Methods Example of approve and transfer in a single batch Web Flutter const approveCallData = ContractUtils . encodeERC20ApproveCall ( spender , amount ) as unknown as Uint8Array ; const calls = [ { to : tokenAddress , value : BigInt ( 0 ) , data : approveCallData , } , { to : spender , value : BigInt ( 0 ) , data : callData , } , ] ; const res = await fuseSDK . executeBatch ( calls , txOptions ) ; console . log ( ` UserOpHash: ${ res ?. userOpHash } ` ) ; console . log ( "Waiting for transaction..." ) ; const receipt = await res ?. wait ( ) ; console . log ( "Transaction Hash:" , receipt ?. transactionHash ) ; final tokenAddress = EthereumAddress . fromHex ( 'TOKEN_ADDRESS' ) ; final recipientAddress = EthereumAddress . fromHex ( 'RECIPIENT_ADDRESS' ) ; final amountInWei = BigInt . parse ( 'AMOUNT_IN_WEI' ) ; final res = await fuseSDK . executeBatch ( [ // Approve ERC20 Token call Call ( to : tokenAddress , value : BigInt . zero , data : ContractsUtils . encodeERC20ApproveCall ( tokenAddress , recipientAddress , amountInWei , ) , ) , // Transfer ERC20 Token call Call ( to : tokenAddress , value : BigInt . zero , data : ContractsUtils . encodeERC20TransferCall ( tokenAddress , recipientAddress , amountInWei , ) , ) , ] , ) ; Edit this page Previous Send Native/ERC20 Transactions Next Non-Blocking Transactions Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/products/t-systems-business-cockpit/?trk=products_seo_search
Business Cockpit | LinkedIn Skip to main content LinkedIn T-Systems International in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Business Cockpit Business Process Management Software by T-Systems International See who's skilled in this Add as skill Learn more Report this product About Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. This product is intended for Manager Process Manager Automotive Manager Business Analyst Senior Business Analyst Project Manager Automotive Consultant Logistics Specialist Media Products media viewer No more previous content Business Cockpit Erklärvideo Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Onepager Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Interview Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software CaseXellence CaseXellence Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less T-Systems International products CARbon Footprint Fleet Optimizer CARbon Footprint Fleet Optimizer Sustainability Software Content as a Service (CaaS) Content as a Service (CaaS) Enterprise Content Management (ECM) Software DocuSign DocuSign E-Signature Software ImageMaster ImageMaster Enterprise Content Management (ECM) Software Limago Limago Translation Management Software MatchMaker MatchMaker Automotive Marketing Software Open Telekom Cloud Open Telekom Cloud Infrastructure as a Service (IaaS) Recycling App Recycling App Sustainability Software TypeMaster TypeMaster Enterprise Content Management (ECM) Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://www.linkedin.com/products/cloudflare-cdn/
Cloudflare CDN | LinkedIn Skip to main content LinkedIn Cloudflare in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Cloudflare CDN Content Delivery Network (CDN) Software by Cloudflare See who's skilled in this Add as skill Get started Report this product About A fast, agile, and secure global network Cloudflare offers ultra-fast static and dynamic content delivery over our global edge network. Exercise precise control over how your content is cached, reduce bandwidth costs and take advantage of built-in unmetered DDoS protection. Media Products media viewer No more previous content What is caching? Caching is the process of storing copies of files in a temporary location for quick and easy retrieval. Caching is often used to speed up web site performance. No more next content Featured customers of Cloudflare CDN BLOX Digital Technology, Information and Internet 3,045 followers Zerodha Financial Services 580,035 followers Chrono24 Retail Luxury Goods and Jewelry 15,639 followers Blackmores Group Wellness and Fitness Services 61,966 followers INSEAD Higher Education 739,009 followers Zendesk Software Development 648,235 followers The University of Tokyo Research Services 157,481 followers Poki Computer Games 6,449 followers Show more Show less Similar products Google Cloud CDN Google Cloud CDN Content Delivery Network (CDN) Software Aura Managed CDN Aura Managed CDN Content Delivery Network (CDN) Software Fastly CDN Fastly CDN Content Delivery Network (CDN) Software Imperva Secure CDN Imperva Secure CDN Content Delivery Network (CDN) Software Fastly Streaming Media Delivery Fastly Streaming Media Delivery Content Delivery Network (CDN) Software CDNetworks CDN CDNetworks CDN Content Delivery Network (CDN) Software Sign in to see more Show more Show less Cloudflare products Argo Smart Routing Argo Smart Routing Network Management Software Cloudflare DDoS Protection Cloudflare DDoS Protection DDoS Protection Software Cloudflare DNS Cloudflare DNS Managed DNS Services Software Cloudflare Load Balancing Cloudflare Load Balancing Load Balancing Software Cloudflare Registrar Cloudflare Registrar Managed DNS Services Software Cloudflare Spectrum Cloudflare Spectrum DDoS Protection Software Cloudflare SSL / TLS Cloudflare SSL / TLS SSL Certificates Software Cloudflare WAF Cloudflare WAF Web Application Firewalls (WAF) Cloudflare Web Analytics Cloudflare Web Analytics Digital Analytics Software Cloudflare Workers Cloudflare Workers Server Virtualization Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
http://git-scm.com/cheat-sheet#configure-git
Git Cheat Sheet About Trademark Learn Book Cheat Sheet Videos External Links Tools Command Line GUIs Hosting Reference Install Community Table of Contents Getting Started Prepare to Commit Make Commits Move Between Branches Diff Staged/Unstaged Changes Diff Commits Ways to refer to a commit Discard Your Changes Edit History Code Archaeology Combine Diverged Branches Restore an Old File Add a Remote Push Your Changes Pull Changes Configure Git Important Files The entire Pro Git book written by Scott Chacon and Ben Straub is available to read online for free . Dead tree versions are available on Amazon.com . Git Cheat Sheet Getting Started Start a new repo: git init Clone an existing repo: git clone <url> Prepare to Commit Add untracked file or unstaged changes: git add <file> Add all untracked files and unstaged changes: git add . Choose which parts of a file to stage: git add -p Move file: git mv <old> <new> Delete file: git rm <file> Tell Git to forget about a file without deleting it: git rm --cached <file> Unstage one file: git reset <file> Unstage everything: git reset Check what you added: git status Make Commits Make a commit (and open text editor to write message): git commit Make a commit: git commit -m 'message' Commit all unstaged changes: git commit -am 'message' Move Between Branches Switch branches: git switch <name> OR git checkout <name> Create a branch: git switch -c <name> OR git checkout -b <name> List branches: git branch List branches by most recently committed to: git branch --sort=-committerdate Delete a branch: git branch -d <name> Force delete a branch: git branch -D <name> Diff Staged/Unstaged Changes Diff all staged and unstaged changes: git diff HEAD Diff just staged changes: git diff --staged Diff just unstaged changes: git diff Diff Commits Show diff between a commit and its parent: git show <commit> Diff two commits: git diff <commit> <commit> Diff one file since a commit: git diff <commit> <file> Show a summary of a diff: git diff <commit> --stat git show <commit> --stat Ways to refer to a commit Every time we say <commit> , you can use any of these: a branch main a tag v0.1 a commit ID 3e887ab a remote branch origin/main current commit HEAD 3 commits ago HEAD^^^ or HEAD~3 Discard Your Changes Delete unstaged changes to one file: git restore <file> OR git checkout <file> Delete all staged and unstaged changes to one file: git restore --staged --worktree <file> OR git checkout HEAD <file> Delete all staged and unstaged changes: git reset --hard Delete untracked files: git clean 'Stash' all staged and unstaged changes: git stash Edit History "Undo" the most recent commit (keep your working directory the same): git reset HEAD^ Squash the last 5 commits into one: git rebase -i HEAD~6 Then change "pick" to "fixup" for any commit you want to combine with the previous one Undo a failed rebase: git reflog BRANCHNAME Then manually find the right commit ID in the reflog, then run: git reset --hard <commit> Change a commit message (or add a file you forgot): git commit --amend Code Archaeology Look at a branch's history: git log main git log --graph main git log --oneline Show every commit that modified a file: git log <file> Show every commit that modified a file, including before it was renamed: git log --follow <file> Find every commit that added or removed some text: git log -G banana Show who last changed each line of a file: git blame <file> Combine Diverged Branches Combine with rebase: git switch banana git rebase main Before: After: Combine with merge: git switch main git merge banana Before: After: Combine with squash merge: git switch main git merge --squash banana git commit Before: After: Bring a branch up to date with another branch (aka "fast-forward merge"): git switch main git merge banana Before: After: Copy one commit onto the current branch: git cherry-pick <commit> Before: After: Restore an Old File Get the version of a file from another commit: git checkout <commit> <file> OR git restore <file> --source <commit> Add a Remote git remote add <name> <url> Push Your Changes Push the main branch to the remote origin : git push origin main Push the current branch to its remote "tracking branch": git push Push a branch that you've never pushed before: git push -u origin <name> Force push: git push --force-with-lease Push tags: git push --tags Pull Changes Fetch changes (but don't change any of your local branches): git fetch origin main Fetch changes and then rebase your current branch: git pull --rebase Fetch changes and then merge them into your current branch: git pull origin main OR git pull Configure Git Set a config option: git config user.name 'Your Name' Set option globally: git config --global ... Add an alias: git config alias.st status See all possible config options: man git-config Important Files Local git config: .git/config Global git config: ~/.gitconfig List of files to ignore: .gitignore About this site Patches, suggestions, and comments are welcome. Git is a member of Software Freedom Conservancy
2026-01-13T09:29:16
https://confluence.atlassian.com/spaces/BAMBOO1010/pages/1484587839/Bamboo+documentation
Bamboo documentation | Bamboo Data Center 10.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo Data Center 10.1 Documentation Unable to load Atlassian Support Bamboo 10.1 Documentation Data Center 10.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Bamboo documentation Bamboo is a continuous integration and delivery tool that ties automated builds, tests, and releases into a single workflow. Get started New to using Bamboo? Get started with some introductory information.   Let's start What’s new Read all about the latest changes in Bamboo. Have a look Last modified on Feb 12, 2025 Installing and upgrading See here if you're a new user or you want to move to a newer version. View topics Using Bamboo Learn about the essentials of using Bamboo. View topics Bamboo Best Practice Find out more tips and tricks of using Bamboo. View topics Administering Bamboo Learn more about managing the Bamboo server. View topics Bamboo Specs Learn more about this feature that lets you store build plans configuration as code. View topics Bamboo FAQ Browse through questions frequently asked about Bamboo. View topics Exporting existing plan configuration to Bamboo YAML Specs View topics Bamboo Data Center View topics Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://www.atlassian.com/university
Learning - Atlassian Community Community Open menu Forums Learning Events Champions Log in Sign up Learning On-demand learning Get started Learn the basics to get started with Atlassian. Grow your career Level up your career with role-focused learning. Get certification ready Everything you need to prep for your exam. Build admin skills Learn advanced skills to become an expert admin. By app Jira Confluence Loom Rovo Jira Service Management Trello Jira Product Discovery Forge By type Learning paths Collections By subject Cloud migration Teamwork practices Browse catalog Live training Credentials Adoption Adoption and change management guide Rovo adoption guide Jira adoption guide Jira Data Center to Cloud adoption guide Confluence adoption guide Confluence Data Center to Cloud adoption guide Learning Build skills to work smarter Learn Atlassian apps quickly, build skills and confidence, and earn globally recognized certifications. Browse the full learning catalog Get the most out of Rovo Learn how to use Rovo, Atlassian’s AI-powered app, to find, learn, and act on information faster. Start the Rovo learning path Focused learning, quick results Find free courses or explore focused learning paths designed around your goals. From bite-sized learning to in-depth instruction, there’s something for all levels. See all learning paths Get started quickly Learn more Build admin skills Learn more Boost productivity and teamwork Learn more Live training Train with your team, enroll in public classes, or join community-led classes with like-minded peers. Explore live training Get certified with Atlassian Earn global recognition and advance your career. Get certified Prepare for your next career move Learn essential tools and skills to excel in your job and impress employers. From Developers to Marketing Managers, IT Support Agents to Platform Engineers and more, these career hubs will help you advance or prepare for your next role. Find out more Tomislav Tobijas Senior Atlassian Consultant, Koios Consulting "Atlassian courses make it incredibly easy to get onboarded with new tools and features you may not have tried before." Amanda Barber Product Manager, Gradecam "Atlassian live training helps me stay current – I always learn a new way of using a familiar tool." Kai Krause Senior Technical Consultant, VI2VA "In four years of training with Atlassian, I've gained invaluable skills in Atlassian apps and agile methodologies." Get started with Atlassian apps Jira Start learning Confluence Start learning Jira Service Management Start learning Sign up for the community newsletter Get the latest resources, tips, and trends to help you grow. Email address Sign up Sign up By signing up, you agree to receive promotional emails including product news, events, and more from Atlassian and its affiliates, and acknowledge and accept the Atlassian Privacy Policy . Community Forums FAQs Forums guidelines Learning About learning Resources Events Champions Copyright © 2026 Atlassian Report a problem Privacy Policy Notice at Collection Terms Security About
2026-01-13T09:29:16
https://www.linkedin.com/products/t-systems-business-cockpit/?trk=products_seo_search
Business Cockpit | LinkedIn Skip to main content LinkedIn T-Systems International in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Business Cockpit Business Process Management Software by T-Systems International See who's skilled in this Add as skill Learn more Report this product About Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. This product is intended for Manager Process Manager Automotive Manager Business Analyst Senior Business Analyst Project Manager Automotive Consultant Logistics Specialist Media Products media viewer No more previous content Business Cockpit Erklärvideo Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Onepager Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Interview Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software CaseXellence CaseXellence Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less T-Systems International products CARbon Footprint Fleet Optimizer CARbon Footprint Fleet Optimizer Sustainability Software Content as a Service (CaaS) Content as a Service (CaaS) Enterprise Content Management (ECM) Software DocuSign DocuSign E-Signature Software ImageMaster ImageMaster Enterprise Content Management (ECM) Software Limago Limago Translation Management Software MatchMaker MatchMaker Automotive Marketing Software Open Telekom Cloud Open Telekom Cloud Infrastructure as a Service (IaaS) Recycling App Recycling App Sustainability Software TypeMaster TypeMaster Enterprise Content Management (ECM) Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://www.linkedin.com/products/t-systems-business-cockpit/?trk=products_details_guest_similar_products_section_similar_products_section_product_link_result-card_image-click#main-content
Business Cockpit | LinkedIn Skip to main content LinkedIn T-Systems International in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Business Cockpit Business Process Management Software by T-Systems International See who's skilled in this Add as skill Learn more Report this product About Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. This product is intended for Manager Process Manager Automotive Manager Business Analyst Senior Business Analyst Project Manager Automotive Consultant Logistics Specialist Media Products media viewer No more previous content Business Cockpit Erklärvideo Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Onepager Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. Business Cockpit Interview Das Business Cockpit ist ein Service, der es ermöglicht, Business Objekte (z.B. Fahrzeuge, Lieferungen) und deren Prozessdurchläufe in Echtzeit graphisch darzustellen und analytisch auszuwerten. Durch ein systemübergreifendes Tracking erkennen Sie schnell Anomalien, können Entscheidungen auf Basis aktueller Fakten treffen und sofort eingreifen. Verringern Sie Prozesskosten und beschleunigen Sie Ihre Abläufe durch gezielte Ursachenanalyse auch von historischen Daten. No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software CaseXellence CaseXellence Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less T-Systems International products CARbon Footprint Fleet Optimizer CARbon Footprint Fleet Optimizer Sustainability Software Content as a Service (CaaS) Content as a Service (CaaS) Enterprise Content Management (ECM) Software DocuSign DocuSign E-Signature Software ImageMaster ImageMaster Enterprise Content Management (ECM) Software Limago Limago Translation Management Software MatchMaker MatchMaker Automotive Marketing Software Open Telekom Cloud Open Telekom Cloud Infrastructure as a Service (IaaS) Recycling App Recycling App Sustainability Software TypeMaster TypeMaster Enterprise Content Management (ECM) Software Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://confluence.atlassian.com/bamboo/using-bamboo-289276852.html
Using Bamboo | Bamboo Data Center 12.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo latest Documentation Unable to load Atlassian Support Bamboo 12.1 Documentation Using Bamboo Data Center 12.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Using Bamboo Bamboo documentation Getting started with Bamboo Installing and upgrading Using Bamboo Bamboo Best Practice Administering Bamboo Bamboo Specs Bamboo FAQ Exporting existing plan configuration to Bamboo YAML Specs Bamboo Data Center On this page In this section Configuring plans Linking to source code repositories Triggering builds Using stages in a plan Jobs and tasks Sharing artifacts Working with builds Deployment projects Getting feedback Integrating Bamboo with other applications Managing your user profile Bamboo variables Bamboo permissions Quick filters for Bamboo Unpacking large .ZIP archives Personal access tokens Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community Atlassian Bamboo  is a continuous integration (CI) and continuous delivery (CD) server. Bamboo assists software development teams by providing: automated building and testing of software source-code status. updates on successful/failed builds. reporting tools for statistical analysis. visibility into, and control over, release artifacts and environments. This section has information about using Bamboo. Please see  Administering Bamboo  for information about managing the Bamboo server itself. Continuous integration Understanding the Bamboo CI Server Configuring plans Linking to source code repositories Jobs and tasks Working with builds Sharing artifacts Continuous delivery Understanding deployment releases Deployment projects A sample deployment project Creating a deployment project Creating a deployment environment See also Getting started Managing your user profile   Administering Bamboo Supported platforms Bamboo Release Notes Installing and upgrading Integrating Bamboo with other applications    Last modified on Jun 24, 2020 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section Configuring plans Linking to source code repositories Triggering builds Using stages in a plan Jobs and tasks Sharing artifacts Working with builds Deployment projects Getting feedback Integrating Bamboo with other applications Managing your user profile Bamboo variables Bamboo permissions Quick filters for Bamboo Unpacking large .ZIP archives Personal access tokens Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://confluence.atlassian.com/display/ALLDOC/Applications+and+Tools+Documentation+Directory
Applications and Tools Documentation Directory | Atlassian Support | Atlassian Documentation Products Resources Search Log in View account View requests Log out ... Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration System Status Cloud services health Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Atlassian Documentation Documentation Unable to load Atlassian Support Documentation Atlassian Documentation Applications and Tools Documentation Directory Applications and Tools Documentation Directory Atlassian Documentation Applications and Tools Documentation Directory Contributing to the Atlassian Documentation Using and Reproducing the Atlassian Documentation On this page In this section Application Links Documentation Directory Bamboo Documentation Directory Bitbucket Documentation Directory Clover Documentation Directory Confluence Documentation Directory SharePoint Connector for Confluence - Documentation Directory Team Calendars for Confluence - Documentation Directory Crowd Documentation Directory Crucible Documentation Directory Fisheye Documentation Directory Gadgets Documentation Directory IDE Connector Documentation Directory Integration Documentation Directory Jira Documentation Directory Advanced Roadmaps for Jira Documentation Directory Jira Agile Documentation Directory Jira Service Management Documentation Directory Universal Plugin Manager Documentation Directory User Management Documentation Directory Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community Welcome to the Atlassian documentation directory! We supply documentation for most versions of the Atlassian applications. Application Links Documentation Directory Bamboo Documentation Directory Bitbucket Documentation Directory Clover Documentation Directory Confluence Documentation Directory SharePoint Connector for Confluence - Documentation Directory Team Calendars for Confluence - Documentation Directory Crowd Documentation Directory Crucible Documentation Directory Fisheye Documentation Directory Gadgets Documentation Directory IDE Connector Documentation Directory Integration Documentation Directory Jira Documentation Directory Advanced Roadmaps for Jira Documentation Directory Jira Agile Documentation Directory Jira Service Management Documentation Directory Universal Plugin Manager Documentation Directory User Management Documentation Directory Other troubleshooting articles Atlassian Knowledge Base Last modified on Jun 26, 2017 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section Application Links Documentation Directory Bamboo Documentation Directory Bitbucket Documentation Directory Clover Documentation Directory Confluence Documentation Directory SharePoint Connector for Confluence - Documentation Directory Team Calendars for Confluence - Documentation Directory Crowd Documentation Directory Crucible Documentation Directory Fisheye Documentation Directory Gadgets Documentation Directory IDE Connector Documentation Directory Integration Documentation Directory Jira Documentation Directory Advanced Roadmaps for Jira Documentation Directory Jira Agile Documentation Directory Jira Service Management Documentation Directory Universal Plugin Manager Documentation Directory User Management Documentation Directory Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://confluence.atlassian.com/spaces/BAMBOO0904/pages/1299917008/Bamboo+documentation
Bamboo documentation | Bamboo Data Center 9.4 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo 9.4 Documentation Unable to load Atlassian Support Bamboo 9.4 Documentation Data Center 9.4 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Bamboo documentation Bamboo is a continuous integration and delivery tool that ties automated builds, tests, and releases into a single workflow. Get started New to using Bamboo? Get started with some introductory information.   Let's start What’s new Read all about the latest changes in Bamboo. Have a look Last modified on Jun 19, 2025 Installing and upgrading See here if you're a new user or you want to move to a newer version. View topics Using Bamboo Learn about the essentials of using Bamboo. View topics Bamboo Best Practice Find out more tips and tricks of using Bamboo. View topics Administering Bamboo Learn more about managing the Bamboo server. View topics Bamboo Specs Learn more about this feature that lets you store build plans configuration as code. View topics Bamboo FAQ Browse through questions frequently asked about Bamboo. View topics Exporting existing plan configuration to Bamboo YAML Specs View topics Bamboo Data Center View topics Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://confluence.atlassian.com/login.action?os_destination=%2Fpeopledirectory.action
Log in with Atlassian account Atlassian JavaScript is disabled You should enable JavaScript to work with this page. Atlassian JavaScript load error We tried to load scripts but something went wrong. Please make sure that your network settings allow you to download scripts from the following domain: https://id-frontend.prod-east.frontend.public.atl-paas.net
2026-01-13T09:29:16
https://confluence.atlassian.com/login.action?os_destination=%2Fspacedirectory%2Fview.action
Log in with Atlassian account Atlassian JavaScript is disabled You should enable JavaScript to work with this page. Atlassian JavaScript load error We tried to load scripts but something went wrong. Please make sure that your network settings allow you to download scripts from the following domain: https://id-frontend.prod-east.frontend.public.atl-paas.net
2026-01-13T09:29:16
https://huggingface.co/datasets?format=format%3Awebdataset
Datasets in webdataset – Hugging Face Hugging Face Models Datasets Spaces Community Docs Enterprise Pricing Log In Sign Up 1T","label":"> 1T","type":"size_categories"}],"format":[{"id":"format:json","label":"json","type":"format"},{"id":"format:csv","label":"csv","type":"format"},{"id":"format:parquet","label":"parquet","type":"format"},{"id":"format:optimized-parquet","label":"optimized-parquet","type":"format"},{"id":"format:imagefolder","label":"imagefolder","type":"format"},{"id":"format:audiofolder","label":"soundfolder","type":"format"},{"id":"format:webdataset","label":"webdataset","type":"format"},{"id":"format:text","label":"text","type":"format"},{"id":"format:arrow","label":"arrow","type":"format"}],"benchmark":[{"id":"benchmark:official","label":"Benchmark","type":"benchmark"}]},"numItemsPerPage":30,"numTotalItems":3348,"pageIndex":0,"searchQuery":"","sortBy":""}}"> Edit Datasets filters Main Tasks Libraries Languages Licenses Other Modalities 3D Audio Document Geospatial Image Tabular Text Time-series Video Size (rows) Reset Size < 1K > 1T Format Reset Format json csv parquet optimized-parquet imagefolder soundfolder webdataset text arrow Evaluation Benchmark Apply filters Datasets 3,348 Full-text search Edit filters Sort:  Trending Active filters: webdataset Clear all ScienceOne-AI/S1-MMAlign Viewer • Updated 8 days ago • 21.1M • 7.54k • 70 InternRobotics/InternData-A1 Viewer • Updated 2 days ago • 5.8M • 33.3k • 67 Lewandofski/OpenVE-3M Viewer • Updated 8 days ago • 4.16M • 6.59k • 80 SparkAudio/voxbox Viewer • Updated Apr 15, 2025 • 23.8M • 14.3k • 69 builddotai/Egocentric-100K Viewer • Updated Dec 11, 2025 • 1.95M • 97.4k • 80 amphion/Emilia-Dataset Viewer • Updated Feb 28, 2025 • 54.8M • 65.1k • 411 InternRobotics/OmniWorld Viewer • Updated 5 days ago • 6.35B • 24.3k • 79 HiDream-ai/ReCo-Data Viewer • Updated 18 days ago • 1.11M • 8.61k • 85 agibot-world/AgiBotWorld-Alpha Viewer • Updated Sep 29, 2025 • 49.8M • 6.67k • 209 agibot-world/AgiBotWorld-Beta Viewer • Updated Oct 13, 2025 • 248M • 45.4k • 53 InternRobotics/MotionMillion Viewer • Updated Nov 17, 2025 • 1.25M • 1.09k • 38 amphion/Emilia-NV Viewer • Updated Sep 18, 2025 • 174k • 176 • 35 sarulab-speech/commonvoice22_sidon Viewer • Updated Oct 8, 2025 • 15.1M • 1.64k • 15 allenai/olmoearth_pretrain_dataset Viewer • Updated Nov 1, 2025 • 705M • 360 • 8 IQuestLab/UBio-MolLR25 Viewer • Updated 4 days ago • 301 • 31 • 2 laion/conceptual-captions-12m-webdataset Viewer • Updated Mar 27, 2022 • 45.6k • 8.01k • 28 clip-benchmark/wds_mscoco_captions Viewer • Updated Jan 31, 2023 • 35.6k • 1.31k • 3 timm/imagenet-1k-wds Viewer • Updated Jan 7, 2024 • 80.7k • 6.03k • 31 onedean/Terra Viewer • Updated Jun 17, 2024 • 167k • 75 • 7 AbdomenAtlas/_AbdomenAtlas1.1Mini Viewer • Updated Jan 16, 2025 • 175k • 88 • 10 SwayStar123/CelebV-HQ Viewer • Updated Oct 3, 2024 • 41.1k • 90 • 6 litagin/Galgame_Speech_ASR_16kHz Viewer • Updated Oct 14, 2024 • 3.75M • 588 • 38 laion/LAION-Audio-300M Viewer • Updated Jan 10, 2025 • 229M • 39.1k • 55 laion/laions_got_talent_raw Viewer • Updated Jan 13, 2025 • 59k • 1.53k • 7 bop-benchmark/hot3d Viewer • Updated Sep 29, 2025 • 768k • 13.3k • 3 PixelAI-Team/TalkBody4D Viewer • Updated Mar 25, 2025 • 1.05M • 114 • 90 Arlolo0/Nuplan-Occupancy Viewer • Updated Jun 17, 2025 • 3.49M • 197 • 3 facebook/PE-Video Viewer • Updated Apr 18, 2025 • 118k • 3.75k • 40 laion/en_and_de_reference_voice_files_for_emotion_cloning Viewer • Updated Apr 6, 2025 • 106k • 8 • 1 CJY/Chinese-Dialogue-180k-Instruct-Audio Viewer • Updated May 7, 2025 • 187k • 115 • 3 Previous 1 2 3 ... 100 Next System theme Company TOS Privacy About Careers Website Models Datasets Spaces Pricing Docs
2026-01-13T09:29:16
https://confluence.atlassian.com/login.action?os_destination=%2Fpages%2Fviewpage.action%3FpageId%3D289276551
Log in with Atlassian account Atlassian JavaScript is disabled You should enable JavaScript to work with this page. Atlassian JavaScript load error We tried to load scripts but something went wrong. Please make sure that your network settings allow you to download scripts from the following domain: https://id-frontend.prod-east.frontend.public.atl-paas.net
2026-01-13T09:29:16
http://www.ifross.org/?q=lizenz-center
Lizenz-Center | ifrOSS Institut für Rechtsfragen der Freien und Open Source Software Aktuelles Publikationen Rechtspolitik Lizenzen GPL Urteile Creative Commons FAQ Institut --> --> You are here Startseite › Lizenz-Center ifrOSS News Embedded-Linux-Woche mit technischen und rechtlichen Themen vom 21.-25.10.2024 in Würzburg Workshop „Rechtsfragen bei OSS“ von Till Kreutzer an der Universität Münster am 29.06.2023 Gespräch von Nils Pooker und Till Jaeger zum Thema " Wie KI Kunst und Urheberrecht verändert "  bei der re:publica 2023 am 07.06.2023   Suchen Suchen Anmeldung Benutzername * Passwort * Neues Passwort anfordern Sprachen English Deutsch --> Lizenz-Center Im Lizenzcenter des ifrOSS werden die Lizenzen für Freie Software, Open Source, Open Content, Open Data und Open Source Hardware gesammelt und verschiedenen Lizenztypen zugeordnet. Damit wird eine einfache Auffindbarkeit und Charakterisierung ermöglicht. https://ifross.github.io/ifrOSS/Pages/licence_center/de English Sprache Deutsch Nachrichten der Woche Derzeit sind keine aktuellen Nachrichten der Woche verfügbar. Ältere Nachrichten im Archiv . Nachrichtenarchiv 2025 (1) 2024 (1) 2023 (2) 2022 (2) 2021 (4) 2020 (8) 2019 (3) 2018 (7) 2017 (11) Login Kontakt Impressum Datenschutz
2026-01-13T09:29:16
https://confluence.atlassian.com/login.action?os_destination=https%3A%2F%2Fconfluence.atlassian.com%2Fpages%2Feditpage.action%3FpageId%3D289276551%26atl_token%3Da09ed10a09900c83ec851c0e56b112b8345f62ec
Log in with Atlassian account Atlassian JavaScript is disabled You should enable JavaScript to work with this page. Atlassian JavaScript load error We tried to load scripts but something went wrong. Please make sure that your network settings allow you to download scripts from the following domain: https://id-frontend.prod-east.frontend.public.atl-paas.net
2026-01-13T09:29:16
https://telegram.org/manifest.json
Telegram Messenger English Bahasa Indonesia Bahasa Melayu Deutsch Español Français Italiano Nederlands O‘zbek Polski Português (Brasil) Türkçe Беларуская Русский Українська Қазақша العربية فارسی 한국어 Twitter Home FAQ Apps API Moderation Recent News Jan 3 AI Summaries, New Design and More Dec 12 Passkeys, Gift Purchase Offers and More Nov 19 Live Stories, Repeated Messages, Auctions for Gifts and More a new era of messaging Telegram for Android Telegram for iPhone / iPad Telegram for Windows / Mac / Linux Browse more Telegram apps Telegram for PC / Linux Telegram for macOS Recent News AI Summaries, New Design and More Telegram's first update of 2026 brings even more Liquid Glass interfaces on iOS and AI summaries for channel posts and Instant View pages — built to maximize privacy and protect user… Jan 3, 2026 Passkeys, Gift Purchase Offers and More In today's update, we add secure passkeys for instant login without SMS codes, gift purchase offers with built-in scam protection, and a simple way to add audio from your profile to… Dec 12, 2025 Why Telegram? Simple Telegram is so simple you already know how to use it. Private Telegram messages are heavily encrypted and can self-destruct. Synced Telegram lets you access your chats from multiple devices. Fast Telegram delivers messages faster than any other application. Powerful Telegram has no limits on the size of your media and chats. Open Telegram has an open API and source code free for everyone. Secure Telegram keeps your messages safe from hacker attacks. Social Telegram groups can hold up to 200,000 members. Expressive Telegram lets you completely customize your messenger. Telegram Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. About FAQ Privacy Press Mobile Apps iPhone/iPad Android Mobile Web Desktop Apps PC/Mac/Linux macOS Web-browser Platform API Translations Instant View About Blog Press Moderation
2026-01-13T09:29:16
https://confluence.atlassian.com/bambooreleases/bamboo-11-0-release-notes-1541085845.html
Bamboo 11.0 release notes | Atlassian Support | Atlassian Documentation Products Resources Search Log in View account View requests Log out ... Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration System Status Cloud services health Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo release notes Documentation Unable to load Atlassian Support Documentation Bamboo release notes Bamboo 11.0 release notes Bamboo 11.0 release notes Bamboo release notes Security advisories EAP releases Bamboo 12.1 release notes Bamboo 12.1 upgrade notes Bamboo 12.0 release notes Bamboo 12.0 upgrade notes Bamboo 11.0 release notes Bamboo 11.0 upgrade notes Bamboo 10.2 release notes Bamboo 10.2 upgrade notes Bamboo 10.1 release notes Bamboo 10.1 upgrade notes Bamboo 10.0 release notes Bamboo 10.0 upgrade notes Bamboo 9.6 release notes Bamboo 9.6 upgrade notes Bamboo 9.5 release notes Bamboo 9.5 upgrade notes Bamboo 9.4 release notes Bamboo 9.4 upgrade notes Bamboo 9.3 release notes Bamboo 9.3 upgrade notes Bamboo 9.2 release notes Bamboo 9.2 upgrade notes Bamboo 9.2 LTS change log Bamboo 9.1 release notes Bamboo 9.1 upgrade notes Bamboo 9.0 release notes Bamboo 9.0 upgrade notes Bamboo 8.2 release notes Bamboo 8.2 upgrade notes Bamboo 8.1 release notes Bamboo 8.1 upgrade notes Bamboo 8.0 release notes Bamboo 8.0 upgrade notes Bamboo 7.2 release notes Bamboo 7.2 upgrade notes Bamboo 7.1 release notes Bamboo 7.1 upgrade notes Bamboo 7.0 release notes Bamboo 7.0 upgrade notes Bamboo 6.10 release notes Bamboo 6.10 upgrade notes Bamboo 6.9 release notes Bamboo 6.9 upgrade notes Bamboo 6.8 release notes Bamboo 6.8 upgrade notes Bamboo 6.7 release notes Bamboo 6.7 upgrade notes Bamboo 6.6 release notes Bamboo 6.6 upgrade notes Bamboo 6.5 release notes Bamboo 6.5 upgrade notes Bamboo 6.4 release notes Bamboo 6.4 upgrade notes Bamboo 6.3 release notes Bamboo 6.3 upgrade notes Bamboo 6.2 release notes Bamboo 6.2 upgrade notes Bamboo 6.1 release notes Bamboo 6.1 upgrade notes Bamboo 6.0 release notes Bamboo 6.0 upgrade notes Bamboo 5.15 release notes Bamboo 5.15 upgrade notes Bamboo 5.14 release notes Bamboo 5.14 upgrade notes Bamboo 5.13 release notes Bamboo 5.13 upgrade notes Bamboo 5.12 release notes Bamboo 5.12 upgrade notes Bamboo 5.11 release notes Bamboo 5.11 upgrade notes Bamboo 5.10 release notes Bamboo 5.10 upgrade notes Bamboo 5.9 release notes Bamboo 5.9 upgrade notes Bamboo 5.8 release notes Bamboo 5.8 upgrade notes Bamboo 5.7 release notes Bamboo 5.7 upgrade notes Bamboo 5.6 release notes Bamboo 5.6 upgrade notes Bamboo 5.5 release notes Bamboo 5.5 upgrade notes Bamboo 5.4 release notes Bamboo 5.4 upgrade notes Bamboo 5.3 release notes Bamboo 5.3 upgrade notes Bamboo 5.2 release notes Bamboo 5.2 upgrade notes Bamboo 5.1 release notes Bamboo 5.1 upgrade notes Bamboo 5.0 release notes Bamboo 5.0 upgrade notes Bamboo 4.4 release notes Bamboo 4.4 upgrade guide Bamboo 4.3 release notes Bamboo 4.3 upgrade guide Bamboo 4.2 release notes Bamboo 4.2 upgrade guide Bamboo 4.1 release notes Bamboo 4.1 upgrade guide Bamboo 4.0 release notes Bamboo 4.0 upgrade guide Bamboo 3.4 release notes Bamboo 3.4 upgrade guide Bamboo 3.3 release notes Bamboo 3.3 upgrade guide Bamboo 3.2 release notes Bamboo 3.2 upgrade guide Bamboo 3.1 release notes Bamboo 3.1 upgrade guide Bamboo 3.0 release notes Bamboo 3.0 upgrade guide Bamboo 2.7 release notes Bamboo 2.7 upgrade guide Bamboo 2.6 release notes Bamboo 2.6 upgrade guide Bamboo 2.5 release notes Bamboo 2.5 upgrade guide Bamboo 2.4 release notes Bamboo 2.4 upgrade guide Bamboo 2.3 release notes Bamboo 2.3.1 upgrade guide Bamboo 2.3 upgrade guide Bamboo 2.2 release notes Bamboo 2.2 upgrade guide Bamboo 2.1 release notes Bamboo 2.1 upgrade guide Bamboo 2.0 release notes Bamboo 2.0 upgrade guide Bamboo 1.2 release notes Bamboo 1.2 upgrade guide Bamboo 1.1 release notes Bamboo 1.1 upgrade guide Bamboo 1.0 release notes Bamboo 1.0 upgrade guide On this page In this section Issues resolved in Bamboo 11.0.8 Issues resolved in Bamboo 11.0.7 Issues resolved in Bamboo 11.0.5 Issues resolved in Bamboo 11.0.4 Issues resolved in Bamboo 11.0.3 Issues resolved in Bamboo 11.0.2 Issues resolved in Bamboo 11.0.1 Issues resolved in Bamboo 11.0.0 Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community April 2025 We’re proud to present Bamboo 11.0 . Take some time and read through the release notes to learn what we've prepared for you this time. I f you plan to upgrade, s wing by the Bamboo 11.0 upgrade notes to check for any breaking change and don’t forget to check out the full list of resolved issues . Get the latest version Read the documentation Highlights Freemarker and Velocity templates allowlist security improvements Migration to Apache Struts 6 Your deployment projects and environments are cached now Automatic offline agents management Secure app installations with app signing Updates to supported platforms Resolved issues Bamboo 11.0.0 Release date: 30 Apr 2025   Here's what's new in Bamboo 11.0.0. Freemarker and Velocity templates allowlist security improvements We're taking steps to secure installation directories for all Data Center products. These changes increase the difficulty for an attacker to exploit filesystem access and allow customers to verify the state of the product installation. From Bamboo 11.0, all Velocity files stored on the filesystem (for example, shared, local home, or any other) will need to be explicitly allowlisted and must be of a specific file type. Files stored inside .jar files and bundled within plugins will not be affected. In addition, all method invocations within Freemarker or Velocity templates must be explicitly allowlisted. For more information, visit Configuring the Velocity method allowlist and Configuring the Velocity file and file type allowlist . For Freemarker, visit Configuring the Freemarker method allowlist . Migration to Apache Struts 6 We’ve upgraded to Struts 6. Make sure you’re aware of the following changes: Annotate getters with @StrutsParameter(depth=X) (dependency on struts-core lib ) Annotate setters with @StrutsParameter (dependency on struts-core lib ) The action method previously named doSomething must now be fully informed. Previously, the do prefix could be suppressed. The method previously named getBamboo() has been renamed to getBambooContainer() to avoid warnings from Struts when .bamboo. is used in our templates. OGNL Allowlist. You can find extensive documentation on how to apply these changes at https://developer.atlassian.com/server/confluence/struts-module/ Your deployment projects and environments are cached now Bamboo 11 introduces application-level caching for deployment projects and environments to elevate your daily experience. This can be especially beneficial if you utilize them heavily or have many of them. Bamboo speeds up display times and optimizes resource usage by serving cached objects for user interface and background processing. We recommend that you keep this enabled, though you can disable it via the system property bamboo.deployment.cache.enabled . Automatic offline agents management As an admin, you can now configure policies for the automatic removal of offline agents. This feature helps free up agent names and keeps your instance data tidy and clean. Enabling this will enhance your agents' processing performance. Secure app installations with app signing To improve app security, we’re introducing a new feature that will restrict app installations to only those that are signed. This will help us to: ensure that apps are either from Atlassian Marketplace or manually uploaded by trusted partners prevent malicious actors from uploading harmful apps App signing affects only new app installations, already installed apps will remain intact. This feature will be gradually rolled out across Data Center products by mid-2025. For details, check out this community post . In this release, app signing is disabled by default. The grace period will last until the next feature release of Universal Plugin Manager (UPM), after which app signing will be enabled by default. Use the grace period to adapt your processes. The steps you need to take differ depending on whether you install applications from the Marketplace or build your custom applications. Enable app signing and install from Marketplace During the grace period, you can enable app signing at your convenience. To do so: Enable app signing. For details, see Configuring UPM app signature check . Download and install Certificate Authority (CA) from Atlassian. For details, see Updating Atlassian Certificate Bundles . That’s it! Enjoy the safe app installations from Marketplace. Install custom apps If you use custom application builds, you can sign and secure your apps: Enable app signing. For details, see Configuring UPM app signature check . Get the app signature and verification certificate as described in Generating app signature and verification certificate using OpenSSL . Put your new certificate in your Trust store as described in Updating Atlassian Certificate Bundles . Install the signed application. You can also install the app via the file system without using the app signing feature. If you’re experiencing issues, check out app signing troubleshooting . Updates to supported platforms See what changes are in store for the supported platforms in Bamboo. For more information about what the latest stable release of Bamboo supports, see Supported platforms . End of support announcements In this release, we’re removing support for: PostgreSQL 14 In this release, we’re deprecating support for: PostgreSQL 15 SQL Server 2017 MySQL 8.0 Java 17 We are actively working on adding support for MySQL 8.4 New supported platforms Bamboo 11.0 doesn’t introduce support for any new software platforms. Resolved issues Scroll through the list of the issues we’ve resolved throughout the lifecycle of Bamboo 11.0. Issues resolved in Bamboo 11.0.8 Released on 07 Nov 2025   T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.8) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.8) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1670021752"> Issues resolved in Bamboo 11.0.7 Released on 10 Oct 2025   T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.7) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.7) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1652919994"> Issues resolved in Bamboo 11.0.5 Released on 10 Sept 2025   T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.5) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.5) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1627467541"> Issues resolved in Bamboo 11.0.4 Released on 04 Aug 2025   Includes adding new index at TEST_CASE table for performance improvements, upgrade might take 10+ minutes on large datasets. T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.4) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.4) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1612677172"> Issues resolved in Bamboo 11.0.3 Released on 07 Jul 2025   T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.3) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.3) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1574013357"> Issues resolved in Bamboo 11.0.2 Released on 06 Jun 2025   T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.2) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.2) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1573493911"> Issues resolved in Bamboo 11.0.1 Released on 08 May 2025   T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.1) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.1) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1562215535"> Issues resolved in Bamboo 11.0.0 Released on 30 Apr 2025   T Key Summary Status Loading... Refresh Atlassian JIRA issuetype,issuekey,summary,status type,key,summary,status 10 project = "BAM" and fixVersion in (11.0.0) and statusCategory = Done order by priority 144880e9-a353-312f-9412-ed028e8166fa server=Atlassian JIRA|columnIds=issuetype,issuekey,summary,status|columns=type,key,summary,status|maximumIssues=10|jqlQuery=project = "BAM" and fixVersion in (11.0.0) and statusCategory = Done order by priority |serverId=144880e9-a353-312f-9412-ed028e8166fa BLOCK " data-pageid="1556383073"> Last modified on Nov 7, 2025 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section Issues resolved in Bamboo 11.0.8 Issues resolved in Bamboo 11.0.7 Issues resolved in Bamboo 11.0.5 Issues resolved in Bamboo 11.0.4 Issues resolved in Bamboo 11.0.3 Issues resolved in Bamboo 11.0.2 Issues resolved in Bamboo 11.0.1 Issues resolved in Bamboo 11.0.0 Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://www.linkedin.com/products/cybereason-enterprise?similarProducts=true&trk=products_details_guest_similar_products_section_sign_in
Cybereason | LinkedIn Skip to main content LinkedIn Cybereason in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Cybereason Endpoint Detection & Response (EDR) Software by Cybereason See who's skilled in this Add as skill Learn more Report this product About Cybereason unites with defenders to reverse the adversary advantage. Using one agent, one console, and one team to defend all endpoints, the Cybereason Defense Platform was designed to expose and intercept every Malop (malicious operation). A Malop is not an alert, but a contextualized view of the full narrative of an attack. Only Cybereason provides the actionable intelligence to outthink the adversary, the remediation speed to outpace their operations, and the insights to outthink attackers to end any attack. Media Products media viewer No more previous content - - - - No more next content Similar products HCL BigFix HCL BigFix Endpoint Detection & Response (EDR) Software Microsoft Defender XDR Microsoft Defender XDR Endpoint Detection & Response (EDR) Software OpenText Security & Protection Cloud OpenText Security & Protection Cloud Endpoint Protection Systems Free OpenEDR (Open Source Endpoint Detection and Response) Free OpenEDR (Open Source Endpoint Detection and Response) Endpoint Detection & Response (EDR) Software Kaspersky Next Kaspersky Next Endpoint Detection & Response (EDR) Software IBM Security QRadar EDR IBM Security QRadar EDR Endpoint Detection & Response (EDR) Software Sign in to see more Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://group.mantle.xyz/ru
Mantle: Blockchain for Banking & On-Chain Finance Главная Mantle Главные инновации Ресурсы RU Блокчейн для банковского дела Криптовалюта в вашей повседневной жизни Узнать больше Видение Mantle Мир, в котором финансы свободны, эффективны и доступны, основанный на токенизированных технологиях и открытый для всех. Основные бизнес-сегменты Главные инновации MNT MNT обеспечивает функционирование экосистемы Mantle, служа краеугольным камнем для управления, майнинга и стимулирования инноваций в децентрализованной экономике. Mantle Network Решение Layer 2 на базе Ethereum с модульным дизайном и первый проект, который использовал EigenLayer и EigenDA, а также создал основу для разнообразных продуктов и приложений. mETH Protocol Ликвидный стейкинг и протокол рестейкинга ETH с максимальной доходностью. Токены пользуются популярностью в качестве обеспечения в приложениях CEX и DeFi, а также на денежных рынках. Function Децентрализованное решение Bitcoin, которое связывает BTC с Web3-экономикой, открывая новые финансовые возможности. Mantle Index Four Продукт институционального уровня, приносящий доход и предлагающий диверсифицированный доступ к корзине криптоактивов. UR UR - это безграничное смарт приложение для денег, которое позволяет легко тратить и обналичивать деньги - все в одном месте. MantleX Основоположник будущего децентрализованных систем за счет использования искусственного интеллекта (ИИ). Стратегические альянсы Партнерства Общее казначейство $3,743,472,333 Казначейство Mantle — это ядро финансовой экосистемы Mantle, обеспечивающее стабильность и ускоряющее стратегический рост. Казна 76.31 % MNT $2,856,765,263 8.96 % ETH, mETH & cmETH $335,447,592 7.32 % BTC $274,235,089 6.96 % Stables $260,627,009 Суммы указаны в долларах США. Обновлено 13 Jan 2026, 09:22 UTC Катализированный пул капитала Ecofund $200 000 000 Проект Mantle EcoFund поддерживают профессионалы из организации Mirana Ventures. Он ускоряет рост экосистемы, поддерживая трансформационные проекты и получая доступ к высокоуровневым сделкам благодаря 20 ведущим венчурным компаниям, среди которых Polychain и Dragonfly. Узнать больше Отдел новостей Главное Блог 11 Jul, 2025 UR Early Beta Access: Now Live With Weekly $3,000 Lottery Prize Pool Ecosystem Mantle UR Users can now sign up for a UR account with limited and exclusive, by-invite-only, codes shared by selected participants of the UR Early program from July 11, 2025, 10AM UTC to Aug. 8, 10AM UTC. Читайте также 10 Jul, 2025 Mantle Becomes Strategic Investor of Digital Asset Management Firm ReserveOne Ecosystem Mantle Proud to announce our strategic investment in newly-formed digital asset management firm ReserveOne, an institutionally-governed digital asset reserve anchored in a diverse treasury strategy including Bitcoin, Ethereum and Solana. Читайте также 09 Jul, 2025 Letter to Token Holders Q3 2025 Mantle Network UR Q3 2025 onwards will be a transformative moment for Mantle and our role in the evolving global financial landscape. Читайте также 18 Jun, 2025 Mantle Launches UR (Early Contributors' Access Live) Ecosystem UR Beta testing access now live for UR — a borderless smart money app that makes it easy to spend and off-ramp, all in one place. UR is powered by Mantle Network. Читайте также Mantle Управление Казна EcoFund Программа скаутов Получить MNT Что такое MNT Главные инновации Mantle Network mETH Protocol Function Mantle Index Four UR MantleX Ресурсы Блог Промоакции Вакансии Брендовые активы © Mantle 2026 . All rights reserved. Политика конфиденциальности Условия
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/troubleshooting
Troubleshooting | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Troubleshooting Troubleshooting Error - User op cannot be replaced: fee too low. If you're getting the User op cannot be replaced: fee too low error, it means that the gas price you set is too low. You can increase the gas price by setting the TxOptions parameter when sending a transaction. To replace an user operation, a new user operation must have at least 10% higher maxPriorityFeePerGas and 10% higher maxPriorityFeePerGas than the one in the user operation mempool. To replace the user operation, the new gas price must be at least 10% higher. final res = await fuseSDK . transferToken ( EthereumAddress . fromHex ( 'TOKEN_ADDRESS' ) , EthereumAddress . fromHex ( 'RECIPIENT_ADDRESS' ) , BigInt . parse ( 'AMOUNT_IN_WEI' ) , FuseSDK . defaultTxOptions . copyWith ( feePerGas : '11000000000' , withRetry : true , feeIncrementPercentage : 11 , ) , ) ; print ( 'UserOpHash: ${ res . userOpHash } ' ) ; print ( 'Waiting for transaction...' ) ; final ev = await res . wait ( ) ; Edit this page Previous Limitations Next APIs Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://www.linkedin.com/products/kaspersky-next/
Kaspersky Next | LinkedIn Skip to main content LinkedIn Kaspersky in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Kaspersky Next Endpoint Detection & Response (EDR) Software by Kaspersky See who's skilled in this Add as skill Request demo Report this product About Discover Kaspersky Next, our next-generation product line built to protect against the onslaught of today’s sophisticated and emerging cyber threats. Whether you need powerful endpoint protection, essential EDR technology, or are ready to delve into XDR, Kaspersky Next’s adaptable and robust cloud-native protection is just a few clicks away. Media Products media viewer No more previous content Kaspersky Next No more next content Similar products HCL BigFix HCL BigFix Endpoint Detection & Response (EDR) Software Microsoft Defender XDR Microsoft Defender XDR Endpoint Detection & Response (EDR) Software OpenText Security & Protection Cloud OpenText Security & Protection Cloud Endpoint Protection Systems Free OpenEDR (Open Source Endpoint Detection and Response) Free OpenEDR (Open Source Endpoint Detection and Response) Endpoint Detection & Response (EDR) Software Cybereason Cybereason Endpoint Detection & Response (EDR) Software IBM Security QRadar EDR IBM Security QRadar EDR Endpoint Detection & Response (EDR) Software Sign in to see more Show more Show less Kaspersky products Kaspersky Container Security Kaspersky Container Security Container Security Software Kaspersky Digital Footprint Intelligence Kaspersky Digital Footprint Intelligence Digital Forensics Software Kaspersky Industrial Cybersecurity Kaspersky Industrial Cybersecurity Enterprise Architecture Software Kaspersky Password Manager Kaspersky Password Manager Password Management Software Kaspersky Premium Kaspersky Premium Antivirus Software Kaspersky Safe Kids Kaspersky Safe Kids Antivirus Software Kaspersky Threat Intelligence Kaspersky Threat Intelligence Threat Intelligence Platforms Kaspersky VPN Kaspersky VPN Virtual Private Network (VPN) Software KasperskyOS KasperskyOS Operating Systems Show more Show less LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://www.linkedin.com/products/speridian-technologies-casexellence/?trk=products_seo_search
CaseXellence | LinkedIn Skip to main content LinkedIn Speridian Technologies in Asan Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in CaseXellence Business Process Management Software by Speridian Technologies See who's skilled in this Add as skill Learn more Report this product About Government agencies are in greater need for solutions to streamline processes, communications and workflows in order to manage their caseloads more efficiently. Leveraging decades of Speridian's expertise in developing solutions for the public sector, CaseXellence enables government agencies to take on this challenge and meet the ever-growing demands of public assistance programs. CaseXellence is a low-code intelligent process automation platform that enables public sector enterprises to modernize and transform their legacy infrastructure. CaseXellence has pre-built verticalized solutions designed specifically for public sector automation with security transparency, and traceability at the heart of the platform. This product is intended for Case Administrator Case Manager Case Specialist Senior Case Manager Caseworker Civil Servant Chief Information Officer Chief Technology Officer Nonprofit Coordinator of Volunteers Media Products media viewer No more previous content CaseXellence Video CaseXellence is a low-code intelligent process automation platform that enables public sector enterprises to modernize and transform their legacy infrastructure. CaseXellence has pre-built verticalized solutions designed specifically for public sector automation with security, transparency, and traceability at the heart of the platform. Verticalized Intelligent Process Automation Suite Intelligent Process Automation Suite : Process Automation, Rules and Decision Management Engine, Task Automation & Collaboration, Context and Behaviour History, Low-code solution, Easy Integration The CaseXellence Methodology CaseXellence : Streamline, Transform, Engage . Best case management software. Pre-Built Verticalized Solutions for the Public Sector Pre-Built Verticalized solution for public sector enterprises - Grants Management, Rental Assistance Program Management, Homeowner Assistance Program Management, Student Loan Financial Aid Program Management, Legal Case Management Platform, Court Management Software, Healthcare Case Management Software, Integrated Eligibility Management Portal, Licence & Permitting, Volunteer Management System. Software for case management. CaseXellence Platform OverView No more next content Similar products ServiceNow AI Platform ServiceNow AI Platform Business Process Management Software Amdocs TechInsights Amdocs TechInsights Business Process Management Software HCL Domino HCL Domino Business Process Management Software Skan AI Process Intelligence Platform Skan AI Process Intelligence Platform Business Process Management Software Business Cockpit Business Cockpit Business Process Management Software Decisions Decisions Business Process Management Software Sign in to see more Show more Show less Speridian Technologies products BEACON Banking Solutions BEACON Banking Solutions Core Banking Systems O360 O360 Human Resources Management Systems (HRMS) LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English (English) Language
2026-01-13T09:29:16
https://telegram.org/ass…icon/favicon.svg
Telegram Messenger English Bahasa Indonesia Bahasa Melayu Deutsch Español Français Italiano Nederlands O‘zbek Polski Português (Brasil) Türkçe Беларуская Русский Українська Қазақша العربية فارسی 한국어 Twitter Home FAQ Apps API Moderation Recent News Jan 3 AI Summaries, New Design and More Dec 12 Passkeys, Gift Purchase Offers and More Nov 19 Live Stories, Repeated Messages, Auctions for Gifts and More a new era of messaging Telegram for Android Telegram for iPhone / iPad Telegram for Windows / Mac / Linux Browse more Telegram apps Telegram for PC / Linux Telegram for macOS Recent News AI Summaries, New Design and More Telegram's first update of 2026 brings even more Liquid Glass interfaces on iOS and AI summaries for channel posts and Instant View pages — built to maximize privacy and protect user… Jan 3, 2026 Passkeys, Gift Purchase Offers and More In today's update, we add secure passkeys for instant login without SMS codes, gift purchase offers with built-in scam protection, and a simple way to add audio from your profile to… Dec 12, 2025 Why Telegram? Simple Telegram is so simple you already know how to use it. Private Telegram messages are heavily encrypted and can self-destruct. Synced Telegram lets you access your chats from multiple devices. Fast Telegram delivers messages faster than any other application. Powerful Telegram has no limits on the size of your media and chats. Open Telegram has an open API and source code free for everyone. Secure Telegram keeps your messages safe from hacker attacks. Social Telegram groups can hold up to 200,000 members. Expressive Telegram lets you completely customize your messenger. Telegram Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. About FAQ Privacy Press Mobile Apps iPhone/iPad Android Mobile Web Desktop Apps PC/Mac/Linux macOS Web-browser Platform API Translations Instant View About Blog Press Moderation
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/non-blocking-txn
Non-Blocking Transactions | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Non-Blocking Transactions Non-Blocking Transactions For Developers who want to build use cases that require a higher throughput, then 2D nonces are essential. For example: A user may want to make four independent transactions. With only a 1D nonce, a user would have to wait for each transaction to get on-chain before sending the next one to the mempool. In Non-Blocking such a user can build each User Operation using nonces from keys 0, 1, 2, and 3. All four transactions can then be submitted at once without blocking each other. This can be an approve, unstake, withdraw and transfer transaction in one User Operation. The executeBatch() method is used. To utilize this feature, simply pass the TxOptions with useNonceSequence: true . Setting this flag activates the NonceManager, which increments the nonce automatically. Additionally, you have the option to pass a custom nonce key, for example, customNonceKey: BigInt.from(10) . Web Flutter const tokenAddress = "YOUR_TOKEN" ; const tokenDecimals = 18 ; const to = "RECEIVER_ADDRESS" ; const amount = ethers . parseUnits ( "0.001" , tokenDecimals ) ; const data = Uint8Array . from ( [ ] ) ; await fuseSDK . transferToken ( tokenAddress , to , amount , data , { useNonceSequence : true , } ) ; await fuseSDK . transferToken ( tokenAddress , to , amount , data , { useNonceSequence : true , customNonceKey : 231 , } ) ; // Approve and transfer final tokenAddress = EthereumAddress . fromHex ( 'TOKEN_ADDRESS' ) ; final recipientAddress = EthereumAddress . fromHex ( 'RECIPIENT_ADDRESS' ) ; final amountInWei = BigInt . parse ( 'AMOUNT_IN_WEI' ) ; final res = await fuseSDK . executeBatch ( [ // Approve ERC20 Token call Call ( to : tokenAddress , value : BigInt . zero , data : ContractsUtils . encodeERC20ApproveCall ( tokenAddress , recipientAddress , amountInWei , ) , ) , // Transfer ERC20 Token call Call ( to : tokenAddress , value : BigInt . zero , data : ContractsUtils . encodeERC20TransferCall ( tokenAddress , recipientAddress , amountInWei , ) , ) , ] , FuseSDK . defaultTxOptions . copyWith ( useNonceSequence : true , customNonceKey : BigInt . from ( 11 ) , ) , ) ; // Transfer await fuseSDK . transferToken ( EthereumAddress . fromHex ( 'TOKEN_ADDRESS' ) , EthereumAddress . fromHex ( 'RECIPIENT_ADDRESS' ) , BigInt . parse ( 'AMOUNT_IN_WEI' ) , FuseSDK . defaultTxOptions . copyWith ( useNonceSequence : true , customNonceKey : BigInt . from ( 12 ) , ) , ) ; // Transfer await fuseSDK . transferToken ( EthereumAddress . fromHex ( 'TOKEN_ADDRESS' ) , EthereumAddress . fromHex ( 'RECIPIENT_ADDRESS' ) , BigInt . parse ( 'AMOUNT_IN_WEI' ) , FuseSDK . defaultTxOptions . copyWith ( useNonceSequence : true , customNonceKey : BigInt . from ( 34234 ) , ) , ) ; Edit this page Previous Send Batch Transactions Next Transfer NFT Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://confluence.atlassian.com/bamboo/bamboo-specs-894743906.html
Bamboo Specs | Bamboo Data Center 12.1 | Atlassian Documentation Products Bamboo Support Documentation Knowledge base Resources Search Log in View account View requests Log out ... Knowledge base Products Jira Software Project and issue tracking Jira Service Management Service management and customer support Jira Work Management Manage any business project Confluence Document collaboration Bitbucket Git code management See all Resources Documentation Usage and admin help Community Answers, support, and inspiration Suggestions and bugs Feature suggestions and bug reports Marketplace Product apps Billing and licensing Frequently asked questions Log out Log in to account Contact support Training & Certification Cloud Migration Center GDPR guides Enterprise services Atlassian partners Developers User groups Automation for Jira Atlassian.com Page View in Confluence Edit Page Viewport Manage Viewport Confluence Dashboard Space Directory People Directory Bamboo latest Documentation Unable to load Atlassian Support Bamboo 12.1 Documentation Bamboo Specs Data Center 12.1 Versions 12.1 12.0 11.0 10.2 10.1 10.0 9.6 9.5 9.4 See all Bamboo Specs Bamboo documentation Getting started with Bamboo Installing and upgrading Using Bamboo Bamboo Best Practice Administering Bamboo Bamboo Specs Bamboo FAQ Exporting existing plan configuration to Bamboo YAML Specs Bamboo Data Center On this page In this section What is configuration as code? Enabling repository-stored Bamboo Specs Bamboo Java Specs Bamboo YAML Specs Bamboo Specs reference documentation Bamboo Specs troubleshooting Bamboo Specs - supported scenarios Audit log for plans managed repository-stored Bamboo Specs Bamboo Specs encryption Repository-stored Specs thread permission Related content No related content found Still need help? The Atlassian Community is here for you. Ask the community Configuration as code is now available in Bamboo! We called this feature Bamboo Specs. Learn more about this feature that lets you store build plans configuration as code. Why configuration as code? Consider storing your build plan configuration as code for easier automation, change tracking, validation, and much more. You can read about the details in What is configuration as code? What's in the package?  Bamboo goodies Bamboo Specs library with an API for writing configuration as code Bamboo Specs Runner Maven plugin for easier plan deployments  High-level language for configuration YAML can get the job done, but we know that enterprise users need something much more powerful. That's why we decided to use a simple Java-based plan description language: Enjoy highlighting, syntax checks, and code autocompletion. Validate when you compile and run offline tests. Use high-level language features like modularization or libraries. If you're not familiar with Java, don't worry. Our onboarding process will bootstrap you directly into a working environment and we have made sure that the plan definitions will be familiar to users of other languages such as Python, C++ or C#.   Configuration in a language of your choice The Bamboo Specs library is written in Java. It means that you can write your code in any high-level JVM language that interoperates with Java, for example Groovy, Scala, or Kotlin.  Docs and more docs We're still working on our documentation, but progress is more important than perfection, so we're sharing the first versions with you. Bamboo Specs reference Concepts explained with examples. We really like this one, check it out! Bamboo Specs API reference Our API. Documented Best practices Because we already have some recommendations! Supported scenarios Make the best use out of Bamboo Specs and our Support.  OK, I'm sold. Where do I start? Easy. We've prepared some short tutorials for you. Start with Java |    Start with YAML  Quick links Tutorial: Create a simple plan with Bamboo Java Specs Bamboo Specs reference documentation Best practices What is configuration as code? Last modified on Jul 15, 2025 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article In this section What is configuration as code? Enabling repository-stored Bamboo Specs Bamboo Java Specs Bamboo YAML Specs Bamboo Specs reference documentation Bamboo Specs troubleshooting Bamboo Specs - supported scenarios Audit log for plans managed repository-stored Bamboo Specs Bamboo Specs encryption Repository-stored Specs thread permission Related content No related content found Powered by Confluence and Scroll Viewport . Atlassian Notice at Collection Privacy Policy Terms of Use Security © Atlassian
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/swap-tokens
Swap Tokens | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Swap Tokens On this page Swap Tokens Swap Tokens ​ To exchange one token for another, use the swapTokens() method. This method swaps the token with the contract address specified in the inputToken parameter for the token with the contract address specified in the outputToken parameter at the current market price. Additionally, this method relays the transaction and covers the gas fees for the user, so they don't need to worry about those fees. The method requires a TradeRequest parameter with the following properties: Parameter Type Description inputToken address The contract address of the token to be swapped. outputToken address The contract address of the token to swap for. inputAmount number The amount of the input token to be traded. exactIn boolean Determines the type of trade (exact input or exact output). To ensure your transfer request is successful, subscribe to the transactionStarted, transactionHash, transactionSucceeded, and transactionFailed events of the FuseWalletSDK instance. This will allow you to monitor the transaction as it progresses through the network and handle any errors that may occur. Web Flutter import { TradeRequest } from "@fuseio/fusebox-web-sdk" ; const nativeTokenAddress = "0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE" ; const usdcTokenAddress = "0x28C3d1cD466Ba22f6cae51b1a4692a831696391A" ; const res = await fuseSDK . swapTokens ( new TradeRequest ( nativeTokenAddress , usdcTokenAddress , parseUnits ( "1" , 18 ) , true ) ) ; console . log ( ` UserOpHash: ${ res ?. userOpHash } ` ) ; console . log ( "Waiting for transaction..." ) ; const ev = await res ?. wait ( ) ; console . log ( ` Transaction hash: https://explorer.fuse.io/tx/ ${ ev ?. transactionHash } ` ) ; final nativeTokenAddress = "0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE" ; final usdcTokenAddress = "0x28C3d1cD466Ba22f6cae51b1a4692a831696391A" ; final res = await fuseSDK . swapTokens ( TradeRequest ( inputToken : nativeTokenAddress , outputToken : usdcTokenAddress , inputAmount : BigInt . parse ( '100000000000000000' ) , exactIn : true , ) , ) ; print ( 'UserOpHash: ${ res . userOpHash } ' ) ; print ( 'Waiting for transaction...' ) ; final ev = await res . wait ( ) ; print ( 'Transaction hash: ${ ev ? . transactionHash } ' ) ; Edit this page Previous Transfer NFT Next GET List of Tokens Owned by Address Swap Tokens Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://ai.meta.com/sam2/
Meta Segment Anything Model 2 Meta AI AI Research The Latest About Get Llama Try Meta AI Segment Anything 3: Join the waitlist to be first to hear about SAM 3 Sign up Key capabilities Segment any object, now in any video or image SAM 2 is the first unified model for segmenting objects across images and videos. You can use a click, box, or mask as the input to select an object on any image or frame of video. Read the research paper Select objects and make adjustments across video frames Using SAM 2, you can select one or multiple objects in a video frame. Use additional prompts to refine the model predictions. Robust segmentation, even in unfamiliar videos SAM 2 is capable of strong zero-shot performance for objects, images and videos not previously seen during model training, enabling use in a wide range of real-world applications. Real-time interactivity and results SAM 2 is designed for efficient video processing with streaming inference to enable real-time, interactive applications. State-of-the-art performance for object segmentation SAM 2 outperforms the best models in the field for object segmentation in videos and images. Highlights SAM 2 improves on SAM for segmentation in images SAM 2 outperforms existing video object segmentation models, especially for tracking parts SAM 2 requires less interaction time than existing interactive video segmentation methods Try it yourself Track an object across any video interactively with as little as a single click on one frame, and create fun effects. Try the demo Our approach The next generation of Meta Segment Anything SAM 2 brings state-of-the-art video and image segmentation capabilities into a single model, while preserving a simple design and fast inference speed. Model architecture Meta Segment Anything Model 2 design The SAM 2 model extends the promptable capability of SAM to the video domain by adding a per session memory module that captures information about the target object in the video. This allows SAM 2 to track the selected object throughout all video frames, even if the object temporarily disappears from view, as the model has context of the object from previous frames. SAM 2 also supports the ability to make corrections in the mask prediction based on additional prompts on any frame. SAM 2’s streaming architecture—which processes video frames one at a time—is also a natural generalization of SAM to the video domain. When SAM 2 is applied to images, the memory module is empty and the model behaves like SAM. The Segment Anything Video Dataset A large and diverse video segmentation dataset SAM 2 was trained on a large and diverse set of videos and masklets (object masks over time), created by applying SAM 2 interactively in a model in the loop data-engine. The training data includes the SA-V dataset, which we are open sourcing. Please email support@segment-anything.com with any issues or questions regarding the SA-V dataset. Explore the dataset Highlights ~600K+ masklets collected on ~51K videos Geographically diverse, real world scenarios collected across 47 countries Annotations include whole objects, parts, and challenging occlusions Access our research Open innovation To enable the research community to build upon this work, we’re publicly releasing a pretrained Segment Anything 2 model, along with the SA-V dataset, a demo, and code. Download the model Highlights We are providing transparency into the SAM 2 training data We prioritized geographic diversity in the SA-V dataset for real-world representation We conducted a fairness evaluation of SAM 2 Potential model applications SAM 2 can be used by itself, or as part of a larger system with other models in future work to enable novel experiences. Download the model Extensible outputs The video object segmentation outputs from SAM 2 could be used as input to other AI systems such as modern video generation models to enable precise editing capabilities. Extensible inputs SAM 2 can be extended to take other types of input prompts such as in the future enabling creative ways of interacting with objects in real-time or live video. Explore additional resources Read the AI at Meta blog Read the research paper Download the dataset Explore the dataset Download the model Try the demo Our approach About AI at Meta People Careers Research Infrastructure Resources Demos Meta AI Explore Meta AI Get Meta AI AI Studio Latest news Blog Newsletter Foundational models Llama Our approach Our approach About AI at Meta People Careers Research Research Infrastructure Resources Demos Meta AI Meta AI Explore Meta AI Get Meta AI AI Studio Latest news Latest news Blog Newsletter Foundational models Llama Privacy Policy Terms Cookies Meta © 2026
2026-01-13T09:29:16
https://sg.linkedin.com/company/cloudflare
Cloudflare | LinkedIn Skip to main content LinkedIn Articles People Learning Jobs Games Sign in Join now Cloudflare Computer and Network Security San Francisco, California 1,123,490 followers At Cloudflare, we have our eyes set on an ambitious goal — to help build a better Internet. See jobs Follow Discover all 6,532 employees Report this company Overview Jobs Life About us Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business. Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe. Website https://www.cloudflare.com External link for Cloudflare Industry Computer and Network Security Company size 1,001-5,000 employees Headquarters San Francisco, California Type Public Company Founded 2009 Specialties nginx, lua, go, web performance, web security, dns, network, noc, nocc, ddos, CDN, waf, zero trust security, and developer tools Products See all No more previous content Argo Smart Routing, Network Management Software Argo Smart Routing Network Management Software Cloudflare Access, Identity & Access Management (IAM) Software Cloudflare Access Identity & Access Management (IAM) Software Cloudflare CDN, Content Delivery Network (CDN) Software Cloudflare CDN Content Delivery Network (CDN) Software Cloudflare DDoS Protection, DDoS Protection Software Cloudflare DDoS Protection DDoS Protection Software Cloudflare DNS, Managed DNS Services Software Cloudflare DNS Managed DNS Services Software Cloudflare Load Balancing, Load Balancing Software Cloudflare Load Balancing Load Balancing Software Cloudflare Registrar, Managed DNS Services Software Cloudflare Registrar Managed DNS Services Software Cloudflare Spectrum, DDoS Protection Software Cloudflare Spectrum DDoS Protection Software Cloudflare SSL / TLS, SSL Certificates Software Cloudflare SSL / TLS SSL Certificates Software Cloudflare Stream, Live Streaming Software Cloudflare Stream Live Streaming Software No more next content Products Argo Smart Routing, Network Management Software Argo Smart Routing Network Management Software Cloudflare Access, Identity & Access Management (IAM) Software Cloudflare Access Identity & Access Management (IAM) Software Cloudflare CDN, Content Delivery Network (CDN) Software Cloudflare CDN Content Delivery Network (CDN) Software Cloudflare DDoS Protection, DDoS Protection Software Cloudflare DDoS Protection DDoS Protection Software Cloudflare DNS, Managed DNS Services Software Cloudflare DNS Managed DNS Services Software Cloudflare Load Balancing, Load Balancing Software Cloudflare Load Balancing Load Balancing Software Cloudflare Registrar, Managed DNS Services Software Cloudflare Registrar Managed DNS Services Software Cloudflare Spectrum, DDoS Protection Software Cloudflare Spectrum DDoS Protection Software Cloudflare SSL / TLS, SSL Certificates Software Cloudflare SSL / TLS SSL Certificates Software Cloudflare Stream, Live Streaming Software Cloudflare Stream Live Streaming Software Cloudflare WAF, Web Application Firewalls (WAF) Cloudflare WAF Web Application Firewalls (WAF) Cloudflare Web Analytics, Digital Analytics Software Cloudflare Web Analytics Digital Analytics Software Cloudflare Workers, Server Virtualization Software Cloudflare Workers Server Virtualization Software Locations Primary 101 Townsend St San Francisco, California 94107, US Get directions Westminster Bridge Road 6th Floor, Riverside Building, County Hall London, England SE1 7PB, GB Get directions 120 Robinson Road Frasers Tower #35-01 Singapore, Singapore 069547, SG Get directions 405 Comal St Austin, Texas 78702, US Get directions 10 Almaden Blvd Suite 200 San Jose, California 95113, US Get directions Rosental 7 Munich, Bavaria 80331, DE Get directions 301 N Neil St Suite 440 Champaign, Illinois 61820, US Get directions 26-1 Sakuragaoka-cho Shibuya-ku, Level 15 Cerulean Tower Tokyo, 150-8512, JP Get directions 16 South Guangshun Street Donghuang Building 17th Floor Beijing, Chaoyang District Beijing 100015, CN Get directions Rue de la Loi 38 Brussels, Brussels Region 1000, BE Get directions Praça Marquês de Pombal 14 7th floor Lisbon, 1250-162, PT Get directions 6, Place de la Madeleine Mailing Address Only Paris, Île-de-France 75008, FR Get directions 20 Martin Place Level 10 Sydney, NSW 2000, AU Get directions 1401 K St NW Washington, District of Columbia 20005, US Get directions Show more locations Show fewer locations Employees at Cloudflare Adam Edgmond Mark Nottingham Trevor Laughton Carl Ledbetter See all employees Updates Cloudflare 1,123,490 followers 8h Report this post As we kick off the new year, we’re spotlighting Cloudflare leaders across multiple functions who will share their insights around technical trends and emerging threats in 2026. 🎥 Nan Hao Maguire, APAC & Japan Field CTO at Cloudflare, breaks down the urgent shifts in the threat landscape, from smarter AI-driven attacks to the emerging reality of quantum computing. Discover our technical predictions for 2026 in our Post Quantum Computing solution brief: https://cfl.re/3LyW1eC #Cybersecurity #QuantumComputing #AI #FutureofTech #Infrastructure #2026Trends …more 25 2 Comments Like Comment Share Cloudflare 1,123,490 followers 14h Report this post The margin is thinner than you think with modernizing applications. 📉 14% are behind schedule. 13% are ahead of schedule. This 1% difference can make or break your ability to innovate with AI. 🤖 Find out how in the 2026 Cloudflare App Innovation Report, dropping this Wednesday. 🚀 #AppInnovationReport #TechnologyInnovation #CyberSecurity 35 4 Comments Like Comment Share Cloudflare 1,123,490 followers 3d Report this post 🤠 Dallas! The future of connectivity is coming to Frisco. Ready to connect with the leaders driving network modernization right here in Texas? Join us for Cloudflare Immerse Dallas on February 12th! We’re bringing together the region’s top security, IT, and digital leaders for an afternoon of deep dives into the Connectivity Cloud, Zero Trust, and AI application security. It’s more than just sessions—it’s your chance to network with peers and get your toughest questions answered at our "Ask the Cloudflare Experts" bar. 📍 Where: HALL Park Hotel, Frisco, TX 📅 When: Thursday, Feb 12, 2026 | 1:30 PM - 5:00 PM (Happy Hour to follow! 🍹) Spots are limited. Secure your seat today! 👇 https://lnkd.in/dEKuBqve #CloudflareImmerse #DallasTech #NetSec #FriscoTX #Networking #CyberSecurity #ConnectivityCloud 50 4 Comments Like Comment Share Cloudflare 1,123,490 followers 4d Report this post What's your preferred method for knowledge sharing within a team (e.g., detailed READMEs, synchronous workshops, pairing)? #CloudflareChat 29 8 Comments Like Comment Share Cloudflare 1,123,490 followers 4d Report this post We are thrilled to announce that Cloudflare has been recognized as the current Company to Beat in the December 2025 Gartner AI Vendor Race for Edge Distribution Platform AI! Discover the key findings of the report from our article 👇 Cloudflare named as the current Company to Beat in a Gartner® report for Edge Distribution Platform AI! Cloudflare on LinkedIn 657 11 Comments Like Comment Share Cloudflare 1,123,490 followers 5d Edited Report this post Cloudflare is getting ready for ICE 2026 in Barcelona, taking place 19–21 January. We’ll be at Booth 4K30 sharing how Cloudflare for iGaming helps platforms deliver fast, secure, and reliable experiences for players around the world. If you’re attending, stop by to meet the team, explore our iGaming security solutions, and join us for a relaxed Happy Hour at the booth. If you pre-book a meeting with us, you’ll also be entered into a prize draw for a chance to win an exclusive FC Barcelona jersey on the first day of the event! Click here to book your meeting: https://lnkd.in/gSPe58K6 See you there! 33 Like Comment Share Cloudflare 1,123,490 followers 5d Report this post Is your organization struggling to manage a sprawling attack surface across hybrid environments? Join Cloudflare and Werner Executive VP & CIO Daragh Mahon to hear directly from one of our customers on their successful real-world Zero Trust deployments. Learn more about priority use cases, common challenges, and architectural strategies. Register today! https://lnkd.in/db4Gb6Rk #ZeroTrust #Cybersecurity #Cloudflare #Webinar 41 2 Comments Like Comment Share Cloudflare 1,123,490 followers 5d Report this post Defend against rising app-layer DDoS attacks 📱 In his latest article for theNET, Gregory Van den Top explains how DDoS attacks — often powered by AI — are a growing threat to applications. They can slow or completely crash software, bringing critical operations to a halt. The right strategic framework — focused on detecting, mitigating, and adapting — can help stop attacks and improve resilience: https://lnkd.in/dwuSqcm4 60 1 Comment Like Comment Share Cloudflare 1,123,490 followers 6d Report this post A BGP route leak in Venezuela recently impacted internet connectivity. Our latest analysis breaks down how this happened and why it highlights the need for better routing security across the global Internet. https://cfl.re/4qEaNQ5 A closer look at a BGP anomaly in Venezuela blog.cloudflare.com 358 4 Comments Like Comment Share Cloudflare 1,123,490 followers 6d Report this post Cloudflare was proud to protect the Moldovan Central Election Commission during their elections. 🔗 Learn more about it on our blog: https://lnkd.in/gQ8P2NmB Anatolie Golovco 1w CloudFlare mentioned Moldova in their 2025 Annual Impact Report. As a personal tip to web studios that care about protecting their customers against DDoS attacks: take a look at CloudFlare Pages, CloudFlare R2, and Hugo CMS as alternatives to traditional hosting setups and content management systems. https://lnkd.in/dxgycsYm #CloudFlare 41 2 Comments Like Comment Share Join now to see what you are missing Find people you know at Cloudflare Browse recommended jobs for you View all updates, news, and articles Join now Affiliated pages Cloudflare for Public Sector Computer and Network Security San Francisco, California Cloudflare Partner Network Computer and Network Security Similar pages Akamai Technologies Technology, Information and Internet Cambridge, MA CrowdStrike Computer and Network Security Palo Alto Networks Computer and Network Security SANTA CLARA, California Atlassian Software Development Sydney, NSW Google Software Development Mountain View, CA Zscaler Computer and Network Security San Jose, California Snowflake Software Development Microsoft Software Development Redmond, Washington Cisco Software Development San Jose, CA Databricks Software Development San Francisco, CA Show more similar pages Show fewer similar pages LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) Language Agree & Join LinkedIn By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . Sign in to see who you already know at Cloudflare Sign in Welcome back Email or phone Password Show Forgot password? Sign in or By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . New to LinkedIn? Join now or New to LinkedIn? Join now By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy .
2026-01-13T09:29:16
https://telegram.org/ass…n/favicon-16.png
Telegram Messenger English Bahasa Indonesia Bahasa Melayu Deutsch Español Français Italiano Nederlands O‘zbek Polski Português (Brasil) Türkçe Беларуская Русский Українська Қазақша العربية فارسی 한국어 Twitter Home FAQ Apps API Moderation Recent News Jan 3 AI Summaries, New Design and More Dec 12 Passkeys, Gift Purchase Offers and More Nov 19 Live Stories, Repeated Messages, Auctions for Gifts and More a new era of messaging Telegram for Android Telegram for iPhone / iPad Telegram for Windows / Mac / Linux Browse more Telegram apps Telegram for PC / Linux Telegram for macOS Recent News AI Summaries, New Design and More Telegram's first update of 2026 brings even more Liquid Glass interfaces on iOS and AI summaries for channel posts and Instant View pages — built to maximize privacy and protect user… Jan 3, 2026 Passkeys, Gift Purchase Offers and More In today's update, we add secure passkeys for instant login without SMS codes, gift purchase offers with built-in scam protection, and a simple way to add audio from your profile to… Dec 12, 2025 Why Telegram? Simple Telegram is so simple you already know how to use it. Private Telegram messages are heavily encrypted and can self-destruct. Synced Telegram lets you access your chats from multiple devices. Fast Telegram delivers messages faster than any other application. Powerful Telegram has no limits on the size of your media and chats. Open Telegram has an open API and source code free for everyone. Secure Telegram keeps your messages safe from hacker attacks. Social Telegram groups can hold up to 200,000 members. Expressive Telegram lets you completely customize your messenger. Telegram Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. About FAQ Privacy Press Mobile Apps iPhone/iPad Android Mobile Web Desktop Apps PC/Mac/Linux macOS Web-browser Platform API Translations Instant View About Blog Press Moderation
2026-01-13T09:29:16
https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Fcompany%2Fthis-naked-mind-llc&fromSignIn=true&trk=organization_guest_nav-header-signin
LinkedIn Login, Sign in | LinkedIn Sign in Sign in with Apple Sign in with a passkey By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . or Email or phone Password Show Forgot password? Keep me logged in Sign in We’ve emailed a one-time link to your primary email address Click on the link to sign in instantly to your LinkedIn account. If you don’t see the email in your inbox, check your spam folder. Resend email Back New to LinkedIn? Join now Agree & Join LinkedIn By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional))
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/send-single-txn
Send Native/ERC20 Transactions | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK Send Native/ERC20 Transactions Send Native/ERC20 Transactions To transfer an ERC20/FUSE with a relay, use the transferToken() method. This method relays the transaction and covers the gas fees for the user, so they don't need to worry about those fees. You can also subscribe to events related to the token transfer to track its progress. The method takes the following parameters as inputs: Parameter Type Description tokenAddress address The contract address of the ERC20 token or FUSE recipientAddress address The recipient's wallet address amount string The amount of tokens to transfer in wei Web Flutter const tokenAddress = "0x28C3d1cD466Ba22f6cae51b1a4692a831696391A" ; // USDC Token address const to = "RECEIVER_ADDRESS" ; const amount = ethers . parseUnits ( "0.001" , 6 ) ; // 6 represents the decimals of USDC token in the [contract](https://explorer.fuse.io/address/0x28C3d1cD466Ba22f6cae51b1a4692a831696391A?tab=read_contract) const res = await fuseSDK . transferToken ( tokenAddress , to , amount ) ; console . log ( ` UserOpHash: ${ res ?. userOpHash } ` ) ; console . log ( "Waiting for transaction..." ) ; const receipt = await res ?. wait ( ) ; console . log ( "Transaction Hash:" , receipt ?. transactionHash ) ; final res = await fuseSDK . transferToken ( EthereumAddress . fromHex ( 'TOKEN_ADDRESS' ) , // For sending native token, use '0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE' EthereumAddress . fromHex ( 'RECIPIENT_ADDRESS' ) , BigInt . parse ( 'AMOUNT_IN_WEI' ) , ) ; print ( 'UserOpHash: ${ res . userOpHash } ' ) ; print ( 'Waiting for transaction...' ) ; final ev = await res . wait ( ) ; Edit this page Previous Create Smart Contract Wallet Next Send Batch Transactions Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://scholar.google.com/citations?user=L6vkkC8AAAAJ&hl=ko&oe=ASCII
Minghong Fang - Google 학술 검색 로드 중... 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 연간 인용횟수 중복된 서지정보 다음 학술 문서는 학술검색에서 병합되어 있습니다. 총 인용 횟수가 첫 번째 학술 문서에 대해서만 계산됩니다. 병합된 서지정보 이 '인용' 횟수는 학술검색의 다음 학술 문서에 대한 인용문을 포함합니다. * 표시된 인용문은 프로필에 있는 학술 문서와 다를 수 있습니다. 공동 저자 추가 공동 저자 팔로우 이 저자의 새 학술자료 이 저자를 인용한 새 학술자료 이 저자의 연구와 관련된 새 학술자료 업데이트를 받을 이메일 주소 완료 죄송합니다. 현재 Internet Explorer 버전에서는 일부 기능이 작동하지 않을 수 있습니다. 최적의 상태로 사용하려면 Chrome 또는 Mozilla Firefox 를 사용해 주세요. 내 프로필 내 서재 통계 알리미 설정 로그인 로그인 내 프로필 만들기 인용 전체 2021년 이후 서지정보 4620 4481 h-index 17 17 i10-index 25 25 0 1600 800 400 1200 2019 2020 2021 2022 2023 2024 2025 2026 14 95 268 524 827 1229 1589 43 공개 액세스 모두 보기 모두 보기 자료 23개 자료 0개 공개 비공개 재정 지원 요구사항 기준 공동 저자 Neil Zhenqiang Gong Associate Professor, Duke University duke.edu의 이메일 확인됨 Jia (Kevin) Liu Associate Professor of Electrical & Computer Engineering, The Ohio State University; Amazon Scholar ece.osu.edu의 이메일 확인됨 팔로우 Minghong Fang University of Louisville louisville.edu의 이메일 확인됨 - 홈페이지 Security Privacy AI Safety Machine Learning 학술자료 인용 공개 액세스 공동 저자 제목 정렬 서지정보순 정렬 연도순 정렬 제목순 정렬 인용 인용 연도 Local model poisoning attacks to {Byzantine-Robust} federated learning M Fang, X Cao, J Jia, N Gong 29th USENIX security symposium (USENIX Security 20), 1605-1622 , 2020 1923 2020 FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping X Cao, M Fang, J Liu, NZ Gong ISOC Network and Distributed System Security Symposium (NDSS) , 2021 1135 2021 Achieving linear speedup with partial worker participation in non-iid federated learning H Yang, M Fang, J Liu International Conference on Learning Representations (ICLR) , 2021 365 2021 Poisoning attacks to graph-based recommender systems M Fang, G Yang, NZ Gong, J Liu Proceedings of the 34th annual computer security applications conference�… , 2018 293 2018 Influence function based data poisoning attacks to top-n recommender systems M Fang, NZ Gong, J Liu Proceedings of the web conference 2020, 3019-3025 , 2020 219 2020 GradSafe: Detecting Unsafe Prompts for LLMs via Safety-Critical Gradient Analysis Y Xie, M Fang, R Pi, N Gong Annual Meeting of the Association for Computational Linguistics (ACL) , 2024 76 * 2024 Byzantine-resilient stochastic gradient descent for distributed learning: A lipschitz-inspired coordinate-wise median approach H Yang, X Zhang, M Fang, J Liu 2019 IEEE 58th Conference on Decision and Control (CDC), 5832-5837 , 2019 65 2019 Data poisoning attacks and defenses to crowdsourcing systems M Fang, M Sun, Q Li, NZ Gong, J Tian, J Liu Proceedings of The Web Conference 2021, 969-980 , 2021 61 2021 Byzantine-Robust Decentralized Federated Learning M Fang, Z Zhang, Hairi, P Khanduri, J Liu, S Lu, Y Liu, N Gong ACM Conference on Computer and Communications Security (CCS) , 2024 60 2024 AFLGuard: Byzantine-robust Asynchronous Federated Learning M Fang, J Liu, NZ Gong, ES Bentley Annual Computer Security Applications Conference (ACSAC) , 2022 47 2022 Private and communication-efficient edge learning: A sparse differential Gaussian-masking distributed SGD approach X Zhang, M Fang, J Liu, Z Zhu Proceedings of the Twenty-First International Symposium on Theory�… , 2020 40 2020 Poisoning Federated Recommender Systems with Fake Users M Yin, Y Xu, M Fang, NZ Gong Proceedings of The Web Conference 2024 , 2024 37 2024 Machine learning-based modeling approaches for estimating pyrolysis products of varied biomass and operating conditions J Shen, M Yan, M Fang, X Gao Bioresource Technology Reports , 2022 36 2022 Model Poisoning Attacks to Federated Learning via Multi-Round Consistency Y Xie, M Fang, NZ Gong Proceedings of CVPR 2025 , 2024 28 * 2024 Net-fleet: Achieving linear convergence speedup for fully decentralized federated learning with heterogeneous data X Zhang, M Fang, Z Liu, H Yang, J Liu, Z Zhu Proceedings of the Twenty-Third International Symposium on Theory�… , 2022 23 2022 Toward low-cost and stable blockchain networks M Fang, J Liu ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6 , 2020 19 2020 Do We Really Need to Design New Byzantine-robust Aggregation Rules? M Fang, S Nabavirazavi, Z Liu, W Sun, SS Iyengar, H Yang ISOC Network and Distributed System Security Symposium (NDSS) , 2025 17 2025 Fedredefense: Defending against model poisoning attacks for federated learning using model update reconstruction error Y Xie, M Fang, NZ Gong International Conference on Machine Learning , 2024 17 2024 Adversarial Attacks to Multi-Modal Models Z Dou, X Hu, H Yang, Z Liu, M Fang Proceedings of the 1st ACM Workshop on Large AI Systems and Models with�… , 2024 15 2024 Practical poisoning attacks against retrieval-augmented generation B Zhang, Y Chen, M Fang, Z Liu, L Nie, T Li, Z Liu arXiv preprint arXiv:2504.03957 , 2025 14 2025 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 학술자료 1–20 더보기 개인정보처리방침 약관 도움말 학술검색 정보 검색 도움말
2026-01-13T09:29:16
https://www.atlassian.com/cloud-migration
Atlassian Ascend | Atlassian Close View this page in your language ? All languages Choose your language 中文 Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Português Pусский Polski Products Featured Developers Product Managers IT professionals Business Teams Leadership Teams Featured Developers Product Managers IT professionals Business Teams Leadership Teams See all apps Featured FEATURED APPS Jira Flexible project management Confluence Collaborative knowledge workspace Jira Service Management High-velocity service delivery ATLASSIAN COLLECTIONS Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Optimize strategy and outcomes confidently Focus • Talent • Align Deliver service at high-velocity Jira Service Management • Customer Service Management • Assets • Rovo Ship high-quality software fast Rovo Dev • DX • Pipelines • Bitbucket • Compass POWERED BY Rovo AI-powered apps – driven by your team's knowledge. Developers Jira Flexible project management Compass Software catalog for teams Pipelines Scalable CI/CD automation Bitbucket Source code and CI/CD DX Measure productivity and AI impact Rovo Dev Agentic AI for developers Ship high-quality software fast Rovo Dev • DX • Pipelines • Bitbucket • Compass Rovo AI-powered apps – driven by your team's knowledge. Product Managers Jira Flexible project management Confluence Knowledge, all in one place Jira Product Discovery Capture & prioritize ideas Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Rovo AI-powered apps – driven by your team's knowledge. IT professionals Jira Service Management High-velocity service delivery Guard Enhanced cloud security Rovo AI-powered apps – driven by your team's knowledge. Business Teams Jira Flexible project management Confluence Knowledge, all in one place Trello Organized & visualized work Loom Quick, async video updates Jira Service Management High-velocity service delivery Customer Service Management Customer experiences reimagined Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Rovo AI-powered apps – driven by your team's knowledge. Leadership Teams Focus Enterprise-scale strategic planning Talent Knowledge workforce planning Jira Align Enterprise-wide work planning & value Optimize strategy and outcomes confidently Focus • Talent • Align Rovo AI-powered apps – driven by your team's knowledge. Back Solutions Solutions By use case Team collaboration Strategy and planning Service management Software development By team Software Marketing IT By size Enterprise Small business Startup Non-profit By industry Retail Telecommunications Professional services Government Rovo AI-powered apps – driven by your team's knowledge. Back Why Atlassian Why Atlassian System of Work New Atlassian's blueprint for how teams work together Integrations Connect thousands of apps to your Atlassian products Customers Case studies & stories powered by teamwork FedRAMP Compliant solutions for the public sector Resilience Enterprise-grade & highly performant infrastructure Platform Our deeply integrated, reliable & secure platform Trust center Ensure your data’s security, compliance & availability Back Resources Resources Customer Support Ask questions, report bugs & give us feedback Find Partners Consulting, training & product customization support Atlassian Ascend Resources and support for your transformation Community Learn, connect and grow with the Atlassian Community support General inquiries Product Advice Partner support Enterprise support Technical Support Pricing and Billing Developer support Purchasing & Licensing Resources Project Management Agile Atlassian Learning Get Started Project Collaboration Team Playbook Product Documentation Back Enterprise More + Less - Back Atlassian Ascend Claim free trial Learn Learn See your options Explore cloud value Compare Cloud and Data Center Explore pricing Watch a demo Back Prepare Prepare Plan your transformation Find a partner Walk through the transformation process Transform with FastShift See your support options Back Adopt Adopt Discover adoption resources Learn adoption strategies Explore onboarding resources Back Resources More + Less - Claim free trial Learn the secrets of cloud and AI transformation. Watch our webinar for real-world insights and strategies. Watch now Atlassian Ascend Ascend to new heights with Atlassian Cloud We’re with you every step of the way - helping you chart your path to cloud, at your pace. Contact us Data Center end of life will take place on March 28, 2029 Data Center subscriptions and any associated Marketplace apps will expire on this date. To make this transition as smooth as possible, we’re winding down support in phases across the next 3 years, giving you plenty of time to plan your next steps. Data Center end of life will take place on March 28, 2029 Data Center subscriptions and any associated Marketplace apps will expire on this date. To make this transition as smooth as possible, we’re winding down support in phases across the next 3 years, giving you plenty of time to plan your next steps. Your success is our mission Helping you meet the demand of innovation in the AI-era is our top priority. From the start, Atlassian’s goal has been simple: to help teams unleash their full potential. We introduced Data Center more than ten years ago to meet the needs of our enterprise customers, but these needs have evolved along with the exponential gains in AI-powered technology and an entirely new way of working. Atlassian Cloud has come lightyears from where it started, and we’re thrilled that it can meet the needs of all teams , while putting you in the best position to succeed. What’s the timeline of changes? Transforming the way you work requires careful planning and execution. The timeline below is designed to give you the lead time you need to prepare. All changes are effective at 23:59 PST (Pacific Time) on the date(s) mentioned below. Dec 16, 2025 No new Data Center app submissions ▼ More info Atlassian will no longer accept new Marketplace app submissions for Data Center. Mar 30, 2026 End of license sales to new customers ▼ More info New customers will no longer be able to purchase or request a quote for impacted Data Center products or associated Data Center app licenses. Mar 30, 2028 End of license sales to existing customers ▼ More info Existing customers will no longer be able to purchase impacted Data Center products and associated Data Center app licenses. Additionally, customers will not be able to purchase expansions to existing licenses. Mar 28, 2029 End of life of Data Center products ▼ More info Support and bug fixes will no longer be available for your Data Center products and apps, and any renewals will be prorated to match this date. Extended maintenance will be available for an additional cost, but only upon exception. Start your journey to cloud today Discover the latest cloud innovations and new capabilities that make moving to cloud easier for every customer. See what cloud can do for you Unlock a modern system of work with interconnected apps powered by unified data, intelligent AI, and enterprise-grade security and scalability. Explore cloud value Cloud options for every team Plan your move to cloud with confidence, thanks to new innovation on cloud, new cloud deployment options, and hybrid deployment experiences. Explore cloud options Move to cloud with FastShift Accelerate and optimize your journey to cloud with FastShift—Atlassian’s white glove service that helps expedite the migration process and maximize cloud value. Learn about FastShift High-performing enterprises run on Atlassian Cloud 200+ countries around the world where Atlassian software helps power enterprise 95% migration plan success rate for Jira and Confluence 44% of enterprise customers are able to make faster data-driven decisions after moving to the cloud High-performing enterprises run on Atlassian Cloud 200+ countries around the world where Atlassian software helps power enterprise 95% migration plan success rate for Jira and Confluence 44% of enterprise customers are able to make faster data-driven decisions after moving to the cloud For Bitbucket Data Center customers Keep your Bitbucket Data Center footprint, and get access to the latest innovations in Bitbucket Cloud, with one license. Learn more Bitbucket Dual License For Bitbucket Data Center customers Keep your Bitbucket Data Center footprint, and get access to the latest innovations in Bitbucket Cloud, with one license. We are here to support you Upcoming events and ways to learn more. Watch the webinar Hear from product leaders on Data Center end of life to learn what it means for you, how to get started, and what’s coming on our roadmap. Watch the replay See all the highlights Team ’25 was back at the Fira Gran Via in Barcelona, Spain for three jam-packed days of AI innovation, deep-dive product sessions, and workshops. Watch the keynote Join the conversation Engage with other customers and Atlassian experts to ask questions, share experiences, and monitor key program information and updates. Explore Community Frequently asked questions What does end of life mean?    End of life will occur across several phases, concluding with the the end of sale and support of Data Center products and any associated Marketplace apps. End of license sales to new customers New customers can no longer purchase or request a quote for a Data Center product or purchase new apps associated with Data Center. End of license sales to existing customers Existing customers can no longer purchase or request a quote for a Data Center product, or a Data Center expansion. Similarly, existing customers will no longer be able to purchase new apps, or app expansions End of life Data Center licenses and any associated Data Center app licenses will expire, making Data Center products and apps read-only. What can we expect from now until end of life?    Through March 28, 2029 , we will continue to provide the following for Data Center customers: Technical support Security bug-fixes for critical vulnerabilities Connectors from Atlassian Data Center products to Atlassian cloud In order to provide these security bug-fixes for critical vulnerabilities, we may ship other updates to our Data Center products, such as platform fixes, or support for new browsers. We understand some customers will require new cloud deployment options such as FedRAMP High, Secret Cloud or Sovereign cloud in order to migrate. We also understand that your source code is particularly sensitive, and it may take longer to move it to the cloud. We are committed to working with all customers to ensure the pathway to cloud is clear and you are able to make a smooth transition. What products are included in end of life?    The end of life applies to all affected Data Center products and Marketplace apps, which include: Jira Software Data Center Jira Service Management Data Center Confluence Data Center Bamboo Data Center Crowd Data Center Data Center mobile apps Atlassian Data Center apps Atlassian Marketplace (third-party) Data Center apps We understand that your source code is particularly sensitive, and it may take longer to move it to the cloud. In order to give you maximum flexibility for this data, Bitbucket Data Center will not end of life. Instead, existing Bitbucket Data Center customers will gain access to a new license allowing them to use both Bitbucket Data Center and Bitbucket Cloud . Learn more here . Jira Align Data Center is not included in Data Center end of life. I'm a Bitbucket Data Center customer, what are my options?    We understand that your source code is particularly sensitive, and it may take longer to move it to the cloud. In order to give you maximum flexibility for this data, Bitbucket Data Center will not end of life. Instead, existing Bitbucket Data Center customers will gain access to a new license allowing them to use both Bitbucket Data Center and Bitbucket Cloud. Learn more here . What if I can't move to cloud yet?    Over the past few years we’ve expanded our Cloud Platform, apps and feature set to meet the needs of more organizations. If you haven’t spoken with anyone about Atlassian Cloud recently, we recommend exploring our Cloud Platform vs Data Center comparison page or check out our cloud roadmap , as it may well be that we have added or plan to add support for your requirements. You can also visit our Trust Center to learn the latest on security, compliance, and resilience. We understand that some organizations require specific cloud deployment alternatives to meet data sovereignty requirements, to handle classified data, or to meet other compliance needs. We are committed to partnering with you to meet your needs over the next three years. For example, we've recently announced support for cloud deployment models outside of our commercial multi-tenant cloud - this will lay a foundation to help us offer other deployment options in the future. With this in mind, we are currently exploring options for organizations with more complex requirements. We are committed to developing solutions that meet the needs of all customers. We encourage you to engage with your Account Executive directly so that we can ensure our product roadmap meets your needs. We understand that some organizations face unique challenges or requirements that may delay their move to the cloud. For these situations, we’re committed to offering extended maintenance for certain Data Center customers by exception after March 28, 2029, ensuring you have the flexibility and support you need for a successful transformation . Please reach out to us to discuss migration options. What happens if I don’t take action by March 28, 2029?    If you do not take action to engage with us and create a plan beforehand, your Data Center license will expire on March 28, 2029 at 23:59 PST and your Data Center environment will become read-only. You will not be able to use your Data Center products after your subscription is expired. You are welcome to continue renewing your existing Data Center subscription after March 30, 2026 . However, renewals cannot extend beyond March 28, 2029 , and will be prorated to that date if a 12-month renewal goes past that date. How long will I have access to my Data Center data after my subscription expires?    After your Data Center subscription expires, your data will continue to be available in a read-only state. However, product updates and support will no longer be available in case of technical issues. We strongly advise against keeping your product running in a read-only mode while connected to the internet, since no new security bug fixes will be provided after the end of life date for Data Center. To ensure continued access to your historical Data Center data long term, we recommend backing up your data to ensure continued access after your subscription expires. What if I have more questions?    If you have more questions about what these changes mean for you, don't hesitate to contact us to connect with a specialist . You can also visit our Licensing FAQs for a comprehensive list of questions and answers. Ready to get started? Join millions teaming up to do their best work with Atlassian cloud and start your free trial today. Get started now Company Careers Events Blogs Investor Relations Atlassian Foundation Press kit Contact us products Rovo Jira Jira Align Jira Service Management Confluence Loom Trello Bitbucket See all products Resources Technical support Purchasing & licensing Atlassian Community Knowledge base Marketplace My account Create support ticket Learn Partners Training & certification Documentation Developer resources Enterprise services See all resources Copyright © 2025 Atlassian Privacy Policy Terms Impressum Choose language Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Polski Português русский 中文
2026-01-13T09:29:16
https://docs.fuse.io/developers/fusebox/sdk/get-historical-txns
GET Historical Transactions | Fuse Documentation Skip to main content Basics Developers Search Building On Fuse Web3 tools Tutorials Subgraphs FuseBox SDK Installation And Setup Create Smart Contract Wallet Send Native/ERC20 Transactions Send Batch Transactions Non-Blocking Transactions Transfer NFT Swap Tokens GET List of Tokens Owned by Address GET Historical Transactions GET Token Details GET Smart Wallet Token Balance GET Staking Options Stake and Unstake Tokens GET Staked Tokens GET Token Price GET Token Price Change in the Last 24 hours GET the Price Change in Interval GET the list of Supported Tokens Sponsored Transactions Migration from Old Versions Limitations Troubleshooting APIs Architecture Charge FuseBox SDK GET Historical Transactions On this page GET Historical Transactions Get the Historical Transactions ​ Web Flutter const walletActionsResult = await fuseSDK . getWalletActions ( { page : 1 , limit : 10 , } ) ; final WalletActionsResult walletActionsResult = await fuseSDK . getWalletActions ( page : 1 , limit : 50 ) ; Edit this page Previous GET List of Tokens Owned by Address Next GET Token Details Get the Historical Transactions Youtube GitHub Twitter Telegram Discord Forum Getting Started Fuse Network Mobile Stack Voltage Finance Under the hood Explorer Bridge Staking Governance Service Status General Brand kits Jobs Subscribe to Newsletter © 2025 Fuse. All Rights Reserved
2026-01-13T09:29:16
https://group.mantle.xyz
Mantle: Blockchain for Banking & On-Chain Finance Home Mantle Innovation Pillars Resources EN Blockchain for Banking Bringing crypto to your everyday. Learn More Mantle's Vision A world where finance is free, efficient, and accessible — powered by tokenized technology and open to all. Primary Business Segments Innovation Pillars MNT MNT powers Mantle’s ecosystem, serving as the cornerstone for governance, staking, and driving innovation across the decentralized economy. Mantle Network An Ethereum Layer 2, known for its modular design and as the first adopter of EigenLayer and EigenDA, serving as the foundation for our diverse range of products and applications. mETH Protocol A liquid ETH staking and restaking protocol that maximizes yields. Widely accepted as collateral in CEXs & DeFi apps, and money markets. Function A decentralized Bitcoin solution that bridges BTC into the Web3 economy thereby unlocking new financial opportunities. Mantle Index Four An institutional grade, yield-bearing product that offers diversified exposure to a basket of top crypto assets. UR UR is a borderless smart money app that makes it easy to spend and off-ramp, all in one place. MantleX Pioneering the future of decentralized systems by harnessing Artificial Intelligence (AI). Strategic Alliances Partnerships Total Treasury $3,741,673,939 Mantle Treasury acts as the nucleus of Mantle's financial ecosystem, ensuring stability and driving strategic growth. Treasury 76.29 % MNT $2,854,810,424 8.96 % ETH, mETH & cmETH $335,280,829 7.33 % BTC $274,325,500 6.97 % Stables $260,798,007 Figures are in US Dollars. Updated on 13 Jan 2026, 09:26 UTC EcoFund Catalyzed Capital Pool $200,000,000 The Mantle EcoFund, supported by professionals from Mirana Ventures, drives ecosystem growth by backing transformative projects and accessing top-tier deal flow through 20 leading VCs like Polychain and Dragonfly. Learn More Newsroom Spotlight Blog 11 Jul, 2025 UR Early Beta Access: Now Live With Weekly $3,000 Lottery Prize Pool Ecosystem Mantle UR Users can now sign up for a UR account with limited and exclusive, by-invite-only, codes shared by selected participants of the UR Early program from July 11, 2025, 10AM UTC to Aug. 8, 10AM UTC. Read More 10 Jul, 2025 Mantle Becomes Strategic Investor of Digital Asset Management Firm ReserveOne Ecosystem Mantle Proud to announce our strategic investment in newly-formed digital asset management firm ReserveOne, an institutionally-governed digital asset reserve anchored in a diverse treasury strategy including Bitcoin, Ethereum and Solana. Read More 09 Jul, 2025 Letter to Token Holders Q3 2025 Mantle Network UR Q3 2025 onwards will be a transformative moment for Mantle and our role in the evolving global financial landscape. Read More 18 Jun, 2025 Mantle Launches UR (Early Contributors' Access Live) Ecosystem UR Beta testing access now live for UR — a borderless smart money app that makes it easy to spend and off-ramp, all in one place. UR is powered by Mantle Network. Read More Mantle Governance Treasury EcoFund Scouts Program Get MNT What is MNT Innovation Pillars Mantle Network mETH Protocol Function Mantle Index Four UR MantleX Resources Blog Events Careers Brand Assets © Mantle 2026 . All rights reserved. Privacy Policy Terms
2026-01-13T09:29:16
https://www.linkedin.com/products/categories/data-preparation-tools
Best Data Preparation Tools | Products | LinkedIn Skip to main content LinkedIn Expand search This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. Jobs People Learning Clear text Clear text Clear text Clear text Clear text Join now Sign in Clear text Used by Used by Data Analyst (9) Chief Information Officer (5) Data Scientist (4) Data Engineer (4) Software Engineer (4) See all products Find top products in Data Preparation Tools category Software used to clean, combine, and enrich data for self-service business intelligence and data science analytics. - Process raw data into large, curated datasets for quick integration and analysis - Transform and harmonize modeling data for analytical tasks and visualizations - Use standalone ingestion processes for smooth extraction and high data quality Can include machine learning functionality, metadata management and governance, and automatic recommendations to reduce preparation time. 68 results Zoho DataPrep Data Preparation Tools by Zoho DataPrep is an AI-powered data preparation tool with no-code Advanced ETL capabilities, specially designed to help you clean, transform, and enrich data for analytics, machine learning, data warehousing, and more. View product Tableau Prep Data Preparation Tools by Tableau Combine, shape, and clean your data for analysis with Tableau Prep. View product Altair Monarch Data Preparation Tools by Altair Altair Monarch is a market leading desktop-based self-service data preparation solution. Monarch connects to multiple data sources including structured and unstructured data, cloud-based data, and big data. Connecting to data, cleansing and manipulating data requires no coding. Monarch can quickly convert disparate data formats into rows and columns for use in data analytics. Over 80 pre-built data preparation functions mean data preparation tasks can be completed quickly and error free. More time is spent on generating value from data as opposed to making data usable to begin with. View product Prime EDM Data Preparation Tools by Gresham Integrate validated market and derived data into downstream business-critical processes and systems. Specialised software solution designed to help financial institutions effectively manage, organize, and utilise their vast volumes of market and reference data. Prime EDM centralises data from over 100 sources providing users a modern the self-service tool for end to end data management. Our financial data store ensures on-demand availability of high-quality data to all users and applications. This web enabled platform, using NoSQL database technology; Apache Cassandra and Spark, allows for data discovery, enterprise search and distribution. A highly scalable platform to meet the surging market data demands of businesses that provides native integration with commonly used data scientist languages such as Python and R as well as commercial analytics and business intelligence applications. View product Trifacta Data Preparation Tools by Trifacta Learn more about the products from Trifacta, focused on helping individuals and organizations to more efficiently explore and transform data for analysis. View product Find products trusted by professionals in your network See which products are used by connections in your network and those that share similar job titles Sign in to view full insights ResolvID Data Preparation Tools by CACI Ltd ResolvID brings together data from multiple sources and automatically standardises, validates and cleanses it. It provides the consistent, unified customer data you need to deliver successful personalisation and differentiated customer experiences, for revenue and customer growth. Using a Restful API, it can easily integrate with your any platform or existing IT and marketing systems regardless of whether they’re hosted, or cloud based. It can help you create better experiences for the individual customers: - Identifying the individual customer in your data - Connecting online and offline data - Ensuring your data is compliant View product AppliedInsight | Data Quality Visualization Data Preparation Tools by Arcadis Gen Create the best datasets for optimization. Data Quality Visualizer (DQV) is a secure, web-based app that assess the overall quality of your datasets, and instantly gives you a detailed view of where your data is poor. It provides easy-to-understand guide questions formulated by expert data scientists and analysts to help you work out where and how to improve your data. DQV shows you where the problems lie in your dataset and makes it simple to complete, correct or improve them to boost decision-making. Even without an expert consultant, you can fix your own data quickly and effectively, saving you time and resources. All data input into DQV are stored safely in a cloud-based app, kept secured by the highest levels of protection in the world. Have confidence that your data starts and stays with you. DQV works hand in hand with Gen’s Data Quality Repair app, so you can get your datasets primed and ready for modeling and asset optimization. View product AppliedInsight | Data Quality Repair Data Preparation Tools by Arcadis Gen Get rid of incorrect data. Quickly. Automatically. Improve data weak points and boost confidence in future modeling with Data Quality Repair (DQR). This web-based app takes you on a step-by-step walkthrough of your data quality issues and provides solutions for fixing them, backed by decades of consultancy expertise to create an easy-to-follow journey. It keeps your data your data safe and secure with the highest levels of protection wherever you are in the world, making sure your data starts and stays with you. With DQR, you can quickly understand, repair and improve your own datasets. It breaks down traditional, investment barriers by putting you in control of your own data at all times, using enterprise-level analytics to help you build and present better business cases – sometimes even right there, during live meetings. DQR works hand in hand with Gen’s Data Quality Visualization app, so you can get your datasets primed and ready for modeling and asset optimization. View product Ingestro Data Preparation Tools by Ingestro Ingestro is an AI-powered, easily embeddable data integration solution empowering SaaS companies to organize, validate, and clean unpredictable customer data. Import data from Excel, CSV, PDF, and other sources into your preferred system quickly and securely with AI-powered automation. View product Datameer Data Preparation Tools by Datameer Datameer enables data engineers and analysts to transform and model data directly in their cloud warehouses via a simple SQL code or no-code interface to solve complex analytical projects. View product See more How it works Explore Discover the best product for your need from a growing catalog of 25,000 products and categories trusted by LinkedIn professionals Learn Evaluate new tools, explore trending products in your industry and see who in your network is skilled in the product Grow Join communities of product users to learn best practices, celebrate your progress and accelerate your career LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines English Language
2026-01-13T09:29:16
https://scholar.google.com/citations?user=p8i0_-EAAAAJ&hl=ko&oe=ASCII
Chenyang Lyu - Google 학술 검색 로드 중... 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 연간 인용횟수 중복된 서지정보 다음 학술 문서는 학술검색에서 병합되어 있습니다. 총 인용 횟수가 첫 번째 학술 문서에 대해서만 계산됩니다. 병합된 서지정보 이 '인용' 횟수는 학술검색의 다음 학술 문서에 대한 인용문을 포함합니다. * 표시된 인용문은 프로필에 있는 학술 문서와 다를 수 있습니다. 공동 저자 추가 공동 저자 팔로우 이 저자의 새 학술자료 이 저자를 인용한 새 학술자료 이 저자의 연구와 관련된 새 학술자료 업데이트를 받을 이메일 주소 완료 죄송합니다. 현재 Internet Explorer 버전에서는 일부 기능이 작동하지 않을 수 있습니다. 최적의 상태로 사용하려면 Chrome 또는 Mozilla Firefox 를 사용해 주세요. 내 프로필 내 서재 통계 알리미 설정 로그인 로그인 내 프로필 만들기 인용 전체 2021년 이후 서지정보 1043 960 h-index 11 11 i10-index 11 11 0 280 140 70 210 2019 2020 2021 2022 2023 2024 2025 2026 18 64 85 125 209 266 271 3 공개 액세스 모두 보기 모두 보기 자료 8개 자료 1개 공개 비공개 재정 지원 요구사항 기준 팔로우 Chenyang Lyu Zhejiang University zju.edu.cn의 이메일 확인됨 fuzzing data driven systems and security 학술자료 인용 공개 액세스 제목 정렬 서지정보순 정렬 연도순 정렬 제목순 정렬 인용 인용 연도 {MOPT}: Optimized mutation scheduling for fuzzers C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah 28th USENIX security symposium (USENIX security 19), 1949-1966 , 2019 443 2019 {UNIFUZZ}: A holistic and pragmatic {Metrics-Driven} platform for evaluating fuzzers Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen, C Lyu, C Wu, R Beyah, ... 30th USENIX Security Symposium (USENIX Security 21), 2777-2794 , 2021 180 2021 V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs Y Li, S Ji, C Lyu, Y Chen, J Chen, Q Gu, C Wu, R Beyah IEEE transactions on cybernetics 52 (5), 3745-3756 , 2020 70 2020 Smartseed: Smart seed generation for efficient fuzzing C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen arXiv preprint arXiv:1807.02606 , 2018 70 2018 A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ... Proceedings of the 31st ACM SIGSOFT International Symposium on Software�… , 2022 69 2022 V-fuzz: Vulnerability-oriented evolutionary fuzzing Y Li, S Ji, C Lv, Y Chen, J Chen, Q Gu, C Wu arXiv preprint arXiv:1901.01142 , 2019 66 2019 EMS: History-Driven Mutation for Coverage-based Fuzzing. C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah NDSS , 2022 56 2022 SLIME: program-sensitive energy allocation for fuzzing C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ... Proceedings of the 31st ACM SIGSOFT international symposium on software�… , 2022 34 2022 {MINER}: A Hybrid {Data-Driven} Approach for {REST}{API} Fuzzing C Lyu, J Xu, S Ji, X Zhang, Q Wang, B Zhao, G Pan, W Cao, P Chen, ... 32nd USENIX Security Symposium (USENIX Security 23), 4517-4534 , 2023 25 2023 One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ... IEEE Transactions on Dependable and Secure Computing 21 (3), 1372-1389 , 2023 18 2023 {UVSCAN}: Detecting {Third-Party} Component Usage Violations in {IoT} Firmware B Zhao, S Ji, X Zhang, Y Tian, Q Wang, Y Pu, C Lyu, R Beyah 32nd USENIX Security Symposium (USENIX Security 23), 3421-3438 , 2023 12 2023 현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요. 학술자료 1–11 더보기 개인정보처리방침 약관 도움말 학술검색 정보 검색 도움말
2026-01-13T09:29:16