Show filters Hide filters

Refine your search

Publication Year
Organisation found in the video
1-36 out of 65 results
Change view
  • Sort by:
1:03:26 Berkeley System Distribution (BSD), Andrea Ross English 2015

Networking with OpenBSD in a virtualized environment

Virtualized systems running on hypervisors such as bhyve, ESXi, Xen, etc are increasingly important in the datacenter. With a long history of stable regular releases, security, and networking performance OpenBSD is very well suited to take advantage of virtualization and to help improve the state of the art. This presentation will explore why OpenBSD is well suited to deploying as virtual network devices on the various hypervisors and present practical examples of using OpenBSD for production networking in a virtual system. I will discuss what tools are in base, what tools are easily installable from ports/packages, current automation and management tools, and how to use them effectively using specific real world examples from large data center networks. Will present examples and methods for using OpenBSD to build routers, firewalls, and loadbalancers running on the various hypervisors. Will talk about methods for automating deployment, configuration, and integration with existing vendors. Will also address possible future applications in switching. Will discuss how to use the tools in OpenBSD to run a better and faster network with fewer problems and how virtualization can be part of that. In addition to the above I will discuss why the OpenBSD community in particular should care about virtualization and work to improve the state of engineering there.
  • Published: 2015
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
59:45 Berkeley System Distribution (BSD), Andrea Ross English 2015

Early days of Unix and design of sh

  • Published: 2015
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
2:29:23 Technische Universität Braunschweig, Institut für Informationssysteme English 2011

Audio Low level Features, Difference Limen, Pitch Recognition (19.05.2011)

In this course, we examine the aspects regarding building multimedia database systems and give an insight into the used techniques. The course deals with content-specific retrieval of multimedia data. Basic issue is the efficient storage and subsequent retrieval of multimedia documents. The general structure of the course is: - Basic characteristics of multimedia databases - Evaluation of retrieval effectiveness, Precision-Recall Analysis - Semantic content of image-content search - Image representation, low-level and high-level features - Texture features, random-field models - Audio formats, sampling, metadata - Thematic search within music tracks - Query formulation in music databases - Media representation for video - Frame / Shot Detection, Event Detection - Video segmentation and video summarization - Video Indexing, MPEG-7 - Extraction of low-and high-level features -Integration of features and efficient similarity comparison - Indexing over inverted file index, indexing Gemini, R *- trees
  • Published: 2011
  • Publisher: Technische Universität Braunschweig, Institut für Informationssysteme
  • Language: English
2:16:44 Technische Universität Braunschweig, Institut für Informationssysteme English 2011

Relevance feedback, Classification (1.6.2011)

This lecture provides an introduction to the fields of information retrieval and web search. We will discuss how relevant information can be found in very large and mostly unstructured data collections; this is particularly interesting in cases where users cannot provide a clear formulation of their current information need. Web search engines like Google are a typical application of the techniques covered by this course.
  • Published: 2011
  • Publisher: Technische Universität Braunschweig, Institut für Informationssysteme
  • Language: English
2:32:31 Technische Universität Braunschweig, Institut für Informationssysteme English 2011

Introduction to Web retrieval (22.6.2011)

This lecture provides an introduction to the fields of information retrieval and web search. We will discuss how relevant information can be found in very large and mostly unstructured data collections; this is particularly interesting in cases where users cannot provide a clear formulation of their current information need. Web search engines like Google are a typical application of the techniques covered by this course.
  • Published: 2011
  • Publisher: Technische Universität Braunschweig, Institut für Informationssysteme
  • Language: English
57:28 Berkeley System Distribution (BSD), Andrea Ross English 2014

BSD/ARM Kernel Internals

In this talk, I'll discuss how BSD kernels interface with the ARM processor. I will cover the kernel internals of the FreeBSD and NetBSD ARM ports, focusing on ARMv7 primarily. I will discuss how booting, memory management, exceptions, and interrupts work using plenty of BSD code. This talk is meant to be a quick start guide for BSD hackers who aren't familiar with the ARM architecture.
  • Published: 2014
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
39:17 Berkeley System Distribution (BSD), Andrea Ross English 2014

IPv6 Transitioning mechanisms on the BSDs

The growth pace of IPv6 adoption is still slow, but constantly increasing, as more providers and networks migrate. There is one aspect of the adoption that is still underestimated, and it's transition mechanisms, enabling networks speaking different protocols to talk to each other. In may 2013, Switzerland jumped on top of IPv6 utilisation in the world by just having its incumbent operator enable one of these for a large base of its users. This talk will first introduce a handful of different transitioning mechanisms in use, picking the most widely used amongst the plethora of ones available. In the second part, a live demonstration will show the audience how to set up some of them using native tools on OpenBSD and FreeBSD.
  • Published: 2014
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
1:02:19 Free and Open Source software Conference (FrOSCon) e.V. English 2015

Beginning of the End or End of the Beginning?

On August 7th maddog turned 65 years old. He started programming in 1969 after almost being electrocuted by 13,600 volts and 800 Amps (he figured software was safer). In celebration of 46 years in the computer in the computer field and five more years before he can afford to retire, come hear maddog explain the computer field in ways few people have thought of it. maddog
  • Published: 2015
  • Publisher: Free and Open Source software Conference (FrOSCon) e.V.
  • Language: English
44:23 PGCon - PostgreSQL Conference for Users and Developers, Andrea Ross English 2015

Shabang

Scripting with Postgres Sometimes bash is just the way to go! This talk will cover tips and techniques for effective bash scripting with PostgreSQL. Sometimes bash is just the way to go! This talk will cover tips and techniques for effective bash scripting with PostgreSQL. It will include guidance about: Pros/cons of shell scripts Function library creation and use Executing SQL Set/get PostgreSQL data from/into script variables Keeping PostgreSQL functions in sync with scripts Locking Doing work in parallel Ensuring cleanup This is a source-code heavy talk. Moderate experience with both bash scripting and PostgreSQL is needed to get the most out of it.
  • Published: 2015
  • Publisher: PGCon - PostgreSQL Conference for Users and Developers, Andrea Ross
  • Language: English
36:44 EuroPython English 2015

Tuning Python applications can dramatically increase performance

Vasilij Litvinov - Tuning Python applications can dramatically increase performance Traditional Python profiling tools have limitations. Standard tools like **cProfile** and most all third party tools (like **Python Tools** plugin for Microsoft Visual Studio) suffer from common flaws. First, the profiling overhead is high (up to 50%). Second, the information provided is “function-level” i.e. the tool shows how much time was spent within a function, but not actionable “line-level” information to show which exact lines are the bottleneck in a function. Adding “line-level” information to most tools causes the application to run even slower. Third, some tools require modification of the application source code to enable profiling thus disrupting development. This talk presents an experimental Python profiler. It typically has less than 15% overhead, shows line-level information and does not require modification of application source code. Experiments using it resulted in performance gains of 2x and more. Of course results vary by application, but in a typical application there may be quick optimizations easily identified by this type of profiler. The talk will briefly describe the basics of what, why and how to profile. The profiler‘s use and results will be shown in the presentation with examples based on real-life applications. Previous experience of working with profilers and trying to optimize an application is a plus, but not required, to gain a better appreciation of the work presented.
  • Published: 2015
  • Publisher: EuroPython
  • Language: English
30:58 EuroPython English 2014

How Disqus is using Django as the basis of our Service Oriented Architecture

adam - How Disqus is using Django as the basis of our Service Oriented Architecture Disqus maintains the largest Django app out there. And we love it! It has, however, grown rather large and unwieldy. In the last year Disqus has had an increasing number of smaller services cropping up based on several different platforms. So this talk will be about how we do continuous deployment with our emerging service-based infrastructure.
  • Published: 2014
  • Publisher: EuroPython
  • Language: English
36:03 EuroPython English 2016

CloudABI: Capability based security on Linux/Unix

Alex Willmer - CloudABI: Capability based security on Linux/Unix Take POSIX, add capability-based security, then remove anything that conflicts. The result is CloudABI, available for BSD, Linux, OSX et al. A CloudABI process is incapable of any action that has a global impact It can only affect the file descriptors you provide. As a result even unknown binaries can safely be executed - without the need for containers, virtual machines, or other sandboxes. This talk will introduce CloudABI, how to use it with Python, the benefits, and the trade-offs. ----- [CloudABI] is a new POSIX based computing environment that brings [capability-based security] to BSD, Linux, OSX et al. Unlike traditional Unix, if a CloudABI process goes rogue it cannot execute random binaries, or read arbitrary files. This is achieved by removing `open()` & any other API able to acquire global resources. Instead a CloudABI process must be granted capabilities to specific resources (e.g. directories, files, sockets) in the form of file descriptors. If a process only has a descriptor for `/var/www` then it's incapable of affecting any file or folder outside that directory. This talk will - Review the security & reusability problems of Linux & Unix processes - Introduce capability-based security - Summarize the design of CloudABI - its benefits & trade-offs - Demonstrate how to write Python software for CloudABI & run it - Point out the pitfalls & gotchas to be aware of - Discuss the current & future status of CloudABI CloudABI began life on FreeBSD. It also runs DragonFly BSD, NetBSD, PC-BSD, Arch Linux, Debian, Ubuntu, & OS X. The API & ABI are kernel agnostic - a CloudABI binary can run on any supported kernel. The design is evolved from [Capsicum], a library that allows processes to drop access to undesired syscalls at runtime. CloudABI applies this at build time to make testing & lock- down easier.
  • Published: 2016
  • Publisher: EuroPython
  • Language: English
21:16 River Valley TV English 2012

Improving the remarkable photosensitivity of dichromated gelatin for hologram recording in green laser light

  • Published: 2012
  • Publisher: River Valley TV
  • Language: English
28:30 University of Trento English 2002

Flow computation on massive grid terrains

  • Published: 2002
  • Publisher: University of Trento
  • Language: English
31:57 River Valley TV English 2012

Keynote

  • Published: 2012
  • Publisher: River Valley TV
  • Language: English
45:53 Confreaks, LLC English 2017

Keynote by Rogers

  • Published: 2017
  • Publisher: Confreaks, LLC
  • Language: English
31:36 re:publica English 2016

Crowdsourcing the Reconstruction of Lost Heritage

The destruction of cultural heritage by human or natural causes isn’t new, but the way we can help is. Although the original artifacts and structures can never be replaced, their cultural memory can be preserved thanks to uniting web development, image-based reconstructions, and crowdsourcing. Building on its first version as Project Mosul, associated with the demolition of archaeological sites and museums in northern Iraq, Rekrei pushes this development and vision internationally to regions in Asia, Africa, Europe, and the Americas.
  • Published: 2016
  • Publisher: re:publica
  • Language: English
27:57 re:publica English 2013

How music can predict the human/machine future

From HAL to Wiimotes and Kinect, musicians have predicted the future of machine/human interaction. Because music connects with time, body, and emotion in a unique way, they test the limits of technology. Now it's time to work out what comes next. What's going on here - how did musicians manage to invent major digital interaction tech before anyone else? Before the iPad, the first commercial multi-touch product was built for musicians and DJs. Before the Wii remote, musicians built gestural controllers, dating back to the early part of the 20th century. Before the moon landing, Max Mathews' team of researchers taught computers to make music and sing, inspired HAL in 2001: A Space Odyssey, and may have even built the precursor to object-oriented programming.Music's demands - to be expressive, real-time, and play with others - can test the limitations of technology in a way people feel deeply, and help us get beyond those limitations.
  • Published: 2013
  • Publisher: re:publica
  • Language: English
31:20 EuroPython English 2017

Call a C API from Python becomes more enjoyable with CFFI

Call a C API from Python becomes more enjoyable with CFFI [EuroPython 2017 - Talk - 2017-07-12 - Anfiteatro 2] [Rimini, Italy] Python is slow ! Python can’t access bare metal! You often hear theses assumptions? Theses limitations can be surpassed by Python extensions written in C. However, according to my personal experience, doing this by leveraging C may yield to several issues (e.g., memory management). C Foreign Function Interface for Python (a.k.a., CFFI) allows you to easily write Python extensions. One of the main aims of CFFI is to to wrap C libraries. Along the same lines, it may also be used for performance enhancement. By this call, I am firstly presenting CFFI and it’s two modes of utilization: API level and ABI level. Then I will share my own experience about wrapping shaderc library (https://github.com/google/shaderc) in six hours pyshaderc (https://github.com/realitix/pyshaderc). Next we are going to the next level, let’s wrap all the Vulkan API! Vulkan is the new 3D API and is not a piece of cake. To see the real advantage of CFFI, a side by side comparison between two Python modules is going to be presented: CVulkan is a Vulkan wrapper written fully in C, it’s a classic C extension for Python vulkan is its CFFI counterpart without any C written, only Python I have developed two versions of Vulkan wrapper (one in a pure C, and the second by leveraging CFFI) and I can assure you that CFFI is a a way better! Let’s code
  • Published: 2017
  • Publisher: EuroPython
  • Language: English
58:03 FOSDEM VZW English 2016

How CoreOS is Built, Modified, and Updated

  • Published: 2016
  • Publisher: FOSDEM VZW
  • Language: English
21:50 Confreaks, LLC English 2016

Delivery Dependency Support (or How Your Project is Not an Island)

Want to get a handle on dependency support and safe promotion, what does that mean anyhow and how can they help? You've come to the right place. This talk will dive into the philosophy of dependencies, how to use 'em and a bit about how the sausage is made.
  • Published: 2016
  • Publisher: Confreaks, LLC
  • Language: English
40:02 Confreaks, LLC English 2016

Balancing Velocity and Compliance

At SAP NS2, our business is focused on delivering a full suite of applications, analytics, database, cybersecurity, and cloud software solutions. with specialized levels of security and support for our U.S. national security and critical infrastructure customers. We have the same needs for development velocity as many other organizations but we must operate under stringent compliance and security protocols that present barriers to collaboration and fast, small batch releases. Our presentation will examine how you can balance velocity and compliance in regulated environments, and will take what we’ve learned from working with the government and show you how to apply those lessons to a range of industries with their own security and compliance considerations. A few topics we will cover: -How do you apply DevOps to enterprise software? -Compliance and security at speed and scale -Continuous monitoring is continuous delivery -How do I ensure auditability of my infrastructure -Chef Delivery and its vital role with compliance -Chef provisioning and our ability to adapt to customer needs quickly and reliably. -Auto scaling powered by slapchop Attendees will learn how we: -Leveraged Chef to enforce compliance -Leveraged Delivery for Change Control -Enabled auditing powered by Chef data.
  • Published: 2016
  • Publisher: Confreaks, LLC
  • Language: English
1:03:52 Free and Open Source software Conference (FrOSCon) e.V. English 2016

The future of private clouds

Last June, Nextcloud started as an ownCloud fork; a first release came less than two weeks later! Today, plans are already taking shape. Where is the project going? Key for Nextcloud is community: working, in the open, with others. We'll talk about calendar and contacts, communication and productivity, enterprise functionality, upgrading, distribution packaging and more.
  • Published: 2016
  • Publisher: Free and Open Source software Conference (FrOSCon) e.V.
  • Language: English
1:05:04 REcon English 2017

Getting Physical with USB Type-C: Windows 10 RAM Forensics and UEFI Attacks

  • Published: 2017
  • Publisher: REcon
  • Language: English
43:26 DjangoCon US English 2016

Walking Down the A11Y Road - Lessons Learnt From Working on Accessibility of A Django Project

- Who we are and how did we meet? WHY DO WE CARE? - Universal Design as a core value - Who benefits? - Why making inclusive products makes business sense? - What liabilities you incur for not making inclusive products? WHAT CAN YOU DO WITH AN ALREADY ROUNDED PRODUCT? BABY-STEPS WITH KA LITE Easy things you can check for and correct fast (titles, headings, aria landmarks, visible focus, alttext for images, meaningful labels for EVERYTHING...) Bit more tinkering required (menus and navigation, complex forms, accessible color schemes...) Accessible Multimedia & Documents (offer ALTERNATIVES!) WHAT SHOULD YOU DO RIGHT FROM THE START OF A NEW PROJECT? KOLIBRI FLIES FOR EVERYBODY - Include a11y requirements into the Usability Style Guide - Take a11y into account when choosing the libraries and frameworks - Follow the standard web semantic - Make accessible web components available from the beginning - Start including a11y automated tests as soon as possible ACCESSIBILITY IN EVERYDAY DEV TEAM LIFE - A11y Pills & lots of passion - Make accessibility a *SHARED* responsibility - Start a Tools Repository (Rome wasn't built in a day) - Don't rely exclusively on checklists and automated testing (Involve the USERS!) - No such thing as 100% accessible
  • Published: 2016
  • Publisher: DjangoCon US
  • Language: English
55:51 REcon English 2016

Shooting the OS X El Capitan Kernel Like a Sniper

OS X El Capitan has introduced new exploit mitigations to the kernel. Such mitigations include “vm map copy” mitigation, System Integrity Protection/Rootless, SMAP (enforced on new model of Macbook Pro), etc. Combining with the existing modern OS exploit mitigations like kASLR, DEP, exploiting OS X El Capitan kernel became harder. Approaches to defeat those new mitigations have been discovered by security researchers in late 2015, but most of them have additional prerequisite to either the bug or the environment. For example, the technology to overwrite the size of vm map copy requires a perfect zone overflow (overflowed length controllable + content controllable), also some of the technology requires creating specific user client which is prohibited by sandboxed processes (Safari WebContent, Chrome sandbox, etc.) In this talk, we will introduce a new approach to exploit the El Capitan kernel from the most restrictive sandboxed process (Safari WebContent). The new approach is universal to all OS X kernel and doesn’t require too much on bug quality. Only a single write (not necessarily arbitrary value) is needed to pwn everything (including info leak, kASLR, DEP, SIP, SMAP bypass). The new technology will be illustrated by a live remote root demo during the talk.
  • Published: 2016
  • Publisher: REcon
  • Language: English
52:15 REcon English 2016

Dangerous Optimizations and the Loss of Causality

Increasingly, compiler writers are taking advantage of undefined behaviors in the C and C++ programming languages to improve optimizations. Frequently, these optimizations are interfering with the ability of developers to perform cause-effect analysis on their source code, that is, analyzing the dependence of downstream results on prior results. Consequently, these optimizations are eliminating causality in software and are increasing the probability of software faults, defects, and vulnerabilities. This presentation describes some common optimizations, describes how these can lead to software vulnerabilities, and identifies applicable and practical mitigation strategies.
  • Published: 2016
  • Publisher: REcon
  • Language: English
58:57 FOSDEM VZW English 2014

What's new in FreeBSD 10?

The new FreeBSD 10.0 has been released just before FOSDEM. This new release adds many new features and enhancements to FreeBSD. To tease your appetite, here are some of the highlights: FreeBSD now includes the BSD native hypervisor bhyve. The build system now uses the CLANG compiler instead of GCC by default. The ports and packages system now uses the new PKGNG package repository by default. A new kernel-based iSCSI target and initiator have been added. FUSE is now part of the base system which allows you to run nearly all fusefs filesystems. Growfs can now enlarge filesystems while mounted. A new and better implementation of the CARP protocol. The PF packet filter now supports fine-grained locking which significantly improves performance on multi-core systems. More GNU utilities replaced by BSD licensed implementations
  • Published: 2014
  • Publisher: FOSDEM VZW
  • Language: English
24:24 FOSDEM VZW English 2014

JavaScript for the skeptics

Starting with pdf.js, spiraling around shumway & zipfile.js, we'll explore what JS is already capable of, even though it never seemed practical. Then we'll go on to explain the WebAPIs to bring the "native" right in the browser (with a tinge of FxOS - so that it's not up in the air, it's already there - in fact it's so-last-FOSDEM actually). Finally, we will talk about the (near) future, and how broadway.js, asm.js (Emscripten, LLVM) et al. are going the change the web - for good!
  • Published: 2014
  • Publisher: FOSDEM VZW
  • Language: English
39:59 FOSDEM VZW English 2014

Dual-Android on Nexus 10 using XEN

Samsung will present the challenges of creating a dual-Android platform on the Nexus 10 (Cortex A15 based) using Xen on ARM. Samsung has been endeavoring to run XEN on ARM based mobile devices using para-virtualization for CortexA9 devices earlier and now with virtualization extensions on cortexA15 devices. The primary end user use case is BYOD(Bring Your Own Device), where two isolated OSs run simultaneously. One OS would be "personal" OS and the other a "work" OS. The user experience should not deteriorate in either of the OSs and GPU is the biggest hurdle in achieving this. Samsung would present its approach in virtualization of the GPU within the context of XEN and discuss the challenges encountered in achieving a good FPS(frames per second) in both OSs (two Androids in this case). The main points would be stress the following points * Virtualization on mobile devices and user experience importance for its success. * GPU virtualization is achievable with very good performance using XEN. * XEN and open source collaboration from Samsung. * Paravirtualization cahllenges of IO/peripheral devices on a typical Mobile device with virtualization extension support for CPU and Memory
  • Published: 2014
  • Publisher: FOSDEM VZW
  • Language: English
51:03 re:publica English 2015

Simulating the universe: Supercomputers in astrophysics

How computation is being used to address cutting edge problems in astrophysics. In this talk Dr. Christine Corbett Moran will go over modern puzzles and challenges in astrophysics: from the formation of supermassive black holes, to dark matter, to dark energy and more and how cutting edge computing techniques in distributed systems are paving the way to enhancing our understanding of the deepest mysteries of the universe.
  • Published: 2015
  • Publisher: re:publica
  • Language: English
41:46 re:publica English 2015

How to Avoid Curses in the Era of Big Data

How to Avoid Curses in the Era of Big Data: The Answer Through a Brief Historical Detour of Electricity, Computers, and Algorithms
  • Published: 2015
  • Publisher: re:publica
  • Language: English
52:38 FOSS4G, Open Source Geospatial Foundation (OSGeo) English 2014

MapLoom: A New Web-client With Versioned Editing (GeoGit) Integration

The need for a user-friendly web-client that enabled effective geospatial data collection, sharing, and collaboration for the ROGUE project motivated us to move away from our GeoExplorer based web-client. Our new web-client, MapLoom, is based on OpenLayers3, AngularJS, and Bootstrap which addresses key shortcomings of GeoExplorer and provides an intuitive and simple interface for performing complex GeoGit operations. The capabilities include per feature and layer history, viewing difference between revisions, merging, conflict resolution, and synchronizing with multiple remotes through the UI. The ability to synchronize a repository with multiple remotes is just one of the reasons why development of GeoGit was the solution to our needs. GeoGit allows distributed versioned editing of geospatial data at a feature level and allows the repositories to be synchronized even in disconnected or reduced connectivity environments. This talk will cover our experience developing the web-client as well as highlight the use of GeoGit.
  • Published: 2014
  • Publisher: FOSS4G, Open Source Geospatial Foundation (OSGeo)
  • Language: English
57:57 Chaos Computer Club e.V. English 2017

Dude, you broke the Future!

We're living in yesterday's future, and it's nothing like the speculations of our authors and film/TV producers. As a working science fiction novelist, I take a professional interest in how we get predictions about the future wrong, and why, so that I can avoid repeating the same mistakes. Science fiction is written by people embedded within a society with expectations and political assumptions that bias us towards looking at the shiny surface of new technologies rather than asking how human beings will use them, and to taking narratives of progress at face value rather than asking what hidden agenda they serve. In this talk, author Charles Stross will give a rambling, discursive, and angry tour of what went wrong with the 21st century, why we didn't see it coming, where we can expect it to go next, and a few suggestions for what to do about it if we don't like it.
  • Published: 2017
  • Publisher: Chaos Computer Club e.V.
  • Language: English
52:13 Chaos Computer Club e.V. English 2017

The making of a chip

You are surrounded by ICs. Yet you probably don't know much about how such a chip is made. This talk is an introduction to the world of chip fabrication from photolithography over ion implantation to vapor deposition of the connections
  • Published: 2017
  • Publisher: Chaos Computer Club e.V.
  • Language: English
24:22 University of Southern California (USC) English 2011

Long range failure-tolerant entanglement distribution

We introduce a protocol to distribute entanglement between remote parties. Our protocol is based on a chain of repeater stations, and exploits topological encoding to tolerate very high levels of defect and error. The repeater stations may employ probabilistic entanglement operations which usually faill; ours is the first protocol to explicitly allow for technologies of this kind. Given a error rate between stations in excess of 10%, arbitrarily long range high fidelity entanglement distribution is possible even if the heralded failure rate within the stations is as high as 99%, providing that unheralded errors are low (order 0.01%).
  • Published: 2011
  • Publisher: University of Southern California (USC)
  • Language: English
out of 2 pages
Loading...
Feedback

Timings

  260 ms - page object
  174 ms - search
    9 ms - highlighting
    2 ms - highlighting/32388
    2 ms - highlighting/21087
    3 ms - highlighting/15330
    2 ms - highlighting/31258
    9 ms - highlighting/342
    3 ms - highlighting/19935
    3 ms - highlighting/20220
    1 ms - highlighting/21003
    9 ms - highlighting/358
    2 ms - highlighting/21960
    3 ms - highlighting/21077
    2 ms - highlighting/33536
    4 ms - highlighting/31765
    4 ms - highlighting/18657
    9 ms - highlighting/351
    1 ms - highlighting/32514
    3 ms - highlighting/31866
    2 ms - highlighting/32556
    3 ms - highlighting/15343
    3 ms - highlighting/34903
    2 ms - highlighting/32660
    3 ms - highlighting/31969
    1 ms - highlighting/21759
    2 ms - highlighting/34909
    2 ms - highlighting/35311
    2 ms - highlighting/34627
    2 ms - highlighting/32438
    3 ms - highlighting/32738
    2 ms - highlighting/34345
    2 ms - highlighting/34614
    2 ms - highlighting/32727
    2 ms - highlighting/32741
    1 ms - highlighting/33727
    4 ms - highlighting/19593
    2 ms - highlighting/19145
    2 ms - highlighting/18650

Version

AV-Portal 3.8.0 (dec2fe8b0ce2e718d55d6f23ab68f0b2424a1f3f)