 Unraveling string_view: Basics, Benefits, and Best PracticesC++: string_view: Deep dive Jasmine Lopez Prithvi Okade 1Topics • Motivation • Performance benefits & basics • string_view: Constructors, useful functions • string vs. string_view and their interoperability '\n'; } hello hello hello Apart from this convenience, string_view also provides performance benefits which we will see shortly.Basics • string_view does not allocate any memory. • It consists of sv{pchar + 1, 2}; puts(sv.data()); ello Don’t do this when you are using string_view 6Performance benefits • The fact that string_view does not allocate memory can be used to gain performance in some0 码力 | 61 页 | 1.11 MB | 6 月前3 Unraveling string_view: Basics, Benefits, and Best PracticesC++: string_view: Deep dive Jasmine Lopez Prithvi Okade 1Topics • Motivation • Performance benefits & basics • string_view: Constructors, useful functions • string vs. string_view and their interoperability '\n'; } hello hello hello Apart from this convenience, string_view also provides performance benefits which we will see shortly.Basics • string_view does not allocate any memory. • It consists of sv{pchar + 1, 2}; puts(sv.data()); ello Don’t do this when you are using string_view 6Performance benefits • The fact that string_view does not allocate memory can be used to gain performance in some0 码力 | 61 页 | 1.11 MB | 6 月前3
 Powered by AI: A Cambrian Explosion for C++ Software Development Tools`University of Massachusetts Amherst Powered by AI: A Cambrian Explosion for C++ Software Development Tools Emery BergerCretaceous–Paleogene (K-Pg) extinction eventCretaceous–Paleogene (K-Pg) extinction ALLOCATED MEMORY USAGE GPU UTIL %, PEAK MEMORY (MB/s) MEMORY PYTHON NATIVE AI-powered optimizations!AI-powered optimizations... COMING SOON!evolveevolve profiler that suggests optimizationsevolve0 码力 | 128 页 | 23.40 MB | 6 月前3 Powered by AI: A Cambrian Explosion for C++ Software Development Tools`University of Massachusetts Amherst Powered by AI: A Cambrian Explosion for C++ Software Development Tools Emery BergerCretaceous–Paleogene (K-Pg) extinction eventCretaceous–Paleogene (K-Pg) extinction ALLOCATED MEMORY USAGE GPU UTIL %, PEAK MEMORY (MB/s) MEMORY PYTHON NATIVE AI-powered optimizations!AI-powered optimizations... COMING SOON!evolveevolve profiler that suggests optimizationsevolve0 码力 | 128 页 | 23.40 MB | 6 月前3
 3.云原生边云协同AI框架实践云原生边云协同AI框架实践 普杰 华为云边缘云创新Lab 高级工程师 KubeEdge SIG AI Tech Lead 目 录 Edge AI现状与趋势 01 Sedna:边云协同AI框架 02 Sedna-GM:K8S Operator 03 实践案例 04 Edge AI现状与趋势 第一部分 Why Edge AI? • Cloud中心化的AI计算范式不足以应对端上AI 应用对实时性、准确性和强交互性的需求 devices Edge AI • 随着大模型的发展,AI 计算对算力需求大 幅且快速增长 AI应用到越来越多的边缘场景 分布式协同AI 概念 将人工智能相关的部分任务部署到边缘设备,基于边缘设备、边缘服务 器、云服务器,利用分布式乃至分布式协同方式实现人工智能的技术 数据在边缘产生 边侧逐步具备AI能力 分布式协同AI 核心驱动力 分布式协同AI核心驱动力 • 随着边侧算 随着边侧算力逐步强化,边缘AI持续演变至分布式协同AI 分布式协同AI技术挑战 1. 边缘资源碎片化 2. 边缘数据孤岛 3. 边缘样本少 4. 边缘数据异构 分布式协同AI 技术挑战 边云协同AI框架 第二部分 首个分布式协同AI开源项目Sedna 基于KubeEdge提供的边云协同能力,支持现有AI类应用无缝下沉到边缘 为分布式协同机器学习服务 ✓ 降低构建与部署成本 ✓ 提升模型性能0 码力 | 37 页 | 2.36 MB | 1 年前3 3.云原生边云协同AI框架实践云原生边云协同AI框架实践 普杰 华为云边缘云创新Lab 高级工程师 KubeEdge SIG AI Tech Lead 目 录 Edge AI现状与趋势 01 Sedna:边云协同AI框架 02 Sedna-GM:K8S Operator 03 实践案例 04 Edge AI现状与趋势 第一部分 Why Edge AI? • Cloud中心化的AI计算范式不足以应对端上AI 应用对实时性、准确性和强交互性的需求 devices Edge AI • 随着大模型的发展,AI 计算对算力需求大 幅且快速增长 AI应用到越来越多的边缘场景 分布式协同AI 概念 将人工智能相关的部分任务部署到边缘设备,基于边缘设备、边缘服务 器、云服务器,利用分布式乃至分布式协同方式实现人工智能的技术 数据在边缘产生 边侧逐步具备AI能力 分布式协同AI 核心驱动力 分布式协同AI核心驱动力 • 随着边侧算 随着边侧算力逐步强化,边缘AI持续演变至分布式协同AI 分布式协同AI技术挑战 1. 边缘资源碎片化 2. 边缘数据孤岛 3. 边缘样本少 4. 边缘数据异构 分布式协同AI 技术挑战 边云协同AI框架 第二部分 首个分布式协同AI开源项目Sedna 基于KubeEdge提供的边云协同能力,支持现有AI类应用无缝下沉到边缘 为分布式协同机器学习服务 ✓ 降低构建与部署成本 ✓ 提升模型性能0 码力 | 37 页 | 2.36 MB | 1 年前3
 PyConChina2022-杭州-ARM芯片的Python+AI算力优化-朱宏林ARM 芯片的 Python + AI 算力优化 主讲人: 朱宏林 – 阿里云程序语言与编译器团队 简介 • 当今开发者们大量使用 Python 语言编写的 AI 程序。过去这些程序总跑在 GPU 或者 x86 架构的 CPU 上。然而综合考虑到功耗、成本、性能等因素,云厂商们开始建设 ARM 架构的服务平台,如 何整合 Python + AI 的相关软件并使其在该平台上发挥最高的性能成为了工程师们关注的焦点。 提升明显。目前,该成果已经被集成进 OpenBLAS 和 PyTorch 中。 • 本次演讲,将向大家介绍我们在倚天 710 ARM 芯片上开展的 Python + AI 优化工作,以及在 ARM 云平台上部署 Python + AI 任务的最佳实践。 深度学习 • 广泛使用的深度学习框架 • TensorFlow、PyTorch • 结合硬件(ARM 服务端芯片) • 倚天 710 •0 码力 | 24 页 | 4.00 MB | 1 年前3 PyConChina2022-杭州-ARM芯片的Python+AI算力优化-朱宏林ARM 芯片的 Python + AI 算力优化 主讲人: 朱宏林 – 阿里云程序语言与编译器团队 简介 • 当今开发者们大量使用 Python 语言编写的 AI 程序。过去这些程序总跑在 GPU 或者 x86 架构的 CPU 上。然而综合考虑到功耗、成本、性能等因素,云厂商们开始建设 ARM 架构的服务平台,如 何整合 Python + AI 的相关软件并使其在该平台上发挥最高的性能成为了工程师们关注的焦点。 提升明显。目前,该成果已经被集成进 OpenBLAS 和 PyTorch 中。 • 本次演讲,将向大家介绍我们在倚天 710 ARM 芯片上开展的 Python + AI 优化工作,以及在 ARM 云平台上部署 Python + AI 任务的最佳实践。 深度学习 • 广泛使用的深度学习框架 • TensorFlow、PyTorch • 结合硬件(ARM 服务端芯片) • 倚天 710 •0 码力 | 24 页 | 4.00 MB | 1 年前3
 Node.js Client & Web Bridge Ready
for ROS 2.0please visit https://realsense.intel.com 12 Intel Robot (Intel’s Contribution to Robotics) ● AI/ML/CV Software for ROS 2.0 ○ Object detection/segmentation/tracking/velocity estimation & etc. ○ Network Optimization Toolkit. ○ A bridge to connect ROS 2.0 & OpenCV*. ● MovidiusTM NCS: dedicated AI hardware by Intel® ○ A ROS service/publisher for object classification and detection ○ Support multiple ROS 1.0 17 Questions... 19 Legal Notices and Disclaimers •Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation0 码力 | 19 页 | 2.09 MB | 1 年前3 Node.js Client & Web Bridge Ready
for ROS 2.0please visit https://realsense.intel.com 12 Intel Robot (Intel’s Contribution to Robotics) ● AI/ML/CV Software for ROS 2.0 ○ Object detection/segmentation/tracking/velocity estimation & etc. ○ Network Optimization Toolkit. ○ A bridge to connect ROS 2.0 & OpenCV*. ● MovidiusTM NCS: dedicated AI hardware by Intel® ○ A ROS service/publisher for object classification and detection ○ Support multiple ROS 1.0 17 Questions... 19 Legal Notices and Disclaimers •Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation0 码力 | 19 页 | 2.09 MB | 1 年前3
 10 Problems Large Companies Have with Managing C++ Dependencies and How to Solve ThemprojectProblem 1: ABI incompatible C++ binaries Solution 1: Build C++ dependencies from source Benefits of building from source: •No waiting for library owner to update binary •Able to view, edit, and them all? •Scenario A: Look up if your product has dependencies with known licensing or security risks. •Scenario B: Important customer (e.g. US government) requires transparency about everything that available or access-restricted. Source: SBOM FAQ (Cybersecurity and Infrastructure Security Agency)Benefits of SBOMs accrue to both software suppliers and consumers — and are similar for both. They include:0 码力 | 46 页 | 917.72 KB | 6 月前3 10 Problems Large Companies Have with Managing C++ Dependencies and How to Solve ThemprojectProblem 1: ABI incompatible C++ binaries Solution 1: Build C++ dependencies from source Benefits of building from source: •No waiting for library owner to update binary •Able to view, edit, and them all? •Scenario A: Look up if your product has dependencies with known licensing or security risks. •Scenario B: Important customer (e.g. US government) requires transparency about everything that available or access-restricted. Source: SBOM FAQ (Cybersecurity and Infrastructure Security Agency)Benefits of SBOMs accrue to both software suppliers and consumers — and are similar for both. They include:0 码力 | 46 页 | 917.72 KB | 6 月前3
 A Security Guide for Kotlin DevelopersTop Kotlin Security Risk...........................................5 OWASP Mobile TOP 10 Mobile Risks..........................10 Protect Your Kotlin Programs with Kiuwan.............. 11 1 A pragmatic statically typed coding language that’s essentially a Java alternative, Kotlin offers some key benefits for Java Virtual Machine (JVM) and Android app development while also being interoperable alongside security risks they can expect to face — from inherent weaknesses to potential attack vectors for data breaches. This Kotlin security guide will explore the following topics and top common risks: • Kotlin’s0 码力 | 13 页 | 1.80 MB | 1 年前3 A Security Guide for Kotlin DevelopersTop Kotlin Security Risk...........................................5 OWASP Mobile TOP 10 Mobile Risks..........................10 Protect Your Kotlin Programs with Kiuwan.............. 11 1 A pragmatic statically typed coding language that’s essentially a Java alternative, Kotlin offers some key benefits for Java Virtual Machine (JVM) and Android app development while also being interoperable alongside security risks they can expect to face — from inherent weaknesses to potential attack vectors for data breaches. This Kotlin security guide will explore the following topics and top common risks: • Kotlin’s0 码力 | 13 页 | 1.80 MB | 1 年前3
 Reflection Is Not Contemplationfinally blows the door off its hinges •The two facets of reflection are equally important •Where do AI tools fit within this craze?The Reflection Circularity Problem Without generation, we’re chasing our opaque/unwieldy? Use token sequences instead of strings • Cost: one added literal kind •Injection risks and dangers? Restrict string expansion • Carefully controlled escapes, interpolation-style constexpr typename[:^char:] c = '*'; // Same as: char c = '*';Suddenly, an AIWe Can’t Not Talk About This •How is generative AI changing language (features) design? •jippity.pro: 350 lines of working code written by a 9 yo in0 码力 | 45 页 | 2.45 MB | 6 月前3 Reflection Is Not Contemplationfinally blows the door off its hinges •The two facets of reflection are equally important •Where do AI tools fit within this craze?The Reflection Circularity Problem Without generation, we’re chasing our opaque/unwieldy? Use token sequences instead of strings • Cost: one added literal kind •Injection risks and dangers? Restrict string expansion • Carefully controlled escapes, interpolation-style constexpr typename[:^char:] c = '*'; // Same as: char c = '*';Suddenly, an AIWe Can’t Not Talk About This •How is generative AI changing language (features) design? •jippity.pro: 350 lines of working code written by a 9 yo in0 码力 | 45 页 | 2.45 MB | 6 月前3
 Conan 2.1 Documentationas possible. This flow is relatively straightforward, and has many advantages that mitigate the risks described before: • No central repository outage can affect your builds. • No changes in the central game-engine library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources CMakeLists.txt conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 173 Conan Documentation, Release 2.1.0 algorithms ai rendering network Fig. 1: components0 码力 | 694 页 | 4.13 MB | 1 年前3 Conan 2.1 Documentationas possible. This flow is relatively straightforward, and has many advantages that mitigate the risks described before: • No central repository outage can affect your builds. • No changes in the central game-engine library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources CMakeLists.txt conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 173 Conan Documentation, Release 2.1.0 algorithms ai rendering network Fig. 1: components0 码力 | 694 页 | 4.13 MB | 1 年前3
 Conan 2.3 Documentationas possible. This flow is relatively straightforward, and has many advantages that mitigate the risks described before: • No central repository outage can affect your builds. • No changes in the central game-engine library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources CMakeLists.txt conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 183 Conan Documentation, Release 2.3.2 algorithms ai rendering network Fig. 1: components0 码力 | 748 页 | 4.65 MB | 1 年前3 Conan 2.3 Documentationas possible. This flow is relatively straightforward, and has many advantages that mitigate the risks described before: • No central repository outage can affect your builds. • No changes in the central game-engine library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources CMakeLists.txt conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 183 Conan Documentation, Release 2.3.2 algorithms ai rendering network Fig. 1: components0 码力 | 748 页 | 4.65 MB | 1 年前3
共 771 条
- 1
- 2
- 3
- 4
- 5
- 6
- 78
相关搜索词
 UnravelingstringviewBasicsBenefitsandBestPracticesPoweredbyAICambrianExplosionforC++SoftwareDevelopmentTools原生边云协同框架实践PyConChina2022杭州ARM芯片Python算力优化朱宏林NodejsClientWebBridgeReadyROS2.010ProblemsLargeCompaniesHavewithManagingDependenciesHowtoSolveThemSecurityGuideKotlinDevelopersReflectionIsNotContemplationConan2.1Documentation2.3














 
 