Speakers

ML and DL basics, supervised, reinforcement and unsupervised learning. Key concepts of Machine Learning (ML) and Deep Learning (DL); Model training approaches: supervised learning, unsupervised learning, reinforcement learning; Examples of ML and DL applications.

Generative models basics. In this speech, we will explore the fundamentals of generative models, delving into their core concepts and how they create new data, such as images, text, and audio. We’ll highlight their connection to cutting-edge technologies like AI and deep learning, showcasing practical applications across various fields. Expect insights into the mechanics, benefits, and transformative potential of generative models in shaping innovation.

Google Cloud Platform Overview: Tools and Practices for Working with Big Data
This lecture provides an introduction to Google Cloud Platform (GCP) as a powerful ecosystem for managing and analyzing Big Data. It explores essential tools and best practices for efficient data storage, processing, and visualization. Attendees will gain insights into the capabilities of GCP services like BigQuery, Dataflow, and Cloud Storage, and discover how GCP empowers organizations to make data-driven decisions.

"Neural networks. Transformers. Building models with Keras and PyTorch"
We are going to cover the main concepts in Deep Learning and Neural Networks and their differences compared to classic ML / Data Science. Understand what task can be solved using TensorFlow and PyTorch.

"MS Azure and Big Data in Azure."
In the presentation we will go through an overview of Azure Cloud, Microsoft’s scalable and secure cloud platform, and its capabilities. I will highlight Azure’s Big Data tools, such as Azure Synapse Analytics and Azure Data Lake, which enable efficient data storage, processing, and analysis at scale. The session will showcase how Azure empowers organizations to derive actionable insights and drive innovation through advanced analytics and seamless integration with machine learning.

"Database basics, relational, non-relational, distributed databases, data warehouse, ETL, data workflows."
We'll run through the overview of the DB basics, ways to operate with, and main use cases. In a nutshell we will cover how relational databases organize structured data, how NoSQL databases handle unstructured data, and the benefits of distributed databases for scalability and fault tolerance. Going forward to data warehousing, extraction and transfer processes.

Project and data management (Git, Data Version Control (DVC), Data sources (Kaggle, etc.), ML Hubs (Hugging Face, etc.)). How to manage effective tools and approaches to project and data management? I will explain the basics of working with Git for code version control, using Data Version Control (DVC) to track changes in data and models, as well as an overview of popular data sources such as Kaggle, and platforms for sharing models and tools, such as Hugging Face. The material will help you understand how to organize work with projects and data, ensuring reproducibility and efficiency.

Database usage for Data Science, Data Analysis and Machine Learning. The presentation explores the role of databases in Data Science, Data Analysis, and Machine Learning workflows. Key topics include selecting appropriate database types (SQL, NoSQL, and graph databases) for different data scenarios, optimizing data retrieval and preprocessing for analysis, and integrating databases with machine learning pipelines. Real-world examples demonstrate how effective database management enhances data-driven insights and supports scalable machine learning applications.

NLP, NLP tasks, NLP libraries and frameworks (e.g. NLTK). Supervised Machine Learning Unsupervised Machine Learning Reinforcement Machine Learning

This presentation delves into Amazon Web Services (AWS) and its capabilities for managing and analyzing big data. Key topics include AWS services such as S3, Redshift, EMR, and Glue, which facilitate data storage, processing, and analysis at scale. Practical use cases demonstrate how AWS empowers businesses to extract insights from large datasets, optimize workflows, and enable machine learning applications in a cost-effective and scalable manner.

LLM, Transformers, BERT, GPT models family, LLM fine-tuning techniques. The presentation explores Large Language Models (LLMs) and their underlying Transformer architecture, focusing on prominent models like BERT and the GPT family. It covers the evolution of these models, their capabilities in natural language processing tasks, and the core concepts behind their success. Additionally, fine-tuning techniques, including transfer learning, prompt engineering, and parameter-efficient tuning, are discussed to demonstrate how LLMs can be adapted for specific applications, enhancing performance and efficiency.

Why are soft skills critical for techies?
Agenda:
- Why are soft skills power skills?
- How to increase personal effectiveness?
- How to make decisions effectively?
- How to delegate?
- What are the false friends of productivity?
- How to recognize the non-obvious signs of a great team?
- And much (or little) more!

This lecture covers modern DevSecOps implementation, beginning with the "shift left security" concept. We'll examine technical components including dependency scanning, automated security testing (SAST, DAST, IAST), secrets management, and Infrastructure as Code security. The practical segment focuses on organizational implementation: security champions programs, CI/CD pipeline security gates, and incident response protocols. We'll address GDPR and PSD2 compliance requirements, concluding with a live demonstration of key concepts. Learning outcome: Participants will gain practical knowledge and skills for implementing secure software development practices

Introduction to modern cryptography - where academia meets applied solutions. While implementing and working with modern cybersecurity solutions, one cannot omit one of the most powerful tools in terms of data protection - cryptography. This talk is dedicated to introducing and demonstrating modern cryptography as a broad spectrum of security tools commonly used to keep our data safe in the digital world. The lecture aims to summarize the knowledge and introduce the audience to the world of not only well-known cryptographic primitives but also less common ones such as Blind Signatures and Oblivious Pseudorandom Functions from a scientific perspective, along with examples of their use in real-world solutions.

“Data Analysis and Reporting Life Cycle”
This lecture draws from my personal experience and insights gained while working at Miratech. Having mentored trainees, I understand the key skills (some students are missing) needed to kick-start a career in analytics. During the session, we will cover:
• Data analysis and Reporting Life Cycle
• Practical tips for data preparation
• Best practices for data visualization
• The importance of simplicity in analytics
• Real-life examples
Additionally, we’ll explore other topics such as forecasting, segmentation, naming, colours, and "calculation of parrots."

Ever wondered how your favourite apps stay functional 24/7, even while you’re catching up on sleep?
In this lecture, we’ll delve into the world of background workers, focusing on .NET implementations and exploring their role in powering real-world applications. For instance, systems like LeoCard, the unified electronic ticketing system for public transport in Lviv, likely rely on background services to process transactions or queues, manage user data, and ensure seamless operations for thousands of daily commuters.
Key takeaways from this session:
• Understanding Background Workers: Grasp the fundamentals of background workers and their significance in application architecture.
• Real-World Applications: Explore practical use cases, including emails sending or financial transaction management.
• Designing Resilient Systems: Learn tips for creating scalable and efficient background tasks.
• Cross-Language Perspectives: While focusing on .NET examples, we’ll also examine how similar tasks are handled in other languages, such as Python, using tools like Celery.

LLM fine-tuning techniques (RAG і GenAI agents)
Introduction
Overview of Fine-Tuning Techniques
Understanding RAG
GenAI Agents
Demo Setup: Building an Agent from Scratch
Q&A

Dive into the world of unsupervised learning on hierarchical clustering algorithms. It will cover key techniques such as agglomerative and divisive clustering and demonstrate their application through examples. The session will start with a theoretical overview of the methods, followed by practical demonstrations of their application in various scenarios. This lecture is an invaluable opportunity for students to deepen their understanding and refresh knowledge of clustering algorithms and enhance their analytical skills.

OAuth and OpenID Connect are two extremely important protocols for anyone who works with security. This lecture provides the basics of using these protocols, as well as some general-purpose terms and principles of security.

Machine learning, deep learning, neural networks

This session is perfect for students eager to think outside the box, embrace imaginative problem-solving, and find innovative solutions in everyday challenges. Expand your perspective and learn how creativity can be your most valuable skill!During the session you will learn:
- Examples of creative approaches which costed nothing but brought fortunes
- Theory of Minimal Impact
- See no problems, but possibilities
- How GenAI can help us being creative

Version Control Systems: Git, Data Version Control (DVC), etc.
During the workshop, participants will learn what git history is and why it is important to keep it clean and organized. What is the difference between merge and rebase. What is interactive rebase and what is its power not only in words but also in practice.

Usage of AI in modern services, applications, platforms
Diring the talk we will discover how AI drives real-world innovation across today’s digital landscape, from personalized apps to chatbots improving customer service. In this talk, we’ll break down the core AI techniques behind these successes, examine use cases that optimize workflows, and explore the ethical considerations of responsible AI deployment. Attendees will gain practical insights into leveraging AI tools and frameworks to enhance their future projects and careers.

Impostor syndrome is a psychological phenomenon that most of us suffer from to some extent. I'm no exception, and I've been dealing with it for most of my IT career, which is about 10 years now. It took me a while to realize that imposter syndrome was one of the biggest blockers to my personal and career development, but when I did, I gradually, in small and big steps, fought it in all available ways. In my talk, I will share my story and how it helped me grow from an ordinary developer to a team leader and later to the entire department.

Probability in Real Life
In the lecture, we will study interesting examples of the use of probability theory. We will get acquainted with the basic concepts and terms that are later used in data analysis and with which mathematical modeling of the phenomena surrounding us is carried out.

Statistics in Real Life
We will consider the basics of mathematical statistics and numerical data analysis. In particular, we will get acquainted with descriptive statistics, estimation of sample parameters and testing of statistical hypotheses. We will talk about parametric and nonparametric criteria for testing hypotheses.

Data visualization
We will explore the main Python libraries for data visualization. We will learn how to present the results of statistical research in a form convenient for further analysis.

Eigen decomposition, singular decomposition and their applications
We will review decomposition methods that are widely used in various fields of data science, including machine learning, signal and image processing, and in recommender systems to improve the accuracy and efficiency of algorithms.

Classical regression analysis
We will learn the basic principles of building a simple and multivariate linear regression model. We will consider interesting examples of forecasting sales depending on the price of the product and wages depending on many factors (gender, age, education, part-time or full-time employment).

Bayesian Data Analysis
We will consider the basics of modern probabilistic programming. We will get acquainted with
examples of using Bayesian statistics to solve interesting applied problems.

Decision making. How to make better choices in life and work.
We will consider four enemies of great decisions, will learn how to avoid them and how to broaden
horizons to make the best choices in business and life

Life on the command line: How text-based interfaces can improve data processing
Command-line interfaces (CLIs), or terminal user interfaces (TUIs) are an extremely productive
environment for all kinds of knowledge work. Being already 60 years old, these UIs still keep
evolving. Software development, spreadsheets, data analysis, personal knowledge management,
task management, even social networks - all these can beautifully and efficiently handled within a
text-based workflow.
Introduction to zero-knowledge proofs
Zero-knowledge proofs are an important tool in the arsenal of modern cryptography. Their
applications include blockchain, specifically Ethereum scaling solutions, machine learning, identity
proofs, image authentication, etc. We will consider mathematical foundations, technologies and
systems for proofs (SNARK/STARK/PLONK), and modern development tooling.
Computer vision
Computer vision is a classical AI problem with venerable history and immense future. Object
recognition, navigation and autopilot, image and video generation are only a tiny part of what this
field is about. We will tackle some of the basic problems in computer vision, using OpenCV library
for hands-on examples.

Building Secure Android Applications (Security in Mobile World)
Understand the key security concerns within the Android ecosystem.
Identify potential risks and vulnerabilities in Android applications.
Apply secure coding practices and adopt a security-first mindset when developing Android apps.

What is Cloud and what are they for
Types of Clouds
Microsoft Azure basics
Basic Azure services
Azure Virtual Machine
Azure Storage Account
Learning paths in Azure

How AI Code Generation works. Copilot.
How AI code generation works? We will focusing on tools like GitHub Copilot and discuss the underlying machine learning models, particularly the use of large language models like OpenAI’s Codex. The presentation will cover how these models understand context and generate relevant code suggestions. Finally, we will examine the benefits and limitations of using AI-powered tools for coding.

Relational, non-relational, distributed databases in modern software. (Key-Value, Column-based, Document-based, Graph databases)

Mastering Real-Time Processing with Kafka and Flink
This training explores the shift from batch to streaming data processing, highlighting the roles of Apache Kafka for data ingestion and Apache Flink for real-time stream processing. Learn how these tools work together to enable scalable, real-time analytics and modern data-driven solutions.

Generative AI is revolutionizing enterprises by enhancing efficiency and creativity in decision-making. Generative AI enables predictive analytics, business assisting, market trends identifying, optimizing operations and others on higher level of understanding. However, challenges like data privacy, ethical concerns, and the need for skilled talent must be addressed. Overall, generative AI offers enterprises a powerful tool to innovate, compete, and adapt in a rapidly evolving digital landscape.

Big Data in AWS

Radical directness: how to achieve results faster through a feedback culture in the team?
During this presentation, Mariana will talk about:
- The skill of working with feedback as a strong soft skill in the development of technical specialists.
- Difficulties that prevent you from working with feedback efficiently.
- The 4A Framework is a tool for successfully giving and receiving feedback.

Bringing AI ideas and systems to production

Bringing AI ideas and systems to production

Headway Autopark and How Being Open About Failures Moves Us Forward
* Headway’s approach to handling failures and owning mistakes, with real-world cases of how we do it.
* Why failures are actually some of your most important learning opportunities and why being open to them is a crucial part of your self-growth journey.
* What to do if you’re afraid of making mistakes.
* Why avoiding failure is actually harmful to your growth.

Cloud computing basics, SaaS, PaaS and IaaS
Introduction to cloud computing, exploring its core concepts and the primary service models - Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). We will learn how these models differ in terms of responsibility distribution, scalability, customization, and use cases. By incorporating real-world examples and best practices, participants will gain a solid foundation for evaluating and implementing cloud-based solutions within modern software projects.

Reverse Engineering: Tasks and Tools. An introduction to the world of reverse engineering, its role in cybersecurity and other fields. Practical demonstration of popular tools, such as IDA and Ghidra.

At the session, we will examine the most common myths about the work of the СyberSecurity Operational Center (CSOC), the practices and tools used by the center's analysts, and assess the realities of the cybersecurity world.

Languages and Automata
The Chomsky classification of formal languages will be presented. Also, different methods of determining of formal languages, in particular we shall discuses the determining of formal languages by automata.
Algebraic Codes
The lecture will be devoted the algebraic theory of codes. We present some algebraic codes, their methods of determining and the maximality of some types of codes.
The Hill Cipher
We present the first mathematical cipher which introduced by Lester Hill in 1927. The method of encryption and decryption of the Hill Cipher, and modern its applications are discussed.

In this session, we will cover the key aspects of protecting applications and the associated infrastructure from cyberattacks, vulnerabilities, and misconfigurations through the implementation of a Product Security Operations Center (PSOC).

Modular Arithmetics and its Applications
This lecture will focus on the properties of integers and their relationships. Modular arithmetic is a fascinating and practical area of advanced mathematics. It is essential in pure mathematics and has a wide range of real-world applications. Moreover, modular arithmetic allows for the easy creation of groups, rings, and fields, which are fundamental components of most modern public-key cryptosystems.

Cryptography methods overview and application
This lecture provides overview of modern cryptography methods and their application:
- Evolution of cryptosystems development from Classical Ancient Cryptography to modern Elliptic Curve Cryptography.
- Concept of cryptosystems efficiency and reliability, types of cryptanalyses. Advantages and disadvantages of symmetric and asymmetric cryptosystems.
- Cryptographic hash functions.
- Application of modern cryptosystems (AES, ChaCha20, RSA, Diffie–Hellman key exchange): electronic digital signature, cryptocurrency, cryptographic protocols TLS/SSL, SSH, OpenSSL library, digital certificates.

The Power of Effective Teamwork
In this session, we will talk about what makes teamwork so powerful. We’ll explore the key difference between a group and a team—spoiler: it's not just working together! Then, we`ll break down the different roles team members play and why every role matters. Lastly, we’ll discuss the stages a team goes through to grow and perform its best. Get ready to learn practical tips you can apply right away to make teamwork work for you!

Cybersecurity in everyday life
This lecture offers fundamental practical guidance on safeguarding personal accounts. We will explore the mindset and methods of hackers, as well as contemporary strategies for ensuring account security. Key topics include creating strong and secure passwords, understanding Multi-Factor Authentication (MFA), and recognizing social engineering tactics with strategies to effectively resist them.

Secure Coding
In this lecture we will focus on best practices and techniques for developing software that minimizes security risks and prevents vulnerabilities. The goal of this session is to help developers identify, mitigate, and prevent vulnerabilities throughout the software development lifecycle.This lecture emphasizes the importance of integrating security into every stage

Game developer as a full-time job
During this session we will discuss the details of working as the game developer in a nowadays industry. From coding the first game towards building your own studio. We will discuss how the games become profitable and what it's like to spend your days thinking about ideas and implementing the game in Unity.

Swizzling in Swift

Leadership in IT

Microsoft programs
Presentation on Microsoft programs designed to support students, highlighting learning platforms, opportunities for skilling, certification and building technical expertise.

Modern Data Architectures. What is a Data Architecture and why do we need them?
What are considered modern Data Architecture and how did we get to this point?
Where should we look next and what to consider in future?

Eigen decomposition and singular decomposition in practice
We will review practice aspects of decomposition methods that are widely used in various fields of
data science, including machine learning, signal and image processing, and in recommender
systems to improve the accuracy and efficiency of algorithms

Sports simulating using Markov chains
We will consider the concepts of the Markov chains and transition matrices from one state to
another. Will implement them using Python as a simulative probabilistic model of certain sports,
using football as an example

About cybersecurity educational programs at Lviv University. Why is it important to study cybersecurity and data protection?

Present the educational programs of the Faculty of Electronics and Computer Technologies. Participants will learn about unique learning opportunities, career development prospects, and innovative approaches applied to student training. The presentation will cover key areas of study, collaboration with IT companies, and student life highlights. This is a great opportunity for prospective students and their parents to get answers to their questions and take the first step toward a successful future in electronics and information technology.


AI Agents in the Cloud
This lecture explores the world of AI agents, delving into their core concepts, design, and functionality. Learn how to integrate Large Language Models (LLMs) into AI agents. Discover cutting-edge frameworks like AutoGEN and LangGraph. Explore best practices for deployment, invocation, and scaling in the cloud. Learn how microservices and serverless architectures empower AI agents for robust, cloud-based solutions.

Introduction to Probability
In the lecture, we will study interesting examples of the use of probability theory. We will get
acquainted with the basic concepts and terms that are later used in data analysis and with which
mathematical modeling of the phenomena surrounding us is carried out.

Exploring Penetration Testing: Techniques, Tools, and Trends.
This session will explore the fundamentals of penetration testing, highlighting key methodologies,
approaches and practical tools that offensive security professionals use. Additionally, we'll explore the latest trends and examine how the field of cybersecurity is adapting to address new challenges. Join to enhance your understanding of the critical role penetration testing plays in safeguarding information systems from constantly evolving threats.

LLM Security and Observability
Large Language Models (LLMs) are now very capable of performing a variety of tasks. This paper investigates whether GPT-4, one such LLM, can help researchers in the field of adversarial machine learning. We evaluate the robustness of AI-Guardian, a recent adversarial defense published at IEEE S&P 2023.

Join Lviv Regional Junior Academy of Sciences and start your journey to IT success!
Discover unique opportunities to study IT at the Lviv Regional Junior Academy of Sciences. How to create your own project and participate in national and international IT competitions. Inspiring stories of young inventors whose innovative projects gained global recognition.

Startups Under the Wings of Uncertainty: How a Pilot Finds a Target Where It’s Almost Invisible
Times of uncertainty are a unique challenge for everyone who dreams of taking off and achieving success. In the world of startups, circumstances constantly change, goals may seem blurry, and the paths to success often hide beyond the horizon. Yet, even in the densest fog, there is always a way forward — and it is found by the boldest pilots of their startups.
This session is for those who are ready to take the controls into their own hands. We’ll discuss how to define your key goal, even when it seems invisible. How to use modern approaches to find your bearings in an ever-changing world, how risks transform into opportunities, and how uncertainty becomes a catalyst for great ideas. A startup is not just a business; it’s a daring flight into the unknown. And while turbulence is inevitable, those who master the art of focusing on their goals are bound to succeed.
The key is to prepare well and have the courage to take off, even when the horizon is hidden.

In this lecture, you will find a lot of useful information, including:
- The peculiarities of the project management process in the Fintech domain.
- How teamwork and cooperation with stakeholders work in this sector.
- What typical risks exist in the management process.