IR Conference - Social Media for Public CompaniesLoa Fridfinnson
Speaking engagement at IR Conference in Vancouver January, 21, 2011. Discussed importance of social media in an investor relations environment. Online compliance covered.
CIO Executive Series Group virtual roundtable presentation with special guest Kristin Burnham, Web 2.0 Advisor at CIO.com.
TOPIC: Facebook and the CIO - top threats and opportunities within the enterprise
IR Conference - Social Media for Public CompaniesLoa Fridfinnson
Speaking engagement at IR Conference in Vancouver January, 21, 2011. Discussed importance of social media in an investor relations environment. Online compliance covered.
CIO Executive Series Group virtual roundtable presentation with special guest Kristin Burnham, Web 2.0 Advisor at CIO.com.
TOPIC: Facebook and the CIO - top threats and opportunities within the enterprise
Social Computing In The Enterprise BarCampBuffalo Open DiscussionЅ. Νavpreet Jatana
Though we wouldn’t think twice about it, social computing has been around since the beginning of enterprise computing. Some examples of social software include: email, blogs, wikis, instant messaging & presence awareness, media sharing, social bookmarking & search, social networking, and web conferencing. The latest wave of social computing applications and standards are often dubbed Web 2.0 or Collaborative Software.
Enabling Business with Social Media Tools at CiscoAyelet Baron
There is a lot of hype about social media right now, which has created some confusion around when to strategically use it. The key is to realize that for any organization, social media is another channel to drive trusted relationships and community interactions. It’s important for any organization to have a plan that maps out their overall journey through a vision, strategy and an executable roadmap.
New Research on Security Risks and Blind Spots in Current Identity Management...Symplified
Symplified surveyed IT executives and administrators to uncover security and operational flaws putting their corporate networks, user data and IP at risk.
Presentación - Protecting your Employess, Customers, and Investments in the A...Interlat
Interlat & Hootsuite - Protecting your Employess, Customers, and Investments in the age Social Media #LatamDigital - Evento Financiero 2018 - Sam Small, ZeroFOX, mas información de Hootsuite e Interlat aquí: http://interlat.co/hootsuite/
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
Social media is all the rage. According to a recent report, 94 percent of Generation Y has joined a social networking site. Social media is believed to be leading the next social revolution. In fact, social networking has grown so dramatically that it is now the number one activity on the Web. In response to this social media phenomenon, businesses are moving at a rapid pace to take advantage of the untapped opportunity by making social media an integral part of their business strategy.
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
Learn about the top risks associated with mobile devices in the enterprise environment and the steps you can take to mitigate these risks and protect your business
M Dot Extinction: The Next Evolution of Mobile WebMobify
The technology world is facing an extinction – m.dot sites are slowly but surely dying out, and for good reason.
A survey of the Internet Retailer 500 found that m.dot sites for ecommerce dropped from 79% in 2013 to 59% in 2014, and the trend continues. While numbers still need to be confirmed for this past year, m.dot sites were expected to lose 50% share in 2015.
Unlike the dinosaur extinction 65 million years ago, for which the reasons are still widely debated, m.dots are an outdated technology and the reasons for their demise are clear. While m.dots were a huge improvement to serving the desktop site to mobile shoppers, they have failed to evolve with customers’ rising expectations and advancements in technology.
Download our M.dot Extinction Storybook to learn the 5 reasons that m.dot sites are disappearing.
The Power of Social Media - Keynote slidesRoss Dawson
Slides for Ross Dawson's keynote at Oracle Cloud Day, Auckland, August 9, 2013. The slides are designed to accompany Ross's keynote, not as stand-alone slides, but may still be interesting to those who did not attend. For extensive complete resources see www.rossdawson.com
Social business organizations, especially those in regulated industries, now know they must take privacy and data security seriously to gain consumer trust, but many don’t know how to begin implementing practices and software that protect the brand and the consumer. Can you be both a social business and have a secure data setup? How do you know what data to collect and what to block? How can you use a system that is both scalable and usable to flag unwanted content? How do you know when to export and archive data? How can you integrate a culture of data compliance into your entire organization?
In this webinar, we will discuss:
-Best practices for collecting, processing, and storing data.
-Software solutions that will help you start and scale a data management and compliance program.
-How to integrate a compliance strategy into technology solutions so the entire organization is on board.
Microblogging is synonymous with twitter, or at least it seems that way. In reality Facebook and many other social networking environments have adopted this communication paradigm extremely successfully.
The question really is how does this play in the enterprise space? Ian McNairn will discuss how IBM has adapted to this social computing phenomenon and exploits it internally extensively.
He will look at some of the reasons behind the exponential growth in activity as well as the tools and clients being used both within and outside IBM.
Knowledge Management and the Evolution of the WorkplaceSilicon Halton
Silicon Halton Meetup#16 featured a keynote by Reema Duggal from the Sitaran Group and Chris Willard from Igloo Software on the topic of Knowledge Management and the Social Workplace.
Social Computing In The Enterprise BarCampBuffalo Open DiscussionЅ. Νavpreet Jatana
Though we wouldn’t think twice about it, social computing has been around since the beginning of enterprise computing. Some examples of social software include: email, blogs, wikis, instant messaging & presence awareness, media sharing, social bookmarking & search, social networking, and web conferencing. The latest wave of social computing applications and standards are often dubbed Web 2.0 or Collaborative Software.
Enabling Business with Social Media Tools at CiscoAyelet Baron
There is a lot of hype about social media right now, which has created some confusion around when to strategically use it. The key is to realize that for any organization, social media is another channel to drive trusted relationships and community interactions. It’s important for any organization to have a plan that maps out their overall journey through a vision, strategy and an executable roadmap.
New Research on Security Risks and Blind Spots in Current Identity Management...Symplified
Symplified surveyed IT executives and administrators to uncover security and operational flaws putting their corporate networks, user data and IP at risk.
Presentación - Protecting your Employess, Customers, and Investments in the A...Interlat
Interlat & Hootsuite - Protecting your Employess, Customers, and Investments in the age Social Media #LatamDigital - Evento Financiero 2018 - Sam Small, ZeroFOX, mas información de Hootsuite e Interlat aquí: http://interlat.co/hootsuite/
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
Social media is all the rage. According to a recent report, 94 percent of Generation Y has joined a social networking site. Social media is believed to be leading the next social revolution. In fact, social networking has grown so dramatically that it is now the number one activity on the Web. In response to this social media phenomenon, businesses are moving at a rapid pace to take advantage of the untapped opportunity by making social media an integral part of their business strategy.
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
Learn about the top risks associated with mobile devices in the enterprise environment and the steps you can take to mitigate these risks and protect your business
M Dot Extinction: The Next Evolution of Mobile WebMobify
The technology world is facing an extinction – m.dot sites are slowly but surely dying out, and for good reason.
A survey of the Internet Retailer 500 found that m.dot sites for ecommerce dropped from 79% in 2013 to 59% in 2014, and the trend continues. While numbers still need to be confirmed for this past year, m.dot sites were expected to lose 50% share in 2015.
Unlike the dinosaur extinction 65 million years ago, for which the reasons are still widely debated, m.dots are an outdated technology and the reasons for their demise are clear. While m.dots were a huge improvement to serving the desktop site to mobile shoppers, they have failed to evolve with customers’ rising expectations and advancements in technology.
Download our M.dot Extinction Storybook to learn the 5 reasons that m.dot sites are disappearing.
The Power of Social Media - Keynote slidesRoss Dawson
Slides for Ross Dawson's keynote at Oracle Cloud Day, Auckland, August 9, 2013. The slides are designed to accompany Ross's keynote, not as stand-alone slides, but may still be interesting to those who did not attend. For extensive complete resources see www.rossdawson.com
Social business organizations, especially those in regulated industries, now know they must take privacy and data security seriously to gain consumer trust, but many don’t know how to begin implementing practices and software that protect the brand and the consumer. Can you be both a social business and have a secure data setup? How do you know what data to collect and what to block? How can you use a system that is both scalable and usable to flag unwanted content? How do you know when to export and archive data? How can you integrate a culture of data compliance into your entire organization?
In this webinar, we will discuss:
-Best practices for collecting, processing, and storing data.
-Software solutions that will help you start and scale a data management and compliance program.
-How to integrate a compliance strategy into technology solutions so the entire organization is on board.
Microblogging is synonymous with twitter, or at least it seems that way. In reality Facebook and many other social networking environments have adopted this communication paradigm extremely successfully.
The question really is how does this play in the enterprise space? Ian McNairn will discuss how IBM has adapted to this social computing phenomenon and exploits it internally extensively.
He will look at some of the reasons behind the exponential growth in activity as well as the tools and clients being used both within and outside IBM.
Knowledge Management and the Evolution of the WorkplaceSilicon Halton
Silicon Halton Meetup#16 featured a keynote by Reema Duggal from the Sitaran Group and Chris Willard from Igloo Software on the topic of Knowledge Management and the Social Workplace.
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
This luncheon keynote at the ARMA Houston Spring Seminar introduced Web 2.0 concepts and issues and provided attendees with specific steps for managing social content as part of the records program.
UC Expo Keynote Presentation - Flying cars and cool uniforms v2AIIM International
Information is an asset that can be used to change reality, improve positioning, and reduce costs and risks. Knowledge is power, which means increased focus on the knowledge worker in an electronic world. Social media has already started to influence how employees are connected to each other, and solutions like iPhone, Facebook and Twitter change our enterprise requirements for functionality and usability. Knowledge workers want smart solutions like in Star Trek, and over the next few years we will see extensive adoption of social collaboration technologies. The presenter will share research, use cases and perspectives on how to plan the future for knowledge workers.
Insights Success has shortlisted “The 10 Best Performing Document Management Solution Providers 2018,” which are changing the way we store our documents.
Agile Project Management for Nonprofits501 Commons
Are you looking for ways to remove dysfunctions, waste, and inefficiencies in your non-profit organization? Whether it is a technology or a non-technology project for non-profits, this quick introduction to “Agile” – a modern project management approach can help you get more done more efficiently with full engagement of your team and stakeholders.
In this workshop you will learn how Agile has caused tremendous disruption and innovation in today’s networked global economy and what are the future possibilities. You will specifically learn how to adopt Agile practices to do twice more in less than half the time at your non-profit organization. Agile practices are aimed at responding to changing organizational demands by reducing waste, incorporating program improvements more quickly, and working collaboratively.
Agile is a mindset and it requires a mind shift from individual performance to team progress. It emphasizes the ability to adapt to changes and provide organizations the framework to adapt in a predictable way with a minimal amount of waste, such as from over planning. In Agile, teams incorporate frequent feedback, from both internal and external stakeholders, and work in short iterations, with the goal always to get something viable in front of an individual for feedback. Everyone works as one team to get work done.
Specifically, participants will learn the benefits of Agile, how to become Agile, the role of a team in a scrum environment, and an overview of scrum roles.
Bring your own... Everything! The Rise of the Networked IndividualSharon Richardson
What if enterprise-based productivity and communications tools were replaced with consumer-based online services? This talk explores the impact of the 'Bring your own device' (BYOD) trend in the workplace and asks what else might we start to bring? Bring your own profile, network, apps, data... everything?
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
Exploring new mobile and cloud platforms without a governance strategy can
have consequences.
At the beginning of my IT career, I witnessed a number of decisions and project management practices which, at the
time, just didn't seem to make sense. But I was young, and I often thought to myself that the people involved must have
some other reasoning, some justification for their actions that I was just not privy to.
In short, I remained quiet when I should have spoken up. What two decades of experience has taught me is that there
is rarely reasoning or justification behind actions that, at a gut-level, are clearly bad IT practices. We inherently
recognize when common sense has taken a back seat.
There is most definitely a dark side to BYOD. For the most part, I am an advocate for the consumerization of IT (using
non-standard apps and tools as a way to increase end user engagement and productivity) and support the bring-your-
own-device model.
However, as a seasoned manager and IT operations leader, I recognize the risks that come with the model if
organizations do not properly plan out their strategies, putting sufficient protections and governance practices in place
to manage the potential risks that could come from these unsupported devices and applications. End users often want
what’s NEW, but there are valid reasons for imposing and enforcing safeguards when giving mobile business users
access to your otherwise secure, scalable, and compliant systems.
Some people equate governance with bureaucracy and hierarchical systems, but those perceptions often come from a
lack of appreciation for the potential risks involved. Governance is about checks and balances -- supporting the tools
and systems your end users want, but in a way that is manageable and which follows defined protocols.
Examples of rogue IT practices
A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b)recent uSamp survey
(http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b) found that 41% of US mobile business
users have used unsanctioned services to share or sync files, despite 87% saying they are aware that their company
has a document sharing policy that prohibits this practice. And, 27% of mobile business users who “went rogue”,
reported immediate and direct repercussions, from lost business to expensive lawsuits and financial penalties that cost
$2 billion.
While most IT professionals understand these risks viscerally, some business users need to crash and burn before
they are willing to adjust their risky behaviors, which is not a message your employer wants to hear. Luckily, there is
another way: learning from the mistakes of others. This month, I am one of six mobile security and IT experts judging a
(http://www.rogueitstories.com/)"Rogue IT" contest (http://www.rogueitstories.com/). We’re collecting anonymous stories from the
community ...
20110411 Archive Systems User Conference Keynote Future of EDRMJesse Wilkins
This keynote was delivered at the Archive Systems User Conference in Orlando and focused on the 8 trends that will affect document and records management
Insights Success has in store for you a distinctive list, The 10 Most Trusted Identity and Access Management Solution Providers in the world, 2018, who are ensuring the management and security of your identity. They are proven leaders with the team of experts who can create a guarding fence around the identity of its associates that cannot be crossed easily.
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
The world has become a giant network, transformed by the
growth of mobile devices and social technologies. In fact,
there are now more devices than people.1 This networked
world is clearly evident in our personal lives: We keep in
touch with our friends and family on Facebook or Instagram,
use Twitter to get the latest news from people around the
globe, and often find our next career opportunity with
LinkedIn. In this networked world, people connect with each
other easily, information and knowledge move faster, and we
are able to accomplish more by working together.
What CIOs Need to Know about the Future of Technology - Steve Sammartino, Fu...IT Network marcus evans
Ahead of the marcus evans Australian CIO Summit 2022, Steve Sammartino discusses disruptive technologies, the future of the internet, and what CIOs need to plan for.
Similar to 20110519 AIIM Midwest Thirsty Thursday on Social Media (20)
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Oklahoma chapter on February 15, 2024, introduced attendees to the idea of a business and RIM playbook. Attendees learned about the benefits of a playbook, the elements of a playbook, and the elements of a play. The session concluded with a review of the process for building a playbook from scratch.
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
This presentation, delivered virtually to the ARMA Chattanooga chapter on February 13, 2024, described the elements of a business assessment, a technical assessment, and a maturity assessment in support of an information management initiative.
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
This presentation, delivered virtually on February 2, 2024 as part of the Austin ARMA Annual Conference, introduced the idea of a records management playbook. I described the purpose and benefits of a playbook, then outlined the elements of a playbook and the individual plays.
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater St. Louis Chapter on January 18, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater Kansas City Chapter on January 10, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
This presentation, delivered virtually to the ARMA Madison Chapter on December 7, 2023, outlined the value of a business playbook and, specifically, a records and information management (RIM) playbook. Attendees learned about the elements of a playbook and of individual plays and how to construct their own playbooks using a provided template.
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
This presentation, delivered virtually to the ARMA Florida Gulf Chapter on December 19, 2023, outlined the value of certifications and described three class of certifications including RIM, "RIM-adjacent", and "Other". Attendees received an overview of the 6 RIM certifications and a table comparing their exams and programs. The session concluded with a framework for determining how to select the most appropriate certification based on costs, context, and program visibility and market awareness.
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
This presentation was delivered virtually to ARMA San Diego on October 5, 2023. It compared and contrasted the various information governance / information management-related certifications and presented a framework for deciding which one(s) to pursue based on an individual's career goals.
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
This presentation, delivered at the ARMA Canada Information Conference on July 19, 2023 in Toronto, outlined a framework for professional development in the IM industry. Attendees learned about the 4 types of learning and the 5 domains IM professionals need to understand. Attendees also received a professional development plan template.
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
This presentation, delivered on July 17, 2023, at the ARMA Canada Information Conference, compared and contrasted the various IM and IM-adjacent certifications. Attendees also learned how to determine the right certification for them based on their career goals.
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
This keynote, delivered at the ARMA New England Win with IG seminar on September 19, 2023, outlined the state of the IG industry from three perspectives: what industry analysts are talking about, what the key conference sessions are about, and what individual chapters and vendors are talking about. The session concluded with ways for individuals to keep abreast of developments in IG.
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
This presentation, delivered to the ARMA Mile High Denver Chapter on January 17, 2023, outlined the value and benefits of building a records management playbook. Attendees learned about the elements of a playbook and the individual plays within the playbook. The session concluded with a discussion of how to actually build a RM playbook.
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
This presentation, delivered to the ARMA Boston Chapter on June 2, 2016, outlined how to apply information governance practices to social media posts. It described specific social media security threats and gave attendees an opportunity to participate in roundtable discussions.
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
This presentation, delivered at the MER conference in Chicago on May 23, 2023, introduced attendees to the concept of an information governance playbook. Attendees learned the purpose and value of a playbook, as well as the structure of a playbook and of individual plays. The session concluded with a discussion of how to build and maintain a playbook.
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
This presentation, delivered to the AIIM True North chapter virtually on September 12th, introduced ChatGPT and other generative AI tools. I briefly introduced and demonstrated ChatGPT and some other generative AI tools. We reviewed some of the more popular use cases and benefits of using generative AI. We also reviewed some of the challenges these tools present for the organization. Finally, we discussed some practices to use these tools safely and effectively in support of real business outcomes.
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
This session provided the conclusion to the ARMA Nebraska 2023 Spring Seminar in Omaha, Nebraska. Attendees learned what a playbook is, what plays are, and how to develop a RIM/IG playbook tailored to their organization.
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
This session, delivered at the ARMA Nebraska Spring Seminar 2023 on April 19, 2023, introduced the professional development matrix and walked attendees through how to leverage the matrix to develop their own personal professional development plans.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
2. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner It’s just a fad….
9. “…fully networked enterprises are not only more likely to be market leaders or to be gaining market share but also use management practices that lead to margins higher than those of companies using the Web in more limited ways…”
18. Technology touches everyone. Everyone carries technology expectations into the workplace. Why do I feel so powerful as a consumer and so lame as an employee? Photo source = http://www.flickr.com/photos/notionscapital/5225049493/
20. Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.” Policy 2.0 – in 140 characters
22. Blog post Comments? Updates? Individual Tweet Links and shortened URLS? Wiki article The article? Its changes over time? It depends…. What’s the record? Prepare for discovery
26. It’s an interesting time to be in the industry These trends are not on the horizon – they are here now Organizations need our guidance We have to be ready to lead the information management discussions Conclusion
27. Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins For more information
Editor's Notes
Moving into mainstream
During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
It’s also true that Web 2.0 is profoundly changing the way we work. You can work on a computer at your work, home, or Internet café, a laptop at the airport, a tablet PC at the local starbucks, or on your iPhone in a pub. It generally requires Web access, though even this is starting to change, but the tools are lightweight enough and the computers are both mobile enough and powerful enough to let you “work where you want, when you want, and be able to conduct real business.“[twitter]Web 2.0:work where you want, when you want, and be able to conduct real business. – blognation Canada[/twitter]
350,000 apps in the iStoreOver 10 billion downloads
Here’s a very succinct Twitter policy from a blog by an HR-focused law firm, GruntledEmployees.com. “Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.””Pretty good, right? Now, you could argue that this policy is missing a lot of the stuff I just mentioned. But I don’t know that I agree – authentic, professional, discreet, represent us well – that’s pretty close. And regardless of what you think might be missing, I’d argue that if your employees follow this policy, you won’t have many issues with them. And note that this policy is itself Tweetable. [twitter] Policy 2.0 – in 140 characters, courtesy of gruntledemployees.com. http://is.gd/8BpjT[/twitter]
Prepare for discovery. This means having the same type of data map you have in place inside the organization, but with listings of all the services you use, the accounts used there, etc. At a minimum you should list any official use of services and official accounts. It also means understanding the process for getting at that information in the event of litigation, FOIA request, etc. The time to put that process in place is before the subpoena is received. For hosted tools, such as FB or Twitter, it may mean taking periodic snapshots of what is posted to them. Right now there aren’t a lot of tools that do this; one way that can be effective is to capture the RSS feeds generated by these tools. As updates are made, they are published through the RSS feed, which can be saved locally. It might also require working with the third-party vendor in the event that some information or some updates are not available through RSS – for example, web-based email. It’s also important to note that at least for commercial solutions there is very little ability to put or enforce legal holds or to prevent a user from deleting an account, at least without a subpoena and without doing it before the user knows to delete it. [twitter]Prepare for discovery in advance, including listing official use of services and accounts.[/twitter]
These are closely related to security issues but have a couple of additional ramifications in the Web 2.0 sphere:First, different jurisdictions have different privacy environments. Some are much more permissive while others restrict even the ability of their users to agree to lower security. This can create interesting privacy issues when you consider that multiple authors and users may be collaborating from different jurisdictions on a website hosted in yet another jurisdiction. Privacy also works differently at home vs. at the work place. The question then becomes, in an era of Web-2.0-enabled teleworking, whether from home or at the local Internet café, which set of rules applies? What about when the work is done on a user’s personal laptop and network vs. when the work is done on a work-provided laptop? Is this even relevant anymore if the data isn’t stored on the laptop but is instead stored in the cloud somewhere?[twitter]Privacy considerations – as noted earlier, plus issues with different jurisdictions and line blurring between home and work.[/twitter]