The document summarizes the agenda for the 4th Annual Saratoga Wi-Fi Summit. The agenda includes presentations on the converged network, the TE2 Experience Engine platform, Ruckus Wireless, and Wi-Fi metrics. It also provides an overview of the TE2 Experience Engine platform which aims to transform the guest experience through personalized interactions across mobile devices. Finally, it discusses Ruckus Wireless' growth in enterprise customers and market share as well as their new ZoneFlex H500 access point product.
UPDATED: On December 5th 2014, I had the honor of being the Keynote speaker for this years Colorado 9-1-1 Resource Center '9-1-1 Goes to Denver' event held at the Jefferson County Courts and Admin Building, in Golden, Colorado. I provided an update on Kari's Law and MLTS as well as an overview of location challenges and future technologies that will provide an Over The Top NG9-1-1 solution in today's environment.
Simcon3 2020, Are We There Yet? Alan QuayleAlan Quayle
"Are we there yet? Telecom Services' slow migration to IP." - Most of the marketing noise is utter bs - Basic landscape and sizing - CPaaS history, current status, and what matters - UCaaS history, current status, and what matters - Its all about the services - solving the core business communications problem (business phone systems), and locking that service in through solving specific business problems (programmability).
Wi-Fi public hotspots are increasingly a factor in a visitor’s choice of a venue. Holidays are booked on the quality of a Wi-Fi connection, cafés are rated on their Wi-Fi, restaurants and pubs provide an excellent Wi-Fi environment as part of the eating and drinking experience. Even football stadia are providing Wi-Fi for upwards of 40,000 fans. The hospitality and leisure industry needs quality Wi-Fi.
Wi-Fi quality is a combination of hardware and software: the hardware is a combination of the telecoms line into the building, the router and the wireless access points (WAP). The software is crucial to offering a venue’s visitors a mundane, generic experience or, alternatively, a quality interface — a one-click login via social media and instant access.
With PurpleWiFi software, the venue owner manager benefits in a number of ways: Wi-Fi Analytics — learning about your visitors; Wi-Fi Marketing — communicating with your visitors and fans; Social Wi-Fi — interacting and engaging with visitors; Wi-Fi Security and Legal — staying legally compliant; family-friendly content filtering; multilingual.
Installation of PurpleWiFi is the start of an exciting journey towards a competitive advantage: a better visitor profile, accelerated social media interaction, greater turnover.
Digital Supremo offers the post-sales support that ensures you make the best use of your new system.
UPDATED: On December 5th 2014, I had the honor of being the Keynote speaker for this years Colorado 9-1-1 Resource Center '9-1-1 Goes to Denver' event held at the Jefferson County Courts and Admin Building, in Golden, Colorado. I provided an update on Kari's Law and MLTS as well as an overview of location challenges and future technologies that will provide an Over The Top NG9-1-1 solution in today's environment.
Simcon3 2020, Are We There Yet? Alan QuayleAlan Quayle
"Are we there yet? Telecom Services' slow migration to IP." - Most of the marketing noise is utter bs - Basic landscape and sizing - CPaaS history, current status, and what matters - UCaaS history, current status, and what matters - Its all about the services - solving the core business communications problem (business phone systems), and locking that service in through solving specific business problems (programmability).
Wi-Fi public hotspots are increasingly a factor in a visitor’s choice of a venue. Holidays are booked on the quality of a Wi-Fi connection, cafés are rated on their Wi-Fi, restaurants and pubs provide an excellent Wi-Fi environment as part of the eating and drinking experience. Even football stadia are providing Wi-Fi for upwards of 40,000 fans. The hospitality and leisure industry needs quality Wi-Fi.
Wi-Fi quality is a combination of hardware and software: the hardware is a combination of the telecoms line into the building, the router and the wireless access points (WAP). The software is crucial to offering a venue’s visitors a mundane, generic experience or, alternatively, a quality interface — a one-click login via social media and instant access.
With PurpleWiFi software, the venue owner manager benefits in a number of ways: Wi-Fi Analytics — learning about your visitors; Wi-Fi Marketing — communicating with your visitors and fans; Social Wi-Fi — interacting and engaging with visitors; Wi-Fi Security and Legal — staying legally compliant; family-friendly content filtering; multilingual.
Installation of PurpleWiFi is the start of an exciting journey towards a competitive advantage: a better visitor profile, accelerated social media interaction, greater turnover.
Digital Supremo offers the post-sales support that ensures you make the best use of your new system.
Ladbrokes and Aditi - Digital Transformation Case study HARMAN Services
Your digital customer is evolving and digital engagement is evolving even faster! See how Aditi digitally transformed Labrokes' business to give them an edge over the competition.
Up your game with Digital Transformation and unlock opportunities by creating enhanced user experiences to better serve and engage with your customers at scale.
It’s time to slam dunk your customer experience strategy.
Best Practices in Implementing Social and Mobile CX for UtilitiesCapgemini
Are you having difficulties in implementing a modern customer experience solution strategy that meets your customers’ needs across all interaction channels, including mobile and social?
This presentation highlights best practices for the design and implementation of effective CX strategies adapted to the utilities industry.
Presented at Oracle OpenWorld 2014 by Bruna Gapo, Oracle's Utilities Industry Director, Ajay Verma, Capgemini's Global Utility Practice Leader, and Victor Jimenez, Capgemini Utilities Executive.
http://www.capgemini.com/oracle
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
Phishing attacks are almost a daily event – the result of someone trying to trick an unsuspecting victim into sharing their username and password for their bank account or other valuable resource. Other attacks try to impersonate the victim attempting to change passwords in hopes of gaining access to their email, financial or other on-line accounts. Simple username/password combinations used to be enough to keep the bad guys out…not anymore.
Two factor authentication or (2FA) is a security tool that has become the norm to protect high-value targets, using SMS or voice calling to verify the user identity. As financial services and many other industries work to secure their systems, they need access to two factor authentication tools, including APIs, ability to send SMS and make voice calls to deliver temporary passcodes.
During this event, we’re joined by experts from both Telestax and Network Intelligence who are going to show us how 2FA can offered as a service by service providers, creating new revenue opportunities. Be sure to stay with us for information on a live demonstration you can try on your own.
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
Phishing attacks are almost a daily event – the result of someone trying to trick an unsuspecting victim into sharing their username and password for their bank account or other valuable resource. Other attacks try to impersonate the victim attempting to change passwords in hopes of gaining access to their email, financial or other on-line accounts. Simple username/password combinations used to be enough to keep the bad guys out…not anymore.
Two factor authentication or (2FA) is a security tool that has become the norm to protect high-value targets, using SMS or voice calling to verify the user identity. As financial services and many other industries work to secure their systems, they need access to two factor authentication tools, including APIs, ability to send SMS and make voice calls to deliver temporary passcodes.
During this event, we’re joined by experts from both Telestax and Network Intelligence who are going to show us how 2FA can offered as a service by service providers, creating new revenue opportunities. Be sure to stay with us for information on a live demonstration you can try on your own.
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
Dominique Singer will be hosted AppGate's RVP of Sales, Ken Harris, and National Channel Director, Tamara Prazak, where they discussed how there’s never been greater demand from your clients to secure work from home and remote access. Don’t miss this window of opportunity to help your clients replace their outdated VPNs with Software-Defined Perimeter (SDP) from the industry leading solution- AppGate SDP. Get more client meetings by using this as a wedge.
INNOVATION JAM 2
Virtual Reality, Internet of Things, Programmatic Advertising and Beacon Technology
Four consumer technologies are about to disrupt the way you think about digital marketing in 2016: virtual reality, the “Internet of Things” (IoT), programmatic advertising and beacon technology. In the very near future, these innovative technologies will dramatically transform how consumers experience a brand and its products and services.
Join us for a showcase event with the following experts who will demonstrate how these disruptive technologies could become game-changers in your industry:
The Internet of Things: Justin Grammens is a professor at the University of St. Thomas and founder of Recursive Awesome, an IoT consulting company. He will demonstrate how to enable richer experiences for your customers by leveraging hardware and software to decipher vast amounts of data and reveal insights and analytics to help you connect on a deeper level.
Virtual Reality and 360 Video: Chuck Olsen is an award-winning video and web producer, and co-founder of Visual, a virtual reality company that creates extraordinary engagement through the power of immersive video. Chuck will demonstrate how 360-degree video content distributed on desktop, mobile and VR can engage your audience like never before.
Programmatic Advertising: Ashley Evenson leads the programmatic advertising, ad technology, and programs at Ciceron, and has spent nearly 10 years in the digital media space. She will demonstrate why programmatic advertising needs to be an integral part of your marketing strategy in 2016 with solutions for video, display and mobile.
Beacon Technology: Kent Strand is Managing Partner of Accredent LLC – a Minneapolis-based strategy consulting firm specializing in the Internet of Things (IoT) and Data Analytics space. He will present Proximity Marketing with Beacons. This presentation will answer key questions such as: Why are marketers using beacons? What do proximity marketing campaigns look like? How can proximity fit into a company’s overall IoT strategy?
Organizational waste and lack of productivity is more than a nagging workplace condition, it’s an epidemic that is undermining your businesses. To succeed in today’s commercial landscape, we must look for new ways to reduce this waste. How do you effectively reduce waste in an organization? How do you create a sustainable infrastructure to stay ahead of the competition?
Efficiency expert Chris Day, Founder and CEO of IT Glue, talks about the sources of waste in your managed services business and the ways in which you can solve this challenge.
Join Chris as he discusses topics such as:
• Providing employees with access to information
• Standardizing process
• Reducing onboarding time
• Efficiency
• Transparency
• Sustainable infrastructure
Deep Blue Communications is the leader in engineering, installing and supporting hospitality networks that ensure your property opens on time, on budget, with all your technologies working together the way they should - on day one. With over 10 years’ experience, Deep Blue has made the INC 5000 List of the Fastest Growing Companies, emerging as a pioneer in converged networks for properties by seamlessly integrating hospitality, retail and entertainment services. Deep Blue collaborates with you and your technology vendors to design and install the network, manage all 3rd party product integrations and provide ongoing support, streamlining operations with solutions that deliver the best ROI within your budget. We help businesses across the United States, Canada, Mexico and the Caribbean elevate their guest experience. For more information, contact sales@deepbluecommunications.com, call 844-389-2718, or visit www.deepbluecommunications.com.
Deep Blue Communications is the leader in engineering, installing and supporting hospitality networks that ensure your property opens on time, on budget, with all your technologies working together the way they should - on day one. With over 10 years’ experience, Deep Blue has made the INC 5000 List of the Fastest Growing Companies, emerging as a pioneer in converged networks for properties by seamlessly integrating hospitality, retail and entertainment services. Deep Blue collaborates with you and your technology vendors to design and install the network, manage all 3rd party product integrations and provide ongoing support, streamlining operations with solutions that deliver the best ROI within your budget. We help businesses across the United States, Canada, Mexico and the Caribbean elevate their guest experience. For more information, contact sales@deepbluecommunications.com, call 844-389-2718, or visit www.deepbluecommunications.com.
Ladbrokes and Aditi - Digital Transformation Case study HARMAN Services
Your digital customer is evolving and digital engagement is evolving even faster! See how Aditi digitally transformed Labrokes' business to give them an edge over the competition.
Up your game with Digital Transformation and unlock opportunities by creating enhanced user experiences to better serve and engage with your customers at scale.
It’s time to slam dunk your customer experience strategy.
Best Practices in Implementing Social and Mobile CX for UtilitiesCapgemini
Are you having difficulties in implementing a modern customer experience solution strategy that meets your customers’ needs across all interaction channels, including mobile and social?
This presentation highlights best practices for the design and implementation of effective CX strategies adapted to the utilities industry.
Presented at Oracle OpenWorld 2014 by Bruna Gapo, Oracle's Utilities Industry Director, Ajay Verma, Capgemini's Global Utility Practice Leader, and Victor Jimenez, Capgemini Utilities Executive.
http://www.capgemini.com/oracle
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
Phishing attacks are almost a daily event – the result of someone trying to trick an unsuspecting victim into sharing their username and password for their bank account or other valuable resource. Other attacks try to impersonate the victim attempting to change passwords in hopes of gaining access to their email, financial or other on-line accounts. Simple username/password combinations used to be enough to keep the bad guys out…not anymore.
Two factor authentication or (2FA) is a security tool that has become the norm to protect high-value targets, using SMS or voice calling to verify the user identity. As financial services and many other industries work to secure their systems, they need access to two factor authentication tools, including APIs, ability to send SMS and make voice calls to deliver temporary passcodes.
During this event, we’re joined by experts from both Telestax and Network Intelligence who are going to show us how 2FA can offered as a service by service providers, creating new revenue opportunities. Be sure to stay with us for information on a live demonstration you can try on your own.
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
Phishing attacks are almost a daily event – the result of someone trying to trick an unsuspecting victim into sharing their username and password for their bank account or other valuable resource. Other attacks try to impersonate the victim attempting to change passwords in hopes of gaining access to their email, financial or other on-line accounts. Simple username/password combinations used to be enough to keep the bad guys out…not anymore.
Two factor authentication or (2FA) is a security tool that has become the norm to protect high-value targets, using SMS or voice calling to verify the user identity. As financial services and many other industries work to secure their systems, they need access to two factor authentication tools, including APIs, ability to send SMS and make voice calls to deliver temporary passcodes.
During this event, we’re joined by experts from both Telestax and Network Intelligence who are going to show us how 2FA can offered as a service by service providers, creating new revenue opportunities. Be sure to stay with us for information on a live demonstration you can try on your own.
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
Dominique Singer will be hosted AppGate's RVP of Sales, Ken Harris, and National Channel Director, Tamara Prazak, where they discussed how there’s never been greater demand from your clients to secure work from home and remote access. Don’t miss this window of opportunity to help your clients replace their outdated VPNs with Software-Defined Perimeter (SDP) from the industry leading solution- AppGate SDP. Get more client meetings by using this as a wedge.
INNOVATION JAM 2
Virtual Reality, Internet of Things, Programmatic Advertising and Beacon Technology
Four consumer technologies are about to disrupt the way you think about digital marketing in 2016: virtual reality, the “Internet of Things” (IoT), programmatic advertising and beacon technology. In the very near future, these innovative technologies will dramatically transform how consumers experience a brand and its products and services.
Join us for a showcase event with the following experts who will demonstrate how these disruptive technologies could become game-changers in your industry:
The Internet of Things: Justin Grammens is a professor at the University of St. Thomas and founder of Recursive Awesome, an IoT consulting company. He will demonstrate how to enable richer experiences for your customers by leveraging hardware and software to decipher vast amounts of data and reveal insights and analytics to help you connect on a deeper level.
Virtual Reality and 360 Video: Chuck Olsen is an award-winning video and web producer, and co-founder of Visual, a virtual reality company that creates extraordinary engagement through the power of immersive video. Chuck will demonstrate how 360-degree video content distributed on desktop, mobile and VR can engage your audience like never before.
Programmatic Advertising: Ashley Evenson leads the programmatic advertising, ad technology, and programs at Ciceron, and has spent nearly 10 years in the digital media space. She will demonstrate why programmatic advertising needs to be an integral part of your marketing strategy in 2016 with solutions for video, display and mobile.
Beacon Technology: Kent Strand is Managing Partner of Accredent LLC – a Minneapolis-based strategy consulting firm specializing in the Internet of Things (IoT) and Data Analytics space. He will present Proximity Marketing with Beacons. This presentation will answer key questions such as: Why are marketers using beacons? What do proximity marketing campaigns look like? How can proximity fit into a company’s overall IoT strategy?
Organizational waste and lack of productivity is more than a nagging workplace condition, it’s an epidemic that is undermining your businesses. To succeed in today’s commercial landscape, we must look for new ways to reduce this waste. How do you effectively reduce waste in an organization? How do you create a sustainable infrastructure to stay ahead of the competition?
Efficiency expert Chris Day, Founder and CEO of IT Glue, talks about the sources of waste in your managed services business and the ways in which you can solve this challenge.
Join Chris as he discusses topics such as:
• Providing employees with access to information
• Standardizing process
• Reducing onboarding time
• Efficiency
• Transparency
• Sustainable infrastructure
Deep Blue Communications is the leader in engineering, installing and supporting hospitality networks that ensure your property opens on time, on budget, with all your technologies working together the way they should - on day one. With over 10 years’ experience, Deep Blue has made the INC 5000 List of the Fastest Growing Companies, emerging as a pioneer in converged networks for properties by seamlessly integrating hospitality, retail and entertainment services. Deep Blue collaborates with you and your technology vendors to design and install the network, manage all 3rd party product integrations and provide ongoing support, streamlining operations with solutions that deliver the best ROI within your budget. We help businesses across the United States, Canada, Mexico and the Caribbean elevate their guest experience. For more information, contact sales@deepbluecommunications.com, call 844-389-2718, or visit www.deepbluecommunications.com.
Deep Blue Communications is the leader in engineering, installing and supporting hospitality networks that ensure your property opens on time, on budget, with all your technologies working together the way they should - on day one. With over 10 years’ experience, Deep Blue has made the INC 5000 List of the Fastest Growing Companies, emerging as a pioneer in converged networks for properties by seamlessly integrating hospitality, retail and entertainment services. Deep Blue collaborates with you and your technology vendors to design and install the network, manage all 3rd party product integrations and provide ongoing support, streamlining operations with solutions that deliver the best ROI within your budget. We help businesses across the United States, Canada, Mexico and the Caribbean elevate their guest experience. For more information, contact sales@deepbluecommunications.com, call 844-389-2718, or visit www.deepbluecommunications.com.
When 802.11ac arrives, technologies like seamless authentication, geolocation and locationbased analytics will deliver consumers a much richer, more personalized Wi-Fi experience. The arrival of 802.11ac will be gradual, but businesses will need to upgrade their network infrastructure to support much higher data loads and the new standards – soon.
Even though 802.11ac will not necessarily become an overnight requirement for Wi-Fi, the Wi-Fi Alliance has begun certifying products early this year. There are a number of companies already releasing 802.11ac compatible products, and those products have the potential to help businesses take advantage of new technologies to increase their reach and their ROI.
We all know more and more hotels are offering amenities to help attract guests from business travelers and vacationers, to Gen X and Baby Boomers alike. The one factor key to driving this change is technology. The sheer volume of apps, devices and systems designed to make our lives easier, more streamlined, more efficient than
ever is growing exponentially. The convergence of these devices, applications and systems in the hospitality environment is impossible to ignore and can make or break a guest experience.
Personalized oers: E-Shots
Access to real-time marketing information means that retailers can personalize the oers and coupons sent out to customers in store. Oers can be sent out in real time (as the customer is physically browsing in store) or used as a way to incentivize the customer to return. For example, a clothing retailer could oer a discount on purchases made during a subsequent visit.
Actionable insight from analytics
Our reporting engine is like Google Analytics for your stores. Find out who is hopping, how long they are staying, how often they are returning, and details of their demographics.
Raise your social media prole with automatic posting
50%+ of people choose to automatically post a message about your brand when logging on through their social media accounts. Retailers can customize posts according to the store and current oers. This is a powerful marketing tool, as each person's network of friends will then see the post.
When 802.11ac finally arrives, projected around 015-2016, businesses looking to incorporate new technologies with it will have many options. With faster speeds and room for more devices, 802.11ac paves the way for some very compelling new technology that can change the way you interact with customers.
Utilizing this technology effectively will allow businesses to manage individual customer relationships and loyalty in new ways.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. The Agenda Today
• Part 1
• The Converged Network, Ryan Donnelly
• TE2 – The Experience Engine, Marjorie Hsu
• 30 minute Break
• Part 2
• Ruckus Wireless, Kevin O’Neill
• Wi-Fi Metrics, Brian Epstein
3. Monetize - How can the Wi-Fi network increase profits?
Optimize - How can the Wi-Fi network increase operating
efficiencies and lower costs?
Respond - How can the Wi-Fi network respond to dynamic
business and technology needs?
Elevate - How can the Wi-Fi network elevate the user experience?
Using Technology to Deliver MORE!
5. • Proven track record and references
• Leading edge provider of goods and/or services
• Ability to manage other vendors
• Compliance with industry security standards
• Brand Certifications
Choose your Vendors
7. Define your Level of Convergence
What services, technology, and security do you need?
Behind the Firewall Outside the Firewall Air Gap / Security
8. Define your Network Requirements
Ensure your network will support your services
Switching Firewall Gateway Redundancy
9. Define your Vendor Requirements
Ensure parties understand their responsibilities and are held accountable
• Details are clearly spelled
out in a formal agreement
or letter of understanding
• Ensure quality of service
from Firewall to AP’s and
Ethernet ports
10. Onsite Project
Management
and
Coordination
Vital Piece to ensure a
property opens on time
with the right
technologies, working the
right way and delivering
MORE!
ISP Cabling
Wi-Fi
PMS and
Custom
Integration
3rd Party
Integration
17. TE2: UNIVERSITIES
TE2 | THE EXPERIENCE ENGINE, INC
TE2 is their mobile experience platform
to engage their campus community and
drive revenue, sponsorship and
convenience.
ASU: Deployed May 2015
IDENTITY:
Incoming Freshman
TIME:
Just after
Campus Tour
PROXIMITY:
On Campus
Near Bookstore
22. Enterprise & Proximity Data
Our Connector Framework securely maps and
ingests your enterprise data asynchronously or
in real-time. We collect and correlate location
data from GPS, WiFi positioning, Bluetooth
Beacons, and NFC touchpoints.
Unified Identity
We use this information to progressively build a
unified identity in real-time based on consumer
interactions. These profiles power experiences.
Consumer Touchpoints
Our Device SDK makes it easy to deliver these
experiences - to the right consumer, at the right
time, in the right place, on the right device
TE2 EXPERIENCE MARKETING PLATFORM
32. • Enterprise
• Digital classroom for K-12: US e-rate, (MoE maintenance of effort) funding in
other countries
• 11ac wave 1 & wave 2 upgrades
• Public Wi-Fi service expected in every public venue / public enterprise
• SP
• US MSOs ( Multiple System Operator ) & international cable/fixed operators
• Enterprise (esp SMB) managed services offered by MSOs, MNOs ( Mobile
Network Operator), MSPs
• Deployment or funding by OTT (over the top content providers) operators,
eg, Google, Facebook, Tencent, Alibaba
• Wi-Fi Calling buzz
• Developing/under-served markets
32
Market Drivers for 2015
Ruckus Wireless Confidential
33. Introducing ZoneFlex H500
Product Summary
802.11ac, 2x2:2, dual band concurrent
BeamFlex+ Adaptive Antennas with Polarization Diversity (PD-MRC)
Matched Band Coverage
Supports In-room Private Networking
5 Ethernet ports
1 rear-facing 10/100/1000 & PoE in
4 front-facing 10/100, single PoE out
Bluetooth Low Energy (BLE) Smart Beacon Support
Cable channel for pass-through applications
Mounts to worldwide standard electrical outlet boxes
Single-gang wall-plate width (3.5 x 6.3 x 1.2 inches )
ZoneFlex 9.10 / vSCG 3.0 / SCG 3.1
33 RUCKUS PROPRIETARY AND HIGHLY CONFIDENTIAL
Industry’s first wired-wireless wall switch access point with adaptive antennas!
Embedded BeamFlex+ Adaptive Antennas
Available Q1 2015
34. H500 Typical Markets
• Hotel Guest
Rooms
Hospitality
• MDU
Residences
Multi-Dwelling Units
• University
student
housing
Student Housing
34 RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
35. Converged Guestroom Connectivity
Gigabit Ethernet Uplink
High Performance Guest WiFi
Dual Band 802.11abgn/ac
Wired Guest Access
Networked guestroom
infrastructure
IP Telephone
IPTV
PoE
STB
Cable pull-through
PBX phone
H500
BLE Beacon
BLE Beacon Service e.g.
Rewards Program Offer,
WiFi Onboarding…
36. Highlights
Dual band 802.11ac 4x4:4 Access Point
1733 Mbps (5 GHz), 800 Mbps (2.4 GHz)
80 MHz channelization
256-QAM modulation (both 2.4 & 5 GHz)
BeamFlex+ Polarization Diversity
MU-MIMO (up to 3ss)
Chip-based Transmit BeamForming
2x Gigabit Ethernet Ports – Link Aggregation (LACP)
USB port for IoT devices e.g. BLE beacons
802.3af/at PoE or 12VDC power – 802.3af Operating Mode Feature
ZoneDirector 9.12 / SmartZone 3.1.1
36
Introducing ZoneFlex R710
Ruckus Proprietary and Confidential
Ruckus is 1st
Industry’s Best Wave 2 802.11ac Indoor Access Point
37. R710 Applications - Examples
• Mid to large
Enterprise
Dense Enterprise
• K-12
Classrooms
• Campus
Libraries &
common areas
Education
• Convention
Centers
• Conference
halls
Public Venues
37 RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
38. MyDeepBlue Cloud Hosted EvaluationTools
EnforceWorldwide Wi-Fi Standards
Uptime using DBC
SNMP Monitoring
Tickets to Login Ratio
DBC Ticketing System
Guest Satisfaction
Survey Scores
Deep Blue has the tools to evaluate
Wi-Fi performance and enforce
standards across all properties,
worldwide.
• Uptime SNMP monitoring
• Support ticket-to-login ratio
• Guest satisfaction scores
• Ticket tracking
• Real-time device status
• Property comparative meta
analysis
39. Mimic the User Experience
The best way to ensure a great user experience is to see it from their perspective.
3.75”
2.5”
Deep Blue utilizes onsite Raspberry Pi mini computers to:
• Achieve a higher level of insight into the property network
• Automatically run regular speed tests to monitor available bandwidth
• Ensure there is bandwidth for users to enjoy their devices
• Use remote desktop software to mimic the guest experience
• Troubleshoot connectivity and authentication
Due to the highly customizable nature of the device,
future tests and tools can be developed by Deep Blue’s
team of developers
40. Hotspot 2.0
Making the Wi-Fi Roaming Experience as Secure and Easy to Use as With Cellular Data
Hotspot 2.0 makes the user experience
as seamless and secure as possible.
Users no longer encounter multiple
login pages as they roam.
41. KeyWi-Fi Metrics
Get the data you need to understand your network
• Airtime utilization
• Average speed of client connections
• Bandwidth up/down per radio
• Run all three reports by frequency
(2.4GHz/5.0GHz)
Upload
Download
Bandwidth Average
Speed
Airtime
Utilized Airtime
Nonutilized Airtime
8 Mbps
1 Mbps
35%
6 Mbps
42. Key Bandwidth Metrics
Ensure your users have the speed they need to enjoy their devices
0
20
40
60
80
100
12
AM
1
AM
2
AM
3
AM
4
AM
5
AM
6
AM
7
AM
8
AM
9
AM
10
AM
11
AM
12
PM
1
PM
2
PM
3
PM
4
PM
5
PM
6
PM
7
PM
8
PM
9
PM
10
PM
11
PM
Advertised Max Speed Advertised Min Speed Actual Download Speed
Bandwidth
Download Speed (Mbps)
• % of time meet user minimums
• Pie chart showing %
download/upload for each tier
• Latency average and deviation
to various websites
• Run reports to see what % of
the time a property exceeded
x% of the total line
43. Infrastructure Metrics
Ensure your network hardware is performing up to speed
• Average latency inside of the network
• Uptime of network
• Uptime of rooms (not WAPs)
• Record time to get a DHCP address as
a client
44. Differentiation through a Superior Guest Experience
SuperiorWi-Fi Management – SNMP Monitoring
Capabilities
Efficient, low-bandwidth polling engine scales for testing thousands of
devices, providing at-a-glance, real-time network view.
Real-Time Monitoring
Real-time monitoring and testing capabilities identify hardware, software, or
traffic problems on your network.
Intelligent Mapping
Intelligent mapping feature automatically discovers layer 2/3 connections
and creates geographical and hierarchical views.
Smart Alerting
Smart alerting offers configurable, multi-level notifications for warning,
alarm, critical, and up/down conditions. Sends alerts to email, mobile phone
(text/SMS), audible alerts, pagers, and run scripts.
Probe Any Device
Built-in probes monitor critical performance statistics on common
equipment. Checks availability/outages, packet loss, response time, traffic,
and error rates.
45. • Use best of breed technology
• Ruckus designs the best performing AP’s on the market
• Nomadix builds the most feature rich Hot Spot Gateways
• User experience
• Seamless roaming across entire property
• PAN (Personal Area Network) for each guest
• Support for multiple devices including printers and audio/visual steaming devices
The Personal Area Network (PAN)
Bring the home networking experience with you when you travel
46. The Personal Area Network
• Each user receives their own Personal Area Network (PAN) via
their own VLAN
• User may register unlimited number of devices
• Up to 10 active Wi-Fi devices
• e.g. Chromecast, Roku, printers, phones, computers, tablets, etc…
• The PAN follows the user across property
• Allows access to all devices from anywhere with coverage
• No need to re-authenticate connections
• No bandwidth limitations between devices in the PAN
48. Thank you!
Next:
Dinner and Exploring Saratoga
Shop and explore all that downtown Saratoga has to offer
Dinner on the porch of Maestro’s at the Van Dam
Cocktails: 6:00 PM
Dinner: 7:00 PM
Address: 353 Broadway
Editor's Notes
27
28
29
30
32
onne
First to announce wave 2!
Spec run-thru
BeamFlex+ 4 dual-band antennas, 2 V & 2 H
Where to position?
High density, high performance demand environments such as…