IEEE 802.11n, the next generation wireless LAN technology, promises to meet the constant demand for higher data rates, reliable connectivity, and wider coverage. Not a ratified standard yet, 802.11n is creating a lot of buzz with WiFi-certified equipment based on IEEE 802.11n draft 2.0 already in the market. The final standard, expected in mid-2009, will only escalate the adoption of this emerging technology. It is time for businesses to get ready for this inevitable change, whether they invest in pre-standard equipment or wait for the final standard to come out.
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesCisco Mobility
Best practices for implementing the latest WLAN security techniques from design to deployment. Includes recommendations for proper authentication and encryption and fast secure roaming. Learn More: http://www.cisco.com/go/wireless
Wireless LAN Design and Deployment of Rich Media NetworksCisco Mobility
Technical presentation on Wi-Fi channel designs for voice and video calls, including bandwidth management of the Wi-Fi cell and Wireless LAN Controller configurations for VoWLAN and Wi-Fi SIP calls. Learn More: http://www.cisco.com/go/wireless
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesCisco Mobility
Best practices for implementing the latest WLAN security techniques from design to deployment. Includes recommendations for proper authentication and encryption and fast secure roaming. Learn More: http://www.cisco.com/go/wireless
Wireless LAN Design and Deployment of Rich Media NetworksCisco Mobility
Technical presentation on Wi-Fi channel designs for voice and video calls, including bandwidth management of the Wi-Fi cell and Wireless LAN Controller configurations for VoWLAN and Wi-Fi SIP calls. Learn More: http://www.cisco.com/go/wireless
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesCisco Mobility
Learn the fundamentals of advanced wireless services from design to deployment and operation. Includes Context-Aware for wireless location of users, clients and interference events with CleanAir and Adaptive Wireless IPS for advanced security protection. Learn More: http://www.cisco.com/go/wireless
Learn how to plan, evaluate, and implement wireless in demanding high density environments such as lecture halls, classrooms, and auditoriums. Learn how to evaluate end user throughput requirements and translate this into the number of channels required. Learn how to manage cell size, co-channel interference, and successfully apply these principles using Cisco's Unified Wireless Network.
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
The current state of wireless security, covering wireless device access, preventing rogue threats and addressing wireless attacks. Special focus on device profiling and policy covering how to prevent unauthorized (such as smartphones and tablets) from accessing the network. Learn More: http://www.cisco.com/go/wireless
Architectural concepts of the branch office WLAN deployments emphasizing the core technologies that drive and enable mobility in retail banking education enterprise or managed WLAN services. Topics covered include in-depth protocol description of H-REAP (FlexConnect) all deployment options in practice and are based on customer case studies for their application into the branch environment. Learn More: http://www.cisco.com/go/wireless
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The Meraki MR12 is an enterprise class, single-radio 802.11n cloud managed
access point designed for deployments in small-to-medium businesses, home and branch offices, hotels and retail stores. The MR12 uses advanced 802.11n technologies including MIMO, beam forming and channel bonding to deliver the throughput and reliable coverage required by the most demanding business applications.
Watch the full OnDemand Webcast: http://bit.ly/wcincreasing80211
Making the move to 802.11n? Though the rewards are significant, they come with a cost. The increased complexity of 802.11n can be a bit maddening, and it will definitely impact the way you design, monitor, and maintain your WLAN. MIMO? Channel bonding? Aggregation? If these terms aren’t currently part of your WLAN vocabulary, they certainly will be by the time you make the move. And even though the specification has been ratified for some time now, 802.11n hardware continues to evolve.
Join us as we explore the number of MIMO streams, channel bonding, guard interval lengths, and other characteristics that define your WLAN capabilities. We’ll also characterize the current state of commercially available 802.11n hardware, arming you with the information you need to determine if, when, and how you want to make the move.
In these slides, we will cover:
- Key technologies that are new to 802.11n
- The relative importance of each technology in contributing to increased performance
- The current “state of the art” of commercially available 11n equipment
What you will learn:
- What new 11n technologies are most important to you
- When to use the various 11n technologies
- How to monitor and analyze WLANs – both mixed-mode and Greenfield 11n
Watch the full webcast at: http://bit.ly/80211nIncreasedSpeedComplexity.
802.11n Technology - Presented by Meru Networks and DTCDigitalTelecom
This is the Webinar DTC and Meru Networks hosted on 8/25.
Discussed is 802.11n technology and How Meru Networks addresses of the problems seen in the market with other Wireless Network providers.
This tutorial explains the 802.11n concepts in a simple and easy to understand manner. It talks about different types of MIMO improvements (diversity, MRC, spatial multiplexing, space time coding). It also provides a summary of 802.11n packet formats and various capacity/throughput related optimizations proposed in 802.11n (PLCP improvements, BlockAcks, A-MPDU & A-MSDU Aggregation).
This presentation encompasses a method to properly design a wireless network. The presentation focuses on WiMAX networks, but the ideas can be extended to other wireless technologies. During the presentation you will need the file "Proposed algorithm", which is also published in SlideShare.
If you have comments or questions, or simply wanna say thanks, fell free to contact me at fernandoandressanchez@gmail.com
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesCisco Mobility
Learn the fundamentals of advanced wireless services from design to deployment and operation. Includes Context-Aware for wireless location of users, clients and interference events with CleanAir and Adaptive Wireless IPS for advanced security protection. Learn More: http://www.cisco.com/go/wireless
Learn how to plan, evaluate, and implement wireless in demanding high density environments such as lecture halls, classrooms, and auditoriums. Learn how to evaluate end user throughput requirements and translate this into the number of channels required. Learn how to manage cell size, co-channel interference, and successfully apply these principles using Cisco's Unified Wireless Network.
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
The current state of wireless security, covering wireless device access, preventing rogue threats and addressing wireless attacks. Special focus on device profiling and policy covering how to prevent unauthorized (such as smartphones and tablets) from accessing the network. Learn More: http://www.cisco.com/go/wireless
Architectural concepts of the branch office WLAN deployments emphasizing the core technologies that drive and enable mobility in retail banking education enterprise or managed WLAN services. Topics covered include in-depth protocol description of H-REAP (FlexConnect) all deployment options in practice and are based on customer case studies for their application into the branch environment. Learn More: http://www.cisco.com/go/wireless
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The Meraki MR12 is an enterprise class, single-radio 802.11n cloud managed
access point designed for deployments in small-to-medium businesses, home and branch offices, hotels and retail stores. The MR12 uses advanced 802.11n technologies including MIMO, beam forming and channel bonding to deliver the throughput and reliable coverage required by the most demanding business applications.
Watch the full OnDemand Webcast: http://bit.ly/wcincreasing80211
Making the move to 802.11n? Though the rewards are significant, they come with a cost. The increased complexity of 802.11n can be a bit maddening, and it will definitely impact the way you design, monitor, and maintain your WLAN. MIMO? Channel bonding? Aggregation? If these terms aren’t currently part of your WLAN vocabulary, they certainly will be by the time you make the move. And even though the specification has been ratified for some time now, 802.11n hardware continues to evolve.
Join us as we explore the number of MIMO streams, channel bonding, guard interval lengths, and other characteristics that define your WLAN capabilities. We’ll also characterize the current state of commercially available 802.11n hardware, arming you with the information you need to determine if, when, and how you want to make the move.
In these slides, we will cover:
- Key technologies that are new to 802.11n
- The relative importance of each technology in contributing to increased performance
- The current “state of the art” of commercially available 11n equipment
What you will learn:
- What new 11n technologies are most important to you
- When to use the various 11n technologies
- How to monitor and analyze WLANs – both mixed-mode and Greenfield 11n
Watch the full webcast at: http://bit.ly/80211nIncreasedSpeedComplexity.
802.11n Technology - Presented by Meru Networks and DTCDigitalTelecom
This is the Webinar DTC and Meru Networks hosted on 8/25.
Discussed is 802.11n technology and How Meru Networks addresses of the problems seen in the market with other Wireless Network providers.
This tutorial explains the 802.11n concepts in a simple and easy to understand manner. It talks about different types of MIMO improvements (diversity, MRC, spatial multiplexing, space time coding). It also provides a summary of 802.11n packet formats and various capacity/throughput related optimizations proposed in 802.11n (PLCP improvements, BlockAcks, A-MPDU & A-MSDU Aggregation).
This presentation encompasses a method to properly design a wireless network. The presentation focuses on WiMAX networks, but the ideas can be extended to other wireless technologies. During the presentation you will need the file "Proposed algorithm", which is also published in SlideShare.
If you have comments or questions, or simply wanna say thanks, fell free to contact me at fernandoandressanchez@gmail.com
This guide covers indoor 802.11n WLANs and is considered part of the foundation guides within the VRD core technologies series. This guide describes 802.11n, differences in 802.11n vs. 802.11a/b/g functionality, and Aruba-specific technologies and access points (APs) that make 802.11n-based WLANs a viable replacement for wired Ethernet in the majority of deployments.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
Our major goal is to help you achieve your academic goals. We are commited to helping you get top grades in your academic papers.We desire to help you come up with great essays that meet your lecturer's expectations.Contact us now at http://www.premiumessays.net/
With the continual improvements of speed and performance in wireless, comes the need to be knowledgeable in the latest wireless standards. This white paper addresses both technical and business aspects that have led to the ratification of 802.11ac. A number of considerations need to be made when making the decision to deploy this technology. Topics covered include compatibility, speed, range, modulation, channelization, beamforming and how it works, null data packet beamforming, Multi User MIMO, spatial streams, migration, compatibility, and deployment.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
AirTight Networks and AirTight Senior Technical Engineer, Robert Ferruolo, will be addressing how 802.11ac will shape your thought process for network planning. Robert will address the implications of 802.11ac on network design methodology. He will also map 802.11ac to use cases of your business and give a glimpse into our new access point calculator/estimator.
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration AirTight Networks
Part of Hospitality Technology Magazine's webinar "Restaurant Wi-Fi Primer". View the on-demand webinar at http://hospitalitytechnology.edgl.com/web-event/Restaurant-Wi-Fi-Primer--Network-Design---Optimization90930
AirTight Secure Wi-Fi™ is the first Wi-Fi access and security solution designed specifically for retail enterprises with distributed outlets. It is an automated PCI wireless scanning and compliance service that can double as an enterprise Wi-Fi access solution,
This doc provides a guide to some practical steps to combat often cited non-WiFi interference sources such as microwave oven, Bluetooth, baby monitors, cordless phones, wireless cameras and jammers.
"Hole196" is a vulnerability in the WPA2 security protocol exposing WPA2-secured Wi-Fi networks to insider attacks. AirTight Networks uncovered a weakness in the WPA2 protocol, which was documented but buried on the last line on page 196 of the 1232-page IEEE 802.11 Standard (Revision, 2007). Thus, the moniker “Hole196.” This document explains most of the FAQs about Hole196
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesAirTight Networks
This paper presents a vulnerability, called Hole1961, in the WPA2 protocol that makes all
implementations of WPA- and WPA2-secured Wi-Fi networks (regardless of the authentication
and encryption used) vulnerable to insider attacks. It discusses ways in which a malicious
insider can exploit Hole196 to attack other authorized Wi-Fi users in a WPA2-secured wireless
LAN (WLAN). It also explores remediation strategies at various levels that organizations can
implement to mitigate this threat.
Windows 7 soft ap is a new wireless risk to the enterprise. This presentation demonstrates how windows 7 can be converted to a soft ap(hotspot) and become a thread to your organization.
The new 802.11 security protocol called 802.11w was recently ratified. Check this 802.11w-Tutorial to know how it works and what it means for your WLAN.
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
These slides include discussion on important Wi-Fi security issues and the solutions available to address them. Enterprises which need to secure their networks from Wi-Fi threats in order to protect their information assets, prevent unauthorized use of their network, enforce no-Wi-Fi zones, and meet regulatory compliance for themselves and their clients will benefit from this discussion.
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
This presentation will deconstruct the skyjacking vulnerability - explaining why the vulnerability occurs in Cisco WLANs, which Cisco access points are affected, how skyjacking can be exploited to launch potent attacks, and what are the best practices to proactively protect your enterprise network against such zero-day vulnerabilities and attacks.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.