Improve software development project success with better informationBill Duncan
Summary: Automated reporting can help you document compliance and eliminate the errors, inconsistency, and wasted time and effort inherent in manual reporting. Automated measurement can help improve processes and streamline project delivery. This article describes how automated reporting and measurement tools, such as IBM Rational Publishing Engine and Rational Insight, help software and systems development teams provide accurate, timely, and appropriate information to decision makers.
Developing service component architecture applications using rational applica...Bill Duncan
Summary: This article describes how to develop and access SCA applications using Rational Application Developer Version 8 with a sample application. It begins with some basic definitions and frequently used terms used, next we describe the pre-requisites and references links before start developing SCA applications. Next explains with the wizards of the Rational Application Developer to create a sample SCA application, create different supported bindings for SCA Services and SCA References like default SCA binding, web services binding, and EJB bindings. The article concludes by describing how Servlet client application accesses the SCA sample application.
Human Exploration Framework Team PresentationBill Duncan
Summary of Phase I
- Developed an investment portfolio that strikes a balance of new developments, technology, and operational programs with an eye towards a new way of exploring.
- Created a point of departure DRM that is flexible and can evolve over time to support multiple destinations with the identified systems.
- Identified a minimum subset of elements needed to conduct earlier beyond LEO missions.
- Infused key technology developments
that should begin in earnest and identified gaps which should help inform additional technology prioritization over and above the NEO focused DRM.
- Costed the DRM using traditional costing methodologies.
- Determined alternative development options are required to address the cost and schedule shortfalls."
Customizing System Architect XT Web PagesBill Duncan
Abstract:
With all the IBM Rational System Architect XT customizations in place, this whitepaper will show you how to create a complete Enterprise Architect Web Site.
Content:
This white paper starts with an insight into Rational System Architect and System Architect XT and proceeds to provide instructions on setting up the integration. The paper further explains how to customize Rational System Architect XT web pages to get customized reports and its usage at different levels in an enterprise.
Improve software development project success with better informationBill Duncan
Summary: Automated reporting can help you document compliance and eliminate the errors, inconsistency, and wasted time and effort inherent in manual reporting. Automated measurement can help improve processes and streamline project delivery. This article describes how automated reporting and measurement tools, such as IBM Rational Publishing Engine and Rational Insight, help software and systems development teams provide accurate, timely, and appropriate information to decision makers.
Developing service component architecture applications using rational applica...Bill Duncan
Summary: This article describes how to develop and access SCA applications using Rational Application Developer Version 8 with a sample application. It begins with some basic definitions and frequently used terms used, next we describe the pre-requisites and references links before start developing SCA applications. Next explains with the wizards of the Rational Application Developer to create a sample SCA application, create different supported bindings for SCA Services and SCA References like default SCA binding, web services binding, and EJB bindings. The article concludes by describing how Servlet client application accesses the SCA sample application.
Human Exploration Framework Team PresentationBill Duncan
Summary of Phase I
- Developed an investment portfolio that strikes a balance of new developments, technology, and operational programs with an eye towards a new way of exploring.
- Created a point of departure DRM that is flexible and can evolve over time to support multiple destinations with the identified systems.
- Identified a minimum subset of elements needed to conduct earlier beyond LEO missions.
- Infused key technology developments
that should begin in earnest and identified gaps which should help inform additional technology prioritization over and above the NEO focused DRM.
- Costed the DRM using traditional costing methodologies.
- Determined alternative development options are required to address the cost and schedule shortfalls."
Customizing System Architect XT Web PagesBill Duncan
Abstract:
With all the IBM Rational System Architect XT customizations in place, this whitepaper will show you how to create a complete Enterprise Architect Web Site.
Content:
This white paper starts with an insight into Rational System Architect and System Architect XT and proceeds to provide instructions on setting up the integration. The paper further explains how to customize Rational System Architect XT web pages to get customized reports and its usage at different levels in an enterprise.
Create software builds with jazz team buildBill Duncan
A guide to using the Jazz Team Build feature in Rational Team Concert
Veena H. Balakrishnaiah (veena.balakrishna@in.ibm.com), Build and Release Engineer, IBM
Summary: Veena H. Balakrishnaiah gives an overview of how to configure source control and Jazz Team Build components of Rational Team Concert to define and manage your build. Jazz builds run against files that come from a designated build repository workspace and include traceability between change sets and work items. Jazz Team Builds provide support for the automation, monitoring, and awareness of a team's regular builds.
This article originally appeared at http://www.ibm.com/developerworks/rational/library/create-software-builds-jazz-team-build/index.html?ca=drs-
How to implement access restrictions to your EA artifacts using Rational Syst...Bill Duncan
Abstract
This white paper provides you with information on how to implement access restrictions to your Enterprise Architecture (EA) Artifacts using IBM Rational System Architect Catalog Manager.
Content
This white paper discusses what Rational System Architect Catalog Manager is and how it can be used to addresses the concerns of "Visibility" and "Security". The paper also gives problem scenarios and then the solutions to those scenarios to help easier understanding of the capabilities.
Optimize load handling for high-volume tests with IBM Rational Performance Te...Bill Duncan
Summary: When using IBM® Rational® Performance Tester for testing diversified protocols and large volume load simulations, it is essential to optimize the performance of your testing machines and tools, as well as your network and infrastructure. In this article, you will discover best practices that you can adopt to enhance the load generation capability of Rational Performance Tester per machine by configuring both the testing tool and the operating system. You will also learn about techniques that you can use to alleviate trivial errors that occur during large volume load simulations.
Automate document generation from SysML models with Rational Rhapsody Reporte...Bill Duncan
This article explains techniques to generate documents from IBM® Rational® Rhapsody SysML models, using the Rhapsody ReporterPLUS feature. Automated document generation from existing models enhances consistency between the different representations of the system used throughout system development. Using the right techniques, it is possible to produce publication-ready, human-readable documents that support engineering processes.
Inadequate Security Practices Expose Key NASA Network to Cyber AttackBill Duncan
Remote attackers using the Internet could seize control of servers on NASA's agency-wide mission networks that guide spacecraft, potentially causing havoc with America's space missions, the space agency's inspector general said in a new report.
The audit - Inadequate Security Practices Expose Key NASA Network to Cyberattack - didn't link any specific mission to specific vulnerabilities, but did mention that the NASA mission network is widely distributed and hosts more than 190 IT systems and projects run by the agency's mission directorates and Jet Propulsion Laboratory, including the Hubble space telescope, space shuttle and international space station and the Cassini and lunar reconnaissance orbiters.
By default, IBM® Rational® Performance Tester provides essential performance metrics, such as throughput, response times, concurrency, and success rate. However, it also includes several advanced features for detailed analysis, many of which are not commonly used. Proper use of these options provides deeper insight when analyzing test results. This article gives five tips for using some of these advanced features, all of which have helped tremendously in real-world performance testing projects with large companies.
Managing requirements across Analysis and Design phases using System Architec...Bill Duncan
Abstract
This document describes why requirements need to be tracked and also explains how tracking can be setup and managed.
Content
The IBM Rational System Architect DOORS integration helps users create abstract views in System Architect based on the user requirements in IBM Rational DOORS. Having this integration will enable users to synchronize the model with the ever changing requirements. This document can be used as a reference for users who would like to map their requirements captured in DOORS to a modeling tool Rational System Architect. Also, there would be an information flow between DOORS to System Architect and vice-versa.
Using the document provided, users can map the requirements in DOORS to the System Architect project encyclopedia and vice versa. As a summary, this document can prove effective as a start point for new users who are in the process of exploring this integration and its benefits.
What's New in Rational Team Concert 3.0Bill Duncan
Rational Team Concert integrates work item tracking, source control management, continuous builds, iteration planning, and a highly configurable process support to adapt to the way you want to work, enabling developers, architects, project managers, and project owners to work together effectively.
Rational Team Concert 3.0 coming November 23rd!
Here are some highlights of what's coming in the next version:
* Simplified packaging
* Advanced planning for formal and agile teams
* Flexible customization and configuration
* Distributed source control
* Enterprise build support, with enhanced Build Forge integration
* Enterprise platform enhancements (z/OS and Power)
* Enhanced client for Microsoft Visual Studio IDE
* Open integrations to your existing tools, including a new DOORS 9.3 integration and OpenSocial support
Automatic Proactive Troubleshooting with IBM Rational Build ForgeBill Duncan
Abstract
This paper will address using Build Forge to integrate Rational products to fix or “phone home” potential support issues proactively without user intervention.
Content
Refrigerator companies have often floated the idea of having intelligent refrigerators that would call in service requests for themselves when components were failing. The basis of this idea is that better diagnostics are driven by greater integration between computerized parts. This paper brings this idea to Rational products by using Build Forge to fix or “phone home” potential support issues proactively without user intervention.
Load Testing SAP Applications with IBM Rational Performance TesterBill Duncan
This technical solution briefly describes how the SAP CoE / Value Prototyping successfully leveraged IBM Rational Performance Tester 8.0 to test an ABAP Web Dynpro application before it went into production. The paper shows how IBM testing tools can be used to simulate user load on any SAP system and measure the system’s behavior under load. The solution described in this paper was used in an SAP internal project to measure a new SAP application before it was implemented internally.
The International Space Station Multilateral Coordination Board (MCB) has approved a docking system standard. The international standard will provide guidelines for a common interface to link future spacecraft ranging from crewed to autonomous vehicles and from low-Earth orbit to deep-space exploration missions
NASA OIG: Status of NASA's Transition to Internet Protocol Version 6 (IPv6)Bill Duncan
Results NASA has taken preliminary steps to meet OMB requirements for IPv6 transition and integration, including assigning a lead official in November 2005 to coordinate NASA's efforts, developing inventories of IP-aware devices and an impact analysis, and in June 2008 demonstrating IPv6 capability of one NASA network
.
However, as of March 2010 the Agency did not have an updated or complete IPv6 transition plan as required by OMB. This occurred, in part, because the Agency has ample IPv4 addresses to meet its current and future requirements and because the individual who was leading the IPv6 transition effort left NASA in November 2006 and no one has been assigned to replace him.
As a result, the Agency does not have adequate assurance that it has considered all necessary transition elements or that the security and interoperability of its systems will not be affected as other Government agencies and entities transition to IPv6. Accordingly, even if NASA can continue meeting its communication needs using IPv4 addresses, it should ensure that its systems are prepared as other Internet users transition to IPv6.
OIG: Review of NASA's Management and Oversight of Its Information Technology ...Bill Duncan
We found that NASA's IT security program
had not fully implemented key FISMA requirements needed to adequately secure Agency information systems and data. For example, we found that only 24 percent (7 of 29) of the systems we reviewed met FISMA requirements for annual security controls testing and only 52 percent (15 of 29) met FISMA requirements for annual contingency plan testing. In addition, only 40 percent (2 of 5) of the external systems we reviewed were certified and accredited.
These deficiencies occurred because NASA did not have an independent verification and validation function for its IT security program
. We also found that NASA's Office of Chief Information Officer (OCIO) had not effectively managed corrective action plans used to prioritize the mitigation of IT security weaknesses. This occurred because OCIO did not have a formal policy for managing the plans and did not follow recognized best practices when it purchased an information system that it hoped would facilitate Agency-wide management of IT corrective action plans. However, after spending more than $3 million on the system since October 2005, implementation of the software failed.
The Agency is currently expending funds to acquire a replacement system. Specifically, we found that the information system was significantly underutilized and therefore was not an effective tool for managing corrective action plans across NASA. For example, the system contained corrective actions plans for only 2 percent (7 of 289) of the 29 systems we sampled. In our judgment, the system was underutilized because OCIO did not fully document detailed system requirements prior to selecting the system and did not have users validate requirements via acceptance testing prior to implementing it. Because the information system contained minimal data and the manual process the Agency relied on was not consistently followed, OCIO's management of corrective actions plans was ineffective and did not ensure that significant IT security weaknesses were corrected in a timely manner.
Until NASA takes steps to fully meet FISMA requirements and to improve its system acquisition practices, NASA's IT security program will not be fully effective in protecting critical Agency information systems. Moreover, until such improvements are made OCIO will not be in a position to effectively allocate resources to correct IT security weaknesses. Management
1 NPR 2810.1A, "Security of Information Technology," Chapter7, defines moderate impact as "loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on NASA operations, organizational assets, or individuals." High impact is defined as "loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on NASA operations, organizational assets, or individuals." 2 NASA OIG. "Federal Information Security Management Act: Fiscal Year 2009 Report from the Office of Inspector General" (IG-10-001, November 10, 2009). 3 NASA OIG. "Review of the Information Technology Security of the Internet Protocol Operational Network (IONet)" (IG-10-013, May 13, 2010); and NASA OIG. "Audit of NASA's Efforts to Continuously Monitor Critical Information Technology Security Controls" (IG-10-019, September 14, 2010).
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Create software builds with jazz team buildBill Duncan
A guide to using the Jazz Team Build feature in Rational Team Concert
Veena H. Balakrishnaiah (veena.balakrishna@in.ibm.com), Build and Release Engineer, IBM
Summary: Veena H. Balakrishnaiah gives an overview of how to configure source control and Jazz Team Build components of Rational Team Concert to define and manage your build. Jazz builds run against files that come from a designated build repository workspace and include traceability between change sets and work items. Jazz Team Builds provide support for the automation, monitoring, and awareness of a team's regular builds.
This article originally appeared at http://www.ibm.com/developerworks/rational/library/create-software-builds-jazz-team-build/index.html?ca=drs-
How to implement access restrictions to your EA artifacts using Rational Syst...Bill Duncan
Abstract
This white paper provides you with information on how to implement access restrictions to your Enterprise Architecture (EA) Artifacts using IBM Rational System Architect Catalog Manager.
Content
This white paper discusses what Rational System Architect Catalog Manager is and how it can be used to addresses the concerns of "Visibility" and "Security". The paper also gives problem scenarios and then the solutions to those scenarios to help easier understanding of the capabilities.
Optimize load handling for high-volume tests with IBM Rational Performance Te...Bill Duncan
Summary: When using IBM® Rational® Performance Tester for testing diversified protocols and large volume load simulations, it is essential to optimize the performance of your testing machines and tools, as well as your network and infrastructure. In this article, you will discover best practices that you can adopt to enhance the load generation capability of Rational Performance Tester per machine by configuring both the testing tool and the operating system. You will also learn about techniques that you can use to alleviate trivial errors that occur during large volume load simulations.
Automate document generation from SysML models with Rational Rhapsody Reporte...Bill Duncan
This article explains techniques to generate documents from IBM® Rational® Rhapsody SysML models, using the Rhapsody ReporterPLUS feature. Automated document generation from existing models enhances consistency between the different representations of the system used throughout system development. Using the right techniques, it is possible to produce publication-ready, human-readable documents that support engineering processes.
Inadequate Security Practices Expose Key NASA Network to Cyber AttackBill Duncan
Remote attackers using the Internet could seize control of servers on NASA's agency-wide mission networks that guide spacecraft, potentially causing havoc with America's space missions, the space agency's inspector general said in a new report.
The audit - Inadequate Security Practices Expose Key NASA Network to Cyberattack - didn't link any specific mission to specific vulnerabilities, but did mention that the NASA mission network is widely distributed and hosts more than 190 IT systems and projects run by the agency's mission directorates and Jet Propulsion Laboratory, including the Hubble space telescope, space shuttle and international space station and the Cassini and lunar reconnaissance orbiters.
By default, IBM® Rational® Performance Tester provides essential performance metrics, such as throughput, response times, concurrency, and success rate. However, it also includes several advanced features for detailed analysis, many of which are not commonly used. Proper use of these options provides deeper insight when analyzing test results. This article gives five tips for using some of these advanced features, all of which have helped tremendously in real-world performance testing projects with large companies.
Managing requirements across Analysis and Design phases using System Architec...Bill Duncan
Abstract
This document describes why requirements need to be tracked and also explains how tracking can be setup and managed.
Content
The IBM Rational System Architect DOORS integration helps users create abstract views in System Architect based on the user requirements in IBM Rational DOORS. Having this integration will enable users to synchronize the model with the ever changing requirements. This document can be used as a reference for users who would like to map their requirements captured in DOORS to a modeling tool Rational System Architect. Also, there would be an information flow between DOORS to System Architect and vice-versa.
Using the document provided, users can map the requirements in DOORS to the System Architect project encyclopedia and vice versa. As a summary, this document can prove effective as a start point for new users who are in the process of exploring this integration and its benefits.
What's New in Rational Team Concert 3.0Bill Duncan
Rational Team Concert integrates work item tracking, source control management, continuous builds, iteration planning, and a highly configurable process support to adapt to the way you want to work, enabling developers, architects, project managers, and project owners to work together effectively.
Rational Team Concert 3.0 coming November 23rd!
Here are some highlights of what's coming in the next version:
* Simplified packaging
* Advanced planning for formal and agile teams
* Flexible customization and configuration
* Distributed source control
* Enterprise build support, with enhanced Build Forge integration
* Enterprise platform enhancements (z/OS and Power)
* Enhanced client for Microsoft Visual Studio IDE
* Open integrations to your existing tools, including a new DOORS 9.3 integration and OpenSocial support
Automatic Proactive Troubleshooting with IBM Rational Build ForgeBill Duncan
Abstract
This paper will address using Build Forge to integrate Rational products to fix or “phone home” potential support issues proactively without user intervention.
Content
Refrigerator companies have often floated the idea of having intelligent refrigerators that would call in service requests for themselves when components were failing. The basis of this idea is that better diagnostics are driven by greater integration between computerized parts. This paper brings this idea to Rational products by using Build Forge to fix or “phone home” potential support issues proactively without user intervention.
Load Testing SAP Applications with IBM Rational Performance TesterBill Duncan
This technical solution briefly describes how the SAP CoE / Value Prototyping successfully leveraged IBM Rational Performance Tester 8.0 to test an ABAP Web Dynpro application before it went into production. The paper shows how IBM testing tools can be used to simulate user load on any SAP system and measure the system’s behavior under load. The solution described in this paper was used in an SAP internal project to measure a new SAP application before it was implemented internally.
The International Space Station Multilateral Coordination Board (MCB) has approved a docking system standard. The international standard will provide guidelines for a common interface to link future spacecraft ranging from crewed to autonomous vehicles and from low-Earth orbit to deep-space exploration missions
NASA OIG: Status of NASA's Transition to Internet Protocol Version 6 (IPv6)Bill Duncan
Results NASA has taken preliminary steps to meet OMB requirements for IPv6 transition and integration, including assigning a lead official in November 2005 to coordinate NASA's efforts, developing inventories of IP-aware devices and an impact analysis, and in June 2008 demonstrating IPv6 capability of one NASA network
.
However, as of March 2010 the Agency did not have an updated or complete IPv6 transition plan as required by OMB. This occurred, in part, because the Agency has ample IPv4 addresses to meet its current and future requirements and because the individual who was leading the IPv6 transition effort left NASA in November 2006 and no one has been assigned to replace him.
As a result, the Agency does not have adequate assurance that it has considered all necessary transition elements or that the security and interoperability of its systems will not be affected as other Government agencies and entities transition to IPv6. Accordingly, even if NASA can continue meeting its communication needs using IPv4 addresses, it should ensure that its systems are prepared as other Internet users transition to IPv6.
OIG: Review of NASA's Management and Oversight of Its Information Technology ...Bill Duncan
We found that NASA's IT security program
had not fully implemented key FISMA requirements needed to adequately secure Agency information systems and data. For example, we found that only 24 percent (7 of 29) of the systems we reviewed met FISMA requirements for annual security controls testing and only 52 percent (15 of 29) met FISMA requirements for annual contingency plan testing. In addition, only 40 percent (2 of 5) of the external systems we reviewed were certified and accredited.
These deficiencies occurred because NASA did not have an independent verification and validation function for its IT security program
. We also found that NASA's Office of Chief Information Officer (OCIO) had not effectively managed corrective action plans used to prioritize the mitigation of IT security weaknesses. This occurred because OCIO did not have a formal policy for managing the plans and did not follow recognized best practices when it purchased an information system that it hoped would facilitate Agency-wide management of IT corrective action plans. However, after spending more than $3 million on the system since October 2005, implementation of the software failed.
The Agency is currently expending funds to acquire a replacement system. Specifically, we found that the information system was significantly underutilized and therefore was not an effective tool for managing corrective action plans across NASA. For example, the system contained corrective actions plans for only 2 percent (7 of 289) of the 29 systems we sampled. In our judgment, the system was underutilized because OCIO did not fully document detailed system requirements prior to selecting the system and did not have users validate requirements via acceptance testing prior to implementing it. Because the information system contained minimal data and the manual process the Agency relied on was not consistently followed, OCIO's management of corrective actions plans was ineffective and did not ensure that significant IT security weaknesses were corrected in a timely manner.
Until NASA takes steps to fully meet FISMA requirements and to improve its system acquisition practices, NASA's IT security program will not be fully effective in protecting critical Agency information systems. Moreover, until such improvements are made OCIO will not be in a position to effectively allocate resources to correct IT security weaknesses. Management
1 NPR 2810.1A, "Security of Information Technology," Chapter7, defines moderate impact as "loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on NASA operations, organizational assets, or individuals." High impact is defined as "loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on NASA operations, organizational assets, or individuals." 2 NASA OIG. "Federal Information Security Management Act: Fiscal Year 2009 Report from the Office of Inspector General" (IG-10-001, November 10, 2009). 3 NASA OIG. "Review of the Information Technology Security of the Internet Protocol Operational Network (IONet)" (IG-10-013, May 13, 2010); and NASA OIG. "Audit of NASA's Efforts to Continuously Monitor Critical Information Technology Security Controls" (IG-10-019, September 14, 2010).
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
2. The Workflow Driven Environment Develop enterprise architecture Analyze & optimize business strategies Deploy & maintain Design services & applications Business requirements User requirements System requirements Trace and analyze relationships
3. Defense Workflow Develop defense architecture Analyze & optimize operations strategies Deploy & maintain Design services & applications Program requirements Project requirements System requirements Trace and analyze relationships
4. The IBM Solution Develop enterprise architecture Analyze & optimize business strategies Deploy & maintain Design services & applications Business requirements User requirements System requirements Trace and analyze relationships System Architect Tau DOORS Common Repository