The document discusses data management challenges facing organizations and how Veritas provides a holistic solution. It summarizes challenges like poor data visibility, security risks from uncontrolled data, and high storage costs. Veritas offers unified data protection, availability, and insights capabilities. Protection capabilities include backup and recovery at scale across environments. Availability ensures predictable uptime through high availability and disaster recovery. Insights provide data visualization, classification, and compliance reporting to target and act on data. In summary, Veritas is a leading data management company that addresses organizations' data challenges with integrated solutions.
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Veritas Technologies LLC
This document discusses challenges with multi-cloud data management and solutions from Veritas. It begins by noting the complexity of managing data across multiple workloads, clouds, storage types and tools. It then discusses challenges like relentless data growth and outlines Veritas' research finding many misconceptions around cloud data responsibility and compliance. The document proposes Veritas' intelligent data platform and specific products like NetBackup, CloudPoint and Cloud Storage to help customers gain control and protect data everywhere in a multi-cloud environment.
This document discusses 10 common myths regarding compliance with the EU's General Data Protection Regulation (GDPR), which takes effect in May 2018. It aims to clarify misunderstandings about GDPR requirements.
The first myth addressed is that GDPR compliance is a one-time project like preparing for Y2K, but GDPR actually requires ongoing processes. The second myth is that no one will be fined, but regulators are likely to target large firms to set examples and fines could be up to 4% of revenue. The third myth is that all noncompliance will result in the maximum 4% fine, but fines will depend on factors like severity of the violation.
The document discusses Veritas's software-defined storage solutions for addressing challenges related to modernizing applications, costs and budgets, and application sprawl in hybrid cloud environments. It introduces Veritas HyperScale as a solution that provides quality of service, linear scalability, integrated data protection, and massive I/O performance. Veritas Access is described as a hybrid cloud solution that is policy-driven, supports multiple protocols, provides integrated data protection using commodity hardware. An example is given of how Veritas Cloud Storage could be used for predictive maintenance of telecom towers by collecting and analyzing sensor data from drones and enabling automated maintenance workflows.
This document discusses software-defined storage and Veritas' approach. It highlights how applications are modernizing, the need for data services and tailored solutions. Veritas provides a software-defined approach using HyperScale for quality of service, scaleout, data protection and performance. Their solution offers hybrid cloud, policy-driven access, multi-protocol support and integrated data protection using commodity hardware. The document also discusses how Veritas technology is used for predictive maintenance of cell towers by collecting and analyzing sensor data to identify issues and trigger maintenance.
(1) The document discusses the exponential growth of data and the challenges of managing, protecting, and extracting insights from data.
(2) It notes that an estimated 163 ZB of global data will exist by 2025 and 2.5 quintillion bytes are created daily, with 50% being "dark" or unused data.
(3) The document promotes Veritas as a company that can help organizations address data challenges including ransomware, storage costs, compliance, business continuity, and harnessing insights from big data and the cloud.
This document summarizes a presentation by Philip Carter, Chief Analyst at IDC, about developing data-driven digital platforms. It discusses how most organizations now have multiple "islands of innovation" using different cloud services, and the challenges of managing data across these systems. Carter notes that by 2020 over 90% of enterprises will use multiple clouds but only a third will have ways to manage them. The document outlines IDC's model for GDPR readiness and discusses challenges European organizations face in meeting GDPR requirements by the May 2018 deadline. It suggests organizations will need to restructure how personal data flows and is managed across public and private cloud systems.
Accelerating Secure SAP Application Delivery Delphix
SAP is one of the critical applications enterprises heavily leverage to enable their digital transformation. But oftentimes, teams struggle with delivering SAP application projects on time and on budget with high-quality software. To achieve these goals, teams require access to high-quality SAP data, whenever and wherever it’s needed during application development while protecting sensitive information.
Mike Palmer of Veritas: Debunking the myths of multi-cloud to achieve 360 Dat...Veritas Technologies LLC
This document discusses challenges with multi-cloud data management and solutions from Veritas. It begins by noting the complexity of managing data across multiple workloads, clouds, storage types and tools. It then discusses challenges like relentless data growth and outlines Veritas' research finding many misconceptions around cloud data responsibility and compliance. The document proposes Veritas' intelligent data platform and specific products like NetBackup, CloudPoint and Cloud Storage to help customers gain control and protect data everywhere in a multi-cloud environment.
This document discusses 10 common myths regarding compliance with the EU's General Data Protection Regulation (GDPR), which takes effect in May 2018. It aims to clarify misunderstandings about GDPR requirements.
The first myth addressed is that GDPR compliance is a one-time project like preparing for Y2K, but GDPR actually requires ongoing processes. The second myth is that no one will be fined, but regulators are likely to target large firms to set examples and fines could be up to 4% of revenue. The third myth is that all noncompliance will result in the maximum 4% fine, but fines will depend on factors like severity of the violation.
The document discusses Veritas's software-defined storage solutions for addressing challenges related to modernizing applications, costs and budgets, and application sprawl in hybrid cloud environments. It introduces Veritas HyperScale as a solution that provides quality of service, linear scalability, integrated data protection, and massive I/O performance. Veritas Access is described as a hybrid cloud solution that is policy-driven, supports multiple protocols, provides integrated data protection using commodity hardware. An example is given of how Veritas Cloud Storage could be used for predictive maintenance of telecom towers by collecting and analyzing sensor data from drones and enabling automated maintenance workflows.
This document discusses software-defined storage and Veritas' approach. It highlights how applications are modernizing, the need for data services and tailored solutions. Veritas provides a software-defined approach using HyperScale for quality of service, scaleout, data protection and performance. Their solution offers hybrid cloud, policy-driven access, multi-protocol support and integrated data protection using commodity hardware. The document also discusses how Veritas technology is used for predictive maintenance of cell towers by collecting and analyzing sensor data to identify issues and trigger maintenance.
(1) The document discusses the exponential growth of data and the challenges of managing, protecting, and extracting insights from data.
(2) It notes that an estimated 163 ZB of global data will exist by 2025 and 2.5 quintillion bytes are created daily, with 50% being "dark" or unused data.
(3) The document promotes Veritas as a company that can help organizations address data challenges including ransomware, storage costs, compliance, business continuity, and harnessing insights from big data and the cloud.
This document summarizes a presentation by Philip Carter, Chief Analyst at IDC, about developing data-driven digital platforms. It discusses how most organizations now have multiple "islands of innovation" using different cloud services, and the challenges of managing data across these systems. Carter notes that by 2020 over 90% of enterprises will use multiple clouds but only a third will have ways to manage them. The document outlines IDC's model for GDPR readiness and discusses challenges European organizations face in meeting GDPR requirements by the May 2018 deadline. It suggests organizations will need to restructure how personal data flows and is managed across public and private cloud systems.
Accelerating Secure SAP Application Delivery Delphix
SAP is one of the critical applications enterprises heavily leverage to enable their digital transformation. But oftentimes, teams struggle with delivering SAP application projects on time and on budget with high-quality software. To achieve these goals, teams require access to high-quality SAP data, whenever and wherever it’s needed during application development while protecting sensitive information.
The document discusses how enterprises can use big data and security intelligence to build an "anti-fragile" security system. It argues that collecting and analyzing large amounts of security data through correlation and analytics can help detect threats and hackers. The system aims to continuously learn from new data and improve threat detection over time by gaining a better understanding of normal versus abnormal user and system behavior.
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
Jennifer Mailander, associate general counsel and director, Compliance and Corporate Markets, CSC
Scott Plichta, chief information security officer, CSC
In this complimentary Corporation Service Company® (CSC®) webinar, Jennifer and Scott will introduce you to key technology terms and concepts, letting you in on the top 10 technology tips to effectively guide your company through the legal issues associated with changing technology.
This presentation will give you a better understanding of the importance of a robust cyber security program to protect company and clients’ interests—including how to identify and mitigate potential threats within your organization, and build a plan for encouraging your company to practice online diligence.
Veritas360 Data Management provides a unified data protection platform for multi-cloud environments. It features an intelligent core for discovery, classification, and policy automation. The platform provides data visibility, digital compliance, business continuity, storage optimization, and data and application portability. It also includes data protection solutions like NetBackup, which offers 3x better data deduplication to the cloud than competitors. Veritas also announced CloudPoint, a cloud-native data protection solution that provides multi-cloud snapshot management and enterprise-grade data protection.
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationVeritas Technologies LLC
Data Management Insights
Data visibility is achieved with Information Studio, which can ingest and visually render data from more than 30 sources including NetBackup, MS OneDrive, MS SharePoint, CIFs shares, etc., then take action on that data such as tiering or deleting.
The Veritas Information Classifier is included in every key technology across our information governance offerings and enables organizations to easily apply data management policies to help meet key regulatory requirements such as required by GDPR, Sarbanes Oxley, HIPAA, SEC, CCPA.
Users can quickly eliminate dark data and gain key insights like what data you have, who has access to it, whether it’s stale and can be tiered to lower cost storage, whether it’s PII data.
We apply this technology across the portfolio, including in enterprise archiving, where we’ve developed marketshare leadership. More details in this presentation.
Kindred Healthcare is one of the nation’s most respected healthcare providers. Through its subsidiaries, Kindred operates multiple healthcare-related businesses across the United States, including hospitals, nursing centers, institutional pharmacies and a contract rehabilitation-services business.
The document discusses OpenText Core, a cloud-based content management and file sharing platform. It notes that organizations are increasingly moving business data and processes to the cloud. OpenText Core provides secure file storage, collaboration features like desktop editing, and administrative controls for file access management. The platform aims to simplify content management and sharing across devices through an intuitive interface in the OpenText cloud.
Why do organizations need a secure file transfer solution? OpenText offers an solution to transfer large files based on the OpenText Cloud that integrates to desktop and business applications such as SAP, Salesforce or Oracle.
A simple approach to a successful cloud implementationAlaa Eldin Aly
This presentation demonstrates a universal approach to achieve successful cloud computing programs to avoid common mistakes of overlooking important aspects of the programs that lead to failed implementation
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
Today legal hold data requests expand far beyond traditional email server requirements. Last year alone, 62% of requests included data from mobile devices and 37% from cloud application services. As the data volumes increase, Legal and IT teams can no longer continue to rely on legacy eDiscovery processes that are both inefficient and costly.
Our experts discussed how the latest generation of eDiscovery solutions, using native-cloud technologies, are dramatically reducing both data collection and ingestion times, while significantly increasing the speed and efficiencies of the analysis and review process. Hear how legal and IT teams can:
* Extend data collection to endpoints and cloud apps to centrally collect, preserve and classify information
* Increase transparency for senior lawyers and corporate counsel through automated real-time metrics
* Achieve cloud-to-cloud data transfer to reduce the risk of data spoliation while removing the need for physical collection and shipping
By moving your eDiscovery process to the cloud, IT can quickly respond to their legal department’s inquiries, and legal teams gain faster data ingestion times along with high speed processing, analysis, and review.
To view the webcast: http://pages2.druva.com/eDiscovery-in-Cloud_On-Demand.html
Uptime Group is an IT services company that specializes in advising, preparing, and implementing solutions to optimize clients' ICT infrastructure. They aim to provide added value beyond basic IT tasks through their expertise across all levels of the IT stack, including networking, security, storage, virtualization, and cloud solutions. Uptime Group prides itself on its experienced consultants and tailored approaches to meeting clients' unique needs.
Protect your confidential information while improving servicesCloudMask inc.
The document discusses security issues with cloud computing and software as a service (SaaS) applications. It introduces CloudMask as a solution that protects sensitive data by masking it before it enters encryption channels and at data centers. This prevents unauthorized access to data even if user credentials or data center security are compromised. CloudMask allows secure use of cloud services without the risks of data breaches and regulatory issues from exposed sensitive data.
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
Growing data volumes, cloud service options, and overwhelming number of mobile devices continue to add to the complexity of eDiscovery. Information dispersed across various data sources (endpoints and popular cloud applications) and outdated technology for eDiscovery make the collection and preservation of ESI not only a tedious and manual process but can also be the source of data spoliation.
The slides from this webcast show modern eDiscovery technologies enables organizations to accelerate the eDiscovery process while reducing costs and risk by:
* Automating legal hold, in place preservation, collection and processing utilizing a single platform from Exterro
* Collection and preservation of end-user (including existing employee) data across endpoints and popular cloud applications (through Druva)
* Streamlining data transfer and ingestion to eliminate technology bottlenecks for faster analysis and review
See the webcast at: http://bit.ly/2fBeLXW
This document discusses the state of cybersecurity and the need for a data-centric approach. It notes the massive growth in connected devices and data, and the fragmented security market with over 5,000 vendors. Traditional defense-focused security tools have led to complexity, high costs and failed to stop major data breaches. The document advocates shifting to a data-centric model that minimizes risk of data compromise and consolidates security tools. It promotes the Stash data-centric solution as helping organizations simplify security, reduce costs and better protect their data.
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
This document discusses cloud security from an enterprise perspective. It begins by outlining trends in security threats facing organizations and the challenges of managing risk. It then provides guidance on taking a risk-based approach to cloud security, designing applications securely for the cloud, and conducting ongoing auditing and management. The key recommendations are to understand your risk profile, architect for security in cloud environments, implement robust identity and access management, confirm compliance obligations, and define clear security responsibilities between customers and cloud service providers.
Oc cio roundtable mooney management imperatives for realizing value from clou...James Sutter
This document summarizes research on management practices for realizing business value from cloud computing while mitigating risks. It discusses Allergan's experience adopting a "cloud first" policy to increase business responsiveness and agility. Key benefits of cloud computing identified include increased speed, reliability, cost savings, and business agility. However, challenges include security concerns, compliance, vendor lock-in, and lack of expertise. The document proposes six imperatives for effectively managing cloud adoption, such as redefining IT's value proposition in terms of business agility rather than just efficiency.
This document appears to be from a Veritas Technologies event and contains various presentations and discussions about data management challenges faced by businesses. Some key points:
- Businesses are dealing with exponential data growth but face challenges around storage costs, ransomware, compliance, and business continuity.
- IT is having to rapidly adapt to demands like agility, scalability, availability, and extracting value from data.
- Veritas provides a 360 data management portfolio including data protection, resiliency, software-defined storage, and compliance solutions to help customers overcome these challenges across on-premises, virtualized, and cloud environments.
- Presentations discuss how Veritas helps customers optimize data storage costs, accelerate
The document discusses how too much data is creating challenges for businesses. It notes that data is doubling every two years but 41% of data is not touched for three years. It then discusses how Information Map from Veritas can help solve problems related to uncontrolled data growth such as increased costs, risk, and complexity. Information Map provides visibility into data to help optimize storage usage, minimize risk, and simplify processes like backup and recovery. The document provides examples of how early adopters have used Information Map for benefits like reducing infrastructure costs, improving compliance, and increasing operational responsiveness.
The document discusses how enterprises can use big data and security intelligence to build an "anti-fragile" security system. It argues that collecting and analyzing large amounts of security data through correlation and analytics can help detect threats and hackers. The system aims to continuously learn from new data and improve threat detection over time by gaining a better understanding of normal versus abnormal user and system behavior.
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
Jennifer Mailander, associate general counsel and director, Compliance and Corporate Markets, CSC
Scott Plichta, chief information security officer, CSC
In this complimentary Corporation Service Company® (CSC®) webinar, Jennifer and Scott will introduce you to key technology terms and concepts, letting you in on the top 10 technology tips to effectively guide your company through the legal issues associated with changing technology.
This presentation will give you a better understanding of the importance of a robust cyber security program to protect company and clients’ interests—including how to identify and mitigate potential threats within your organization, and build a plan for encouraging your company to practice online diligence.
Veritas360 Data Management provides a unified data protection platform for multi-cloud environments. It features an intelligent core for discovery, classification, and policy automation. The platform provides data visibility, digital compliance, business continuity, storage optimization, and data and application portability. It also includes data protection solutions like NetBackup, which offers 3x better data deduplication to the cloud than competitors. Veritas also announced CloudPoint, a cloud-native data protection solution that provides multi-cloud snapshot management and enterprise-grade data protection.
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationVeritas Technologies LLC
Data Management Insights
Data visibility is achieved with Information Studio, which can ingest and visually render data from more than 30 sources including NetBackup, MS OneDrive, MS SharePoint, CIFs shares, etc., then take action on that data such as tiering or deleting.
The Veritas Information Classifier is included in every key technology across our information governance offerings and enables organizations to easily apply data management policies to help meet key regulatory requirements such as required by GDPR, Sarbanes Oxley, HIPAA, SEC, CCPA.
Users can quickly eliminate dark data and gain key insights like what data you have, who has access to it, whether it’s stale and can be tiered to lower cost storage, whether it’s PII data.
We apply this technology across the portfolio, including in enterprise archiving, where we’ve developed marketshare leadership. More details in this presentation.
Kindred Healthcare is one of the nation’s most respected healthcare providers. Through its subsidiaries, Kindred operates multiple healthcare-related businesses across the United States, including hospitals, nursing centers, institutional pharmacies and a contract rehabilitation-services business.
The document discusses OpenText Core, a cloud-based content management and file sharing platform. It notes that organizations are increasingly moving business data and processes to the cloud. OpenText Core provides secure file storage, collaboration features like desktop editing, and administrative controls for file access management. The platform aims to simplify content management and sharing across devices through an intuitive interface in the OpenText cloud.
Why do organizations need a secure file transfer solution? OpenText offers an solution to transfer large files based on the OpenText Cloud that integrates to desktop and business applications such as SAP, Salesforce or Oracle.
A simple approach to a successful cloud implementationAlaa Eldin Aly
This presentation demonstrates a universal approach to achieve successful cloud computing programs to avoid common mistakes of overlooking important aspects of the programs that lead to failed implementation
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
Today legal hold data requests expand far beyond traditional email server requirements. Last year alone, 62% of requests included data from mobile devices and 37% from cloud application services. As the data volumes increase, Legal and IT teams can no longer continue to rely on legacy eDiscovery processes that are both inefficient and costly.
Our experts discussed how the latest generation of eDiscovery solutions, using native-cloud technologies, are dramatically reducing both data collection and ingestion times, while significantly increasing the speed and efficiencies of the analysis and review process. Hear how legal and IT teams can:
* Extend data collection to endpoints and cloud apps to centrally collect, preserve and classify information
* Increase transparency for senior lawyers and corporate counsel through automated real-time metrics
* Achieve cloud-to-cloud data transfer to reduce the risk of data spoliation while removing the need for physical collection and shipping
By moving your eDiscovery process to the cloud, IT can quickly respond to their legal department’s inquiries, and legal teams gain faster data ingestion times along with high speed processing, analysis, and review.
To view the webcast: http://pages2.druva.com/eDiscovery-in-Cloud_On-Demand.html
Uptime Group is an IT services company that specializes in advising, preparing, and implementing solutions to optimize clients' ICT infrastructure. They aim to provide added value beyond basic IT tasks through their expertise across all levels of the IT stack, including networking, security, storage, virtualization, and cloud solutions. Uptime Group prides itself on its experienced consultants and tailored approaches to meeting clients' unique needs.
Protect your confidential information while improving servicesCloudMask inc.
The document discusses security issues with cloud computing and software as a service (SaaS) applications. It introduces CloudMask as a solution that protects sensitive data by masking it before it enters encryption channels and at data centers. This prevents unauthorized access to data even if user credentials or data center security are compromised. CloudMask allows secure use of cloud services without the risks of data breaches and regulatory issues from exposed sensitive data.
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
Growing data volumes, cloud service options, and overwhelming number of mobile devices continue to add to the complexity of eDiscovery. Information dispersed across various data sources (endpoints and popular cloud applications) and outdated technology for eDiscovery make the collection and preservation of ESI not only a tedious and manual process but can also be the source of data spoliation.
The slides from this webcast show modern eDiscovery technologies enables organizations to accelerate the eDiscovery process while reducing costs and risk by:
* Automating legal hold, in place preservation, collection and processing utilizing a single platform from Exterro
* Collection and preservation of end-user (including existing employee) data across endpoints and popular cloud applications (through Druva)
* Streamlining data transfer and ingestion to eliminate technology bottlenecks for faster analysis and review
See the webcast at: http://bit.ly/2fBeLXW
This document discusses the state of cybersecurity and the need for a data-centric approach. It notes the massive growth in connected devices and data, and the fragmented security market with over 5,000 vendors. Traditional defense-focused security tools have led to complexity, high costs and failed to stop major data breaches. The document advocates shifting to a data-centric model that minimizes risk of data compromise and consolidates security tools. It promotes the Stash data-centric solution as helping organizations simplify security, reduce costs and better protect their data.
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
This document discusses cloud security from an enterprise perspective. It begins by outlining trends in security threats facing organizations and the challenges of managing risk. It then provides guidance on taking a risk-based approach to cloud security, designing applications securely for the cloud, and conducting ongoing auditing and management. The key recommendations are to understand your risk profile, architect for security in cloud environments, implement robust identity and access management, confirm compliance obligations, and define clear security responsibilities between customers and cloud service providers.
Oc cio roundtable mooney management imperatives for realizing value from clou...James Sutter
This document summarizes research on management practices for realizing business value from cloud computing while mitigating risks. It discusses Allergan's experience adopting a "cloud first" policy to increase business responsiveness and agility. Key benefits of cloud computing identified include increased speed, reliability, cost savings, and business agility. However, challenges include security concerns, compliance, vendor lock-in, and lack of expertise. The document proposes six imperatives for effectively managing cloud adoption, such as redefining IT's value proposition in terms of business agility rather than just efficiency.
This document appears to be from a Veritas Technologies event and contains various presentations and discussions about data management challenges faced by businesses. Some key points:
- Businesses are dealing with exponential data growth but face challenges around storage costs, ransomware, compliance, and business continuity.
- IT is having to rapidly adapt to demands like agility, scalability, availability, and extracting value from data.
- Veritas provides a 360 data management portfolio including data protection, resiliency, software-defined storage, and compliance solutions to help customers overcome these challenges across on-premises, virtualized, and cloud environments.
- Presentations discuss how Veritas helps customers optimize data storage costs, accelerate
The document discusses how too much data is creating challenges for businesses. It notes that data is doubling every two years but 41% of data is not touched for three years. It then discusses how Information Map from Veritas can help solve problems related to uncontrolled data growth such as increased costs, risk, and complexity. Information Map provides visibility into data to help optimize storage usage, minimize risk, and simplify processes like backup and recovery. The document provides examples of how early adopters have used Information Map for benefits like reducing infrastructure costs, improving compliance, and increasing operational responsiveness.
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
When organisations today connect digitally and the concept of a network is found to be fast disappearing. Mobile and Cloud solutions are being enabled across the enterprise to aid digital agendas. Calls for agility by the business are driving CIOs and CISOs to look for effective trust-based service enablement models that can help cater to business demand.
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...Denodo
Watch full webinar here: https://bit.ly/36GEuJO
Traditional data integration is falling short to meet new business requirements - real-time connected data, self-service, automation, speed, and intelligence. Forrester analyst will explain how data fabric is emerging as a hot new market for an intelligent and unified platform.
This document discusses challenges with multi-cloud data management and myths around cloud data protection responsibilities. It introduces Veritas' unified data protection platform called NetBackup 8.1, which provides 3x better data transfer speeds to the cloud. It also announces a new cloud-native data protection product called CloudPoint and an object storage solution called Cloud Storage to help customers better manage rapidly growing data in multi-cloud environments.
This presentation provides information and tips to assist accountants and audits in introducing cloud technologies into their business. Auditflow - www.auditflow.com - offers a range of innovative audit compliance solutions. Mediasphere - www.mediasphere.com.au - builds websites and client portals for accountants and auditors globally.
Contact Tony Carrucan on tonyc@mediasphere.com.au for more information
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
This document discusses how Hewlett Packard Enterprise helps organizations protect their digital enterprises. It notes that 84% of breaches are due to application vulnerabilities but only 6% of security budgets are spent on application security. HPE provides solutions to protect data, users, and applications whether on-premises, in the cloud, or between. It has industry-leading security capabilities including application security, network access control, data security, security information and event management, managed security services, business continuity, and recovery centers. HPE aims to help organizations build security into their infrastructure and operations to protect, prevent, detect, and respond to security threats and ensure business continuity.
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
Hadoop is a powerful tool for today’s enterprise – providing unified storage of all data and metadata, regardless of format or source, and multiple frameworks for robust processing and analytics. However, this flexibility and scale also presents challenges for securing and governing this data.
Join IDC analysts, Carl Olofson and Mike Versace, as they discuss the changing world of big data security with Eddie Garcia, Information Security Architect at Cloudera, and Anil Earla, Chief Data and Analytics Officer of IS at Visa.
During this live roundtable discussion, you will:
Gain an understanding of how securing big data differs from traditional enterprise security
Learn about the latest tools and initiatives around Hadoop platform security
Hear how one of the largest payment processors approaches big data security and regulatory concerns
Hu Yoshida's Point of View: Competing In An Always On WorldHitachi Vantara
The document discusses how businesses need to adapt to constant and rapid changes in technology by embracing a "continuous cloud infrastructure" and "business-defined IT" approach. This involves having an automated, scalable IT infrastructure that is software-defined, virtualized and optimized to meet changing business needs. A continuous cloud infrastructure provides increased agility, automation, security and reliability to help businesses innovate faster, improve productivity and gain a competitive advantage in an "always-on" world of data growth, new technologies and changing customer demands.
This document provides an agenda for a Veritas Vision Solution Day event. The morning session will include presentations from Jason Tooley of Veritas and Phil Carter of IDC, as well as a CIO panel discussing finance, utilities, public sector, and retail industries. The afternoon session will feature keynote speeches from Veritas executives on data management and software-defined storage. There will also be a customer presentation, sessions on data privacy regulations and the future of Veritas, and a panel with guest speakers. The document outlines the schedule and speakers for both the morning and afternoon portions of the event.
Delivering Analytics at The Speed of Transactions with Data FabricDenodo
Watch full webinar here: https://bit.ly/3aAMTDD
It is no more an argument that data is the most critical asset for any business to succeed. While 85% of organizations want to improve their use of data insights in their decision making, according to a Forrester Survey, 91% of the respondents report that improving the use of data insights in decision making is challenging. To make data driven decision, organizations often turn to the data lakes, data lakehouses, cloud data warehouse etc. as their single source data repository. But the hard reality is that data is and will be spread across various repositories across cloud and regional boundaries.
Learn from renowned Forrester analyst and VP at Forrester, Noel Yuhanna:
- Why Data Fabric Is the best way to unify distributed data
- How Data Fabric be leveraged for data discovery, predictive analytics, data science and more
- Why data virtualization technology is key in building an Enterprise Data Fabric
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
This document discusses challenges and best practices for cloud storage and security. It begins by introducing the panelists and outlining the topics to be discussed, which include realities and pain points of cloud storage, how and where cloud security could be compromised, navigating legal and regulatory compliance, and recommendations for deploying the right cloud storage strategy. Key points made include that sensitive data is often stored in the cloud without visibility, cloud breaches and unauthorized access are concerns, and regulations like GDPR and ISO 27001 provide security standards to consider. The document emphasizes knowing cloud vendors, evaluating costs and benefits, and establishing secure data management practices throughout the data lifecycle.
This document discusses the growing need for enterprise-wide remote access and mobility solutions. It outlines some of the key business drivers, such as increased productivity and business continuity. It then evaluates some popular existing approaches like VPNs, server-based computing, and virtual desktop infrastructure (VDI) and finds that they do not scale cost-effectively to support large numbers of remote users. A new appliance-based remote desktop access solution is introduced that aims to provide secure, high-performance remote access across many device types in a more cost-effective way than traditional options.
This presentation from IBM's Business Continuity and Resiliency Services examines the trends and challenges that support cloud-based resiliency, and how IBM's Cloud Resilience portfolio can help.
Data centers and cloud computing may on the face of it, seem to have little in common with manufacturing, but look closer and you will see that the underlying drivers of productivity and efficiency are the same for manufacturing as for any other industry. From collecting and analyzing factory output to ensuring there are no breaks in supply chains, cloud computing can help manufacturing businesses flourish and stay competitive in this, the age of digital.
This document discusses the security risks of big data and how to protect sensitive information. It notes that while big data provides opportunities, it also poses big security risks if data is breached. It recommends asking key questions about data discovery, classification, access controls and monitoring to help secure data. The document also describes IBM tools like InfoSphere Guardium that can help organizations monitor user activity, detect anomalies and protect sensitive data in both traditional and big data environments.
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...DATAVERSITY
Today’s growing complexity to the data ecosystem requires organizations to understand data at the data element level. Challenges in data collection such as open text boxes/free form text fields added to the velocity of incoming data increases risk for organizations. This risk is amplified when those organizations rely exclusively on metadata scanning when it comes to discovering and actioning their data. The need to look deeper than basic metadata becomes even more pronounced when dealing with semi-structured or unstructured data commonly found in file shares and email systems. Maintaining compliance and driving business value often requires scanning actual files, interpreting data, flagging risks, and integrating that risk into a data catalog. Going beyond metadata to the actual data element level ensures that your data catalog is a source of truth, which ultimately allows organizations to create agile Data Governance programs.
We’ll walk you through key considerations for going beyond knowing what metadata you have by:
• Underlining the importance of an enhanced, AI-driven data discovery tool to better understand your data and how it is being used
• Discussing components of an effective Metadata Management strategy including data inventories, data dictionaries, and usage requests
• Highlighting how the OneTrust platform embedded with regulatory intelligence helps you to go beyond metadata and address key use cases around unexpected or at-risk unstructured data
Similar to Conférence - Les enjeux et la vision de Veritas sur la protection des données - #ACSS2019 (20)
This document summarizes an event called the African Cyber Security Summit that was held in Algeria. The summit featured conferences, panels, workshops and networking on cybersecurity topics over two days with participation from various Algerian government ministries and over 500 attendees from multiple African countries and private sector partners. It highlights some of the key speakers and presentations on regulations and solutions. Feedback from past attendees showed very high satisfaction rates with the quality of the event.
Presque toutes les entreprises sont engagées dans un processus de transformation digitale. Cette transformation génère de nouveaux risques et les attaques ciblant les applications web sont actuellement la cause principale des violations de données. Si la plupart des WAF (pare-feu applicatif) permettent de faire face aux menaces les plus courantes et déjà identifiées, ils sont pourtant inadaptés pour contrer les attaques avancées qui ne cessent de se développer à un rythme effréné.
Karim ZGUIOUI - Systems Engineer North Africa - F5
Les entreprises qui cherchent à maîtriser les défis liés à la gestion d’accès doivent établir des politiques d’accès granulaires pour différents services en prenant en compte non seulement l’identité d’un utilisateur mais également un contexte. F5 Access Policy Manager permet d’évaluer le niveau de sécurité d’un utilisateur, de procéder à une authentification à l’aide de mécanismes avancés comme SAML, NTLM, OAuth, MFA, etc. et d’assurer le SSO auprès de certaines applications pour garantir l’accès à une ressource particulière.
Karim ZGUIOUI - Systems Engineer North Africa - F5
Séduites par une vaste gamme d'applications de productivité, réunies sur une même plate-forme, de nombreuses entreprises s’intéressent à Office 365. Mais celles qui franchissent le pas se rendent compte que les enjeux de sécurité du cloud ne sont pas aussi simples à résoudre qu’elles le pensaient.
La plate-forme Office 365 réunit des outils de communication, de création de contenu et de partage au sein d’un environnement cloud ouvert à tous les utilisateurs et compatibles avec tous les appareils. Cette plate-forme
unique concentre ainsi tous les enjeux de sécurité auxquelles l’entreprise doit faire face. Il est donc impératif de
bien réfléchir à cette question.
Retrouvez nous pour ce workshop pour en savoir plus sur les implications de sécurité et les éléments clés à
prendre en considération pour toute entreprise ayant adopté ou prévoyant de passer à Office 365.
Abderezak OUARET - Business Development Manager North Africa - SYMENTEC
Les équipes de sécurité ont besoin de solutions de cyber sécurité de pointe (Arbor Edge Defense) , capables
de détecter et d’arrêter tous les types de menaces cybernétiques - qu’elles soient des menaces entrantes
(DDOS & Advanced Threat) ou des communications malveillantes sortantes à partir de périphériques internes
compromis. De manière aussi importante, ces solutions doivent également pouvoir s'intégrer dans la pile de sécurité existante d'une organisation et / ou consolider des fonctionnalités afin de réduire les coûts, la complexité et les
risques.
La conférence a pour objectif de montrer l’évolution des menaces DDOS et Advanced threat sur le volet de la
complexité et aussi la volumétrie. Cette évolution a un impact directe sur les solutions à mettre en place pour faire face à ce changement.
NETSCOUT AED (Arbor Edge Defence) est une telle solution pour répondre efficacement à cette
problématique. La position unique d'AED sur le bord du réseau (c'est-à-dire entre le routeur et le pare-feu), son moteur de traitement de paquets sans état et les informations de menace basées sur la réputation qu'elle reçoit du flux ATLAS Threat Intelligence de NETSCOUT lui permettent de détecter et d'arrêter automatiquement les menaces entrantes et les communications sortantes. des hôtes internes compromis - agissant essentiellement en tant que première et dernière ligne de défense pour les organisations.
Moncef ZID - Arbor Networks Sales Manager France and North Africa - Netscout
Le 10 Juin 2018, l’Algérie promulguait la loi sur la protection des données à caractère personnel. Pour les entreprises, cette loi induit un changement de paradigme dans la protection des données personnelles et induit un profond changement dans leur organisation, où la protection des données personnelles devra désormais faire partie intégrante de leur stratégie (privacy by design, cartographies des données et des processus de
traitement , etc.).
Cela suscite de nombreuses réflexions, notamment : Sommes nous prêts à adapter nos activités pour se
conformer aux nouvelles exigences?, sommes-nous contient de ce qui nous attend en terme de charge det ravail et d'investissements?, avons nous les personnes pour le faire? par où commencer ? et surtout quelles
démarches adopter?
Un spécialiste de la sécurité des SI vient d'entamer cette mission dans son entreprise et propose de partager
avec nous son approche et la démarche adoptée.
Rabah HACHICHI - Spécialiste Cyber Securité et Data Protection - BNP PARIBAS EL DJAZAIR
Cela fait une dizaine d’année que la fonction RSSI a été créée, mais à ce moment-là les RSSI ne se doutait pas qu’ils seraient un jour à la fois managers, techniciens, gestionnaires des risques organisationnels, réglementaires, stratégiques et opérationnels et souvent-même gestionnaires de projets, et ce, pour pouvoir garantir un niveau de sécurité optimal.
Pour cela, les compétences techniques d’un RSSI ainsi que ses qualités organisationnelles et managériales doivent être au rendez-vous pour pouvoir être l’interlocuteur des managers, des techniciens, des utilisateurs lambda, des partenaires et des tiers, mais aussi, pour prendre en charge les aspects juridiques, réglementaires et normatifs
De plus, il est connu que le RSSI change souvent de rythme : un jour en situation de crise pour la gestion d’un incident de sécurité avéré, et le lendemain, en rédaction de procédures et en sensibilisation des utilisateurs.
Samir ALLILOUCHE - RSSI - CNEP BANQUE
Aujourd'hui, il devient de plus en plus possible aux employés de travailler n'importe où et n'importe quand, ainsi la mobilité et le cloud computing font désormais une partie intégrante de toutes les organisations. Les navigateurs deviennent naturellement l'outil d'accès au travail, au même titre que les appareils mobiles. Avec un certain nombre de navigateurs sur le marché utilisant un certain nombre de modules complémentaires, il devient presque impossible d'assurer la sécurité contre les menaces et les attaques basées sur un navigateur, comme
le ransomware par exemple. Les navigateurs aussi constituent un point d'entrée principal pour les cyber-attaques. Il est temps de penser à gérer les navigateurs comme les terminaux pour sceller la sécurité de notre environnement.
Amine BEYAOUI - Consultant Senior, Afrique Francophone - ManageEngine
L’explosion du périmètre de l’infrastructure informatique impose d’en redéfinir sa sécurisation. Les usages des utilisateurs sont de plus en plus pointus et les métiers imposent des contraintes de production, bien sûr, mais aussi de flexibilité, d’agilité et d’expérience utilisateur. Nous y voilà : c’est tout simplement grâce à ces utilisateurs que nous allons pouvoir redéfinir notre périmètre. Les actions et les permissions qui leurs seront accordés vont constituer la base d’une stratégie IAM. Celle-ci devient essentielle et de plus en plus stratégique car elle impacte et lie directement l’expérience des utilisateurs avec l’infrastructure informatique. Le PAM est
une composante cruciale de l’IAM, puisque s’agit des accès et des permissions qui sont accordés aux utilisateurs « à hauts privilèges » : ceux qui peuvent tout faire, tout détruire… ceux que recherchent les hackers ! On pense bien sûr, à protéger les admin internes, et autres équipes IT, mais maitrisez-vous vraiment tous ces utilisateurs privilégiés ?
Alexis SERRANO - Channel Manager - South EMEA- BeyondTrust
Pour prioriser efficacement vos efforts, vous devez d'abord comprendre vos applications - ses composantes clés
et ses domaines de vulnérabilité. Considérez les plates-formes sur lesquelles l'application réside ; les données
qui transitent entre un utilisateur et une application ; le DNS qui résout l'adresse IP pour accéder à l'application; les serveurs Web et d'application ; et les API associées qui sont utilisées par d'autres applications et systèmes.
F5 améliore de façon unique la stratégie de sécurité que votre entreprise souhaite adopter avec des solutions et des services de sécurité définis par des politiques et des contrôles robustes et simplifie la gestion efficace des facteurs de risque qui sont en constante évolution. « Si vous voulez protéger les outils qui pilotent votre business, cela signifie protéger les
applications qui les font fonctionner »
Karim ZGUIOUI - Systems Engineer North Africa - F5
Tout système sécurisé doit pouvoir identifier tous ses aspects et la partie principale de tout système est les utilisateurs. Internet est le système mondial le plus utilisé de la période actuelle. Cependant, en raison de l'absence de réglementation, l'identification des utilisateurs d'Internet est un processus difficile.
Les technologies émergentes telles que le blockchain peuvent être utilisées pour introduire une identité numérique dans la sécurisation de nos données et pour rendre l'utilisation d'Internet plus fiable.
Ayham Ahmed MADI - Software engineer - GEP TECHNOLOGIES
This document provides information about the African Cyber Security Summit (ACSS) event, including:
- ACSS positions itself as the flagship event for cybersecurity in Algeria, giving it a pan-African and international dimension.
- The event will take place from April 3-5, 2018 in Oran, Algeria.
- It will include conferences, panels, workshops, networking activities, and B2B meetings.
- There will be over 300 participants from 3+ countries and 10+ sectors.
- Key partners and speakers from Algeria and abroad in cybersecurity and technology will present.
The document discusses various techniques used in ransomware attacks and defenses against them. It covers topics like email security appliances, command and control (CnC) detection using DNS, the evolution of ransomware variants, and tools like Umbrella that can be used to block malicious domains. It also discusses how the Next Generation IPS/NGFW from Cisco called Firepower can help discover vulnerabilities, detect malware, and tune signatures based on network context.
The document discusses cyber security strategies and services provided by Symantec Corporation, including managed security services, threat intelligence, incident response, and cyber security exercises. It provides details on Symantec's security operations centers, capabilities for continuous visibility and threat analytics, and frameworks for organizations to develop their own cyber defense centers. The document emphasizes the need for comprehensive security solutions that span prevention, detection, and response across the attack lifecycle.
This document discusses techniques for advanced protection against distributed denial-of-service (DDoS) attacks. It begins by asking questions about knowing the latest DDoS attack trends, best mitigation practices, and the real impact of attacks. It then discusses how easy it is to launch DDoS attacks and the complexity of modern multi-vector attacks. Specific examples of DDoS attacks are provided, such as a 2018 attack against Dutch banks, and how every physical or geopolitical event has a corresponding cyber reflection. The document promotes Arbor Networks as the industry leader in DDoS protection and describes their hybrid DDoS mitigation approach using on-premise and in-cloud/operator solutions.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
20240609 QFM020 Irresponsible AI Reading List May 2024
Conférence - Les enjeux et la vision de Veritas sur la protection des données - #ACSS2019
1. The truth in information.
Les enjeux et LaVision deVeritas sur la
protection des données
Herve Evonlah
Country Manager,
French Speaking Africa
Cell: +27763460669
2. The Digital Business Relies on Information
Always Available, Compliant, Relevant
Electronic
Supply Chains
Customer
Service
Personally
Identifiable
Legal /
Regulatory
Big Data/
Analytics
Mobile
Workforce
Digital
Workflows
IoT
Data
5. ButThere Are Significant ChallengesToday
Poor Visibility
• Data is scattered, mostly unstructured, across heterogeneous systems
• No single source of truth to make informed decisions
Exposed to Risk
• Low visibility into what is being stored or accessed by users, backed up, retained
• Business risk from non-compliance, unplanned downtime, service interruption
$
Paying Too Much
• Storing everything, including old, redundant or irrelevant data
• Maintaining accumulated legacy infrastructure
Not Agile Enough
• Not developing new applications quickly enough
• Limited by traditional IT processes
L
7. IT is Under Pressure from Multiple Directions
Hybrid Clouds
Need ability to reliably
migrate/failover workloads
seamlessly across Clouds as
needed
Open Source
Open Stack and Containers
being adopted by developers, but
need enterprise class ‘-ilities’
Big Data
Need to provide visibility into large sets
of unstructured data for business
decision making, monetization
Always On
Need to protect and preserve data at all
times, ensure it is available & recoverable
with no interruption to operations
Increased Regulation
Need to know where your data is, and
apply compliance policies consistently
Need to reliably store, protect and
provision enterprise data at scale
on choice of hardware
Security
IT
Almost every business is going through some form of digital transformation, and is reliant on information in order to function. Whether you’re transforming the way you’re addressing your customers or your partners, mobilizing your workforce, having to manage private or regulated information, or just using data to make better operational decisions – timely access to relevant information is critical to success.
So you could argue that your data is one the most critical assets you possess. You can outsource your IT infrastructure, your real estate, even your workforce – but your data is the one thing you always need to own and manage yourself. It must be available anywhere/anytime, properly protected, compliant with regulations, and seen as a business enabler rather than deadweight.
[EBC ice-breaker questions: “Where are you on this spectrum?”, “Do you use cloud services, digital processes, mobile apps?”, “Do you know where all your data is, whether it’s protected or compliant with regulations?”]
And yet in our experience from talking to customers, most companies are not managing their information like a critical business asset. Far from using it for competitive advantage, it’s actually a business liability…
DattPresenter:
This situation is unsustainable. We are creating and relying on more and more data at accelerated rates.
The 2016 data genomics world wide report pegged the real data growth rate at 39%.
Some have expressed that data is the new oil. It’ll make us rich…and we need to harness it’s power.
But not all data is created equal. The trouble is we hold on to everything forever.
Saving data forever actually impedes our ability to capitalize on what’s truly valuable.
Presenter:
So, why don’t we treat data like it truly is the “new oil”.
Oil is refined into usable components.
Data is just hoarded. Forever.
According to the Data Genomics Index 2016, 41% of the typical enterprise hoard of unstructured data has not been modified in 3 years.
According to the Databerg Report 2016, 33% of the data stored is ROT and 52% is Dark – meaning, we have no clue what it is.
According to the Data Hoarding Report 2016, we’re storing things like unencrypted company secrets, embarrassing correspondence, and sexually explicit material.
ROT – redundant, outdated & trivial
Penalties for not Focusing on Information Enough (can select from the bullets for talk track)
COST
LOSS OF VISIBILITY & CONTROL
EXPOSURE TO LEGAL/COMPLIANCE RISK, DATA BREACHES ETC
LOSS OF COMPETITIVE ADVANTAGE – EVEN LOSS OF THE BUSINESS!
So Information needs to be managed like the critical business asset that it is….
The problem is that organizations need a quick and simple way to get value out of data while mitigating risk. However, organizations have been keeping everything forever because they know the information has value. So much value that it is too risky to let go of that information without the confidence to do so. In an information centric world, the data that organizations create and store is their greatest asset. We also depend on information in our daily jobs, but often times important business critical or valuable data is buried.
In a world that values information, organizations are now challenged to make decisions about what to do with this information. Decisions around how to get value out of data while mitigating risk in an increasingly complex and regulated environment is getting extremely difficult.
I’m sure many of these trends are familiar. [EBC question: “Which of these are you seeing in your business?”]
Hybrid Clouds: They’re being adopted because customers don't want to pre-buy capacity and want access to more on-demand infrastructure. But from a data pov, they still need to make sure that data is protected, available and transportable as needed through different service providers + on premise infrastructure
Big Data: The ultimate payoff from managing your data more closely is the ability to run the business more efficiently, plan more accurately, even monetize the value in that data. But that requires a lot of preparation prior to the Big Data analysis, on-demand availability and access to lots of high performance storage
Regulation: Regulatory frameworks are becoming more demanding – particularly in Europe with GDPR although there are regional equivalents everywhere. You need to know what data can leave your country, what permissions are needed to touch data, how to ensure privacy and appropriate retention, whether cloud infrastructures are allowed, and so on
Always On: The standard expectation is that these infrastructures are always on and available, in the same way that mainframes were decades ago. And yet they also need flexibility, agility and protection across a heterogeneous landscape including apps and data, which makes that more challenging
White Box Storage: We’re seeing a rise in adoption of commodity storage - hardware with the cheapest possible component parts but no value add on top. No longer plug and play - it needs a lot of software on top to make it usable in an enterprise setting – software that we provide. And it’s likely that you still have legacy storage systems from EMC, NetApp etc, so the software needs to accommodate that while giving you complete freedom to use whatever storage makes sense for the task
Open Source: In parallel with adoption of commodity hardware, there’s another movement away from traditional proprietary environments with Open Source software, particularly OpenStack and Containers. Attractive to developers and low cost to adopt, but it comes with extra challenges around security, scalability, storage performance and availability.
Ensuring Predictable Uptime Across The Multi-Cloud Is Hard. Veritas Makes It Easy.
Predictably meet service levels with real visibility and compliance reporting
Ensure seamless workload mobility across sites and clouds
Adopt multi-clouds while protecting current investments
Veritas information studio goes beyond data visualization to provide classification, targeting and action on the data that matters most.
See the data
Comprehensive insight into data, regardless of where it’s stored
Automated data classification
Context into dark data
Target the data
Robust file analysis aggregates file metadata
Intuitive user interface allows any user to easily dive into data
Act on data
Informed, confident action can be taken to address compliance needs
Use metadata and classification tags to quickly find and resolve unseen risk
Once data sources have been connected, the Information Studio dashboard provides a geographic orientation of all data allowing any user to dive into a specific location, file server, share, user, classification tag, or any combination of the available filters. It also gives an overview of the total orphaned, stale and non-business data. It also provides the amount of money being spent to store the various types of data.
Orphaned means the owner of the data is no longer with the company, stale means the data hasn’t been touched/modified in a certain period of time and non-business data is anything previously set as non-business (.mp4 files as an example)
Organize your data
By aggregating metadata to build an information profile you can now render an organized view of your unstructured data. You can determine where PII, confidential, business critical and stale/orphaned data lives. This is not an exhaustive list, but rather an example.
Veritas is a 360° provider for data management. This is a view of those capabilities mapped to our product portfolio.
Starting in the Protection part of the wheel in the blue, we provide all the necessary infrastructure in all the technology environments to make sure that your data is Protected and Accessible: backing it up, providing it in various form factors, being able to do copy data management, and ensuring high availability to premise or to cloud. NetBackup, the leading B&R solution in the industry, is the foundation for many of the other products and technologies listed here. Velocity is our new data virtualization/CDM solution
At the same time, we’re able to orchestrate heterogeneous workloads in the green section (Availabiity). That includes technologies such as Software Defined Storage (SDS) whether in conventional environments, across clouds, or in OpenStack environments. This provides not only high data availability for all classes of app, but the ability to move workloads around between those environments reliably and quickly, as needed for best optimization. Main product family here is InfoScale and more recently HyperScale for OpenStack.
At the top left of this wheel we’re talking about Information Insight, where we enable new visibility into the data estate and want to become a System of Record that allows that data to be analyzed and to be safely policy controlled.
And underneath you can see another important concept – the Information Fabric. This is the ‘glue’ that ties everything together and allows the various technologies and products in the wheel to share services ‘under the covers’. You’ll be hearing more about this as we build out our Information Management Platform over the next few years.
Here is a view of the products that make up each of these categories.
Veritas is the #1 or #2 leader in all major market segments that it serves, a position endorsed by leading analysts and Fortune 500 customers. We also have a significant amount of intellectual property from having been innovators in Information Management for nearly 30 years. We are trusted by some of the largest and most demanding customers in the world as well as many thousands of smaller businesses in every major region, and enjoy continued growth in both our core businesses as well as newer initiatives.