Monday, March 7, 2016: Hilton Boston Logan Hotel
Presenters:
Tom Leighton, CEO: The Future of the Internet Starts Here
Bobby Blumofe, EVP: The Akamai Platform
Rick McConnell, President & GM: Web Division
Bill Wheaton, EVP & GM: Media Division
Jim Benson, EVP & CFO: Financial Update
Tom uk soti_final_without video.4.21.15Liz Bradley
The connected world around us is evolving at a breath taking pace. Some people refer to it as the Internet of Things, others call it The Internet of Everything or the “hyperconnected world.” Whatever you choose to call it, we are becoming a world in which billions of people, tens of billions of machines, and countless petabytes of information are all interlinked and in which instantaneous and intelligent access becomes the expectation. In this presentation, Akamai CEO and co-founder Dr. Leighton outlines four Grand Challenges created as a result of the massive quantities of video moving online, the rising movement of online transactions and media to mobile devices, an ever-increasing frequency and sophistication of security attacks and the rapid migration of enterprise applications to the cloud.
See Dr. Tom Leighton's Edge Presentation: http://www.akamai.com/html/custconf/edgetv.html#tom-leighton
The Akamai Edge Conference is a gathering of the industry revolutionaries who are committed to creating leading edge experiences, realizing the full potential of what is possible in a Faster Forward World. From customer innovation stories, industry panels, technical labs, partner and government forums to Web security and developers' tracks, there's something for everyone at Edge 2013.
Learn more at http://www.akamai.com/edge
Monday, March 7, 2016: Hilton Boston Logan Hotel
Presenters:
Tom Leighton, CEO: The Future of the Internet Starts Here
Bobby Blumofe, EVP: The Akamai Platform
Rick McConnell, President & GM: Web Division
Bill Wheaton, EVP & GM: Media Division
Jim Benson, EVP & CFO: Financial Update
Tom uk soti_final_without video.4.21.15Liz Bradley
The connected world around us is evolving at a breath taking pace. Some people refer to it as the Internet of Things, others call it The Internet of Everything or the “hyperconnected world.” Whatever you choose to call it, we are becoming a world in which billions of people, tens of billions of machines, and countless petabytes of information are all interlinked and in which instantaneous and intelligent access becomes the expectation. In this presentation, Akamai CEO and co-founder Dr. Leighton outlines four Grand Challenges created as a result of the massive quantities of video moving online, the rising movement of online transactions and media to mobile devices, an ever-increasing frequency and sophistication of security attacks and the rapid migration of enterprise applications to the cloud.
See Dr. Tom Leighton's Edge Presentation: http://www.akamai.com/html/custconf/edgetv.html#tom-leighton
The Akamai Edge Conference is a gathering of the industry revolutionaries who are committed to creating leading edge experiences, realizing the full potential of what is possible in a Faster Forward World. From customer innovation stories, industry panels, technical labs, partner and government forums to Web security and developers' tracks, there's something for everyone at Edge 2013.
Learn more at http://www.akamai.com/edge
The Web Experience Foundry will be dedicated to researching and prototyping projects and technologies that the Web Experience business unit feels are potentially important for the future of its product lines. The primary goals will be:
- Gain a solid understanding of new technology and how it could (or could not) be used in Web Experience products (Discovery).
- Prototype new technologies and create proof of concepts to validate or invalidate a technologies potential utility.
- Research new concepts and look for ways they can improve our existing product lines.”
Million Browser Botnet - Live Demonstration by Michael Smith, CSIRT Director, Akamai Technologies & Matt Johansen, Sr. Manager, Threat Research Center, WhiteHat Security Inc.
Online advertising networks can be a web hacker's best friend. For mere pennies per thousand browser impressions, service providers allow you to broadly distribute arbitrary JavaScript. Most advertisers use this feature to show ads, track users, and get clicks, but hackers don’t play by the same rules as the rest of us. Absolutely nothing prevents them from spending as little as $10 to create a massive JavaScript-driven browser botnet instantly.  Join us for this presentation as WhiteHat Security founder and CEO, Jeremiah Grossman; WhiteHat Threat Research Center Manager, Matt Johansen; and Akamai CSIRT Director Michael Smith show you how easily a bad actor can commandeer browsers to perform DDoS attacks, participate in email spam campaigns, crack hashes, and even help brute-force passwords using just a few lines of HTML5 and JavaScript.
Akamai Edge is the premier event for Internet innovators, tech professionals and online business pioneers who together are forging a Faster Forward World. At Edge, the architects, experts and implementers of the most innovative global online businesses gather face-to-face for an invaluable three days of sharing, learning and together pushing the limits of the Faster Forward World. Learn more at: http://www.akamai.com/edge
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Colin Bendell
If you are building a mobile app or hybrid responsive app you are probably thinking deeply about reusing components and data APIs from your web site. In this talk we will explore some common pitfalls in using web components & web APIs in mobile apps. We will look at the impact on operations, network performance, scalability and reliability - and how to overcome these challenges.
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)💻 Javier Garza
HTTP/2 has been out for about a year. Over that time, Michael Gooding and Javier Garza have worked with many customers to implement it. However, beyond a turnkey solution that offers instant performance gains, HTTP/2 has led to a large amount of questions and confusion about how to optimize for it. Michael and Javier share their experiences with HTTP/2 over the last year, discussing case studies that demonstrate how performance can be improved over HTTP/2 while addressing backward compatibility, exploring using RUM data to review performance-related observations of customers after switching to HTTP/2, and offering hands-on demos of HTTP/2 with server push and HTTP/2 + QUIC.
Topics include:
Rendering impact without prioritization: Many solutions currently do not support server push or prioritization, which can have a negative impact on rendering when all resources instantly compete for the same bandwidth. Michael and Javier discuss solutions to mitigate this problem.
Breaking out to smaller files: Best practices used to dictate combining CSS and JavaScript into as few resources as possible. In an HTTP/2 world, the advice is to leave files alone and serve them as they are. Michael and Javier look at examples where trade-offs exist between the delivery, management, compression, and caching and advise how best to approach the problem.
Sprites: As with smaller files, what should we do with sprites in an HTTP/2 world? Looking at examples, Michael and Javier analyze the trade-offs in breaking a sprite out to smaller parts, looking at the effects of less-complex CSS against network performance to see how much of a difference it actually makes on performance.
Delivering for HTTP/1.x: Many websites today still have a large user base from older browsers that do not and will not support HTTP/2. By reviewing case study sites optimized for HTTP/2, Michael and Javier display the delta between a site delivered over an HTTP/2 connection and an HTTP/1.x connection. Taking these differences into account, they then explore some common trade-offs and review the delivery options to provide good performance for both protocols at the same time.
Real-life HTTP/2 web performance data: Michael and Javier explain how to use RUM data to review web performance data from large websites after enabling HTTP/2 and see the conditions where the performance improvements are at their best.
Hands-on demo comparing the web performance of HTTP/2 versus HTTP/1.x 1 and HTTP/2 with server push and QUIC.
El perímetro es la próxima frontera de la innovación empresarial. Es el lugar donde los usuarios se
conectan, experimentan la vida digital, conviven nubes, dispositivos y enormes secuencias de datos.
Akamai es el perímetro. Su plataforma perimetral inteligente distribuida de manera global llega a todas
partes, desde la empresa hasta la nube, lo que permite a sus clientes y a sus negocios ser rápidos, inteligentes y
seguros. Mantienen las decisiones, aplicaciones y experiencias más cerca de los usuarios, así como, los ataques y las amenazas a raya.
Lo invitamos a conocer la cartera de soluciones de seguridad perimetral, rendimiento web y móvil, y soluciones OTT de Akamai.
DIRIGIDO:
Gerentes de TI, Oficiales de Seguridad (CISO), Gerentes o Jefes de Seguridad y Riesgos, y similares
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
Get insight into the latest Internet trends to accelerate innovation and move your business faster forward.
Download this report to learn about:
• Is your business focused on understanding today’s mobile browsing habits? Akamai has usage data that you will want to see.
• Get insight on recent attacks by the Syrian Electronic Army.
• Looking to do business in another country? Akamai understands broadband and mobile connection speeds and adoption across the world. Check out this report for insight and come to the right decisions.
Drawing on information from the Akamai Intelligent Platform, the State of the Internet Report provides an unhindered view into today’s online trends.
To download the latest edition of Akamai’s “State of the Internet” report, visit: http://www.akamai.com/stateoftheinternet/
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...Amazon Web Services
IT organizations today need to support a mobile, flexible, global workforce and ensure that their users can be productive anywhere. Moving desktops and applications to AWS offers improved security, scale, and performance with cloud economics. In this session, we provide an overview of Amazon WorkSpaces and Amazon AppStream 2.0, and we discuss the use cases for each. Then, we dive deep into best practices for implementing Amazon WorkSpaces and AppStream 2.0, including how to integrate with your existing identity, security, networking, and storage solutions.
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobile Convention
The presentation of IBM, Gold sponsor of Mobile Convention Brussels 2015. Dean Murphy, MobileFirst Business Leader at IBM takes on a journey of his personal experiences of mobility and it’s evolution over the last few years to where we are today. To do this we need to go back in time.
Dr. Tom Leighton delivered a keynote presentation titled “Transforming Experiences Across the Omnichannel." Dr. Leighton explains the challenges of providing frictionless experiences across all devices and channels. He also shares near term and long term strategies for helping to ensure rapid response times – regardless of whether a shopper is engaging on a smartphone or an iPad, using a mobile connection, or competing for Wi-Fi in the store.
Learn more about Akamai's Mobile Solutions - Aqua Ion Mobile: http://www.akamai.com/html/solutions/aqua_ion_mobile.html
The Web Experience Foundry will be dedicated to researching and prototyping projects and technologies that the Web Experience business unit feels are potentially important for the future of its product lines. The primary goals will be:
- Gain a solid understanding of new technology and how it could (or could not) be used in Web Experience products (Discovery).
- Prototype new technologies and create proof of concepts to validate or invalidate a technologies potential utility.
- Research new concepts and look for ways they can improve our existing product lines.”
Million Browser Botnet - Live Demonstration by Michael Smith, CSIRT Director, Akamai Technologies & Matt Johansen, Sr. Manager, Threat Research Center, WhiteHat Security Inc.
Online advertising networks can be a web hacker's best friend. For mere pennies per thousand browser impressions, service providers allow you to broadly distribute arbitrary JavaScript. Most advertisers use this feature to show ads, track users, and get clicks, but hackers don’t play by the same rules as the rest of us. Absolutely nothing prevents them from spending as little as $10 to create a massive JavaScript-driven browser botnet instantly.  Join us for this presentation as WhiteHat Security founder and CEO, Jeremiah Grossman; WhiteHat Threat Research Center Manager, Matt Johansen; and Akamai CSIRT Director Michael Smith show you how easily a bad actor can commandeer browsers to perform DDoS attacks, participate in email spam campaigns, crack hashes, and even help brute-force passwords using just a few lines of HTML5 and JavaScript.
Akamai Edge is the premier event for Internet innovators, tech professionals and online business pioneers who together are forging a Faster Forward World. At Edge, the architects, experts and implementers of the most innovative global online businesses gather face-to-face for an invaluable three days of sharing, learning and together pushing the limits of the Faster Forward World. Learn more at: http://www.akamai.com/edge
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Colin Bendell
If you are building a mobile app or hybrid responsive app you are probably thinking deeply about reusing components and data APIs from your web site. In this talk we will explore some common pitfalls in using web components & web APIs in mobile apps. We will look at the impact on operations, network performance, scalability and reliability - and how to overcome these challenges.
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)💻 Javier Garza
HTTP/2 has been out for about a year. Over that time, Michael Gooding and Javier Garza have worked with many customers to implement it. However, beyond a turnkey solution that offers instant performance gains, HTTP/2 has led to a large amount of questions and confusion about how to optimize for it. Michael and Javier share their experiences with HTTP/2 over the last year, discussing case studies that demonstrate how performance can be improved over HTTP/2 while addressing backward compatibility, exploring using RUM data to review performance-related observations of customers after switching to HTTP/2, and offering hands-on demos of HTTP/2 with server push and HTTP/2 + QUIC.
Topics include:
Rendering impact without prioritization: Many solutions currently do not support server push or prioritization, which can have a negative impact on rendering when all resources instantly compete for the same bandwidth. Michael and Javier discuss solutions to mitigate this problem.
Breaking out to smaller files: Best practices used to dictate combining CSS and JavaScript into as few resources as possible. In an HTTP/2 world, the advice is to leave files alone and serve them as they are. Michael and Javier look at examples where trade-offs exist between the delivery, management, compression, and caching and advise how best to approach the problem.
Sprites: As with smaller files, what should we do with sprites in an HTTP/2 world? Looking at examples, Michael and Javier analyze the trade-offs in breaking a sprite out to smaller parts, looking at the effects of less-complex CSS against network performance to see how much of a difference it actually makes on performance.
Delivering for HTTP/1.x: Many websites today still have a large user base from older browsers that do not and will not support HTTP/2. By reviewing case study sites optimized for HTTP/2, Michael and Javier display the delta between a site delivered over an HTTP/2 connection and an HTTP/1.x connection. Taking these differences into account, they then explore some common trade-offs and review the delivery options to provide good performance for both protocols at the same time.
Real-life HTTP/2 web performance data: Michael and Javier explain how to use RUM data to review web performance data from large websites after enabling HTTP/2 and see the conditions where the performance improvements are at their best.
Hands-on demo comparing the web performance of HTTP/2 versus HTTP/1.x 1 and HTTP/2 with server push and QUIC.
El perímetro es la próxima frontera de la innovación empresarial. Es el lugar donde los usuarios se
conectan, experimentan la vida digital, conviven nubes, dispositivos y enormes secuencias de datos.
Akamai es el perímetro. Su plataforma perimetral inteligente distribuida de manera global llega a todas
partes, desde la empresa hasta la nube, lo que permite a sus clientes y a sus negocios ser rápidos, inteligentes y
seguros. Mantienen las decisiones, aplicaciones y experiencias más cerca de los usuarios, así como, los ataques y las amenazas a raya.
Lo invitamos a conocer la cartera de soluciones de seguridad perimetral, rendimiento web y móvil, y soluciones OTT de Akamai.
DIRIGIDO:
Gerentes de TI, Oficiales de Seguridad (CISO), Gerentes o Jefes de Seguridad y Riesgos, y similares
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
Get insight into the latest Internet trends to accelerate innovation and move your business faster forward.
Download this report to learn about:
• Is your business focused on understanding today’s mobile browsing habits? Akamai has usage data that you will want to see.
• Get insight on recent attacks by the Syrian Electronic Army.
• Looking to do business in another country? Akamai understands broadband and mobile connection speeds and adoption across the world. Check out this report for insight and come to the right decisions.
Drawing on information from the Akamai Intelligent Platform, the State of the Internet Report provides an unhindered view into today’s online trends.
To download the latest edition of Akamai’s “State of the Internet” report, visit: http://www.akamai.com/stateoftheinternet/
Moving desktops & applications to AWS with Amazon WorkSpaces & AppStream 2 - ...Amazon Web Services
IT organizations today need to support a mobile, flexible, global workforce and ensure that their users can be productive anywhere. Moving desktops and applications to AWS offers improved security, scale, and performance with cloud economics. In this session, we provide an overview of Amazon WorkSpaces and Amazon AppStream 2.0, and we discuss the use cases for each. Then, we dive deep into best practices for implementing Amazon WorkSpaces and AppStream 2.0, including how to integrate with your existing identity, security, networking, and storage solutions.
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobile Convention
The presentation of IBM, Gold sponsor of Mobile Convention Brussels 2015. Dean Murphy, MobileFirst Business Leader at IBM takes on a journey of his personal experiences of mobility and it’s evolution over the last few years to where we are today. To do this we need to go back in time.
Dr. Tom Leighton delivered a keynote presentation titled “Transforming Experiences Across the Omnichannel." Dr. Leighton explains the challenges of providing frictionless experiences across all devices and channels. He also shares near term and long term strategies for helping to ensure rapid response times – regardless of whether a shopper is engaging on a smartphone or an iPad, using a mobile connection, or competing for Wi-Fi in the store.
Learn more about Akamai's Mobile Solutions - Aqua Ion Mobile: http://www.akamai.com/html/solutions/aqua_ion_mobile.html
Fast DNS DNS Product Brief - resolution that is fast, reliable and secureAkamai Technologies
Fast DNS quickly and dependably directs end users to your websites. It provides a primary or secondary DNS solution with improved responsiveness, 24x7 availability and the resiliency to defend against the largest Distributed Denial-of-Service (DDoS) attacks. Built on the Akamai Intelligent Platform™, Fast DNS provides a fast, reliable and secure DNS infrastructure designed to enable the best possible online experience.
Visit us to learn more: http://www.akamai.com/html/solutions/fast-dns.html
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Akamai Technologies
Web application performance and security are critical to innovation. Akamai's Web Application Firewall (WAF) is a highly scalable edge defense service architected to detect and mitigate potential attacks, including SQL injection attacks, in HTTP and HTTPs traffic as they pass through Akamai's Intelligent Platform in their attempt to reach origin data centers.
WAF is designed to scale instantly to preserve performance and filter attack traffic close to the source, protecting your infrastructure and keeping your web applications up and running. Learn more about Kona Security Solutions: http://www.akamai.com/html/solutions/kona-solutions.html
Learn more about Akamai's presence at RSA Conference 2013: http://www.akamai.com/html/ms/rsa_conference_2013.html
CIRCUIT 2015 - Akamai: Caching and BeyondICF CIRCUIT
Puru Hemnani - ICF Interactive
The session will go over the advantages of CDN in general and Akamai caching in particular. Akamai is one of the most commonly used caching option with AEM and several clients use it. There are several features and akamai tuning options such as Error caching, GeoRouting, ESI, Siteshield, WAF that can help developers and system engineers make the sites faster and secure. Configuring it correctly can also reduce the licensing requirements for AEM as well as infrastructure costs as you can serve much higher amount of traffic with less number of origin servers.
Sample code: https://github.com/cqsupport/webinar-dispatchercache
Webinar Recording: http://my.adobeconnect.com/p7th2gf8k43/
Optimizing dispatcher cache covering:
Best practices for using the dispatcher
Tips and tricks for improving performance
Common pitfalls to avoid
How to design your site so you get the most out of your Dispatcher
Systems that run across continents and hemispheres, rather than across racks in a single data center, are becoming increasingly necessary; developers deploy their applications across multiple clouds or locations for redundancy and compliance and to push content closer to their users. Tyler McMullen explains why such systems must have fundamentally different designs than what we’re used to.
Without fundamentally different architectures from what we’ve done in the past, these systems become burdens to both their operators and their users. Tyler offers an overview of some of the incredible approaches for designing these systems, including lattices, eventual consistency, CRDTs, and consistency analysis, and discusses the fundamental techniques of such systems: back pressure, randomization, partial availability, and caching. Tyler ends by covering the differences in mental models that must be adopted in order to design and implement globally distributed systems as well as some lessons learned from real-world implementations.
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...IDATE DigiWorld
Ahmet Ozalp is the VP of International Products and Strategy for the Media (Sola) Division of Akamai. In this role Ozalp leads the product management and strategy initiatives for Akamai’s video, software and application delivery, storage and analytics products in EMEA and Asia Pacific regions. He also leads and supports key partnership initiatives with major Telecommunications companies in the region.
Prior to Akamai, Ozalp was the CEO of Telenity, a global provider of mobile advertising and social network solutions. Prior to Telenity, Ozalp was a Partner at Atlas Venture, where he led investments in digital media, mobile and online advertising. While at Atlas, Ozalp was the lead investor and board member of Extend Media (acquired by CSCO) and also had board level involvement with Ellacoya Networks (acquired by Arbor Networks), Isilon (IPO, Nasdaq:ISLN) and Gotuit Media.
Before joining Atlas, Ozalp held executive positions in marketing and product management at Narad Networks (acquired by Nasdaq:CIEN) and was also part of the founding team of Newnet, a telecom software startup acquired by ADC (Tyco Electronics). In the early part of his career, Ozalp was also a management consultant with Bain & Company’s technology and media practice.
Ozalp holds an MBA from the Wharton School of University of Pennsylvania, an MS in EE from Columbia University and two US patents.
AEM (CQ) Dispatcher Security and CDN+Browser CachingAndrew Khoury
This presentation cover Adobe AEM Dispatcher security and CDN and browser caching.
This presentation is the second part of a webinar on AEM Dispatcher:
http://dev.day.com/content/ddc/en/gems/dispatcher-caching---new-features-and-optimizations.html
Visit url above to view the whole presentation. Domique Pfister the primary engineer developing AEM Dispatcher covers the first part on new features.
After a long hibernation, the Web has started changing quickly again, with innovation on all sides; new protocols like HTTP/2 and QUIC, lots of new APIs and even new kinds of devices. Let's talk about the future of the Web -- both good and potentially bad, and how it's going to affect the world as well as engineers.
https://rakutentechnologyconference2016.sched.org/event/8HKH/the-webs-next-adventures
Rakuten Technology Conference 2016
http://tech.rakuten.co.jp/
여전히 급성장하고 있는 글로벌 게임시장. 사용자들의 게이머 경험(Gamer Experience)를 어떻게 정의하고 지켜나가느냐가 시장에서의 성공을 좌우하는 중요한 팩터입니다. 클라우드 네트워크인 아카마이 인텔리전트 플랫폼을 이용하여 보다 효과적으로 글로벌 시장을 두드리는 방법을 살펴보겠습니다
The beauty of the Akamai cloud delivery platform is that you can start out simply, and build to more sophisticated configurations as your needs evolve simply by adding additional capabilities. In this session, we'll step through how the various Akamai solutions can build to a single coherent architecture that ensures every user receives the optimal digital experience -- while at the same time mitigating threats and malicious users. We'll show how to "start simple" with site acceleration enabled through the Onboarding and Configuration Assistant, and proceed down the path to fully enabled solutions encompassing Kona Site Defender, Client Reputation, Bot Manager, Image Manager and mPulse real-user monitoring.
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiPROIDEA
Akamai runs a network of 150.000 servers distributed among 2.000 locations in 92 countries. It’s constantly outputting Terabits per second, accounting for between 15 and 30% of the Internet’s WWW traffic. Talk will cover the principles of operation of Akamai’s Inteligent Platform, aspects of monitoring and managing consistent configuration on such scale. Speaker will share interesting technical details and general ideas behind the scalability and performance of the Akamai network.
Paweł Kuśmierski - Pawel Kusmierski is a Senior Engineer and Lead of Akamai’s System Operations in Krakow, Poland. He’s responsible for operational oversight of Internet Mapping and Distributed Storage systems. In the past he interned at Google’s Mountain View office as a Software Engineer. He lives with his wife and three year old son in Krakow. Occasionally he finds time to fly sailplanes and build electronic devices.
Alta Product Brief - Cloud-based application delivery platform for web applic...Akamai Technologies
Alta is a cloud-based application delivery platform designed to enable enterprises to deliver all of their web-based applications in a fast, reliable, secure, and cost-effective way to any user on any device, anywhere in the world. Alta empowers enterprises to overcome the challenges related to delivering their applications over the Internet by placing all of the application delivery capabilities within the Akamai Intelligent Platform™, which means the optimizations are distributed globally and located closer to users and data centers, wherever they are. Akamai's unique cloud-based architecture also means that applications can be seamlessly migrated across data centers or clouds at will, and the application delivery optimizations will automatically move with the application.
Visit us to learn more: http://www.akamai.com/html/solutions/application-delivery-platform.html
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiAkamai Technologies
Join Akamai Security Engineering for an overview of our WAF rule process. Starting with the OWASP rule set, learn how Akamai incorporates our experience and security intelligence to improve core rules and create new rules. We'll explore how teams create further customized rules for individual application patching and close the loop, bringing these rules back through engineering to be normalized and delivered as common rules. Will include a view into how we're changing our process to take advantage of new security intelligence capabilities. See John Dilley's Edge Presentation: http://www.akamai.com/html/custconf/edgetv-security.html#closing-the-loop
The Akamai Edge Conference is a gathering of the industry revolutionaries who are committed to creating leading edge experiences, realizing the full potential of what is possible in a Faster Forward World. From customer innovation stories, industry panels, technical labs, partner and government forums to Web security and developers' tracks, there’s something for everyone at Edge 2013.
Learn more at http://www.akamai.com/edge
Data is the soil khan smith create tech 2012Khan Smith
You can view the presentation here:
http://www.viddler.com/v/ccfe8168
http://www.viddler.com/v/337d0421
http://createtech.aaaa.org/data-is-the-soil-for-ebusiness/
IoT Deep Dive - Be an IoT Developer for an HourTaisuke Yamada
My presentation on IoT development at "Akamai Tech Summit 2016" in Boston, USA.
The goal of the session was to provide attendees an idea on difficulties IoT developers would face, especially on reliable OTA (over-the-air) upgrade. It included hands-on lab based on micropython/ESP8266 as a quick tour on IoT development.
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PROIDEA
James Kretchmar – CTO EMEA, Akamai Technologies Inc.
James Kretchmar is CTO for Akamai’s Europe, Middle East & Africa region and is responsible for technical strategy across the region. Previously he served as Chair of Akamai’s Architecture Board, responsible for review and oversight of technical designs for Akamai’s globally distributed intelligent platform, as well as providing company-wide technical guidance. Mr. Kretchmar came to Akamai from MIT in 2004 and during his tenure has also served as Architect for Akamai’s Mapping and Network Management systems. He is a published author on Network Administration and speaks several European Languages.
Topic of Presentation: How Akamai scales to serve the largest events on the Internet
Language: English
Abstract: Scaling to meet the ever increasing demands of users in a world of more and heavier on-line content is always a challenge but at Akamai, serving at scale means delivering enormous events like the Olympic Games and the FIFA World Cup to a massive worldwide audience. Akamai’s highly distributed platform of 150,000 servers located in 92 countries around the world is critical to effectively delivering events of this magnitude but the physical deployment is only half of the story. The true key to serving with good performance at massive scale is in the intelligent algorithms that drive the platform. In this talk hear James Kretchmar, CTO EMEA, discuss how the design of the Akamai Intelligent Platform enables a fast, reliable and secure online experience for the largest events on the Internet.
Welcome Address: The Accelerating Pace of Innovation - Dr. Tom Leighton, Akamai Akamai Technologies
See Dr. Tom Leighton's Edge Presentation: http://www.akamai.com/html/custconf/edgetv.html#tom-opening
The Akamai Edge Conference is a gathering of the industry revolutionaries who are committed to creating leading edge experiences, realizing the full potential of what is possible in a Faster Forward World. From customer innovation stories, industry panels, technical labs, partner and government forums to Web security and developers' tracks, there’s something for everyone at Edge 2013.
Learn more at http://www.akamai.com/edge
Web Application Accelerator Product Brief - Application delivery for global w...Akamai Technologies
Web Application Accelerator (WAA) is a cloud-based service designed to enable enterprises to cost-effectively deliver web-based applications that are fast, reliable and secure. WAA empowers enterprises to overcome the challenges related to delivering business applications over the Internet by placing all of the application delivery capabilities within the Akamai Intelligent Platform™, which means the optimizations are distributed globally and located closer to users and data centers around the world. WAA is designed to provide performance and availability that drive application adoption and productivity – and requires no hardware, software, or code changes.
Visit us to learn more: http://www.akamai.com/html/solutions/web-application-accelerator.html
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Akamai Technologies
Site Shield "cloaks" a website from the public Internet – designed to protect the origin by effectively removing it from the Internet-accessible IP address space, adding a layer of security protection while still ensuring that content is delivered quickly and without fail, regardless of end user location. Site Shield complements the existing site security infrastructure that protects a site's origin and leverages Akamai's advanced site acceleration technologies and globally distributed Akamai Intelligent Platform™.
Visit us to learn more: http://www.akamai.com/html/solutions/site-shield.html
Kona Web Application Firewall Product Brief - Application-layer defense to pr...Akamai Technologies
Kona Web Application Firewall provides always-on and highly scalable protection against web application attacks including SQL injections, cross-site scripting and remote file inclusion – while keeping application performance high. By leveraging the globally distributed Akamai Intelligent Platform™ Kona Web Application Firewall scales automatically to defend against massive application attacks and frees companies from the complexities and investment in dedicated hardware. Akamai’s Threat Intelligence Team continuously refines Kona WAF rules for known website attacks and responds to new threats as they emerge.
Visit us to learn more: http://www.akamai.com/html/solutions/web-application-firewall.html
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images