Learn more about what The Cloud is (and isn't) with an easy introduction to Microsoft Office365. Learn how Office365 can power your business by reducing costs and increasing efficiency.
Typical disaster recovery plans leverage backup and/or replication to move data out of the primary data center and to a secondary site. Historically, the secondary site is another data center that the organization maintains. But now, companies are looking to the cloud to become a secondary site, leveraging it as a backup target and even a place to start their applications in the event of a failure. The problem with this approach is that it merely simulates a legacy design and presents some significant recovery challenges.
KEYNOTE: Edge optimized architecture for fabric defect detection in real-timeShuquan Huang
In textile industry, fabric defect relies on human inspection traditionally, which is inaccurate, inconsistent, inefficient and expensive. There were automatic systems developed on the defect detection by identifying the faults in fabric surface using the image and video processing techniques. However, the existing solution has insufficiencies in defect data sharing, backhaul interconnect, maintenance and etc. By evolving to an edge-optimized architecture, we can help textile industry improve fabric quality, reduce operation cost and increase production efficiency. In this session, I’ll share:
What’s edge computing and why it’s important to intelligence manufacturing
What’s the characteristics, strengths and weaknesses of traditional fabric defect detection method
Why textile industry can benefit from edge computing infrastructure
How to design and implement an edge-enabled application for fabric defect detection in real-time
Insights, synergy and future research directions
The term ‘Cloud’ is used extensively in technology circles, meaning different things to different people. But what does the ‘Cloud’ mean for email?
Andrew and Nigel, discuss the opportunities and dangers presented by ‘Cloud’ computing. Where can the ‘Cloud’ add value to our business, and reduce spiralling costs? Are there cases when handing over your data / messaging services isn’t such a good idea? How can we pick and choose the best bits of the ‘Cloud’ whilst retaining control? And what is the ‘Cloud’, really…?
Learn more about what The Cloud is (and isn't) with an easy introduction to Microsoft Office365. Learn how Office365 can power your business by reducing costs and increasing efficiency.
Typical disaster recovery plans leverage backup and/or replication to move data out of the primary data center and to a secondary site. Historically, the secondary site is another data center that the organization maintains. But now, companies are looking to the cloud to become a secondary site, leveraging it as a backup target and even a place to start their applications in the event of a failure. The problem with this approach is that it merely simulates a legacy design and presents some significant recovery challenges.
KEYNOTE: Edge optimized architecture for fabric defect detection in real-timeShuquan Huang
In textile industry, fabric defect relies on human inspection traditionally, which is inaccurate, inconsistent, inefficient and expensive. There were automatic systems developed on the defect detection by identifying the faults in fabric surface using the image and video processing techniques. However, the existing solution has insufficiencies in defect data sharing, backhaul interconnect, maintenance and etc. By evolving to an edge-optimized architecture, we can help textile industry improve fabric quality, reduce operation cost and increase production efficiency. In this session, I’ll share:
What’s edge computing and why it’s important to intelligence manufacturing
What’s the characteristics, strengths and weaknesses of traditional fabric defect detection method
Why textile industry can benefit from edge computing infrastructure
How to design and implement an edge-enabled application for fabric defect detection in real-time
Insights, synergy and future research directions
The term ‘Cloud’ is used extensively in technology circles, meaning different things to different people. But what does the ‘Cloud’ mean for email?
Andrew and Nigel, discuss the opportunities and dangers presented by ‘Cloud’ computing. Where can the ‘Cloud’ add value to our business, and reduce spiralling costs? Are there cases when handing over your data / messaging services isn’t such a good idea? How can we pick and choose the best bits of the ‘Cloud’ whilst retaining control? And what is the ‘Cloud’, really…?
Opportunity Cost — How Cloud Changes the TCO of Data, AnalyticsInside Analysis
Hot Technologies with Lyndsay Wise, Dr. Robin Bloor and Teradata
Live Webcast Feb. 11, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=0c853144c649389f544bcca5dbde8caa
Most executives realize the promise of Cloud, but often underestimate the total cost of ownership for moving information systems off-premise. On the plus side, the Cloud offers agility, scalability, lower initial costs, ease of maintenance and minimal staffing needs. But control is diminished and overall complexity increases, sometimes significantly. If not managed carefully, any large-scale move to the Cloud can create a host of new, often intractable challenges.
Register for this episode of Hot Technologies to learn from veteran analysts Lyndsay Wise and Dr. Robin Bloor, along with Marc Clark of Teradata, as they discuss cost analysis and benefits of moving to the cloud. They will cover key components that organizations often face when considering Cloud deployments, framed within the context of TCO and designed to demonstrate the differences between on-premise and cloud environments.
Visit InsideAnalysis.com for more information.
Webinar: Which Storage Architecture is Best for Splunk Analytics?Storage Switzerland
We discuss the pros and cons of the three most common storage architectures for Splunk, enabling you to decide which makes the most sense for your organization.
1. Leverage existing storage resources
2. Deploy a cloud storage and SaaS solution
3. Deploy a hybrid, Splunk-ready solution
Disaster Recovery is an expensive proposition. But since the consequences of not being prepared for a disaster are so severe, it is an expense that organizations make. But that’s not to say organizations are not always looking for way to do DR better, faster and for less money. In this live webinar join Storage Switzerland and ClearSky to learn how organizations can lower the cost of DR preparation and execution.
Cloud outages are inevitable. And when they occur, they make headlines. In this session, Veritas cloud experts will discuss best practices for detecting and proactively mitigating uptime risks, meeting strict service-level objectives, and recovering business services quickly and confidently in complex multi-cloud environments.
Accelerate your digital business transformation with 360 Data ManagementVeritas Technologies LLC
As infrastructure continues to become more commoditized and abstracted, IT organizations are actively shifting their focus from managing infrastructure to managing information. This session will provide a detailed introduction to 360 Data Management, Veritas' vision for how IT organizations should think about and deploy data management technologies as they work to modernize and embrace this important shift. Veritas experts will reveal the six pillars of 360 Data Management – and talk about how IT leaders can take advantage of the Veritas 360 Data Management Suite to accelerate their digital business transformation.
This session was originally delivered at Veritas' Vision 2017 on Tuesday, Sep 19, 4:30 PM - 5:30 PM.
Benefits to using private cloud storage providersRonit Sharma
In comparison to external storage devices, cloud storage, a. t. a. online storage providers in Delhi, Mumbai, Noida offers a complete data backup and restore solution to customers. Much like computers, exterior storage devices are also susceptible to catastrophic problems, hardware problems, and disease infections. Storage Provider in delhi, mumbai and noida - http://www.smartstream.co.in
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Veritas Technologies LLC
Misperceptions around data ownership and responsibility of data management in the public cloud are plenty, but not everyone is fully aware of them. We may take things like data backup and application resiliency in the cloud for granted, but maybe this is false-confidence? In this session, we identify the top cloud misperceptions that can punish your success, as well as talk about ways to mitigate these risks with solutions you can take advantage of today.
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudVeritas Technologies LLC
Is your organization looking for a more efficient, cost-effective way to use public and private cloud storage as a backup target? Attend this session to find out how CloudCatalyst can help--by providing deduplication of backup data to object storage environments in both public and private clouds. You'll learn how you can use CloudCatalyst to achieve petabyte scale with minimal cache storage requirements, transfer data from a NetBackup Dedupe Media Server without going through a rehydration process, and much more. Don't miss this chance find out exactly how CloudCatalyst provides the most efficient and cost-effective backups from a data center, to the cloud, or in the cloud.
Eliminate the need for additional media servers and reduce your data footprint. NetBackup is truly the “King of Scale,” with the ability to protect 1000s of VMs. Direct integration with Veritas Data Insight and Availability Solutions solves challenges around copy sprawl and information insight.
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...Veritas Technologies LLC
Explore best practices around the following use cases related to the Microsoft Azure platform: Long-term retention of data in the cloud, migration of critical workloads including those running in VMware and Hyper-V, and resiliency of business services running in the cloud. Each of these scenarios are part of what Veritas 360 data management in the cloud can provide. Learn the best way to design, deploy, and manage within each of these scenarios on Azure, and gain key insights into how to avoid pitfalls of common practices and how to boost your cloud ROI – demonstrated via a reference architecture.
There is a lot of talk in technology circles about 'the Cloud' these days. Wondering what it means for you and your business systems? While this new era of cloud computing can bring benefits to your organization these need to be weighed against the risks.
Learn from experts what is really happening today and what you should be considering for the future.
Opportunity Cost — How Cloud Changes the TCO of Data, AnalyticsInside Analysis
Hot Technologies with Lyndsay Wise, Dr. Robin Bloor and Teradata
Live Webcast Feb. 11, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=0c853144c649389f544bcca5dbde8caa
Most executives realize the promise of Cloud, but often underestimate the total cost of ownership for moving information systems off-premise. On the plus side, the Cloud offers agility, scalability, lower initial costs, ease of maintenance and minimal staffing needs. But control is diminished and overall complexity increases, sometimes significantly. If not managed carefully, any large-scale move to the Cloud can create a host of new, often intractable challenges.
Register for this episode of Hot Technologies to learn from veteran analysts Lyndsay Wise and Dr. Robin Bloor, along with Marc Clark of Teradata, as they discuss cost analysis and benefits of moving to the cloud. They will cover key components that organizations often face when considering Cloud deployments, framed within the context of TCO and designed to demonstrate the differences between on-premise and cloud environments.
Visit InsideAnalysis.com for more information.
Webinar: Which Storage Architecture is Best for Splunk Analytics?Storage Switzerland
We discuss the pros and cons of the three most common storage architectures for Splunk, enabling you to decide which makes the most sense for your organization.
1. Leverage existing storage resources
2. Deploy a cloud storage and SaaS solution
3. Deploy a hybrid, Splunk-ready solution
Disaster Recovery is an expensive proposition. But since the consequences of not being prepared for a disaster are so severe, it is an expense that organizations make. But that’s not to say organizations are not always looking for way to do DR better, faster and for less money. In this live webinar join Storage Switzerland and ClearSky to learn how organizations can lower the cost of DR preparation and execution.
Cloud outages are inevitable. And when they occur, they make headlines. In this session, Veritas cloud experts will discuss best practices for detecting and proactively mitigating uptime risks, meeting strict service-level objectives, and recovering business services quickly and confidently in complex multi-cloud environments.
Accelerate your digital business transformation with 360 Data ManagementVeritas Technologies LLC
As infrastructure continues to become more commoditized and abstracted, IT organizations are actively shifting their focus from managing infrastructure to managing information. This session will provide a detailed introduction to 360 Data Management, Veritas' vision for how IT organizations should think about and deploy data management technologies as they work to modernize and embrace this important shift. Veritas experts will reveal the six pillars of 360 Data Management – and talk about how IT leaders can take advantage of the Veritas 360 Data Management Suite to accelerate their digital business transformation.
This session was originally delivered at Veritas' Vision 2017 on Tuesday, Sep 19, 4:30 PM - 5:30 PM.
Benefits to using private cloud storage providersRonit Sharma
In comparison to external storage devices, cloud storage, a. t. a. online storage providers in Delhi, Mumbai, Noida offers a complete data backup and restore solution to customers. Much like computers, exterior storage devices are also susceptible to catastrophic problems, hardware problems, and disease infections. Storage Provider in delhi, mumbai and noida - http://www.smartstream.co.in
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Veritas Technologies LLC
Misperceptions around data ownership and responsibility of data management in the public cloud are plenty, but not everyone is fully aware of them. We may take things like data backup and application resiliency in the cloud for granted, but maybe this is false-confidence? In this session, we identify the top cloud misperceptions that can punish your success, as well as talk about ways to mitigate these risks with solutions you can take advantage of today.
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudVeritas Technologies LLC
Is your organization looking for a more efficient, cost-effective way to use public and private cloud storage as a backup target? Attend this session to find out how CloudCatalyst can help--by providing deduplication of backup data to object storage environments in both public and private clouds. You'll learn how you can use CloudCatalyst to achieve petabyte scale with minimal cache storage requirements, transfer data from a NetBackup Dedupe Media Server without going through a rehydration process, and much more. Don't miss this chance find out exactly how CloudCatalyst provides the most efficient and cost-effective backups from a data center, to the cloud, or in the cloud.
Eliminate the need for additional media servers and reduce your data footprint. NetBackup is truly the “King of Scale,” with the ability to protect 1000s of VMs. Direct integration with Veritas Data Insight and Availability Solutions solves challenges around copy sprawl and information insight.
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...Veritas Technologies LLC
Explore best practices around the following use cases related to the Microsoft Azure platform: Long-term retention of data in the cloud, migration of critical workloads including those running in VMware and Hyper-V, and resiliency of business services running in the cloud. Each of these scenarios are part of what Veritas 360 data management in the cloud can provide. Learn the best way to design, deploy, and manage within each of these scenarios on Azure, and gain key insights into how to avoid pitfalls of common practices and how to boost your cloud ROI – demonstrated via a reference architecture.
There is a lot of talk in technology circles about 'the Cloud' these days. Wondering what it means for you and your business systems? While this new era of cloud computing can bring benefits to your organization these need to be weighed against the risks.
Learn from experts what is really happening today and what you should be considering for the future.
A popular pattern today is the injection of declarative (or functional) mini-languages into general purpose host languages. Years ago, this is what LINQ for C# was all about. Now there are many more examples such as the Spark or Beam APIs for Java and Scala. The opposite embedding is also possible: start with a declarative (or functional) language as the outer host and then embed a general purpose language. This is the path we took for Scope years ago (Scope is a Microsoft-internal big data analytics language) and have recently shipped as U-SQL. In this case, the host language is close to T-SQL (Transact SQL is Microsoft’s SQL language for SQL Server and Azure SQL DB) and the embedded language is C#. By embedding the general purpose language in a declarative language, we enable all-of-program (not just all-of stage) optimization, parallelization, and scheduling. The resulting jobs can flexibly scale to leverage thousands of machines.
(STG308) How EA, State Of Texas & H3 Biomedicine Protect DataAmazon Web Services
In this session, learn how enterprise customers use AWS storage services to address different storage requirements. Learn how Electronic Arts and H3 Biomedicine manage their data flow from on-premises systems to the cloud, giving them a centralized build system and storage flexibility by leveraging enterprise storage gateways. The State of Texas uses AWS and partner solutions to modernize and secure their office file services, and backup and recovery systems, achieving dramatic savings and productivity gains without compromising IT efficiency.
Second edition of this popular interactive workshop, this time we focussed on the new “Windows Azure Accelerator for Umbraco” CodePlex project.
Topics
Web & Worker Role
Virtual Machine sizes & performance
Storage Types: Blobs, Tables, Azure SQL, queues
No local persistant storage
Network Load Balancing (round robin)
Scale out to multiple instances
Multiples websites in one Azure account
Azure Content Delivery Network
Swap between development & production environments
Typical monthly costs to host Umbraco site
Q&A
IoT Architecture - are traditional architectures good enough?Guido Schmutz
Independent of the source of data, the integration of event streams into an Enterprise Architecture gets more and more important in the world of sensors, social media streams and Internet of Things. Events have to be accepted quickly and reliably, they have to be distributed and analysed, often with many consumers or systems interested in all or part of the events. Dependent on the size and quantity of such events, this can quickly be in the range of Big Data. How can we efficiently collect and transmit these events? How can we make sure that we can always report over historical events? How can these new events be integrated into traditional infrastructure and application landscape?
Starting with a product and technology neutral reference architecture, we will then present different solutions using Open Source frameworks and the Oracle Stack both for on premises as well as the cloud.
This is a 2 hour strategy workshop developed by Predrag Mitrovic (http://mynethouse.se and http://cloudadvisor.se).
The workshop is intended for CIOs and roles close to business strategy formulation around technology. Feel free to use the material and develop it further, as long as you give me access to the updated materials.
Any questions can be directed to my e-mail: predrag[at]mynethouse.se
I hope that you enjoy this material and find it useful.
/Predrag a.k.a Cloud Advisor
Cloud computing redefines the way we deliver and use services to support the creation of business value. This change in delivery shifts the way data centres provide applications and infrastructure support to users. Like any major IT project, migrating from a traditional IT Infrastructure to a Cloud environment is not an exercise to be taken lightly.
Whether you are planning to running a private, public or hybrid cloud service in your organisation this presentation will help you prepare a cloud ready data centre and enable you to assess & prioritise your workload migration.
How Cloud Computing Will Transform Information ManagementKnowledge Cue
At the Information Management Summit held in February Jane Cope presented a session entitled “Will Cloud computing transform Information Management” in which she discussed the types of cloud options and the pros and cons. The gist was that moving to cloud won’t change Information Management, but it will influence and impact the way in which we work, and subsequently the way in which we manage our data which fuels information management.
Introduction to Modern Data Virtualization (US)Denodo
Watch full webinar here: https://bit.ly/3uyvxN5
“Through 2022, 60% of all organizations will implement data virtualization as one key delivery style in their data integration architecture," according to Gartner. What is data virtualization and why is its adoption growing so quickly? Modern data virtualization accelerates that time to insights and data services without copying or moving data.
Watch this webinar to learn:
- Why organizations across the world are adopting data virtualization
- What is modern data virtualization
- How data virtualization works and how it compares to alternative approaches to data integration and management
- How modern data virtualization can significantly increase agility while reducing costs
- How to easily get started with Denodo Standard 8.0
Similar to Andy Blumenthal Talks About Cloud Computing (20)
The Biggest Threat to Western Civilization _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
Article in The Times of Israel by Andy Blumenthal: China and Russia are commonly considered the biggest military threats to Western civilization, but I believe that is incorrect. The biggest strategic threat is a terrorist Jihadi Caliphate.
Don't Be So Humble; You're Not That Great _ Andy Blumenthal _ The Blogs.pdfAndy (Avraham) Blumenthal
Article in The Times of Israel by Andy Blumenthal: Judaism teaches that our mission in life is to connect to G-d, the source of all. In connecting to the source, we are supposed to empty ourselves of vanity and materialism so that we can be filled with the Divine holiness.
Article in The Times of Israel by Andy Blumenthal: Right now, hate-filled anarchists, Marxists, and radicals are foaming and frothing at the mouth, very sure of themselves, and giving phony press conferences, posting “legal observers,” and surrounding and terrorizing innocent people, while the authorities and law enforcement seem to do little to nothing.
Every one of these bad actors has had their fun and lived out their fantasy of independence and “saving the world” (not!) and now it is time when they will pay the piper for their knowing misdeeds. The parents, institutions, “professors,” and our politicians need to wake up now, restore truth and order, and salvage what is left of the shattered credibility and lives of these unfortunate and misguided souls.
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
Article in The Times of Israel by Andy Blumenthal: This is not about free speech but about a takeover of America. These vile terrorist supporters are using our very Constitution against us as they falsely cry Islamophobia and free speech, all the while impeding, threatening, and committing acts of violence against students, citizens, and an orderly democracy. It is time for Americans to stop being complacent or fooled by their terrorist talking points and rhetoric of hate, racism, and Communist ideology. In the face of this evil, we are finally seeing Patriots emerge, proudly carrying and defending the American flag, singing the Star-Spangled Banner, and boldly chanting USA!
Article in The Times of Israel by Andy Blumenthal: On college campuses across America, why do we hear "free Palestine" but not "free Ukraine" when the Ukrainian issue is so much larger and more deadly?
Article in The Times of Israel by Andy Blumenthal: This year at Passover seder, I had the privilege to sit next to an elderly Jewish lady, whom I’ll call Esther. We sat together at a Chabad seder, and on the wall next to us was a beautiful painting of the Rebbe.
My wife and I were spellbound by his lifelike holy image, especially his knowing, piercing blue eyes. In fact, we joked that it would be funny if the eyes started to move back and forth in the painting. Esther, who was sitting directly next to me, overheard us and proceeded to tell me some amazing stories about the Rebbe, which I am pleased to be able to share with all of you.
Article in The Times of Israel by Andy Blumenthal: We have all been following the horrific news and video clips coming out of our American universities of blatant antisemitism coupled with intimidation, harassment, barring of access, and violence from Hamas terrorist protesters against Jewish students and faculty under the false guise of blaring calls for Palestinian freedom “from the river to the sea.”
As our enemies gleefully chant, “There is only one solution, intifada revolution” and “by any (violent, abhorrent) means necessary,” we must answer with our “one solution” and that is to hold accountable the corrupt and even criminal institutions and leadership that are openly permitting this to occur.
Article in The Times of Israel by Andy Blumenthal: Modern-day anti-Semitism has taken the form of pro-Hamas supporters on our campuses and in our cities who pretend that they are fighting against colonialism and an occupation of Palestine. They strategically disguise their Jew-hatred by falsely portraying themselves as the victims of oppression. Instead of showing themselves as the vile racists that they are, they attempt to hide as wolves in sheep's clothing. They do this to try and get the world's sympathy and take the mantle of morality and legitimacy through lies and distortion. In so doing, they can call for resistance, intifada, and jihad, and "by any (murderous and abhorrent) means necessary," all the while pretending to be virtuous.
Article in The Times of Israel by Andy Blumenthal: One of the great issues in dealing with life is what happens when we die. Is it “game over” and we are gone for good, or as Jews we believe that while our bodies die, our souls live on in eternity with Hashem. However, another scenario to deal with is if we still have imperfections that we need to work on, does G-d bring us back again through the reincarnation of our souls (“Gilgul Neshamot”) to continue the process of learning, growth, and perfecting ourselves?
Article in The Times of Israel by Andy Blumenthal: Day after day, week after week now, we see the vile Hamas terrorist supporters acting out in public, screaming, cursing, threatening, blocking, harassing, burning flags, pushing, prodding, and violently attacking others (i.e., Zionists and Jews). In any normal situation, the police would be there protecting the innocent, stopping the harassment, and arresting the violent agitators. But these days, what do we see? The police seem to be doing virtually nothing to stop them.
Without any serious consequences from our law enforcement, courts, or politicians, we can expect things to continue to escalate and get more dangerous.
Article in The Times of Israel by Andy Blumenthal: Since October 7, it has become almost a daily chorus by Hamas and their supporters around the world condemning Israel for “occupation.” However, if you really examine the facts, it becomes clear that the word occupation is nothing more than propaganda and a tool of radical Islam for hate, intifada, jihad, and terrorism.
Article in The Times of Israel by Andy Blumenthal: There are countless shakeups and wake-up calls of life that span from small to large crises that test our faith and ability to cope. In whatever circumstances we find ourselves, it's not about escaping from the difficulties, but finding G-d even when he seems absent or hidden from us. G-d is there, and so is a path toward overcoming the challenges, sanctifying our lives, and finding our meaning and significance.
Article in The Times of Israel by Andy Blumenthal: Tick-tock.
The days are, oh, so long.
The years of the past now seem so short.
I am waiting for salvation.
In my heart, I pray over and over:
“Blessed are You, L-rd our G-d,
King of the Universe,
Who sets free those in bonds.”
I know you are coming to rescue me.
I am waiting for you.
The Topsy Turvy World of Baby Killers and Nazis _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
Article in The Times of Israel by Andy Blumenthal: One of the toughest things to bear is when our enemies hypocritically use psychological projection and try to turn the tables, calling us "Baby Killers," "Rapists," and "Nazis," when this is exactly the criminal behavior that the Hamas terrorists perpetrated at the October 7 massacre in Southern Israel.
For Israel, it's as if being barbarically attacked and victimized with the rape and mutilation of women, beheadings and burnings of babies, and murders and abductions of young and old aren't enough. But then to suffer the grotesque turning of reality on its head by having the perpetrators of these crimes call you out as the aggressor is beyond imagination.
As we approach the Jewish holiday of Purim, we have to maintain our ultimate faith in the Almighty that those corrupt evildoers who seek our destruction "by any means necessary" will ultimately themselves face justice like the evil Haman (perhaps the forefather of Hamas).
Article in The Times of Israel by Andy Blumenthal: What blind love and hate do have in common is an irrational mob mentality that destroys one's ability to think rationally and morally. When you either deprive people of real information and outside perspectives, brainwash them, or create a sense of baseless fear and anger, you can bring out a real destructive side of humanity that borders on the psychotic and sociopathic. Thus, when people get back to their family, friends, and "real life," similar to when Hitler was killed and the Nazis and their propaganda machine were defeated, then perspective and normalcy could return. This is why it's so important to fight the fake news and brainwashing that are so prevalent right now.
In the end, love is not actually blind, but hate most certainly is completely blind, deaf, and utterly dumb.
Article in The Times of Israel by Andy Blumenthal: Foes are turned into friends.
Families grow rather than attend early funerals.
Communities bustle and prosper rather than lie as dying evacuated ghost towns.
We all become part of a community of nations working to solve life's biggest problems, instead of planning how to maim and kill each other with greater pinpoint accuracy and effect.
Article in The Times of Israel by Andy Blumenthal: We know that Israel wants more than anything to live in peace and that they have tried virtually everything to make peace with their neighbors, including multiple offerings of a state for the Palestinians (and even giving in to practically their every demand, often to the Israelis own detriment), only to meet with one repeated rejection after another reiterating the Arab League's Khartoum Resolution: "no peace with Israel, no negotiation with Israel, and no recognition of Israel."
After October 7, the deadly abuse absolutely could not continue any longer.
There is a time to walk away and a time for necessary action.
Article in The Times of Israel by Andy Blumenthal: While there are many factors that contribute to our national success, certainly if we are going to be able to confront the challenges we face both at home and abroad, we must have strong and courageous leadership. Not only to unite us but also to evoke our very best, we need leadership that commands respect from both left and right, with a mighty and passionate vision that moves us not only to farseeing human progress but equally to moral righteousness. With this, we can instill pride in both who we are and where we are going and not be in fear of what’s threatening our streets or our shores anymore.
Article in The Times of Israel by Andy Blumenthal: In my opinion, the only tactical way to rescue the hostages is to locate and map the tunnel they are hiding in and then gas them all to sleep. The gas would need to be carefully regulated so as not to alert the terrorists that it is being used and not to harm the hostages. The gas needs to be odorless and colorless (like nitrous oxide) to camouflage its use, and the Israeli commandos will need to be hairpin-ready to blow the blast doors and get in to rescue the hostages.
Article in The Times of Israel by Andy Blumenthal: Everything that happens in this world has not only a physical dimension but a spiritual one as well. Our very existence is a combination of body and soul, so naturally they work together in tandem. And our physical well-being must be matched by our spiritual alignment with God.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
4. Office of Science and Technology
Essential Characteristics of Cloud (NIST)
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
5. Office of Science and Technology
A Continuum Of IT Services Provision
In-House
Outsourced
Tenancy
Service Provision
Single
Internal/Self
Ownership of IT
Control
Efficient/”Green”
(Sharing)
Public Cloud
Multi
External/Others
Customer
Vendor (Subscription Model)
High ✓
Medium
Low
Very Low
Low
Medium
High
Very High
(Resource Pooling)✓
Speed to Set-up
New Services
Slower
Cost
Flexible to Meet
Demand Change
Hosted
Faster (Self-service, Standards,
Centralized C&A…)✓
High
Low
Medium
Medium
Low (pay as go) ✓
High (On-Demand) ✓
6. Office of Science and Technology
Cloud Computing Services
SaaS
(End-user Apps)
PaaS
(Integrated Development
Environment)
IaaS
(Server, Database, Storage)
11. Office of Science and Technology
Recent Government Milestones
March 2010
May 2010
October 2010
November 2010
December 2010
• Los Angeles
(30,000 users) first
U.S. city to
announce move of
email to Cloud
• Recovery.Gov
federal website
implemented in the
cloud.
• NYC (30,000 users)
announces moving
email to cloud and
Army (1.6 million
users) announces
moving email to
DISA cloud
• DOI (88,000 users)
sued by Google
over Microsoft cloud
agreement
• GSA (17,000 users)
and USDA
(120,000) first
federal agencies to
move email to
Cloud