The document discusses the potential for an alternative approach to cloud computing that gives more control to non-profit organizations. It outlines some of the benefits of cloud technology while also noting concerns around loss of control over data and infrastructure. The author advocates for non-profits to take an intentional approach to cloud migration, prioritizing open standards and solutions that respect organizational sovereignty and values like privacy and security. By adopting principles like collective buying power and shared responsibility, the document argues another model of cloud computing is possible that puts non-profits' needs first.
Navigating through the cloud SPUSC 2011 -Rob Livingstone KeynoteLivingstone Advisory
South Pacific User (Universities) Services Conference - Keynote address delivered by Rob Livingstone ( http://tiny.cc/74nri ) on Cloud Computing - Navigating through the Cloud
For individuals and small business, Cloud computing via the internet offers unprecedented access to systems, software and technologies, previously restricted to the corporate world, at little or no cost.
But for mid-sized and large organisations the reality of adopting Cloud computing presents a whole new set of costs, risks and governance implications, quite different to those in traditional in-house IT systems.
This public lecture provides a concise, plain English overview of Cloud computing and what it means for businesses in Australia. It explores the privacy, security, commercial, regulatory, cost, risk and internal governance challenges that organisations, as well as the wider community, should be aware of.
Rob Livingstone is a fellow of the UTS Faculty of Engineering and Information Technology and consults widely to industry. His professional experience spans 33 years in the corporate sector as a manager and strategist, with the past 16 spent as CIO in multinationals based in Oceania - most recently Ricoh. Rob has held strategic advisory and executive roles both locally and internationally in defense-aerospace, manufacturing, public utility, packaging, construction and logistics. He possesses a clear understanding of the financial, operational, risk, commercial and human factors comprising modern corporations and offers insight to managers of small to medium-sized companies as well as multinationals on how IT can bring value to business and its customers. He is author of Navigating through the Cloud.
Introduced by Caroline Bucknell, General Manager, CIO Executive Council.
UTSpeaks: is a free public lecture series presented by UTS experts discussing a range of important issues confronting contemporary Australia.
How Global Data Availability Accelerates Collaboration And Delivers Business ...Dana Gardner
A transcript of a discussion that explores how comprehensive and global data storage access delivers the rapid insights businesses need for digital business transformation.
When you’re planning to move to the cloud and manage a hybrid environment, security is a top concern. But cloud is not necessarily less secure than a traditional environment. In fact, it may be possible to deliver even greater security in a hybrid cloud environment because it offers new and advanced opportunities.
In this eBook, you’ll discover how hackers are using traditional tactics in new ways to attack the cloud. You’ll also find out how the cloud can help you increase security with innovative approaches designed to detect threats long before they threaten your enterprise.
In this eBook, we will uncover the specifics of how a
hybrid cloud solution can transform IT management so
that you can become the leader your business needs.
We will compare traditional and hybrid requirements with
respect to three critical areas: how you’ll govern the
system, the management tools you’ll need, and what
your management opportunities will be.
Navigating through the cloud SPUSC 2011 -Rob Livingstone KeynoteLivingstone Advisory
South Pacific User (Universities) Services Conference - Keynote address delivered by Rob Livingstone ( http://tiny.cc/74nri ) on Cloud Computing - Navigating through the Cloud
For individuals and small business, Cloud computing via the internet offers unprecedented access to systems, software and technologies, previously restricted to the corporate world, at little or no cost.
But for mid-sized and large organisations the reality of adopting Cloud computing presents a whole new set of costs, risks and governance implications, quite different to those in traditional in-house IT systems.
This public lecture provides a concise, plain English overview of Cloud computing and what it means for businesses in Australia. It explores the privacy, security, commercial, regulatory, cost, risk and internal governance challenges that organisations, as well as the wider community, should be aware of.
Rob Livingstone is a fellow of the UTS Faculty of Engineering and Information Technology and consults widely to industry. His professional experience spans 33 years in the corporate sector as a manager and strategist, with the past 16 spent as CIO in multinationals based in Oceania - most recently Ricoh. Rob has held strategic advisory and executive roles both locally and internationally in defense-aerospace, manufacturing, public utility, packaging, construction and logistics. He possesses a clear understanding of the financial, operational, risk, commercial and human factors comprising modern corporations and offers insight to managers of small to medium-sized companies as well as multinationals on how IT can bring value to business and its customers. He is author of Navigating through the Cloud.
Introduced by Caroline Bucknell, General Manager, CIO Executive Council.
UTSpeaks: is a free public lecture series presented by UTS experts discussing a range of important issues confronting contemporary Australia.
How Global Data Availability Accelerates Collaboration And Delivers Business ...Dana Gardner
A transcript of a discussion that explores how comprehensive and global data storage access delivers the rapid insights businesses need for digital business transformation.
When you’re planning to move to the cloud and manage a hybrid environment, security is a top concern. But cloud is not necessarily less secure than a traditional environment. In fact, it may be possible to deliver even greater security in a hybrid cloud environment because it offers new and advanced opportunities.
In this eBook, you’ll discover how hackers are using traditional tactics in new ways to attack the cloud. You’ll also find out how the cloud can help you increase security with innovative approaches designed to detect threats long before they threaten your enterprise.
In this eBook, we will uncover the specifics of how a
hybrid cloud solution can transform IT management so
that you can become the leader your business needs.
We will compare traditional and hybrid requirements with
respect to three critical areas: how you’ll govern the
system, the management tools you’ll need, and what
your management opportunities will be.
Enterprise IT is transitioning from the use of traditional on-premise data centers to hybrid cloud environments. As a result, we’re experiencing a paradigm shift in the way we must think about and manage enterprise security. From Four Walls to No Walls Until now, the conventional view on IT security has been that applications and data are safe because they’re physically housed within the confines of a company’s data center walls using company-owned equipment. So, it’s not surprising that many decision makers perceive greater risks as they trade physical assets for cloud-based solutions.
Through our partnerships with leading cloud providers, we are able to offer hybrid, private and public cloud solutions. At Epoch Universal, we supply cloud the way you want it with deep control, extreme performance, and broad customization capabilities. When you join the Epoch Universal fold, you take back the keys to your kingdom. Reign as supreme commander in chief of your cloud. No compromises. No exceptions.
The What, the Why and the How of Hybrid CloudHybrid Cloud
In this white paper we discuss what hybrid cloud is, why it’s inevitable, and how to take advantage of it. We look at some of the barriers to public-cloud adoption, while we cut through unnecessary technicalities to get to the heart of the matter. We also offer a brief overview of the sponsor of this paper and their relevant solutions.
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
This research analysis will go over the various encryption methods and summarize the previous research in encryption that has been done to this point. The advantages of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency. As encryption becomes more advanced, so the need for proper key management increases as well. This paper will conclude with a look at what could be the future of cloud encryption, Homomorphic Encryption.
Shared responsibility - a model for good cloud securityAndy Powell
An overview of the shared responsibility model that is typically adopted by cloud providers and its impact on the way that Jisc members should build secure solutions in public cloud.
Is your infrastructure holding you back?Gabe Akisanmi
This ebook will help you connect the dots between
today’s biggest business opportunities and the specific
technology required to seize them. You’ll get the facts
you need to identify where current components may
be falling short—and how the right investments in infrastructure
can lead to better business outcomes while
strengthening your role as a strategic consultant within
your organization.
Are You Leveraging the Cloud? Or is it Leveraging You?Tom Mumford
To lead your team and mitigate risk, leveraging the cloud in a unified and secure manner is achievable. View the cloud as an enabler to reaching new heights. Technology for everyone!
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research
in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are
slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
Study on Secure Cryptographic Techniques in Cloudijtsrd
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42363/study-on-secure-cryptographic-techniques-in-cloud/mariam-fatima
Enterprise IT is transitioning from the use of traditional on-premise data centers to hybrid cloud environments. As a result, we’re experiencing a paradigm shift in the way we must think about and manage enterprise security. From Four Walls to No Walls Until now, the conventional view on IT security has been that applications and data are safe because they’re physically housed within the confines of a company’s data center walls using company-owned equipment. So, it’s not surprising that many decision makers perceive greater risks as they trade physical assets for cloud-based solutions.
Through our partnerships with leading cloud providers, we are able to offer hybrid, private and public cloud solutions. At Epoch Universal, we supply cloud the way you want it with deep control, extreme performance, and broad customization capabilities. When you join the Epoch Universal fold, you take back the keys to your kingdom. Reign as supreme commander in chief of your cloud. No compromises. No exceptions.
The What, the Why and the How of Hybrid CloudHybrid Cloud
In this white paper we discuss what hybrid cloud is, why it’s inevitable, and how to take advantage of it. We look at some of the barriers to public-cloud adoption, while we cut through unnecessary technicalities to get to the heart of the matter. We also offer a brief overview of the sponsor of this paper and their relevant solutions.
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
This research analysis will go over the various encryption methods and summarize the previous research in encryption that has been done to this point. The advantages of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency. As encryption becomes more advanced, so the need for proper key management increases as well. This paper will conclude with a look at what could be the future of cloud encryption, Homomorphic Encryption.
Shared responsibility - a model for good cloud securityAndy Powell
An overview of the shared responsibility model that is typically adopted by cloud providers and its impact on the way that Jisc members should build secure solutions in public cloud.
Is your infrastructure holding you back?Gabe Akisanmi
This ebook will help you connect the dots between
today’s biggest business opportunities and the specific
technology required to seize them. You’ll get the facts
you need to identify where current components may
be falling short—and how the right investments in infrastructure
can lead to better business outcomes while
strengthening your role as a strategic consultant within
your organization.
Are You Leveraging the Cloud? Or is it Leveraging You?Tom Mumford
To lead your team and mitigate risk, leveraging the cloud in a unified and secure manner is achievable. View the cloud as an enabler to reaching new heights. Technology for everyone!
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research
in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are
slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
Study on Secure Cryptographic Techniques in Cloudijtsrd
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42363/study-on-secure-cryptographic-techniques-in-cloud/mariam-fatima
Cloud computing: What you need to know as an Australian Finance DirectorLivingstone Advisory
Cloud computing: What you need to know as an Australian Finance Director.
Presentation made to 2nd Annual Future of Cloud Computing in Financial Services Conference in Sydney and Melbourne - September 2011
All rights reserved: FST Media and Rob Livingstone Advisory
Most of us already have a virtual infrastructure already in place. We’re running virtual machines atop a hypervisor, and for the most part enjoying the experience. But there’s always room for improvement. One of those improvements that you can implement today is elevating your simple virtual environment to a real Private Cloud. It’s not difficult, and it leans on the same tools you probably already have. But it does require a different approach to management, and a hard look at supply and demand for resources. Can you quantify how many resources you have? Do you know the exact number your virtual machines are demanding? Is your hardware suited for expansion, or even for the types of high availability a Private Cloud requires? Get the answers to these and many other questions when you attend this half-day workshop with noted VMware Guru Greg Shields. In it, you’ll learn exactly how to construct your own vSphere Private Cloud that exactly meets your needs.
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
originally presented at Mandiant mWise 2023 by Dr Anton Chuvakin of Google Cloud Office of the CISO
Cloud changes everything (does it though?), including how we do threat detection and incident response in the SOC. As we continue to transform our attack surfaces, how do we make sure our detection and response are done "the cloud way"? There were also cases where both business and IT migrated to the cloud, but security was left behind and had to approach cloud challenges with on-premise tools and practices. How should a SOC born before cloud deal with cloud? What to watch for? What changes? What breaks? What stays the same?
The presentation discusses and introduces cloud computing - its history and present challenges.
It also discusses topical cloud-computing related events.
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Black Duck by Synopsys
Black Duck senior technology evangelist Tim Mackey talks containers this week at DevSecCon and elaborates on his presentation, “When Good Containers Go Bad,” with IT Pro, Cloud Pro and Data Centre News. Black Duck VP of Security Strategy Mike Pittenger shares his thoughts on the biggest security threat we face in 2018. Artifex and Hancom settle their long-running open source licensing dispute, and the hidden costs of open source security.
Read all the hottest open source security and cybersecurity news in this week’s Open Source Insight.
It will be a quick intro about Cloud Security Alliance (CSA). Overview of current cloud security research, events and other opportunities are covered. We will touch cloud security related certifications (for professionals and companies that provide cloud offerings)/ CSA Lviv Chapter membership and active participation will be discussed as well.
Streamlining Nonprofit Organizations: It’s All About the Cloud4Good.org
You may have heard people talk about the latest advance in technology: “the cloud.” In this webinar, participants will learn what cloud computing is, how it’s changing our work, and how nonprofit organizations can take advantage of cloud-based services (e.g. Salesforce, Google Docs, Dropbox) to enhance their operations in all parts of their organizations to become more efficient with their limited resources and time.
Participants will see real-life case studies of nonprofit organizations that are using these tools every day. We will offer a survey of cloud-based tools that organizations can use within their own organizations in the areas of cross-organizational management, program management, human resources, marketing and fundraising.
At the end of the webinar, participants will leave with a list of tools and resources for further exploration, and with specific strategies about how to incorporate these tools into their day-to-day work.
Bringing AI to the edge: On-premise Azure Cognitive Services Luis Beltran
Azure Cognitive Services allow developers to build powerful AI-based solutions, enabling different capabilities in our software: vision. speech, search, text analytics, language understanding, and much more. Basically, the model is already built by Microsoft, you just need to do an API call to the Azure cloud and the service retrieves a result. For instance, you send a message and the Text Analytics API returns its sentiment score.
However, there might be cases in which our customers need a local, non-cloud AI solution (either because of limited Internet access or data compliance). This is now possible thanks to the latest update of Azure Cognitive Services, which offers containerization support. Using containers, we can still deliver ML-driven solutions while keeping the data in-house.
In this talk, we'll explore what it takes to configure and use containers in Azure Cognitive Services. Demos will be showcased as well for local Face and Text Cognitive Services.
Threat Hunting, Detection, and Incident Response in the CloudBen Johnson
SaaS and IaaS are new frontiers for a lot of security teams. We'll explore some thoughts at how you might approach some of these areas of your environment from a hunting or IR perspective. This was from a Sans webinar on 2019-09-25.
The following email offers ideas and language you can use as part of your outreach for #GivingTuesday. This can be sent to Board members, staff, donors, and other community partners to get them involved in your campaign. Feel free to copy, paste, or adjust as you see fit for your organisation.
Let's get appy! Engaging mobile audiences through mobile apps Connecting Up
Mobile phone use in Australia is rapidly increasing. If your not-for-profit is considering developing app, you should keep these three key factors in mind.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
#CU12: Another cloud is possible - Allen Gunn at Connecting Up 2012
1. Another Cloud
Is Possible
Allen Gunn, Aspiration
gunner@aspirationtech.org
Twitter: @aspirationtech
aspirationtech.org/publications/manifesto
This material licensed Creative Commons Attribution Share Alike 2.5+
2. What are we talking about?
►What is “The Cloud” and why care?
►What I love (and love less) about cloud
►Case studies on the same
►Pictures real and imagined
►Control of destiny in the cloud
►Security issues in the cloud
►NGO solidarity in the cloud
►Whatever you all want to talk about
3. Who is Aspiration?
►Wework with stakeholders across the
nonprofit software supply chain:
We advise NGO technology decision makers on
how to employ tech sustainably and affordably
We advise vendors and developers on how and
what to build for NGO users
We advise grantmakers on technology strategies
4. Who is Aspiration?
►Most importantly, we support & advise
Nonprofit and Foundation Staff
on how to apply technology
On Their Terms
to
Achieve Impact
in their
Program and Mission Work :^)
5. What is this talk about?
►Movement Solidarity
►Collective Buying Power
►Shared Responsibility
►Paying Attention to Infrastructure
►Looking more than one step ahead
►In short, doing the cloud on your terms, not
somebody else's terms
6. What Is the “IT” Problem?
►IT is damn hard and ever-changing
And it's probably not your core mission
►IT is expensive, hard to cost manage
Tough to budget stuff that keeps changing
►IT staffing is too often a struggle
Tough to find and retain talent
Social and communications skills an issue
Personal hygene also a risk factor
7. What Is the “IT” Problem?
►(Sound of trumpets!)
►“The Cloud” to the rescue!!!
"The Cloud Is Easier"
"The Cloud Saves Time and Money"
"The Cloud Reduces Staffing Needs"
"The Cloud is More Secure"
"The Cloud Tucks Me In At Night"
"The Cloud Slims & Tones Me While I Sleep"
8. What is the Cloud to Us?
►Apps running online, available remotely
Maintained, improved by somebody else
►Data stored on web-accessible servers
Collaboratively edited and curated by
permissioned folks
►Access to all of the above from anywhere you
have internet access
Client devices play a simpler role
Organizations can focus on workflow
9. Things I Love About the Cloud
►Real time collaboration
...co-creating documents on a call...
►Open-ness
Inviting others into my work and thinking
►Focus-ability
Someone else manages technology pieces I don't
want to think about
10. Things I Love About the Cloud
►Availability
e.g. when my primary device and I are in
separate locations
Rich support for “oops, I forgot to bring...”
►Serendipity
Due to all of the above, interesting things just
happen
11. Cloud Changes the Game
►Establishes new collaboration zones
Private places to throw it all together
Relatively “organizational culture neutral”
►Reduces collaboration boundaries
No fighting firewalls for access to servers
►Preserves organizational memory
Across fire drills and turnover
►Drives accountability and transparency
Your laundry is on(the)line
12. Case Study - Mozilla Etherpad
►Etherpad is a collaborative text editor
Like Google Docs without the overhead
►Mozilla uses it for conference call notes
Call host sets up template, shares link
Notes are available in real time, no waiting
Call participants can contribute notes, fixes
Chat feature enables parallel commenting
►Cloud lesson: New Things Are Possible
15. 2011 SF BART Protests
►Activistsused social media and other cloud
platforms to organize, coordinate
Enabled rapid turnout, adaptation of tactics
Dramatic (annoying) successes achieved
So the next time around...
►SF Police cut off internet in stations
Instantly eviscerated the network
Neutralized rapid response, coordination
►Cloud lesson: Have a Plan “B”
16. Let's get conceptual...
►There are 2 ways of envisioning Cloud
The way it is sold
The way it works in practice
...and we've got pictures
►We look at cloud through a lens of
organizational development
Goal: .orgs control their technology destiny
The path to the same is workflow-driven
Our mantra: “Sort the Technology Last”
17. The Cloud of Lore
Source: http://crenk.com/the-cloud-in-the-classroom/
19. Control in the NPTech Cloud
►NGOs should follow cloud strategies that
maximize their control over long-term destiny
►Much comes down to what routes through
your domain name
“Why Facebook=Enterprise #FAIL for us”
http://www.politico.com/news/stories/0910/42364.html
►The game is figuring out what makes sense
to store at what layer of control
20. It's all about the Data
►Tragedy of the NGO financial reality
There are budget line items for software
There are budget line items for hardware
There are budget line items for labor
There are rarely line items for DATA
►Tech is a vessel to story & carry data
As you consider cloud, it's about the DATA
Your DATA is your digital power
Center your cloud thinking on this truth
21. Control in the NPTech Cloud
►We look at the cloud as 4 layers of enterprise
leverage
►(1) Stuff behind your domain name on
remote servers you own and administer
Outside of your walls, it's the highest level of
control
eg, cloud CRM at civicrm.aspirationtech.org
Cloud factor: “meh”, but an essential option to
know you have
22. Control in the NPTech Cloud
►We look at the cloud as 4 layers of enterprise
leverage
►(2) Stuff behind your domain name on
remote servers you contractually control on
terms you like
Someone else handles the lower levels
e.g. our Drupal and Wordpress sites hosted at
www.rochen.com
Cloud factor: “woof”, “yum”, “yay”
23. Control in the NPTech Cloud
►We look at the cloud as 4 layers of enterprise
leverage
►(3) Stuff behind your domain name on
application servers you don't control
e.g. Wordpress.com, Google for Domains
The idealized cloud of “I don't think about IT or
hosting hassles”; limited control
Concerns: Redundancy, long-term support
You “retain” your ability to migrate
Cloud factor: hmmmmm
24. Control in the NPTech Cloud
►We look at the cloud as 4 layers of enterprise
leverage
►(4) Behind “their” domain/”the rest”
A.K.A. “minimal control of your destiny”
Basecamp, Facebook, Bit.ly, YouTube …
Your mileage is guaranteed to vary
If you love yourself, keep local copies of anything
that matters
Cloud factor: psychic required
25. How Most Cloud Companies See
Their Priorities
►#1 Major investors/shareholders
►#2 Major revenue sources
►#3 Primary user bases who drive major
revenues
►#4 Data gleaned from users, revenue
sources to drive follow-on revenues
►…
►#n+1 NGOs, aka "Us"
27. Aspiration's Cloud Fatalism
►Alltech relationships should be predicated on
divorce
►Apply the “Hollywood Marriage” rule:
Nothing tech lasts forever. Nothing.
“Pre-nup thinking” becomes critical
Model for eventual (or sudden) migration
Verify data export on a regular basis
Show restraint towards “lock-in” features
28. Aspiration's Cloud Checklist
►Relationship questions to ask about cloud
options
Can we put it behind our (sub) domain?
Can we talk to other clouds in this relationship?
Who else is this cloud hanging out with?
Can we leave when we want?
Are they like us?
29. Aspiration's Cloud Checklist
►Asset questions to ask...
Can we export our data on demand in open,
complete formats?
Is our data really our data?
Is our data secure, encryptable, private?
Who else can look at our data?
In what legal jurisdiction is our data stored?
What is your policy regarding government
requests for data?
30. Aspiration's Cloud Checklist
►Why ask all these questions???
Because “Single Points of Failure” are not as cool
as they used to be
Most cloud solutions represent uniquely
un-leveraged relationships
There's “looking”, there's “leaping”, and there's
“having a Plan B”, and the sequencing of those
matters
31. Security in the Cloud(s)
►Security of cloud-based systems
There is no simple yes/no answer to the question
of “is it more/less secure?”
The only safe statement is “it is a tradeoff”
►Security is a process, not a state
Redundancy is the golden rule
Develop cloud competency before putting mission
critical data there
Take a “threat matrix” approach when assessing
risk and security
32. Cloud Security: Threat Matrix
►Threat: Data loss
Is your data redundantely backed up? S3?
Have you practiced test restores?
►Threat: Governments
Who are your grantees, where are they?
What jurisdiction does your data live in?
Are you funding in areas of “national security”?
e.g. Immigration?
Let Wikileaks and MegaUpload be lessons
33. Cloud Security: Threat Matrix
►Threat: Intelligence seekers
Who are your opponents and assailants?
Who wants to know more about how and with
who you are working?
►Threat: Disgruntled staff
Have a proactive password policy
Have a smart account ownership protocol
Staff turnover should trigger thorough password
changes
34. Paths to Cloud Security
►Employ redundant multi-vendor backup
And don't forget local download
►Force SSL connections or VPN access
Preclude "snooping" of data and passwords
Assert your expectation of privacy
►Have well-thought-out data policies
Have clear and enforced exclusion and retention
policies for cloud
Understand “3rd party” privacy issues
35. Empower Yourself on Privacy
►Mozilla for User Sovereignty
Collusion - www.mozilla.org/en-US/collusion
Firefox Browser Sync
Mozilla Social Share
►TOR for anonymity
www.torproject.org
Make sure your site works with TOR
►Off-The-Record Messaging
http://www.cypherpunks.ca/otr
37. The Other Thing: The Big “I”
►Online enterprise identity is unsolved
We all manage dozens of credentials
“Fragmented” is an understatement
Battle for control of online identity rages
►The other other “I” thing online
Org identity and individual identity blur
“Can you invite my @GMail, not my @.org”
You need clear policies for distinguishing
38. The Other Thing: The Big “I”
►Judge cloud companies by their primary unit
of identity
Google, Facebook: Centered on The Individual,
aka The Consumer
Basecamp, Salesforce: Centered on The
Organization
►Isyour cloud platform using you as a
gateway to your users?
►Favor cloud providers that give The Org their
due
39. So What to Do?
►Focus on three poles of NPTech
First People
Then Process
Last Technology
►Do incremental research and migration
Acknowledge that cultural change is hard
Leverage opportunity to improve processes
Don't make any big cloud bets right away
40. The NPTech Cloud is young
►Enterprise data management
We need more than just newer data silos
Many apps don't understand how NGOs and
nonprofits work
►Identity, identity, identity
Stuff needs to talk to stuff on OUR terms
It's a tough, unsolved problem
This is where to be wary in placing bets
41. The NPTech Cloud is young
►Interoperability, interoperability, inter...
Prioritize open standards, long-term APIs,
free/open source-based solutions
Don't adopt anything browser-specific
►Establish rich offline synchronization
Single-points-of-failure are so 1970's
►Don't trailblaze
Copy/model others' successes, learnings
Unless you're a trailblazer
42. The Outlook for Cloud
►Cloud is not a fad
And it really can deliver benefits
►Intentionality is key to migration
Involve all users in process from Day 0
Base migration on workflows, not tools
Assert control and portability of your data
Maximize control of your online identity
Have fallback plans at the ready
Rinse and repeat
43. The Outlook for Cloud
►The cloud gets NGOs to better places
Innovative ways of engaging supporters
New modes for building allies, support,
awareness
Collaboration, cost savings, convenience
Ability to focus on impact, not on IT
Paving the way for mobile
44. Another Cloud is Possible
►Technology Decisions are Political Decisions
You are what you use
►Don't let your organizational tech knowledge
atrophy
Don't let cloud tactics sap tech vitality
►Demand cloud tools that meet NGO needs on
our terms
45. Another Cloud is Possible
►Prioritize values-aligned hosting
Store your data with people in solidarity with
your causes
ElectricEmbers.org, NPOGroups.org
Riseup.net
FluxxProject.org
►Practice Sector-Level Solidarity
"First they came for the communists, and I didn't
speak out because I wasn't a communist..."
46. Another Cloud is Possible
►These are exciting times for new paradigms
There is more than one way to get there
The journey should be the .org reward
Make your organization's path one of greatest
sustainability, not least resistance :^)