This document summarizes a blockchain technology workshop presented by Duru Turkoglu, PhD. The workshop covered the history and components of blockchain technology including public key cryptography, distributed systems, and applications. It discussed how blockchain provides an easy to transact and hard to modify distributed ledger through the use of cryptography and distributed consensus. Applications mentioned include cryptocurrencies, smart contracts, asset management, identity verification, and decentralized exchanges.
This document provides an overview and introduction to the dark web and Tor network. It summarizes Grifter and Metacortex's background and expertise, then outlines what topics will be covered which include how to connect to and navigate Tor and the dark web safely and anonymously. Potential legal and ethical issues are also briefly discussed.
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
This presentation discusses penetration testing techniques from an unconventional perspective. It advocates for intelligence gathering and footprinting before scanning or exploitation to have a more effective assessment. Specific techniques discussed include using open source intelligence gathering on internal and external systems to develop profiles and target lists. Footprinting activities within the network focus on enumeration of users, shares, services and other details to identify vulnerable systems rather than broad scanning. The presentation provides examples of exploiting old vulnerabilities in applications like Citrix and weaknesses in administration interfaces. It emphasizes continuing post-exploitation activities like privilege escalation and lateral movement within compromised systems to fully evaluate security.
Presented at Seminar at Bahria University June 2007
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, Certification Authority, Secure Socket Layer (SSL), Secure Electronic Transaction (SET)
This document provides a high-level overview of TLS (Transport Layer Security) in 3 sentences or less:
TLS allows two parties to establish an encrypted connection by using public key cryptography for authentication during the initial handshake and then using symmetric encryption for faster encrypted data transfer. It relies on certificate authorities to validate server identities through digital signatures on their public keys. The initial handshake establishes a shared secret for deriving the symmetric encryption keys through techniques like Diffie-Hellman key exchange to provide forward secrecy if private keys are later compromised.
In this talk, I will explain the foundations of the TLS protocol: symmetric encryption, digital signature, PKI, and how these concepts come together to secure your network connections
This document discusses various topics related to anonymity on darknets including:
- Ways enterprises bypass data leakage prevention including encryption and VPNs
- Differences between proxies, Tor, and VPNs and why Tor provides more anonymity
- Options for maximum anonymity hosting and WikiLeaks platforms on darknets
- Using open Wi-Fis or custom configurations as darknet exit nodes
- Digital currencies and tools like OpenTransactions that allow untraceable transactions
- Decentralized portal systems like Osiris and peer-to-peer networks for private file sharing and chat
- The relationship between encryption, anonymity, and enabling free speech
Onion routing and tor: Fundamentals and Anonymityanurag singh
Onion Routing and Tor: Fundamentals and anonymity discusses anonymity on the internet and how Tor works to provide anonymity. It explains that traditional IP addresses and browser tracking can be linked to a user's identity. Tor creates circuits through multiple relay nodes to hide a user's location and communications. Key features of Tor include using volunteer-run relay nodes, protecting against traffic analysis, and enabling hidden services to host anonymous websites. While Tor enhances anonymity, it cannot prevent all timing attacks if the start and end of a user's traffic can be observed.
This document summarizes a blockchain technology workshop presented by Duru Turkoglu, PhD. The workshop covered the history and components of blockchain technology including public key cryptography, distributed systems, and applications. It discussed how blockchain provides an easy to transact and hard to modify distributed ledger through the use of cryptography and distributed consensus. Applications mentioned include cryptocurrencies, smart contracts, asset management, identity verification, and decentralized exchanges.
This document provides an overview and introduction to the dark web and Tor network. It summarizes Grifter and Metacortex's background and expertise, then outlines what topics will be covered which include how to connect to and navigate Tor and the dark web safely and anonymously. Potential legal and ethical issues are also briefly discussed.
PENETRATION TESTING FROM A HOT TUB TIME MACHINEChris Gates
This presentation discusses penetration testing techniques from an unconventional perspective. It advocates for intelligence gathering and footprinting before scanning or exploitation to have a more effective assessment. Specific techniques discussed include using open source intelligence gathering on internal and external systems to develop profiles and target lists. Footprinting activities within the network focus on enumeration of users, shares, services and other details to identify vulnerable systems rather than broad scanning. The presentation provides examples of exploiting old vulnerabilities in applications like Citrix and weaknesses in administration interfaces. It emphasizes continuing post-exploitation activities like privilege escalation and lateral movement within compromised systems to fully evaluate security.
Presented at Seminar at Bahria University June 2007
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, Certification Authority, Secure Socket Layer (SSL), Secure Electronic Transaction (SET)
This document provides a high-level overview of TLS (Transport Layer Security) in 3 sentences or less:
TLS allows two parties to establish an encrypted connection by using public key cryptography for authentication during the initial handshake and then using symmetric encryption for faster encrypted data transfer. It relies on certificate authorities to validate server identities through digital signatures on their public keys. The initial handshake establishes a shared secret for deriving the symmetric encryption keys through techniques like Diffie-Hellman key exchange to provide forward secrecy if private keys are later compromised.
In this talk, I will explain the foundations of the TLS protocol: symmetric encryption, digital signature, PKI, and how these concepts come together to secure your network connections
This document discusses various topics related to anonymity on darknets including:
- Ways enterprises bypass data leakage prevention including encryption and VPNs
- Differences between proxies, Tor, and VPNs and why Tor provides more anonymity
- Options for maximum anonymity hosting and WikiLeaks platforms on darknets
- Using open Wi-Fis or custom configurations as darknet exit nodes
- Digital currencies and tools like OpenTransactions that allow untraceable transactions
- Decentralized portal systems like Osiris and peer-to-peer networks for private file sharing and chat
- The relationship between encryption, anonymity, and enabling free speech
Onion routing and tor: Fundamentals and Anonymityanurag singh
Onion Routing and Tor: Fundamentals and anonymity discusses anonymity on the internet and how Tor works to provide anonymity. It explains that traditional IP addresses and browser tracking can be linked to a user's identity. Tor creates circuits through multiple relay nodes to hide a user's location and communications. Key features of Tor include using volunteer-run relay nodes, protecting against traffic analysis, and enabling hidden services to host anonymous websites. While Tor enhances anonymity, it cannot prevent all timing attacks if the start and end of a user's traffic can be observed.
MetaMask is a browser extension that allows users to access Ethereum-based decentralized applications (dapps) and manage their identities and Ethereum accounts. It acts as an Ethereum wallet and connects to the Ethereum network through Infura, an external Ethereum node provider. MetaMask stores users' private keys locally in the browser and signs transactions before sending them to the Ethereum network through Infura.
OnionBots: Subverting Privacy Infrastructure for Cyber AttacksAmirali Sanatinia
Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the door to illegal activities, including botnets, ransomware, and a marketplace for drugs and contraband. We contend that the next waves of botnets will extensively attempt to subvert privacy infrastructure and cryptographic mechanisms. In this work we propose to preemptively investigate the design and mitigation of such botnets. We first, introduce OnionBots, what we believe will be the next generation of resilient, stealthy botnets. OnionBots use privacy infrastructures for cyber attacks by completely decoupling their operation from the infected host IP address and by carrying traffic that does not leak information about its source, destination, and nature. Such bots live symbiotically within the privacy infrastructures to evade detection,
measurement, scale estimation, observation, and in general all IP-based current mitigation techniques. Furthermore, we show that with an adequate self-healing network maintenance scheme, that is simple to implement, OnionBots can achieve a low diameter and a low degree and be robust to partitioning under node deletions. We develop a mitigation technique, called SOAP, that neutralizes the nodes of the basic OnionBots. In light of the potential of such botnets, we believe that the research community should proactively develop detection and mitigation methods to thwart OnionBots, potentially making adjustments to privacy infrastructure.
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonDavid Johansson
1) Authentication solutions like SSL/TLS client certificates and SAML SSO can compromise user privacy through design flaws. SSL/TLS does not properly validate server identity before sending client certificates, exposing them. SAML allows passive authentication requests without user consent.
2) Privacy requirements for authentication include knowing who you communicate with, when you authenticate, what information is revealed, and that only the intended recipient sees your identity. Current solutions do not always fulfill these.
3) Upcoming TLS 1.3 and careful design of client certificates and authentication requests can help address privacy issues, but flaws remain and privacy must be explicitly considered in authentication system design.
Setting Up .Onion Addresses for your Enterprise, v3.5Alec Muffett
Onion networking provides an alternative to traditional IP networking by using self-authenticating onion addresses and circuits through the Tor network. Some key aspects of onion networking include:
1) It establishes circuits between clients and servers to transport TCP connections, similar to how IP uses frames and MAC addresses.
2) Onion addresses resolve to introduction points that introduce circuits to rendezvous points for communication, providing redundancy and avoiding single points of failure.
3) While slower than traditional networking due to additional hops, onion networking provides benefits like built-in anonymity, censorship resistance, and lack of single points of control due to its distributed nature.
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
This document provides an overview and summary of a presentation on privacy, the dark web, and hacker devices. The presentation discusses tools that provide anonymity such as Tor browsing and VPNs. It also covers common devices and software used on the dark web and defenses against cyber attacks. The document discusses why people attack, how to prevent being tracked, and mitigating risks. It provides tips on anonymity and privacy as well as an overview of hacker tools and techniques. The presentation aims to familiarize audiences with anonymity methods while discouraging illegal use of the information.
This presentation is all about How TOR works?, How TOR was designed?, and the add-on's, extensions that make possible the functioning of TOR.
Feel free to contact me if you want the slide notes as the slide notes are not displayed by SlideShare!
За последние годы разными специалистами и компаниями (от Google до Сноудена) был проделан колоссальный объём работы с целью популяризации протокола SSL, а позже и TLS. Дорабатывались протоколы и шифры, обнаруживались десятки уязвимостей, криптографические библиотеки форкались и проводили аудиты, правозащитные фонды выдавали сотни миллионов сертификатов "забесплатно". В конце концов, TLS явочным порядком, в обход стандарта, стал обязательным для HTTP/2-серверов. Так много сил было приложено, что просто-напросто уже невежливо всё это игнорировать.
Однако процесс внедрения TLS за это время, как это ни удивительно, не стал проще ни на йоту. Сисадмины, приступающие к развёртыванию TLS, вынуждены столкнуться с классификацией типов сертификатов, с множеством центров сертификации (которые непонятно, чем друг друга лучше) и с великим множеством дополнительных заголовков и "ручек", каждую из которых можно подёргать с непредсказуемым результатом. В результате даже крупные компании при внедрении TLS допускают ошибки той или иной степени серьёзности (включая, но не ограничиваясь масштабным даунтаймом клиентов GlobalSign), а небольшие стартапы предпочитают, вообще, обходить криптографию стороной.
За отведённые на доклад 45 минут мы постараемся дать описание каждой из пресловутых "ручек" и рекомендации по их [не]применению, а также дадим рекомендации по развёртыванию TLS на крупной инфраструктуре.
Dennis Gamayunov discusses the history of undercover communications and encryption techniques. He describes how early systems like BBS, SMTP, and IRC lacked privacy and authentication. PGP introduced public-key cryptography for encrypting and signing messages. The Web of Trust model allows people to verify ownership of keys. However, fake keys and identities can undermine the system. The SILC protocol provides encryption for chat channels. OTR messaging provides forward secrecy, deniability, and no third-party proofs. Future work includes improving usability and expanding these techniques to group messaging.
The document provides an introduction to encryption basics including symmetric and asymmetric encryption. It explains how symmetric encryption works with Alice and Bob sharing a password to encrypt and decrypt messages. It also explains how asymmetric encryption works with Alice using Bob's public key to encrypt a message that only Bob can decrypt with his private key. The document recommends tools for encrypting email, disks, and browsing privately including Thunderbird, TrueCrypt, and Tor. It discusses some challenges with encryption including managing keys and speeds with Tor. The overall purpose is to educate about the importance of encryption for privacy.
The document discusses the Lightning Network and how it enables payments and transfer of small amounts of data. It describes how Lightning Network channels work and how payments can be routed across multiple channels. It then discusses an open-source solution called c13n that allows nodes to read and write data over Lightning Network payments in an efficient and secure manner. Finally, it outlines some potential use cases for sending data and payments over Lightning Network such as messaging apps, serverless computing, and decentralized oracles.
Introduction to Nostr slides for Atlanta BitDevs 1/11/22.
Highly recommend downloading. The animations make the diagrams significantly more effective.
Nostr is a new, fast-growing protocol for decentralized social media.
Read more: https://github.com/vishalxl/nostr_console/discussions/31
https://www.meetup.com/atlantabitdevs/
Presentation I gave at the CoolTwitter Conference in Cleveland, Ohio August 7, 2009. I talked about the top 5 1/2 threats to Twitter and ways you can use it safely. Yes, there are more then 5 1/2 issues but I only had 15 minutes! :-)
Understand Crypto currencies, where to buy them, how to secure owned currencies and investment options. Presentation will give ideas to start investigating and exploration.
This document provides a technical summary of Dan Kaminsky's keynote presentation. The keynote discusses three main topics:
1) Denial of service attacks and how Overflowd aims to make DDoS attacks less annoying by sharing netflow data between networks.
2) Cryptography and how JFE (Jump to Full Encryption) aims to automate TLS deployment to make encryption easier.
3) Data loss prevention and how Ratelock restricts data loss by enforcing rate limits and other policies at the serverless cloud layer to increase survivability even if complex parts are compromised.
The document discusses anonymity and anonymous file sharing systems. It begins with definitions of anonymity and different levels of anonymity that systems aim to achieve. It then outlines several theoretical designs for anonymous systems, including proxy-based networks, mix networks, onion routing, and friend-to-friend networks. Finally, it examines several existing anonymous file sharing systems such as Mute, Ants, Mantis, and Tor that implement these theoretical designs.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
MetaMask is a browser extension that allows users to access Ethereum-based decentralized applications (dapps) and manage their identities and Ethereum accounts. It acts as an Ethereum wallet and connects to the Ethereum network through Infura, an external Ethereum node provider. MetaMask stores users' private keys locally in the browser and signs transactions before sending them to the Ethereum network through Infura.
OnionBots: Subverting Privacy Infrastructure for Cyber AttacksAmirali Sanatinia
Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the door to illegal activities, including botnets, ransomware, and a marketplace for drugs and contraband. We contend that the next waves of botnets will extensively attempt to subvert privacy infrastructure and cryptographic mechanisms. In this work we propose to preemptively investigate the design and mitigation of such botnets. We first, introduce OnionBots, what we believe will be the next generation of resilient, stealthy botnets. OnionBots use privacy infrastructures for cyber attacks by completely decoupling their operation from the infected host IP address and by carrying traffic that does not leak information about its source, destination, and nature. Such bots live symbiotically within the privacy infrastructures to evade detection,
measurement, scale estimation, observation, and in general all IP-based current mitigation techniques. Furthermore, we show that with an adequate self-healing network maintenance scheme, that is simple to implement, OnionBots can achieve a low diameter and a low degree and be robust to partitioning under node deletions. We develop a mitigation technique, called SOAP, that neutralizes the nodes of the basic OnionBots. In light of the potential of such botnets, we believe that the research community should proactively develop detection and mitigation methods to thwart OnionBots, potentially making adjustments to privacy infrastructure.
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonDavid Johansson
1) Authentication solutions like SSL/TLS client certificates and SAML SSO can compromise user privacy through design flaws. SSL/TLS does not properly validate server identity before sending client certificates, exposing them. SAML allows passive authentication requests without user consent.
2) Privacy requirements for authentication include knowing who you communicate with, when you authenticate, what information is revealed, and that only the intended recipient sees your identity. Current solutions do not always fulfill these.
3) Upcoming TLS 1.3 and careful design of client certificates and authentication requests can help address privacy issues, but flaws remain and privacy must be explicitly considered in authentication system design.
Setting Up .Onion Addresses for your Enterprise, v3.5Alec Muffett
Onion networking provides an alternative to traditional IP networking by using self-authenticating onion addresses and circuits through the Tor network. Some key aspects of onion networking include:
1) It establishes circuits between clients and servers to transport TCP connections, similar to how IP uses frames and MAC addresses.
2) Onion addresses resolve to introduction points that introduce circuits to rendezvous points for communication, providing redundancy and avoiding single points of failure.
3) While slower than traditional networking due to additional hops, onion networking provides benefits like built-in anonymity, censorship resistance, and lack of single points of control due to its distributed nature.
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
This document provides an overview and summary of a presentation on privacy, the dark web, and hacker devices. The presentation discusses tools that provide anonymity such as Tor browsing and VPNs. It also covers common devices and software used on the dark web and defenses against cyber attacks. The document discusses why people attack, how to prevent being tracked, and mitigating risks. It provides tips on anonymity and privacy as well as an overview of hacker tools and techniques. The presentation aims to familiarize audiences with anonymity methods while discouraging illegal use of the information.
This presentation is all about How TOR works?, How TOR was designed?, and the add-on's, extensions that make possible the functioning of TOR.
Feel free to contact me if you want the slide notes as the slide notes are not displayed by SlideShare!
За последние годы разными специалистами и компаниями (от Google до Сноудена) был проделан колоссальный объём работы с целью популяризации протокола SSL, а позже и TLS. Дорабатывались протоколы и шифры, обнаруживались десятки уязвимостей, криптографические библиотеки форкались и проводили аудиты, правозащитные фонды выдавали сотни миллионов сертификатов "забесплатно". В конце концов, TLS явочным порядком, в обход стандарта, стал обязательным для HTTP/2-серверов. Так много сил было приложено, что просто-напросто уже невежливо всё это игнорировать.
Однако процесс внедрения TLS за это время, как это ни удивительно, не стал проще ни на йоту. Сисадмины, приступающие к развёртыванию TLS, вынуждены столкнуться с классификацией типов сертификатов, с множеством центров сертификации (которые непонятно, чем друг друга лучше) и с великим множеством дополнительных заголовков и "ручек", каждую из которых можно подёргать с непредсказуемым результатом. В результате даже крупные компании при внедрении TLS допускают ошибки той или иной степени серьёзности (включая, но не ограничиваясь масштабным даунтаймом клиентов GlobalSign), а небольшие стартапы предпочитают, вообще, обходить криптографию стороной.
За отведённые на доклад 45 минут мы постараемся дать описание каждой из пресловутых "ручек" и рекомендации по их [не]применению, а также дадим рекомендации по развёртыванию TLS на крупной инфраструктуре.
Dennis Gamayunov discusses the history of undercover communications and encryption techniques. He describes how early systems like BBS, SMTP, and IRC lacked privacy and authentication. PGP introduced public-key cryptography for encrypting and signing messages. The Web of Trust model allows people to verify ownership of keys. However, fake keys and identities can undermine the system. The SILC protocol provides encryption for chat channels. OTR messaging provides forward secrecy, deniability, and no third-party proofs. Future work includes improving usability and expanding these techniques to group messaging.
The document provides an introduction to encryption basics including symmetric and asymmetric encryption. It explains how symmetric encryption works with Alice and Bob sharing a password to encrypt and decrypt messages. It also explains how asymmetric encryption works with Alice using Bob's public key to encrypt a message that only Bob can decrypt with his private key. The document recommends tools for encrypting email, disks, and browsing privately including Thunderbird, TrueCrypt, and Tor. It discusses some challenges with encryption including managing keys and speeds with Tor. The overall purpose is to educate about the importance of encryption for privacy.
The document discusses the Lightning Network and how it enables payments and transfer of small amounts of data. It describes how Lightning Network channels work and how payments can be routed across multiple channels. It then discusses an open-source solution called c13n that allows nodes to read and write data over Lightning Network payments in an efficient and secure manner. Finally, it outlines some potential use cases for sending data and payments over Lightning Network such as messaging apps, serverless computing, and decentralized oracles.
Introduction to Nostr slides for Atlanta BitDevs 1/11/22.
Highly recommend downloading. The animations make the diagrams significantly more effective.
Nostr is a new, fast-growing protocol for decentralized social media.
Read more: https://github.com/vishalxl/nostr_console/discussions/31
https://www.meetup.com/atlantabitdevs/
Presentation I gave at the CoolTwitter Conference in Cleveland, Ohio August 7, 2009. I talked about the top 5 1/2 threats to Twitter and ways you can use it safely. Yes, there are more then 5 1/2 issues but I only had 15 minutes! :-)
Understand Crypto currencies, where to buy them, how to secure owned currencies and investment options. Presentation will give ideas to start investigating and exploration.
This document provides a technical summary of Dan Kaminsky's keynote presentation. The keynote discusses three main topics:
1) Denial of service attacks and how Overflowd aims to make DDoS attacks less annoying by sharing netflow data between networks.
2) Cryptography and how JFE (Jump to Full Encryption) aims to automate TLS deployment to make encryption easier.
3) Data loss prevention and how Ratelock restricts data loss by enforcing rate limits and other policies at the serverless cloud layer to increase survivability even if complex parts are compromised.
The document discusses anonymity and anonymous file sharing systems. It begins with definitions of anonymity and different levels of anonymity that systems aim to achieve. It then outlines several theoretical designs for anonymous systems, including proxy-based networks, mix networks, onion routing, and friend-to-friend networks. Finally, it examines several existing anonymous file sharing systems such as Mute, Ants, Mantis, and Tor that implement these theoretical designs.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
2. Background
• Lightning nodes have a LOT to
talk about.
• Coordinating channels
opens/closes
• Advertising liquidity
• Operator chit chat
3. Problem
• Operators usually use Twitter/Telegram
• Impersonations
• Reputation is disconnected from the node
• Lightning Nodes go down…
• Gossip goes down with the node
4. Lightning Nodes NEED Messaging that is…
• Censorship Resistant
• Verifiable (signed messages)
• Available when a node (client) is offline
If ONLY there was a protocol like this…
18. Ideas
• Write a NIP
• Gossip over Nostr
• Nostr Gossip Sync
• It’s like RGS, except every note is signed
• Better relays, automatically drops redundant gossip
• Use badges to “deprecate” Nostr accounts
• Help improve bandwidth over gossip (Bolt-12 FUD)