Commercial Innovation in US Oilfield: Buyers and Sellers Both Win by Embracin...Hexacom
For many years (too many, perhaps), technological investment in the oilfield has focused uniquely on the products and services used rather than the ways in which buyers connect to them. Rarely have visionary eyes turned towards the business environment within the industry, the ways in which customers and suppliers work together. However, given the right combination of content (e.g., product specifications, supplier details), front-end tools, and an underlying intelligence structure, a lot can be done to democratize and expand oilfield transactions.
Commercial innovation such as this ensures that the oil and gas industry’s ultimate, collective product – the cheap energy that drives civilization’s progress – maintains its competitive place in the global energy mix. Indeed, a drive towards complete efficiency in every facet of the value chain will keep energy from hydrocarbons viable in the long run. And reducing the waste created throughout the buying and selling process is a key aspect of this.
Open source plays a key role in the development of standards for the web. With open source, new technologies, or extensions to existing technologies, may be experimented and demonstrated during the early stages of standard development. This provides feedback to standard bodies during the design phase, making stadards more robust. This also makes sure that implementations are available as soon as the standard is finished, thus facilitating early adoption of new standards. We analyze in this talk the benefits that open source brings to open standards and conversely, based on the experience gained with the Amaya project that is conducted jointly by W3C and INRIA.
Tulisan soal perselisihan antara badan intelijen Amerika Serikat, CIA, dengan Kongres soal program penyiksaan badan intelijen saat memburu tersangka terorisme
Tulisan soal lambatnya perundingan damai israel-Palestina. Banyaknya masalah yang belum disepakati menyebabkan tenggat yang ditetapkan Amerika Serikat pasti terlewati.
Commercial Innovation in US Oilfield: Buyers and Sellers Both Win by Embracin...Hexacom
For many years (too many, perhaps), technological investment in the oilfield has focused uniquely on the products and services used rather than the ways in which buyers connect to them. Rarely have visionary eyes turned towards the business environment within the industry, the ways in which customers and suppliers work together. However, given the right combination of content (e.g., product specifications, supplier details), front-end tools, and an underlying intelligence structure, a lot can be done to democratize and expand oilfield transactions.
Commercial innovation such as this ensures that the oil and gas industry’s ultimate, collective product – the cheap energy that drives civilization’s progress – maintains its competitive place in the global energy mix. Indeed, a drive towards complete efficiency in every facet of the value chain will keep energy from hydrocarbons viable in the long run. And reducing the waste created throughout the buying and selling process is a key aspect of this.
Open source plays a key role in the development of standards for the web. With open source, new technologies, or extensions to existing technologies, may be experimented and demonstrated during the early stages of standard development. This provides feedback to standard bodies during the design phase, making stadards more robust. This also makes sure that implementations are available as soon as the standard is finished, thus facilitating early adoption of new standards. We analyze in this talk the benefits that open source brings to open standards and conversely, based on the experience gained with the Amaya project that is conducted jointly by W3C and INRIA.
Tulisan soal perselisihan antara badan intelijen Amerika Serikat, CIA, dengan Kongres soal program penyiksaan badan intelijen saat memburu tersangka terorisme
Tulisan soal lambatnya perundingan damai israel-Palestina. Banyaknya masalah yang belum disepakati menyebabkan tenggat yang ditetapkan Amerika Serikat pasti terlewati.
This presentation covers tips and tricks for game developers and covers a little bit of everything for both work for hire developers, as well as those creating their own IP.
Without a recall strategy good companies can go out of business when products must be recalled. This presentation offers advice on how to create a meaningful recall strategy.
Six Mistakes Companies Are Making Today And How You Can Avoid ThemFindWhitePapers
"Look for additional opportunities to use business intelligence to uncover value and drive
improvements. Consider advanced planning tools that can help close the gap between
strategy and execution. Expand the use of sophisticated what-if analyses to model the
operational and financial impact of multiple scenarios on revenue, costs, and cash flow."
This presentation covers tips and tricks for game developers and covers a little bit of everything for both work for hire developers, as well as those creating their own IP.
Without a recall strategy good companies can go out of business when products must be recalled. This presentation offers advice on how to create a meaningful recall strategy.
Six Mistakes Companies Are Making Today And How You Can Avoid ThemFindWhitePapers
"Look for additional opportunities to use business intelligence to uncover value and drive
improvements. Consider advanced planning tools that can help close the gap between
strategy and execution. Expand the use of sophisticated what-if analyses to model the
operational and financial impact of multiple scenarios on revenue, costs, and cash flow."
Jerry Chen, partner at Greylock and former VP of Cloud and Application Services at VMware, shares his Unit of Value framework for startups building a go-to-market strategy. He developed this strategy while managing product and marketing teams at VMware that shipped many “1.0” releases, including VMware VDI, Cloud Foundry, and vFabric, and continues to use the framework to evaluate companies as an investor.
There is a great deal of discussion about the potential of “big data,” the high-volume, high-variety information assets that require new forms of data processing to enable companies to make better decisions and operate more efficiently. There is, however, one important caveat. Many companies—probably most—work in relatively sparse data environments, without access to the abundant information needed for advanced analytics and data mining. Companies that only have access to “little data” can still use that information to improve their business.
How to Sell Acquia DXP, Marketing Cloud, and Drupal Cloud Acquia
Please join Acquia’s product marketing team as they share with partners how to leverage Acquia’s new packages and services opportunities. Diving deeper into how to position and sell Acquia’s DXP, Marketing Cloud, and Drupal Cloud, you will learn:
How to deliver the pitch for each of the clouds
How an integrated demo tells our story
New opportunities for partners, including new services and product capabilities
Importance of Combating Gray Market ActivityNEW Momentum
In a study conducted recently by Components Director for a well known semiconductor supplier of both digital and analog devices, found out that over 90 million units of the products that got sold were gray market sales.
Counterfeiting – a major threat to the brandsNEW Momentum
Wikipedia refers to counterfeit products as “fake replicas of the real product and describes the forgeries of currency and documents, as well as the imitations of works of art, toys, clothing, software, pharmaceuticals, watches, electronics, handbags and shoes”.
The term “gray market” can be used in multiple ways. The two primary usages of this term indicate a market for legal goods that is carried on in a manner that is not intended by the original manufacturer of the goods.
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
Theft. Piracy. Counterfeits. Gray market activity. These words and their implied threat to any company’s bottom line intimidate even the most intrepid executive.
"Outsourcing and globalization have numerous benefits, but they have a significant downside—the proliferation of counterfeits and sales through unauthorized channels."
Ways to End Gray Market Sales & Its EffectNEW Momentum
In today’s fast evolving global economy, gray market diversion is gradually becoming an acute concern that most brands encounter. Unlike black market practices, were refurbished, counterfeit or stolen products are sold as authentic brand products, gray market activities involve unauthorized movement of commerce across multiple territories by fake distributors and channel partners.
Strategies to combat grey market salesNEW Momentum
Developments in internet technology have made it possible for online shopping and ecommerce to flourish successfully. You have a wide selection of products today to choose from and some of them come with attractive discounts.
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
This white paper discusses gray market issues and challenges; presents an overview of Archstone’s strategic approach, process and techniques for combating product diversion; and demonstrates the capabilities and effectiveness of New Momentum’s ERM software solutions in a plan of attack against diverters.
Impact of counterfeits on electronics companiesNEW Momentum
Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation of counterfeits and sales through unauthorized channels. This paper demonstrates the impact of counterfeits on electronics companies and gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost to counterfeits.
Impact of counterfeits on electronics companiesNEW Momentum
Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation of counterfeits and sales through unauthorized channels. This paper demonstrates the impact of counterfeits on electronics companies and gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost to counterfeits.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Brand Protection
1. Brand Protection
Case Study
Any company that manufactures or consumes electronic components in their products has
always had to deal with a volatile component marketplace. But now globalization and
outsourcing are making the situation significantly more challenging. In particular, companies
are struggling with how to protect their intellectual property in a rogue world—particularly when
outsourcing to low cost regions. One Tier 1 global enterprise (Whose name remains
confidential for security purposes.) found that the combination of setting up an “intelligence”
department within the company, and a new Brand/Intellectual Property Protection software
solution from New Momentum helped them protect their brand and their revenues.
Problem:
There were four key issues that were the catalysts for finding a more effective way protect the
company’s brand and IP.
• As this company expanded its operations globally, quality issues began to appear in
customers’ products. Research into these problems revealed that remarked or
counterfeit parts were used—a problem that could lead to a loss of both reputation and
revenues.
• There was a potential loss of revenues from existing partners buying “excess” products
on the open market, instead of at “good partner” prices.
• Since their business plan focused on moving to more of a royalty-based and less chip-
based business model, they needed to find a way let partners know they were serious
about protecting their IP and their brand.
• As one of the few companies who started early developing patents and investing huge
amounts in partner development, much of this company’s culture was built around
knowing what’s coming, out-engineering and investing the competition, and then winning
in the stage of world trade. As a result, they were concerned that their features would
begin appearing in competitors products, causing their reputation and culture to suffer.
Originally, these issues were handled in the legal department, within the gray-market committee
meetings. Once they discovered that their own partners must be “dumping” their products, they
knew a stronger focus was required. Because their strategy was to move to an increasingly
royalty based business model, it necessitated their investment in a group focused on the
gathering/monitoring side of IP protection so they could “caution” the partners.
The initial product the “intelligence” team selected for brand and IP protection had a packaged
series of reports that created some basic activity statistics: Quantities by product line/part with
trend lines up and down; activity by region, as in new companies within country; Top ten data
(most quantities, biggest selling companies). However, unlike New Momentum, which is
focused on the high tech/electronics industry, this solution’s main focus was luxury brands and
pharmaceuticals.
Reasons for Selecting New Momentum
• Since New Momentum focused only on the high tech/electronics industry, the company
understood the gray market and its dynamics.
• New Momentum’s ability to gather unstructured information from a variety of open
market sources and provide access to several kinds of data including email-based data
was important because this problem is bigger, more multi-dimensional, and more at the
street level than management had previously thought.
New Momentum, LLC. ● 181 Avenida La Pata ● Suite #100 San Clemente, CA 92673
Telephone: 949.276.5988 Fax: 949.276.5998 www.newmo.com
2. Brand Protection
Case Study
New Momentum’s ability to quickly tune our data, change formats, search in different ways, etc.
makes it easier for the customer’s intelligence team to get the different kinds data they need
rapidly.
The Solution
The first step—setting up search criteria:
New Momentum began our process with a four-part group of search criteria that the customer
created: Software – the SDKs that allow a carrier (or unauthorized channel) to program each
chip type for use on a carrier network; older chips; current chips; and the newest chipsets.
For all these groups, there are multiple “strings” which are actually searching for the same
physical item – each chip has both a product family part number and a “street” part number.
Using their advanced technology, New Momentum gathered unstructured data from market web
sources, XML data sources and gray market emails. They then combined any results around
the designated product family. Recently, a whole new dimension of advanced searching by
“features”, or “capabilities” rather than chip names or product family codes has been added.
The next step-- import and confirm visibility
In this step New Momentum gathers all the raw data which could include duplicates, market
echoing, misnamed products, and other products that aren’t our customers’ products but show
up anyway. At this point, New Momentum cleanses the data, filtering out the “noise” and
confirming the visibility of their products.
Step three- effective market monitoring and search services
We combine our market data with our customer’s structured enterprise data, which includes
product information, authorized partners, private client data and customer risk models. The
result is much more effective market monitoring and search services which cast a “wide net”
across thousands of open market selling and buying sites, forums, and individual companies.
For this customer, thousands of relevant “buy or sell” listings were automatically retrieved that
contain detailed information about the actual parts being sold or requested. The individual
selling or buying company’s name, location, country, and contact information such as email and
telephone numbers is also captured.
At the customer’s request, New Momentum implemented a monitoring processes around an
analysis designed to produce a standard set of outputs that are “meeting” or “boardroom” ready.
Armed with these outputs, the intelligence group can attend high level or even board level
meetings to discuss changes in the gray market landscape, new brand, IP, or counterfeiting
risks which may be appearing, These risks are then reduced with follow up or on-going legal
action, and an overall strategy for setting priorities based on product families or technology
groups.
These reports, which are provided in both a summary and detail level, consist of: trending charts
across al product families; by customer assigned product family types showing change in
market activity; by individual part or part family within the product family; by geographical region
for quantity, number of buy/sell offers and number of new companies interested in the
customer’s products. The reports also include top ten-style rankings of individual companies
who trade in the largest quantities of the customer’s products and who do the most number of
transactions, regardless of total quantity.
New Momentum, LLC. ● 181 Avenida La Pata ● Suite #100 San Clemente, CA 92673
Telephone: 949.276.5988 Fax: 949.276.5998 www.newmo.com
3. Brand Protection
Case Study
All of the summaries and analytics above can always “drill” back to the original open market
buy/sell transaction that contributed to the total or summary. This data is maintained historically
and archived so that as patterns of activity or risk emerge in the analytics, record by record
research can be done back to the original time period where the pattern started.
Results
The initial results surprised our customer. Within the first 30 days the New Momentum identified
over 500 instances of products that were either unauthorized or counterfeits that had not shown
up using their previous system.
On an ongoing basis, this customer continues to find new, unauthorized companies that are
selling their products; high quantities or unexpected quantities of products being bought and
sold, which usually indicates counterfeits or gray market sales; patterns of activity that are
characteristic of unauthorized sales or counterfeits.
With the data the New Momentum solution provides, this customer approaches partners who
are selling unauthorized products, brokers buying and selling on the gray market or companies
buying/selling counterfeits and makes an effort to turn them into legitimate distributors selling
authorized products at the appropriate price and quality levels. The result is that the violators
either become authorized distributors or they know they’ve been found out, and they cease
operations. This company believes that the combination of their internal intelligence group,
management participation and the New Momentum solutions helps them better protect their
brand, IP, quality and revenues on an on-going basis.
New Momentum, LLC. ● 181 Avenida La Pata ● Suite #100 San Clemente, CA 92673
Telephone: 949.276.5988 Fax: 949.276.5998 www.newmo.com