Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
Cloud computing has revolutionized computing, providing organizations with the opportunity to outsource their computing capability to a third party provider of networks, servers, storage, applications or services located in multiple jurisdictions. This webinar explored the global legal and regulatory developments in cloud computing that have occurred during 2012
Learn about threats to YOUR
Customer\'s privacy.
- Googling Your Corporate Privacy Away
- Tools and practices your users are already using that will compromise their privacy.
- Trends in Regulations
- Rules and regulations you need to know to stay current
- Trends in Financial Crimes - New crimes, old crimes with new tools and why your company is so attractive to attackers
- Effective Multicompliance - Tips, Techniques and lessons learned in staying compliant, while increasing profits and maintaining your sanity
INSZoom - Technology Innovation in Legal Industry INSZoom
Barcamps are known for the hottest technological topics and trends. A session on “Technology Innovation in Legal Industry” by INSZoom made a major impact on the legal-tech space at the recently held Bangalore Barcamp XIII. INSZoom has revolutionized the sector with technological innovation. The industry has advanced to major technological changes – from cloud solutions, security systems, case management software to mobile apps.
If you missed this productive session by Mr. Vishwas Mudagal (VP – Products & Marketing, INSZoom) and Mr. Anuj Sarin (Director – Best Practices, INSZoom) here is an opportunity to go through the law-tech presentation.
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
Cloud computing has revolutionized computing, providing organizations with the opportunity to outsource their computing capability to a third party provider of networks, servers, storage, applications or services located in multiple jurisdictions. This webinar explored the global legal and regulatory developments in cloud computing that have occurred during 2012
Learn about threats to YOUR
Customer\'s privacy.
- Googling Your Corporate Privacy Away
- Tools and practices your users are already using that will compromise their privacy.
- Trends in Regulations
- Rules and regulations you need to know to stay current
- Trends in Financial Crimes - New crimes, old crimes with new tools and why your company is so attractive to attackers
- Effective Multicompliance - Tips, Techniques and lessons learned in staying compliant, while increasing profits and maintaining your sanity
INSZoom - Technology Innovation in Legal Industry INSZoom
Barcamps are known for the hottest technological topics and trends. A session on “Technology Innovation in Legal Industry” by INSZoom made a major impact on the legal-tech space at the recently held Bangalore Barcamp XIII. INSZoom has revolutionized the sector with technological innovation. The industry has advanced to major technological changes – from cloud solutions, security systems, case management software to mobile apps.
If you missed this productive session by Mr. Vishwas Mudagal (VP – Products & Marketing, INSZoom) and Mr. Anuj Sarin (Director – Best Practices, INSZoom) here is an opportunity to go through the law-tech presentation.
CSC Director of Global Security Solutions Ron Knode presents the challenges and proposed solutions to securing the value inherent in cloud computing for enterprises that must maintain audits and control of data in this 40-page research paper.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications and a hundred identical safes with their combinations so that the world’s best safecrackers can study it and you still can’t open the safe, that’s security.
What You Haven't Heard (Yet) About Cloud SecurityCloudPassage
Did you know that 4 out of 5 companies are using cloud architectures? Did you also know that 22% of cloud hosting users believe that their cloud service provider is responsible for the security of their cloud server instances, yet 38% have a high level of concern with losing control of their servers and data in public cloud environments?
Join Andrew Hay, Chief Evangelist at CloudPassage, and Wendy Nather, Research Director at 451 Research, as they dive into these and other findings from the CloudPassage 2012 Security and the Cloud survey. Wendy Nather will also discuss cloud security related trends and observations from 451 Research's findings.
During this live 30-minute webinar, you will learn about:
-The challenges and fears identified by individuals looking to embrace cloud architectures
-Current cloud adoption trends and future individual and organizational expansion plans
-How people are securely delivering applications using cloud architectures
They can strike anywhere and at any time. Their effects can range from the annoying to the downright
disastrous. Users fear them; IT departments dread them. They can create chaos, causing downtime, latency,
loss of productivity, increased costs, loss of revenue, unhappy users and, worst of all, dissatisfied customers. Many noble men and women battle these network problems every day – increasing bandwidth, implementing new
monitoring systems, even hiring more employees. But more often than not, they treat the symptoms without
ever truly knowing the root the cause of the problem. That’s where our hero comes into the story…
System Z Mainframe Security For An EnterpriseJim Porell
System z provides technology that makes it one of the most secure platforms available. It also has the capability to secure other platforms. This presentation provides a number of examples of Enterprise Security. Reduce your cost, your risk, improve your security and resilience with System z.
Les "systèmes intelligents" constituent la nouvelle génération de systèmes embarqués, qui, en s'appuyant sur les caractéristiques de robustesse et de déterminisme de leurs aînés, se connectent au cloud afin d'enrichir l'expérience utilisateur, qu'il s'agisse d'entreprises (collectant des données ou surveillant des systèmes par exemple), de particuliers (à la maison ou dans un contexte médical, ou bien dans la voiture) ou bien d'autres machines (dans le cas de systèmes automatisés à grande échelle). Le cloud et particulièrement Windows Azure fourni les vecteurs de communication et les moyens de stocker massivement des données et de les traiter, déchargeant ainsi les installations locales et donc rendant le déploiement de ses systèmes plus simple. Cette session, riche en exemples concrets, présentera la stratégie qui est celle de Microsoft autour du futur des systèmes embarqués, et leur connexion au cloud, ainsi que les technologies et les partenariats mis en oeuvre pour accélérer ces déploiements de systèmes intelligents. avec un exemple qui parlera à tous: le futur de la voiture, avec Windows Embedded Automotive!
CSC Director of Global Security Solutions Ron Knode presents the challenges and proposed solutions to securing the value inherent in cloud computing for enterprises that must maintain audits and control of data in this 40-page research paper.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications and a hundred identical safes with their combinations so that the world’s best safecrackers can study it and you still can’t open the safe, that’s security.
What You Haven't Heard (Yet) About Cloud SecurityCloudPassage
Did you know that 4 out of 5 companies are using cloud architectures? Did you also know that 22% of cloud hosting users believe that their cloud service provider is responsible for the security of their cloud server instances, yet 38% have a high level of concern with losing control of their servers and data in public cloud environments?
Join Andrew Hay, Chief Evangelist at CloudPassage, and Wendy Nather, Research Director at 451 Research, as they dive into these and other findings from the CloudPassage 2012 Security and the Cloud survey. Wendy Nather will also discuss cloud security related trends and observations from 451 Research's findings.
During this live 30-minute webinar, you will learn about:
-The challenges and fears identified by individuals looking to embrace cloud architectures
-Current cloud adoption trends and future individual and organizational expansion plans
-How people are securely delivering applications using cloud architectures
They can strike anywhere and at any time. Their effects can range from the annoying to the downright
disastrous. Users fear them; IT departments dread them. They can create chaos, causing downtime, latency,
loss of productivity, increased costs, loss of revenue, unhappy users and, worst of all, dissatisfied customers. Many noble men and women battle these network problems every day – increasing bandwidth, implementing new
monitoring systems, even hiring more employees. But more often than not, they treat the symptoms without
ever truly knowing the root the cause of the problem. That’s where our hero comes into the story…
System Z Mainframe Security For An EnterpriseJim Porell
System z provides technology that makes it one of the most secure platforms available. It also has the capability to secure other platforms. This presentation provides a number of examples of Enterprise Security. Reduce your cost, your risk, improve your security and resilience with System z.
Les "systèmes intelligents" constituent la nouvelle génération de systèmes embarqués, qui, en s'appuyant sur les caractéristiques de robustesse et de déterminisme de leurs aînés, se connectent au cloud afin d'enrichir l'expérience utilisateur, qu'il s'agisse d'entreprises (collectant des données ou surveillant des systèmes par exemple), de particuliers (à la maison ou dans un contexte médical, ou bien dans la voiture) ou bien d'autres machines (dans le cas de systèmes automatisés à grande échelle). Le cloud et particulièrement Windows Azure fourni les vecteurs de communication et les moyens de stocker massivement des données et de les traiter, déchargeant ainsi les installations locales et donc rendant le déploiement de ses systèmes plus simple. Cette session, riche en exemples concrets, présentera la stratégie qui est celle de Microsoft autour du futur des systèmes embarqués, et leur connexion au cloud, ainsi que les technologies et les partenariats mis en oeuvre pour accélérer ces déploiements de systèmes intelligents. avec un exemple qui parlera à tous: le futur de la voiture, avec Windows Embedded Automotive!
451 Group Increasing Cloud Application PerformanceCDNetworks
IT is increasingly being consumed ‘as a service.’ This is why 451 Research expects the SaaS portion of the cloud to reach $11.1bn in 2012 and continue to grow to $14.8bn in 2014.
But, there is a network attached to that cloud, and networks don’t always behave well. The cloud has performance problems stemming from latency and availability issues, especially if you have customers or employees in emerging markets including China, Russia, and India.
Applications such as CRM, ERP, content management and collaboration, all the way to archiving and backup storage services can be impacted by network performance. How do you accelerate your cloud applications to ensure a good customer or employee experience? Join the webcast and learn how HighQ, Thomsons Online Benefits, and others have leveraged CDN technology.
Understanding the Dynamics of the Cloud, Current and Emerging TrendsProformative, Inc.
Proformative presents Understanding the Dynamics of the Cloud, Current and Emerging Trends. Special thanks to Ken Piro, Western Region CTO and Sungard Availability Services.
To download full presentation, visit http://bit.ly/9E0J0s
The Cloud: A game changer to test, at scale and in production, SOA based web...Fred Beringer
Today in retail, financial services, media, telecommunications and a host of other industries, more and more business is transacted through consumer web sites and mobile applications. With new channels creating spikes in traffic, highly complex system architectures, and internet-savvy customers, websites and web applications must be tested at scale to maximize business results and avoid a catastrophic crash. However, whether due to time or cost or other reasons, upwards of 90 percent of web applications are not fully tested before launching. If testing is done, many times it's with a small percent of expected traffic, which is then extrapolated for an estimation of performance.
Cloud computing is changing the game for testing web applications. Cloud testing enables, for the first time, performance testing that complements the lab and accounts for the conditions in a production environment, such as traffic spikes, network latency, firewalls, and other factors. And it can be done far more affordably than traditional testing methods, as part of agile development cycles, and without an army of highly skilled performance engineers.
Presentation given in Rome for the International SOA conference - Moving SOA into the Cloud in Rome, May 2011
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
14. Definition:
Clouds are hardware-based services
offering compute, network and
storage capacity where:
Hardware management is highly
abstracted from the buyer
Buyers incur infrastructure costs as
variable OPEX
Infrastructure capacity is highly
elastic (up or down)
McKinsey & Company
18. By a 5‐to‐1 ratio,
companies trust internal
IT systems over cloud‐
based technologies due to
fear about security
threats and loss of control
of data and systems.
Avanade Inc.
19. They are right...
Streamload: On June 15,
2007 system
administrator's script
accidentally misidentified
and deleted quot;good dataquot;
along with the quot;dead dataquot; of
some 3.5 million former
user accounts and files.
20. Or are they?
LAX Los Angeles 1,200
MIA Miami 1,000
JFK New York 900
ORD Chicago 825
EWR Newark 750
0 300 600 900 1200
10 U.S. airports with the highest weekly frequency of laptop loss
Airport Insecurity: The Case of Missing & Lost Laptops, Ponemon Institute LLC
21. This get scary...
Did not protect sensitive
65%
information contained on laptop
57%
Worry about losing their laptop
Laptop contains
53%
confidential company information
42%
Data on laptop is not backed up
0 0.175 0.35 0.525 0.7
Airport Insecurity: The Case of Missing & Lost Laptops, Ponemon Institute LLC
22. Most likely causes of data
breach?
Negligent insiders 75%
Outsourced data 42%
Malicious insiders 26%
Social engineering 2%
Hackers 1%
0 0.2 0.4 0.6 0.8
2008 Study on the Uncertainty of Data Breach Detection,Ponemon Institute LLC
23. IT environment where data
breaches occur
Off-network devices 58%
Networks 50%
Mainframes 41%
Paper files 39%
Backups 18%
0 0.15 0.3 0.45 0.6
2008 Study on the Uncertainty of Data Breach Detection,Ponemon Institute LLC
24. Ability to detect the loss or
theft of confidential
information
31%
25%
18%
16%
10%
Somehow
Very confident Confident confident Not confident Unsure
2008 Study on the Uncertainty of Data Breach Detection,Ponemon Institute LLC
33. ACID -> BASE
Traditional approaches don’t
scale
BASE - basically available, soft
state, eventually consistent:
BigTable, SimpleDB,
Cassandra, Dynamo
34. GoodData: Innovate
vs. leverage?
Processing Power
Cloud makes ROLAP approach possible
Elastic Scale
IT builds for peak load, we don’t have to
Multi-Tenancy
Single instance across 1000s of customers
Stateless
Massive load balancing (shared nothing)
36. Public cloud classes
AWS MS Azure Google AE
Predefined
CPU x86 .Net
framework
EBS, S3, SQL, Azure
Storage SimpleDB store
BigTable
Network Declarative Automatic Fixed
37. Cloud APIs
True SOA
Loosely coupled - REST, Atom
Encapsulate cloud services:
Control APIs
Data APIs
Application Functionality APIs
40. If you want to
change the
game, change
the economics
of how the
game is
played
Alan M. Webber
41. Startups in the cloud
Infrastructure labor savings
No CAPEX: Less equity goes to VCs
Unpredictable demand (up and down)
42. Succeed (or fail)
faster
$500k to start technology company
Big bets aren't as big anymore
Easier for startups to adapt to shifts
Level playing field for startups
43. IT vs. Clouds
Losing their monopoly on the
infrastructure
It’s all about economics
45. Fixed pricing
Most widely used pricing
No supply/demand
Simple, predictable
AWS, Google App Engine:
CPU, Storage, network traffic
46. Variable pricing
Reserved instance price (AWS):
“I have 10 instances running 24x7”
Spot price/future price:
“I want 1,000 instances at the end of
the quarter”
Off-peak pricing:
“Run my MapReduce app 10 hours
every day”
49. Private clouds
Violate #2 of our cloud definition:
Buyers incur infrastructure costs
as CAPEX
Virtualization on top of traditional
enterprise IT stack
Encapsulation of IT infrastructure
Scale?
50. Economies of scale
Technology Medium-sized DC Very Large DC Ratio
$95 per Mbit/sec/ $13 per Mbit/sec/
Network 7.1
month month
$2.20 per GByte / $0.40 per GByte /
Storage 5.7
month month
140 Servers / >1000 Servers /
Administration 7.1
Administrator Administrator
HAMILTON, J. Internet-Scale Service Efficiency. In Large-Scale Distributed Systems and Middleware (LADIS) Workshop (September 2008)