Ceedo Technologies delivers virtualization solutions that extend the reach of business computing to unmanaged devices such as an employee-owned PC or laptop, low-cost netbook or secure USB storage.
By enabling the user's application workspace to run on any device, Ceedo allows its customers to instantly provision teleworkers, temps, contractors and business partners without having to manage additional desktops or increase their datacenter capacity.
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Novell
Laptops and mobile devices—carrying more business-critical data than ever before—are frequently the target of theft or accidental loss. And with a host of removable media devices connecting to networks every day, keeping your data safe has never been more important. In this session we'll discuss the capabilities Novell ZENworks Endpoint Security Management provides to do just that. You'll learn about the product's unique file and folder-based encryption (with advanced data encryption key management), removable storage device controls, USB device controls, and other features designed to protect data residing on lost or stolen devices.
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Novell
Laptops and mobile devices—carrying more business-critical data than ever before—are frequently the target of theft or accidental loss. And with a host of removable media devices connecting to networks every day, keeping your data safe has never been more important. In this session we'll discuss the capabilities Novell ZENworks Endpoint Security Management provides to do just that. You'll learn about the product's unique file and folder-based encryption (with advanced data encryption key management), removable storage device controls, USB device controls, and other features designed to protect data residing on lost or stolen devices.
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...itnewsafrica
The challenge of balancing four conflicting goals:
1.Social – keep employees happy
2.Business – keep processes running effectively
3.Financial – manage costs
4.Risk management – stop bad things from happening.
By Keith Bothma, HP Networking Sales and BU manager for the Enterprise Group in South Africa.
Big picture design without Big Design Up Front (Agile Roots 2010)Desiree Sy
One of the toughest problems facing agile UX designers is keeping the big picture in mind while designing incrementally. This talk builds on prior work at Alias (now Autodesk) that described successful agile adaptations of usability testing, contextual inquiry and iterative prototyping. I’ll present a framework we used to create and implement multi-sprint designs for a complex product without violating the agile taboo against big design.
EVENT DESCRIPTION: FRIDAY Aug 17 - Sun Aug 19, 2012. Solving the challenge of how we can provide social, sustainable, secure Hacking | “Capitalism with a Conscience” | Providing funds and tools for good causes using the power of the pros and the capacity of the crowd. E.g., Autism, Depression Centers, War Veterans | We pick. We solve problems. We give the solutions directly to the people who need them. | We will provide reasonable | compensation, profit sharing and equity to |a community run organization (i.e., Xcorp) | Developers, artists, professionals, VCs and others who make contributions. Sustainable Hacking creates the capacity to good, have fun and make money.
UX: Raising the bar with Software Development by Sulamita Garcia from IntelBeMyApp
Sulamita Garcia (@sulagarcia), Intel's Developers Evangelist, speaking on the first Ultracode Berlin Meetup.
Join us here : http://www.meetup.com/Ultracode-Berlin
Workshop Operations: Benjamin Kohler, Logica - Running Operations DevOps Style
---
Please contact us for a downloadable copy of the slides at CloudOps.Summit@googlemail.com .
Follow us on Twitter @CloudOps_Summit and
Facebook http://www.facebook.com/CloudOps
Human-Centered Design and the Intersection of the Physical and Digital WorldsEffectiveUI
EffectiveUI user experience designers Lindsay Moore and Austin Brown's Lightning Round presentation given at IxDA Interaction '11 in Boulder, CO. "Austin and Lindsay demonstrate how they've redesigned everyday objects based on the combined disciplines of industrial and digital interaction design."
Presentatie tijdens het Hulshoff Seminar.
Over Hulshoff:
Hulshoff, een familiebedrijf met ruim 150 medewerkers, brengt haar klanten verder door facilitaire werkzaamheden volledig uit handen te nemen. Zo kunnen klanten van Hulshoff zich richten op de essentie van hun onderneming. Hulshoff zorgt continu voor innovatieve en passende oplossingen en vormt zo een betrouwbare en professionele serviceorganisatie.
Al sinds 1935 staat de balans tussen belangen op korte- en lange termijn voorop. Daarom werkt Hulshoff volgens de principes van Maatschappelijk Verantwoord Ondernemen (MVO) en hanteren we de eisen van het KVGM-systeem (Kwaliteit Veiligheid Gezondheid en Milieu).
De dienstverlening is onderverdeeld in drie segmenten; projectverhuizing, archiefbeheer en digitalisering.
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...itnewsafrica
The challenge of balancing four conflicting goals:
1.Social – keep employees happy
2.Business – keep processes running effectively
3.Financial – manage costs
4.Risk management – stop bad things from happening.
By Keith Bothma, HP Networking Sales and BU manager for the Enterprise Group in South Africa.
Big picture design without Big Design Up Front (Agile Roots 2010)Desiree Sy
One of the toughest problems facing agile UX designers is keeping the big picture in mind while designing incrementally. This talk builds on prior work at Alias (now Autodesk) that described successful agile adaptations of usability testing, contextual inquiry and iterative prototyping. I’ll present a framework we used to create and implement multi-sprint designs for a complex product without violating the agile taboo against big design.
EVENT DESCRIPTION: FRIDAY Aug 17 - Sun Aug 19, 2012. Solving the challenge of how we can provide social, sustainable, secure Hacking | “Capitalism with a Conscience” | Providing funds and tools for good causes using the power of the pros and the capacity of the crowd. E.g., Autism, Depression Centers, War Veterans | We pick. We solve problems. We give the solutions directly to the people who need them. | We will provide reasonable | compensation, profit sharing and equity to |a community run organization (i.e., Xcorp) | Developers, artists, professionals, VCs and others who make contributions. Sustainable Hacking creates the capacity to good, have fun and make money.
UX: Raising the bar with Software Development by Sulamita Garcia from IntelBeMyApp
Sulamita Garcia (@sulagarcia), Intel's Developers Evangelist, speaking on the first Ultracode Berlin Meetup.
Join us here : http://www.meetup.com/Ultracode-Berlin
Workshop Operations: Benjamin Kohler, Logica - Running Operations DevOps Style
---
Please contact us for a downloadable copy of the slides at CloudOps.Summit@googlemail.com .
Follow us on Twitter @CloudOps_Summit and
Facebook http://www.facebook.com/CloudOps
Human-Centered Design and the Intersection of the Physical and Digital WorldsEffectiveUI
EffectiveUI user experience designers Lindsay Moore and Austin Brown's Lightning Round presentation given at IxDA Interaction '11 in Boulder, CO. "Austin and Lindsay demonstrate how they've redesigned everyday objects based on the combined disciplines of industrial and digital interaction design."
Presentatie tijdens het Hulshoff Seminar.
Over Hulshoff:
Hulshoff, een familiebedrijf met ruim 150 medewerkers, brengt haar klanten verder door facilitaire werkzaamheden volledig uit handen te nemen. Zo kunnen klanten van Hulshoff zich richten op de essentie van hun onderneming. Hulshoff zorgt continu voor innovatieve en passende oplossingen en vormt zo een betrouwbare en professionele serviceorganisatie.
Al sinds 1935 staat de balans tussen belangen op korte- en lange termijn voorop. Daarom werkt Hulshoff volgens de principes van Maatschappelijk Verantwoord Ondernemen (MVO) en hanteren we de eisen van het KVGM-systeem (Kwaliteit Veiligheid Gezondheid en Milieu).
De dienstverlening is onderverdeeld in drie segmenten; projectverhuizing, archiefbeheer en digitalisering.
In 1994, IDC published a report about "Lotus Notes - the Agent of Change" detailing the dramatic ROI achieved by using Notes. We will discuss the whole roadmap - including the right and wrong turns during almost 20 years - leading to the present day Notes/Domino and current situation.
We're right now at the next inflexion point in enterprise productivity driven by the wave of Social Software and we will explore the role and roadmap for Notes/Domino as the catalyst for a Social Business.
Get Connected with Central Desktop - July 2012Central Desktop
In this monthly customer webinar, we chat about collaboration, answer your questions and highlight some things you may not know about using Central Desktop SocialBridge®.
This month’s topic: task management – part 2
Last month, we focused on project-management best practices. This month, we’re rolling up our sleeves and showing you how to do it with SocialBridge®. This webinar is geared to users who are new to our project-management capabilities and covers the basics:
- How to create milestones, task lists and tasks
- How to specify that one task happens before another
- How to use our built-in reports.
This presentation is an Introduction to Albert, noHold's newest Virtual Agent. This self-service helpdesk solution is designed to decrease ticketing volume, support cost, and time to resolution.
Living in a Material World: Keynote from DG MediaMind's Inspire 2012 in Munich looking at the need for technology to disappear into the environment organically to be more acceptable by consumers to address marketing concerns and build a symbiotic relationship between brand and consumer.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Ceedo is a privately held Israeli company that develops innovative technologies and flexible computing solutions that deal with both the old and new challenges faced by IT.To-date we have over 4,000,000 users using our solutions worldwide, and we have partnerships with some of the largest key players in the IT and security world.
When we speak of new IT challenges, we of course speak of the “new users”and how their behavior and needs change the way IT manages their desktops and applications.
Today users demand the ability to use their applications anywhere, any time.
They also want their own applications on any device.
Now, we all know that the world is becoming dynamic,and is no longer like the time when IT told the user what he could and couldn’t do. Today the tables have turned and it’s the users who are setting the pace.
And the old ways for managing and deploying desktops simply doesn’t meet the new demands.
So today, to centrally manage the desktop, IT is trying a host of different solutions that are roughly divided into two parts:
The first is cloud computing, where desktops and/or apps run remotely from the cloud
The second is to simply distribute applications using installation managers which push installation files to end-points.
But those two solutions still suffer from one fundamental problem…A problem that we at Ceedo have solved!
The problem: Today the desktop and applications are inseparably glued together.
The solution: Ceedo can separate the entire application layer on any platform you might use
All the applications run in a self-contained,Plug-and-PlaySecurely sandboxed and portable capsuleReady to run on any PC
Which means that it doesn’t matter if you are using Cloud computing, VDI, application deployment for corporate PCs, or deliveringsolutions for non-corporate PCs…Ceedo’s solutions can fit into all of them - and make them SAFE & COST-EFFECTIVE.
Ceedo Desktop:Deliver Modular End-User Environments for Managed Corporate PCs and Stateless VDI Platforms
And even more impressively:Ceedo Desktop allows organizations to lock down their PCs without locking down their users!
And even more impressively:Ceedo Desktop allows organizations to lock down their PCs without locking down their users!
Ceedo desktop can deliver fully-functional applications to end-points without installing them at all, and without the problems of application virtualization or layering solutions!
This can also make VDI into a viable and cost-effective solution with minimum effort
This can also make VDI into a viable and cost-effective solution with minimum effort
For instance, in portable computing outside of the organization…
For instance, in portable computing within the organization…
For instance, in portable computing within the organization…
For instance, in the organizations…
For instance, in the organizations…
So to conclude, we can simply say that –IT has to – and is – changing, and with Ceedo’s solutions:Organizations can make a smooth transition into the new world, by:Adapting their exiting infrastructures to these changes; Easing the adoption of new solutions, and doing so by integrating Ceedo into any platform;Simplifying management; Increasing security, and easing portability.