This talk shows how you can via a risk assessment process work out how to minimise risk and what security features you should implement that is cost effective. It then shows how this risk assessment process was applied to a ColdFusion project.
This talk was presented at the cf.Objective() conference in Minneapolis in April 2010.
The document discusses the challenges of managing a large workforce during times of change. It notes that communication is key to helping employees understand changes and maintaining productivity. Regular updates that are honest, clear, and provide context can reassure employees and reduce uncertainty. Leaders must also listen to employee concerns, address issues promptly and be open to feedback to build trust throughout the organization.
ColdFusion Security and Risk ManagementJustin Mclean
This document outlines the process of conducting a risk assessment for a ColdFusion application. It discusses identifying assets, threats, likelihood and consequences to determine risk levels. It then covers setting an acceptable risk level and prioritizing threats. For a student election system example, it examines specific threats like SQL injection, server configuration issues, and code modification, providing treatments to address each risk. The overall goal is to balance security and costs to achieve an adequately secure system.
This session looks at the revolution in low cost, easy to program embedded computing and connecting it to the internet. Focusing on the Arduino open source hardware and software platform and how it can be easily connected to various RIA platforms – directly, via the ethernet or via the cloud. Topics covered range from digital and analogue input and output to creating your own Arduino web server (in under 20 lines of code). Show that it's easier than you realise to interface with hardware and that with a little knowledge you can do this.
This session will look at the revolution in low cost easy to program embedded computing. It focuses on the Arduino open source hardware and software platform and how this can be connected to and communicate with ColdFusion. Topics covered include how to implement the Firmata protocol in ColdFusion, using Arduino Ethernet shields and unsing Pachube.
A Practical Guide to Connecting Hardware to FlexJustin Mclean
A look at the revolution in low cost, easy to program embedded computing and how to connect it to Flex. Focusing on the Arduino open source hardware and software platform and how it can be easily connected both directly and via the Ethernet. The slides cover digital and analogue input and output and how to create your own web server (in under 20 lines of code). It’s easier than you realise to interface Flex with hardware and with a little knowledge you too can can do this.
The document discusses the challenges of managing a large workforce during times of change. It notes that communication is key to helping employees understand changes and maintaining productivity. Regular updates that are honest, clear, and provide context can reassure employees and reduce uncertainty. Leaders must also listen to employee concerns, address issues promptly and be open to feedback to build trust throughout the organization.
ColdFusion Security and Risk ManagementJustin Mclean
This document outlines the process of conducting a risk assessment for a ColdFusion application. It discusses identifying assets, threats, likelihood and consequences to determine risk levels. It then covers setting an acceptable risk level and prioritizing threats. For a student election system example, it examines specific threats like SQL injection, server configuration issues, and code modification, providing treatments to address each risk. The overall goal is to balance security and costs to achieve an adequately secure system.
This session looks at the revolution in low cost, easy to program embedded computing and connecting it to the internet. Focusing on the Arduino open source hardware and software platform and how it can be easily connected to various RIA platforms – directly, via the ethernet or via the cloud. Topics covered range from digital and analogue input and output to creating your own Arduino web server (in under 20 lines of code). Show that it's easier than you realise to interface with hardware and that with a little knowledge you can do this.
This session will look at the revolution in low cost easy to program embedded computing. It focuses on the Arduino open source hardware and software platform and how this can be connected to and communicate with ColdFusion. Topics covered include how to implement the Firmata protocol in ColdFusion, using Arduino Ethernet shields and unsing Pachube.
A Practical Guide to Connecting Hardware to FlexJustin Mclean
A look at the revolution in low cost, easy to program embedded computing and how to connect it to Flex. Focusing on the Arduino open source hardware and software platform and how it can be easily connected both directly and via the Ethernet. The slides cover digital and analogue input and output and how to create your own web server (in under 20 lines of code). It’s easier than you realise to interface Flex with hardware and with a little knowledge you too can can do this.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
ColdFusion Security and Risk Management
1. ColdFusion Security and
Risk Management
Justin Mclean
Email: justin@classsoftware.com
Twitter: @justinmclean
Blog: http://blog.classsoftware.com
Tuesday, 27 April 2010
2. Who am I?
• Director of Class Software for 10 years
• Developing and creating web applications for 15
years
• Programming for 25 years
• Adobe Community Professional
• Adobe certified developer and trainer in
ColdFusion and Flex
• Based in Sydney Australia
Tuesday, 27 April 2010
3. Security
• No system is 100% secure
• Security takes time and effort and can be costly
• How much security is actually needed?
• Is a security feature actually effective?
Tuesday, 27 April 2010
4. Risk Assessment
Risk assessment is a tool used to balance
business objectives and security
requirements in order to achieve cost
effective security measures.
Tuesday, 27 April 2010
5. Process
1. Identify assets
2. Identify and quantify the possible threats
3. Determine the consequence of each threat
4. Evaluate the current risk
5. Decide acceptable level of risk
6. Treat each risk
Tuesday, 27 April 2010
6. Frequency
• This is not a once off process
• Repeat when:
• System is in place
• Changes are made to the system or assets
• Made aware of new threats
Tuesday, 27 April 2010
7. Identify Assets
• Create list of assets
• Hardware
• Availability of service
• Integrity of information
• Reputation of system and/or organisation
• Staff
Tuesday, 27 April 2010
8. Identify Threats
• Create a list of threats
• Be creative include unlikely threats
• Tendency to ignore obvious threats
• Careful of preconceived attitudes
Tuesday, 27 April 2010
9. How likely is each threat?
gh
e
w
ibl
me
m
Lo
Hi
glig
diu
tre
gh
ry
ry
w
Ne
Me
Lo
Ex
Ve
Ve
Hi
Occurs coupleevery times asix5 years
OccursOccurstime six months
OccursUnlikelyof every year
Occurs once times a months
Occurs everyoccur month
a couple to month
multiple
Occurs multipletimes in day
Tuesday, 27 April 2010
10. How likely is each threat?
gh
e
w
ibl
me
m
Lo
Hi
glig
diu
tre
gh
ry
ry
w
Ne
Me
Lo
Ex
Ve
Ve
Hi
Occurs coupleevery times asix5 years
OccursOccurstime six months
OccursUnlikelyof every year
Occurs once times a months
Occurs everyoccur month
a couple to month
multiple
Occurs multipletimes in day
Tuesday, 27 April 2010
11. How likely is each threat?
gh
e
w
ibl
me
m
Lo
Hi
glig
diu
tre
gh
ry
ry
w
Ne
Me
Lo
Ex
Ve
Ve
Hi
Occurs coupleevery times asix5 years
OccursOccurstime six months
OccursUnlikelyof every year
Occurs once times a months
Occurs everyoccur month
a couple to month
multiple
Occurs multipletimes in day
Tuesday, 27 April 2010
12. How likely is each threat?
gh
e
w
ibl
me
m
Lo
Hi
glig
diu
tre
gh
ry
ry
w
Ne
Me
Lo
Ex
Ve
Ve
Hi
Occurs coupleevery times asix5 years
OccursOccurstime six months
OccursUnlikelyof every year
Occurs once times a months
Occurs everyoccur month
a couple to month
multiple
Occurs multipletimes in day
Tuesday, 27 April 2010
13. How likely is each threat?
gh
e
w
ibl
me
m
Lo
Hi
glig
diu
tre
gh
ry
ry
w
Ne
Me
Lo
Ex
Ve
Ve
Hi
Occurs coupleevery times asix5 years
OccursOccurstime six months
OccursUnlikelyof every year
Occurs once times a months
Occurs everyoccur month
a couple to month
multiple
Occurs multipletimes in day
Tuesday, 27 April 2010
14. How likely is each threat?
gh
e
w
ibl
me
m
Lo
Hi
glig
diu
tre
gh
ry
ry
w
Ne
Me
Lo
Ex
Ve
Ve
Hi
Occurs coupleevery times asix5 years
OccursOccurstime six months
OccursUnlikelyof every year
Occurs once times a months
Occurs everyoccur month
a couple to month
multiple
Occurs multipletimes in day
Tuesday, 27 April 2010
15. How likely is each threat?
gh
e
w
ibl
me
m
Lo
Hi
glig
diu
tre
gh
ry
ry
w
Ne
Me
Lo
Ex
Ve
Ve
Hi
Occurs coupleevery times asix5 years
OccursOccurstime six months
OccursUnlikelyof every year
Occurs once times a months
Occurs everyoccur month
a couple to month
multiple
Occurs multipletimes in day
Tuesday, 27 April 2010
16. Consequence of each threat?
t
an
t
g
can
gin
i fic
us
r
ave
ma
nifi
ign
rio
no
Da
Ins
Gr
Sig
Mi
Se
Serious.No extra effort outageSystem of
Few people notice. Small effortor loss
Loss of harm. compromised. repair.
SomeExtend Some effort to to repair
Completely system to repairMajor
confidence/reputation.
permanently closed or offline.
effort to repair.
customers.
Tuesday, 27 April 2010
17. Consequence of each threat?
t
an
t
g
can
gin
i fic
us
r
ave
ma
nifi
ign
rio
no
Da
Ins
Gr
Sig
Mi
Se
Serious.No extra effort outageSystem of
Few people notice. Small effortor loss
Loss of harm. compromised. repair.
SomeExtend Some effort to to repair
Completely system to repairMajor
confidence/reputation.
permanently closed or offline.
effort to repair.
customers.
Tuesday, 27 April 2010
18. Consequence of each threat?
t
an
t
g
can
gin
i fic
us
r
ave
ma
nifi
ign
rio
no
Da
Ins
Gr
Sig
Mi
Se
Serious.No extra effort outageSystem of
Few people notice. Small effortor loss
Loss of harm. compromised. repair.
SomeExtend Some effort to to repair
Completely system to repairMajor
confidence/reputation.
permanently closed or offline.
effort to repair.
customers.
Tuesday, 27 April 2010
19. Consequence of each threat?
t
an
t
g
can
gin
i fic
us
r
ave
ma
nifi
ign
rio
no
Da
Ins
Gr
Sig
Mi
Se
Serious.No extra effort outageSystem of
Few people notice. Small effortor loss
Loss of harm. compromised. repair.
SomeExtend Some effort to to repair
Completely system to repairMajor
confidence/reputation.
permanently closed or offline.
effort to repair.
customers.
Tuesday, 27 April 2010
20. Consequence of each threat?
t
an
t
g
can
gin
i fic
us
r
ave
ma
nifi
ign
rio
no
Da
Ins
Gr
Sig
Mi
Se
Serious.No extra effort outageSystem of
Few people notice. Small effortor loss
Loss of harm. compromised. repair.
SomeExtend Some effort to to repair
Completely system to repairMajor
confidence/reputation.
permanently closed or offline.
effort to repair.
customers.
Tuesday, 27 April 2010
21. Consequence of each threat?
t
an
t
g
can
gin
i fic
us
r
ave
ma
nifi
ign
rio
no
Da
Ins
Gr
Sig
Mi
Se
Serious.No extra effort outageSystem of
Few people notice. Small effortor loss
Loss of harm. compromised. repair.
SomeExtend Some effort to to repair
Completely system to repairMajor
confidence/reputation.
permanently closed or offline.
effort to repair.
customers.
Tuesday, 27 April 2010
22. Risk
• Risk is a combination of frequency and
consequence
• The more likely a threat will occur increases risk
• The more serious a threat increases risk
Tuesday, 27 April 2010
23. Risk
Consequence
Insignificant Minor Significant Damaging Serious Grave
Negligible Nil Nil Nil Nil Nil Nil
Very Low Nil Low Low Low Medium Medium
Low Nil Low Medium Medium High High
Threat
Medium Nil Low Medium High High Critical
High Nil Medium High High Critical Extreme
Very High Nil Medium High Critical Extreme Extreme
Extreme Nil Medium High Critical Extreme Extreme
Tuesday, 27 April 2010
24. Acceptable Risk
• Set level of acceptable risk
• Assign priorities for each threat based on
acceptable risk and risk of threat
Tuesday, 27 April 2010
25. Priorities
• A required risk > actual risk + 1 level
• B required risk = actual +1 level
• C required risk = actual risk
• D required risk < actual risk
Tuesday, 27 April 2010
26. Treatments
• Minimisation of harm
• Change of service or system specifications
• Addition of security measures
• Reduction of security measures
• Transference of risk
• Acceptance of risk
Tuesday, 27 April 2010
27. Effort and Cost
• May be many ways to treat a single threat
• Amount of effort or cost may decide which
treatment chosen
Tuesday, 27 April 2010
28. Election System
Student election system for the
University of Technology Sydney
Tuesday, 27 April 2010
30. Server Configuration
• Run with minimal down time
• Perform well under load
• Limited external access to server
Tuesday, 27 April 2010
31. Server Treatment
• Staging/production system
• Not a shared server
• Standalone separate machines for database and
CF server
• No access to production server
• Code reviewed by external agency
Tuesday, 27 April 2010
32. Network Issues
• Occasional network outages
• Occasional slow access from outside
Tuesday, 27 April 2010
33. Network Treatment
• Ability to change the end date after an election
has started
• Date could only be extended not reduced
Tuesday, 27 April 2010
34. SQL Security Issues
• SQL injection attacks
• Sensitivity of data
• Trust and integrity of election results
Tuesday, 27 April 2010
35. SQL Security Treatment
• Multiple data sources
• Multiple database users
• Restrict SQL actions. No deletes and almost no
updates few inserts and mainly selects.
• Table level permissions
Tuesday, 27 April 2010
38. SQL Permissions
• Deny all to all users to all tables
• Add permissions for each SQL operation as
needed
• Don’t be tempted to give admin user all
permissions
Tuesday, 27 April 2010
39. Deny All
deny all on elections to electionvoter,
electionadmin, electionlogin
deny all on candidates to electionvoter,
electionadmin, electionlogin;
deny all on rolls to electionvoter, electionadmin,
electionlogin;
deny all on ballots to electionvoter,
electionadmin, electionlogin;
Tuesday, 27 April 2010
40. Grant Access
grant select on roll to electionvoter,
electionadmin;
grant update on roll to electionvoter;
grant insert on roll to electionadmin;
Tuesday, 27 April 2010
42. Login Treatment
• Account lock out if password wrong x times
• Random time delay
Tuesday, 27 April 2010
43. Java Sleep
<!--- delay is to hinder timing style attacks --->
<cfset thread=createObject("java","java.lang.Thread")>
<cfset thread.sleep(300 + int(rand()*21)*10)>
Tuesday, 27 April 2010
44. Code Modification
• Pages code not modified
• Only run trusted pages
Tuesday, 27 April 2010
45. Code Modification Treatment
• Finger print each page via MD5
• Check finger print when page is run via
Application onRequest method
Tuesday, 27 April 2010
46. onRequest
<!--- read the cfm file --->
<cftry>
<cffile action="read" variable="pagecontents"
file="#CGI.PATH_TRANSLATED#">
.......
</cftry>
<!--- get page from database --->
<cfquery name="dbpage" datasource="#request.datasource#">
select page, hash from pages
where page = <cfqueryparam value="#hash(listlast(arguments.page,'/'))
#" cfsqltype="cf_sql_varchar">
</cfquery>
<!--- check if page exists and page hash is correct --->
<cfif dbpage.recordcount is 1 and hash(pagecontents) is dbpage.hash>
<cfinclude template="#arguments.page#">
<cfelse>
<cfinclude template="./elections/security.cfm">
</cfif>
Tuesday, 27 April 2010
47. Limiting Information
• Assume someone will break into the system
• What information can they obtain?
• What could they modify?
• Limit what they can see
• Minimise damage they can do
• Log everything
Tuesday, 27 April 2010
48. Why do this?
• Know that you’re spent you budget efficiently
• Confidence that your system is secure as you
need it to be
• An understanding of the risks in your system
• Minimal or no damage occurs if the worse does
happen
Tuesday, 27 April 2010
49. Questions?
Ask now, see me after the session or email me at
justin@classsoftware.com
Tuesday, 27 April 2010