This document proposes the Cisco Secure Enclaves architecture to provide security and isolation for applications and data in shared cloud computing environments. The architecture uses standard Cisco integrated systems components along with additional security services. It aims to enable secure multi-tenancy and isolation through automated security configuration, auditing, patching and responses. This is intended to simplify management and provide compliance while allowing flexible consumption of computing and storage resources.
Windstream Hosted Solutions: Public Cloud SecurityJason Proctor
Cloud computing presents a number of unique benefits as compared to traditional or virtualized IT environments. Cloud computing shifts capital expenses (CAPEX) to operational expenses (OPEX) and introduces a new
level of speed, flexibility and scale to the IT organization. These benefits help overcome challenges faced by IT organizations, including rapidly changing technology, budget constraints and time-to-market pressures.
While cloud services can yield a number of advantages, this new model for computing also raises a few new questions.
Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or
consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all
processes, applications and services provisioned “on demand,” regardless of user location or device.
Windstream Hosted Solutions: Public Cloud SecurityJason Proctor
Cloud computing presents a number of unique benefits as compared to traditional or virtualized IT environments. Cloud computing shifts capital expenses (CAPEX) to operational expenses (OPEX) and introduces a new
level of speed, flexibility and scale to the IT organization. These benefits help overcome challenges faced by IT organizations, including rapidly changing technology, budget constraints and time-to-market pressures.
While cloud services can yield a number of advantages, this new model for computing also raises a few new questions.
Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or
consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all
processes, applications and services provisioned “on demand,” regardless of user location or device.
Open Digital Architecture (ODA) is a blueprint for modular, cloud-based, open digital platforms that can be orchestrated using AI.
Designed to support our industry into the cloud native era, ODA sets the framework required
for CSPs to invest in IT, transforming business agility and operations by creating simpler IT and network solutions that are easier and cheaper to deploy, integrate and upgrade. Enabling growth, profitability and a cutting-edge customer experience.
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
Cloud storage systems to protect data from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. In previous research implemented practical Data Integrity Protection (DIP) scheme for regenerating-coding based cloud storage. Functional Minimum-Storage Regenerating (FMSR) codes and it construct FMSR-DIP codes, which allow clients to remotely verify the integrity of random subsets of long-term archival data under a multi server setting. The problem is to optimize bandwidth consumption when repairing multiple failures. The cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired.
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
"The transition of companies to cloud-based will be quicker for some and slower for others depending on their individual circumstances, But the change will happen."
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Hybrid Cloud - Key Benefits & Must Have RequirementsJohn Katrick
Hybrid Cloud - Key Benefits & Must Have Requirements : Gartner says by 2020, a corporate "No-Cloud" Policy will be as rare as a "No-Internet" policy is today as per this article and specifically the Infrastructure as a Service (IaaS) market is projected to continue to grow more than 25 percent per year through 2019. This surge in cloud adoption also represents a huge shift in cloud spending by IT organizations, directly or indirectly affecting more than $1 trillion dollars in Cloud IT purchases by 2020, according to Gartner.
SDN creates a tailored or customized network experience which enables greater level of speed, flexibility, agility and scale in the data center. Read here from Netmagic Solutions.
Cloud computing is the hottest topic in IT. It is virtually impossible to read a trade publication or
attend an IT conference and not be overwhelmed by discussions of the advantages and benefits
of cloud computing. In spite of all of the interest, there is still considerable confusion and
disagreement within the IT industry about the definition of cloud computing. The Cloud
Computing Journal, for example, published an article that included 21 definitions of cloud
computing. 1
Though there is confusion about the definition, the goal of cloud computing is quite clear – to
achieve an order of magnitude improvement in the cost-effective, elastic provisioning and
delivery of IT services.
Проверка серийного номера устройства для доступа к сервисным услугамCisco Russia
- Что такое Service Entitlement
- Преимущества проверки прав доступа к сервисным услугам
- Уровни проверки прав доступа к услугам
- Приложение Support Case Manager
- Команда Global Service Relations (GSR)
- Дополнительные материалы и интерактивные приложения
Open Digital Architecture (ODA) is a blueprint for modular, cloud-based, open digital platforms that can be orchestrated using AI.
Designed to support our industry into the cloud native era, ODA sets the framework required
for CSPs to invest in IT, transforming business agility and operations by creating simpler IT and network solutions that are easier and cheaper to deploy, integrate and upgrade. Enabling growth, profitability and a cutting-edge customer experience.
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
Cloud storage systems to protect data from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. In previous research implemented practical Data Integrity Protection (DIP) scheme for regenerating-coding based cloud storage. Functional Minimum-Storage Regenerating (FMSR) codes and it construct FMSR-DIP codes, which allow clients to remotely verify the integrity of random subsets of long-term archival data under a multi server setting. The problem is to optimize bandwidth consumption when repairing multiple failures. The cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired.
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
"The transition of companies to cloud-based will be quicker for some and slower for others depending on their individual circumstances, But the change will happen."
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Hybrid Cloud - Key Benefits & Must Have RequirementsJohn Katrick
Hybrid Cloud - Key Benefits & Must Have Requirements : Gartner says by 2020, a corporate "No-Cloud" Policy will be as rare as a "No-Internet" policy is today as per this article and specifically the Infrastructure as a Service (IaaS) market is projected to continue to grow more than 25 percent per year through 2019. This surge in cloud adoption also represents a huge shift in cloud spending by IT organizations, directly or indirectly affecting more than $1 trillion dollars in Cloud IT purchases by 2020, according to Gartner.
SDN creates a tailored or customized network experience which enables greater level of speed, flexibility, agility and scale in the data center. Read here from Netmagic Solutions.
Cloud computing is the hottest topic in IT. It is virtually impossible to read a trade publication or
attend an IT conference and not be overwhelmed by discussions of the advantages and benefits
of cloud computing. In spite of all of the interest, there is still considerable confusion and
disagreement within the IT industry about the definition of cloud computing. The Cloud
Computing Journal, for example, published an article that included 21 definitions of cloud
computing. 1
Though there is confusion about the definition, the goal of cloud computing is quite clear – to
achieve an order of magnitude improvement in the cost-effective, elastic provisioning and
delivery of IT services.
Проверка серийного номера устройства для доступа к сервисным услугамCisco Russia
- Что такое Service Entitlement
- Преимущества проверки прав доступа к сервисным услугам
- Уровни проверки прав доступа к услугам
- Приложение Support Case Manager
- Команда Global Service Relations (GSR)
- Дополнительные материалы и интерактивные приложения
Как решения Cisco по безопасности могут повлиять на рост доходов, снижение из...Cisco Russia
Обычно информационная безопасность “продается” (производителями заказчикам, а службами ИБ своему руководству) под видом борьбы со страхом или выполнения нормативных требований. Однако в непростые экономические времена на первый план выходит третий драйвер продвижения технологий ИБ – экономика и финансы. Именно с их помощью можно показать как решения по безопасности могут помочь повысить прибыль предприятия, снизить издержки, повысить лояльность клиентов, ускорить выпуск продуктов и помочь достичь других бизнес-задач. Как решения Cisco по информационной безопасности помогают в этом?
Запись вебинара: https://www.youtube.com/watch?v=bcQWuKUMeb4
Последний в истории отзыв продукции уже не за горами. И с этим поможет Всеобъемлющий Интернет.
Узнайте больше о Всеобъемлющем Интернете: http://bit.ly/1Pi6lmy
Cisco Collaboration – как технологии позволяют видоизменять способы нашей работыCisco Russia
Каждый из нас – часть общества. Все люди постоянно взаимодействуют между собой как в личной жизни, так и, конечно, на работе. Условия нашей работы и задачи, которые приходится решать постоянно меняются – нам необходимо постоянно учиться чему-то новому, налаживать связи с новыми людьми. Технологии Cisco в области совместной работы позволяют людям по-новому взглянуть на привычные задачи и найти наиболее удобный способ работать эффективно и комфортно в любых условиях.
Готовые решения Cisco для построения «частного облака»Cisco Russia
Что делать с рутинными операциями над инфраструктурой ЦОД, которые администраторам инфраструктуры приходится выполнять чаще чем один раз в три месяца? Ответ простой – автоматизировать при помощи IaaS-платформы. Что делать с такими же рутинными операциями, которые администраторы приложений вынуждены в свою очередь снова и снова повторять на элементах инфраструктуры, подготовленных с нуля их коллегами "инфраструктурщиками"? Ответ такой же простой – автоматизировать при помощи PaaS платформы. В презентации речь пойдет о готовом решении Cisco, которое позволяет реализовать IaaS и PaaS сценарии автоматизации при помощи продуктов Cisco UCS Director (UCS-D) и Cisco Prime Service Catalog (PSC). Изюминкой готового решения является механизм изящной и бесшовной интеграции между IaaS (UCS-D) и PaaS (PSC) платформами Cisco, которая драматически упрощает процесс развертывания и сокращает затраты на внедрение и адаптацию.
Cisco participa da maior olimpíada educacional do mundoCisco do Brasil
A Cisco participa, nesta semana, da maior olimpíada de educação profissional do mundo, o WorldSkills Competition. A companhia é uma das patrocinadoras globais do evento, que reúne jovens de mais de 60 países na simulação de desafios de diversas profissões. A Cisco ainda fornece os equipamentos para o evento, que acontece de 11 a 16 de agosto no Anhembi, em São Paulo, Brasil.
Решение Cisco Active Threat Analytics (ATA) сочетает глубокие знания с передовыми технологиями, а также расширенными аналитическими данными и возможностями
для оперативного, направленного и точного выявления и изучения угроз.
Наши эксперты осуществляют круглосуточный мониторинг сетей заказчиков через глобальную сеть современных центров безопасности, обеспечивая постоянный контроль
и детальный анализ в качестве комплексного решения безопасности.
Thanks to the advent of public and private clouds, both IT and business have become more agile – more able to quickly respond to fluctuating needs and demands in information processing. However, to achieve a fully agile infrastructure, businesses need to integrate their traditional IT with clouds in all their variants. Hybrid clouds provide that path forward.
For companies considering a hybrid cloud infrastructure, there are significant concerns, with security being number one. Companies must protect corporate data and applications, even as that data moves in a geographically distributed IT infrastructure. Simultaneously, they must ensure the security of data from point of capture at the edge to consumption and storage in the back end. A second concern is ease of infrastructure management and maintenance. This concern becomes more relevant as the number of vendors and management interfaces increase. A related concern has to do with simplifying management and maintenance with automation. For automation to succeed, it requires a policy-driven infrastructure. Finally, because businesses are ultimately looking for greater agility from hybrid clouds, another key concern is the ease of application development and application deployment to production.
For this paper, we used publicly available information to compare two major hybrid cloud technology and service companies: Cisco, through its hybrid cloud portfolio, and HP, through its Helion portfolio. Although it is difficult to pinpoint exactly where each vendor falls in the hybrid cloud spectrum, we can draw a few broad conclusions. The Cisco approach is network-centric and application-centric. The HP approach, on the other hand, is more infrastructure-centric, with an emphasis in developer support, and includes some elements to support the software development lifecycle. The differences between the two companies’ approaches are clearest in the question of security. From our research, it is clear that HP and Cisco are both strong contenders. Their offerings span compute, storage, and network for hybrid clouds and offer different approaches to and levels of security, automation, SDLC support, network virtualization, cloud management, workload mobility technologies, and more. Each company has its own specific target niche in enterprise cloud deployments.
As the interconnectivity between private and public clouds grows, the world of the hybrid cloud is quickly changing. We expect significant changes in the near future –not only in offerings from Cisco and HP, but in the hybrid cloud ecosystem generally. We look forward to watching how Cisco, HP, and other cloud vendors adapt to the expansions and shifts in the future of the hybrid cloud.
A dynamic policy based security-as-a-service infrastructure for cloud environ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Assessing the Business Value of SDN Datacenter Security Solutionsxband
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Taming Cloud Sprawl - XConf Europe 2023 - Kief.pdfKief Morris
Composable Environments is an architectural approach to implementing environments (using Infrastructure as Code, of course) that are better aligned to support your organization's strategy.
Avoid Snowkflakes as Code and Horizontal Environment Provisioning. Instead, use Application-Driven Infrastructure Provisioning and Just Enough Environments!
IDC: Selecting the Optimal Path to Private CloudEMC
This IDC white paper discusses the challenges and benefits of various cloud paths: prebuilt or integrated infrastructure systems such as VCE Vblock, reference architectures such as EMC VSPEX, and traditional or "build your own" systems.
In summary, The impact of cloud computing on IT infrastructure support is profound, ushering in a new era of efficiency, agility, and scalability. Organizations must embrace this evolution, redefining their approach to IT infrastructure management to capitalize on the benefits of cloud computing.
Learn about IBM PureFlex Sytem and VMware vCloud Enterprise Suite. The IBM PureFlex System platform has been used to meet the hardware requirements in support of this reference architecture. All the components required to support vCloud Suite (including computing, networking, storage, and management interfaces). For more information on Pure Systems, visit http://ibm.co/J7Zb1v.
http://www.scribd.com/doc/210719868/IBM-pureflex-system-and-vmware-vcloud-enterprise-suite-reference-architecture
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
Cloud computing is a rapidly emerging technology that has removed the saddle of buying licensed software and heavy hardware. By exploiting this technology, clients are able to access resources remotely by using a simple web browser. They are not required to maintain hardware devices or software applications, so it saves managing cost and time for organizations. Many industries, such as banking, healthcare, and education, are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern. The utilization and payment process of cloud computing is similar to other common utilities such as electricity. As the users of electricity are only required to pay for the amount of electricity consumed throughout the month. Similarly, cloud providers charge the users based on the exploitation of a cloud system or resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied. Cloud computing is a completely internet dependent technology where client data is stored in the data center of a cloud provider. There are various challenges for adopting cloud computing such as privacy, interoperability and reliability. Beside these challenges, there are also several benefits for adopting this technology such as cost savings, easy scalability, and increased productivity. This research paper introduces a big picture of cloud computing and analyzes the key challenges as well as benefits of adopting the paradigm of cloud computing.
Similar to Cisco Secure Enclaves Architecture (20)
Обзор Сервисных Услуг Cisco в России и странах СНГ.Cisco Russia
Обзор Сервисных Услуг в России и странах СНГ.
Сервисные Услуги в России и странах СНГ делятсяна Базовую и Расширенную техническую поддержку.
БАЗОВАЯ ТЕХНИЧЕСКАЯ ПОДДЕРЖКА 1. Центр Технической Поддержки (ТАС) Центр технической поддержки Cisco TAC предоставляет Заказчикам быстрый доступ к технологическим экспертам с опытом диагностики и решения самых сложных проблем.
Cisco TAC обладает развитой системой управления запросами, которая позволяет оперативно направить проблему в соответствующую технологическую команду или перевести на следующий уровень поддержки, если проблема не решена в заданный период.
Cisco TAC предоставляет круглосуточную поддержку по всему миру.
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareCisco Russia
Клиентские контракты на услуги технической поддержки Cisco Smart Net Total Care
Cisco Smart Net Total Care (SNTC) — это контракт на услуги технической поддержки Cisco.
Cервис сочетает в себе ведущие в отрасли и получившие множество наград технические сервисы с дополнительно встроенными инструментами бизнес-аналитики, которые получает Заказчик через встроенные интеллектуальные возможности на портале Smart Net Total Care.
Запись вебинара "Решения компании Cisco для операторов связи по защите от взлома и вредоносного программного обеспечения": https://ciscoclub.ru/resheniya-kompanii-cisco-dlya-operatorov-svyazi-po-zashchite-ot-vzloma-i-vredonosnogo-programmnogo-o
Запись вебинара "Решения компании Cisco для операторов связи по защите от взлома и вредоносного программного обеспечения": https://ciscoclub.ru/resheniya-kompanii-cisco-dlya-operatorov-svyazi-po-zashchite-ot-vzloma-i-vredonosnogo-programmnogo-o
Запись вебинара "Решения компании Cisco для операторов связи по защите от взлома и вредоносного программного обеспечения": https://ciscoclub.ru/resheniya-kompanii-cisco-dlya-operatorov-svyazi-po-zashchite-ot-vzloma-i-vredonosnogo-programmnogo-o
Профессиональные услуги Cisco для Software-Defined AccessCisco Russia
Как реализовать SDA, создать стратегию, которая будет сопоставлена с бизнес задачами, оценить готовность к трансформации, успешно и максимально надежно реализовать намеченные планы.
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Cisco Russia
О работе группы исследователей компании Cisco, в которой доказана применимость традиционных методов статистического и поведенческого анализа для обнаружения и атрибуции известного вредоносного ПО, использующего TLS в качестве метода шифрования каналов взаимодействия, без дешифровки или компрометации TLS-сессии. Также рассказано о решении Cisco Encrypted Traffic Analytics, реализующем принципы, заложенные в данном исследовании, его архитектуре и преимуществах.
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиCisco Russia
Как компания Cisco способствует цифровой трансформации предприятий нефтегазовой отрасли. Описание внедренных проектов, полученных результатов, обзор примененных архитектур.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.