Tracking technology trends that will change the future of the industry. Fostering innovation. Megatrends and transitions are occurring in months rather than years. From mobility and video to cloud and network programmability, there is no end in sight. The implications of this are amazing. Faster rates of new product introduction. Increasing product complex- ity. And a highly volatile technology landscape, where disruption occurs more easily. To continue advancing the technological frontier, and encouraging global economic growth, we need a comprehensive vision of where the IT industry is heading. Cisco Technology Radar meets this need. It is the foundation of Cisco internal and external innovation strategy. The Corporate Technology Group coordinates the radar for the Cisco Chief Technology and Strategy Office. The program builds on Cisco employees’ passion for technology combined with data-driven inputs from the latest trends in academic research, patenting activity, and venture capital funding.
Independent of industry, BCG Green Ventures believes in 12 concrete opportunities the world needs to get to net zero. These are the 12 levers available for any given corporate to participate in the decarbonization economy, which we are treating as a massive value creation opportunity.
Business Strategy Presentation Template 2023 - By ex-Mckinsey and BCG consult...Slideworks
A comprehensive, end-to-end strategy presentation template based on proven frameworks created by ex-McKinsey and BCG consultants.
277 PowerPoint slides organized in a complete storyline with best-practice slide-layouts, titles, and graphics
4 real-life full-length examples from Fortune500 companies so you can see how a strategy is presented in other organizations
Helpful checklist used in top-tier consulting firms
Excel model to support your strategy document.
Access full powerpoint at www.slideworks.io.
Independent of industry, BCG Green Ventures believes in 12 concrete opportunities the world needs to get to net zero. These are the 12 levers available for any given corporate to participate in the decarbonization economy, which we are treating as a massive value creation opportunity.
Business Strategy Presentation Template 2023 - By ex-Mckinsey and BCG consult...Slideworks
A comprehensive, end-to-end strategy presentation template based on proven frameworks created by ex-McKinsey and BCG consultants.
277 PowerPoint slides organized in a complete storyline with best-practice slide-layouts, titles, and graphics
4 real-life full-length examples from Fortune500 companies so you can see how a strategy is presented in other organizations
Helpful checklist used in top-tier consulting firms
Excel model to support your strategy document.
Access full powerpoint at www.slideworks.io.
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...Smart City
Productivity in the engineering and construction industry has been stagnant for decades. The proliferation of digital solutions has made it difficult for users to develop a coherent strategy. Companies who are able to successfully navigate the new digital landscape are on the brink of a transformation that will see top performers reduce overall project costs by 20-45%. However, digital transformations require developing digital capability across all aspects of the organization. Therefore, each entity involved in the industry must understand its critical challenges in order to guide its path to increased digital capability.
The tipping point for electrified vehicles is in sight, and a combination of hybrid and fully electric powertrains is expected to cut the global market share of pure internal combustion engines (ICEs) by about 50% by 2030.
The presentation covers innovation strategies that have been implemented by different companies in different industries to disrupt the market and become leaders in their industries.
Open Innovation And strategy includes the Long term growth of the company in which industries/technologies a firm wants to be active – new business development
CEO's need to change the way their companies do business. Why? How? and... Do it Different! Check out these 3 key messages in detail. This presentation was held at the CEO Forum in Taipei, Taiwan.
Easily define & implement your Digital Transformation Strategy & Plan by leveraging this 10-step Template. Created by ex-McKinsey, Deloitte and BCG Consultants specialized in Digital Strategy, after more than 600 hours of work. Don’t reinvent the wheel. Download Now. To download the whole template, go to www.slidebooks.com.
McKinsey Global Institute's latest report shows how soaring flows of data and information now generate more economic value than the global goods trade. Here are the key charts and graphs that tell the story. For the full report, visit http://bit.ly/digiflows.
Cisco Tech Advantage Webinar. June 4th, 2014
Video: http://youtu.be/RkmMi9qea5Y
IoT is everywhere, from smart meters on houses to parking sensors in the ground – all devices are connected to the Internet. Internet engineers are helping traditional industries solve new industrial world challenges by connecting billions of new devices. An exciting part of the IoT journey is the integration between both worlds: Information Technology (IT) and Operation Technology (OT). For that a systems approach is required to scale the existing Internet infrastructure to accommodate IoT use cases, while making IT technology easy to adopt for OT operators.
In this session you will learn:
IoT infrastructure challenges and the need for open standards and partner ecosystem
Key elements to build large-scale IoT systems as IPv6, access control, plug and play, distributed intelligence and contextual awareness
Introduction to fog computing and advantages of extending cloud computing and services
Looking ahead to the future
A Connected Data Landscape: Virtualization and the Internet of ThingsInside Analysis
The Briefing Room with Dr. Robin Bloor and Cisco
Live Webcast March 3, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=a75f0f379405de155800a37b2bf104db
Data at rest, data in motion - regardless of its trajectory, data remains the lifeblood of today's information economy. But finding a way to bridge old systems with new opportunities requires an innovative data strategy, one that takes advantage of multiple processing technologies. With the optimal architecture in place, companies can harness years of work in traditional information systems, while opening the door to the flood of new data sources available.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor, as he explains how data virtualization and other data technologies fundamentally change what's possible with data access, movement and analysis. He'll be briefed by David Besemer of Cisco, who will discuss how this new kind of data strategy can enable the integration of legacy systems, Cloud computing and the Internet of Things. He'll also answer questions about how Big Data and the IoT are helping to redefine the practice of data management.
Visis InsideAnalysis.com for more information.
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...Smart City
Productivity in the engineering and construction industry has been stagnant for decades. The proliferation of digital solutions has made it difficult for users to develop a coherent strategy. Companies who are able to successfully navigate the new digital landscape are on the brink of a transformation that will see top performers reduce overall project costs by 20-45%. However, digital transformations require developing digital capability across all aspects of the organization. Therefore, each entity involved in the industry must understand its critical challenges in order to guide its path to increased digital capability.
The tipping point for electrified vehicles is in sight, and a combination of hybrid and fully electric powertrains is expected to cut the global market share of pure internal combustion engines (ICEs) by about 50% by 2030.
The presentation covers innovation strategies that have been implemented by different companies in different industries to disrupt the market and become leaders in their industries.
Open Innovation And strategy includes the Long term growth of the company in which industries/technologies a firm wants to be active – new business development
CEO's need to change the way their companies do business. Why? How? and... Do it Different! Check out these 3 key messages in detail. This presentation was held at the CEO Forum in Taipei, Taiwan.
Easily define & implement your Digital Transformation Strategy & Plan by leveraging this 10-step Template. Created by ex-McKinsey, Deloitte and BCG Consultants specialized in Digital Strategy, after more than 600 hours of work. Don’t reinvent the wheel. Download Now. To download the whole template, go to www.slidebooks.com.
McKinsey Global Institute's latest report shows how soaring flows of data and information now generate more economic value than the global goods trade. Here are the key charts and graphs that tell the story. For the full report, visit http://bit.ly/digiflows.
Cisco Tech Advantage Webinar. June 4th, 2014
Video: http://youtu.be/RkmMi9qea5Y
IoT is everywhere, from smart meters on houses to parking sensors in the ground – all devices are connected to the Internet. Internet engineers are helping traditional industries solve new industrial world challenges by connecting billions of new devices. An exciting part of the IoT journey is the integration between both worlds: Information Technology (IT) and Operation Technology (OT). For that a systems approach is required to scale the existing Internet infrastructure to accommodate IoT use cases, while making IT technology easy to adopt for OT operators.
In this session you will learn:
IoT infrastructure challenges and the need for open standards and partner ecosystem
Key elements to build large-scale IoT systems as IPv6, access control, plug and play, distributed intelligence and contextual awareness
Introduction to fog computing and advantages of extending cloud computing and services
Looking ahead to the future
A Connected Data Landscape: Virtualization and the Internet of ThingsInside Analysis
The Briefing Room with Dr. Robin Bloor and Cisco
Live Webcast March 3, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=a75f0f379405de155800a37b2bf104db
Data at rest, data in motion - regardless of its trajectory, data remains the lifeblood of today's information economy. But finding a way to bridge old systems with new opportunities requires an innovative data strategy, one that takes advantage of multiple processing technologies. With the optimal architecture in place, companies can harness years of work in traditional information systems, while opening the door to the flood of new data sources available.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor, as he explains how data virtualization and other data technologies fundamentally change what's possible with data access, movement and analysis. He'll be briefed by David Besemer of Cisco, who will discuss how this new kind of data strategy can enable the integration of legacy systems, Cloud computing and the Internet of Things. He'll also answer questions about how Big Data and the IoT are helping to redefine the practice of data management.
Visis InsideAnalysis.com for more information.
Blair christie global editors conf 12.9.14 finalMarc Musgrove
Cisco CMO Blair Christie's presentation at the Cisco Global Editors' Conference - on the future of work and results of our recent IoT Analytics thought leadership study.
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
As a novel computing platform in network, IoT will bring many security challenges to enterprise networks, and create new opportunities for security industry. This talk will provide a general overview of enterprise network security problems, especially the data security, caused by IoT. After that, a few existing security technologies are evaluated as necessary elements of a holistic network security that cover IoT devices. These technologies include : (a) IoT security monitoring and control; (b) FOTA for firmware vulnerability management; (c) NetFlow based big data security analysis. In the end, the practice of standard security protocols (such as OpenIoC and IODEF) will be strongly advocated for delivering effective IoT security solutions.
The Internet of Things is connecting just about any physical object in our environment with a growing option of users, partners, applications, 3rd party software systems and vendors. Managing and securing the growing number of things, people, and applications shuttling data to and from one another is a massive Identity & Access Management nightmare for most enterprises. In this talk we will discuss real-world scenarios for building more scalable identity management systems and how they will interact with your existing enterprise systems such as Salesforce.com.
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
The Briefing Room with Mark Madsen and Cisco
Live Webcast August 18, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=0eff120f8b2879b582b77f4ff207ee54
Today's digital enterprises are seeing an explosion of data at the edge. The Internet of Everything is fast approaching a critical mass that will demand a sea change in how companies process data. This new world of information is widely distributed, streaming, and overall becoming too big to move. Experts predict that within two to three years, the bulk of analytic processing will take place on the fringes of information architectures. As a result, forward-thinking companies are dramatically shifting their analytic strategies.
Register for this episode of The Briefing Room to hear veteran Analyst Mark Madsen of Third Nature explain how a new era of information architectures is now unfolding, paving the way to much more responsive and agile business models. He'll be briefed by Kim Macpherson of the Cisco Data and Analytics Business Unit, who will explain how her company's platform is uniquely suited for this new, federated analytic paradigm. She'll demonstrate how edge analytics can help companies address opportunities quickly and effectively.
Visit InsideAnalysis.com for more information.
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
GICT Certified Internet of Things Specialist (CIoTS) course focuses on the core technologies behind Internet of Things (IoT).
Find Out More : https://globalicttraining.com
Learn how and why John McDonough contributes to Ansible and how you can too. We’ll arm you with what you need to know, things like Python, Git, and YAML.
Rome 2017: Building advanced voice assistants and chat botsCisco DevNet
If it takes minutes to code a simple bot, building professional bots represents quite a challenge. Soon you realize you need serious programming and API architecture experience but also “Bot” specific skills. In this session, we'll first show the code of advanced Chat and Voice interactions, and then explore the challenges faced when building advanced Bots (Context storage, NLP approaches, Bot Metadata, OAuth scopes), and discuss interesting opportunities from latest industry trends (Bot platforms, Serverless, Microservices). This talk is about showing the code and sharing lessons learned.
How to Build Advanced Voice Assistants and ChatbotsCisco DevNet
Learn more about the CodeMotion Voice Machine and Cisco DevNet Chatbot. Understand what a typical bot journey is and where to go to get more information about Cisco Spark and Tropo.
Cisco Spark and Tropo and the Programmable WebCisco DevNet
Learn how Cisco Spark and Tropo collaboration features can be easily combined with hundreds of cloud APIs to build sophisticated, flexible workflows via a new breed of programmable web solutions from 'Integration Platform as a Service (iPaaS)' partners like Built.io, Zapier and IFTTT. This session covers multiple real-world Cisco+iPaaS use-cases, and includes a hands-on walk-through demonstrating how to build a Spark+Tropo sample application using Built.io.
Watch the BRK-DEV2004 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92557&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Device Programmability with Cisco Plug-n-Play SolutionCisco DevNet
Cisco Open Plug-n-Play solution allows customers to reduce the costs associated with deployment/installation of network devices, increase the speed and reduce the complexity of deployments without compromising the security. Using Cisco Plug-n-Play solution, customers can do Zero Touch Installs of Cisco gear in various deployment scenarios and deployment locations.
Watch the DevNet 2052 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91108&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Building a WiFi Hotspot with NodeJS: Cisco Meraki - ExCap APICisco DevNet
Captive Portals, also known as Splash Pages, are a common requirement for guest WiFi. Captive portals typically deliver branding, a terms of service and a simple login process before authenticating the client onto the network. By leveraging the Meraki ExCap API, developers can customize this experience based on their requirements. This deep dive will walk through the various API options: Click-through vs Sign-on Splash page Programming a Click-through and Sign-on (w/ RADIUS) using NodeJS Programming a Click-through with Node-RED Leveraging OAuth for social login support.
Watch the DevNet 2049 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92727&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Application Visibility and Experience through Flexible NetflowCisco DevNet
The world of applications is changing rapidly in the enterprise; from the way applications are increasingly hosted in the cloud, the diverse nature of apps and to the way they are consumed by many devices. The need for organizations and network administrators is to focus on "Fast IT" - "Innovation in the Enterprise" is growing, which means having to spend less time on daily operations, maintenance and troubleshooting and more time on delivering business value with newer services. Cisco AVC with its NBAR2 technology is designed to detect applications and measure application performance through measuring round trip time, retransmission rates, jitter, delay, packet loss, MoS, URL statistics etc. Those details are transmitted using Flexible Netflow/IPFIX, so partners could leverage the data for application usage reporting, performance reporting and troubleshooting application issues to deliver best possible application experience.
Watch the DevNet 2047 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92664&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
The WAN Automation Engine (WAE) is a software platform that provides multivendor and multilayer visibility and analysis for service provider and large enterprise networks. It plays a critical role in answering key questions of network resource availability, and when appropriate can automate and simplify Traffic Engineering mechanisms such as RSVP-TE and Segment Routing. This session will focus on use-cases and APIs for developers.
Watch the DevNet 2035 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92720&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Cisco's Open Device Programmability Strategy: Open DiscussionCisco DevNet
Cisco DNA is an open and extensible, software-driven architecture built on a set of design principles with the objective of providing:
- Insights & Actions to drive faster business innovation
- Automaton & Assurance to lower IT costs and complexity while meeting business and user expectations
- Security & Compliance to reduce risk as the organization continues to expand and grow. The architecture extends to Cisco network elements.
This session will focus on the open, model-driven, programmable interfaces available across Cisco's network elements which enable you to leverage and extend your network through applications that directly access the routers and switches in your network.
Watch the DevNet 1028 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91041&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Open Device Programmability: Hands-on Intro to RESTCONF (and a bit of NETCONF)Cisco DevNet
In this small group, hands-on workshop session you'll learn how to write your first Python application that uses YANG, NETCONF and , RESTCONF to access operational and configuration data on a device.
Watch the DevNet 2044 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92725&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
NETCONF & YANG Enablement of Network DevicesCisco DevNet
A technical discussion and a demo showing how Tail-f's ConfD management agent can be used to implement NETCONF and YANG, the industry-leading solution for providing a programmable management interface in a network element. ConfD is recognized as the best-in-breed embedded software for implementing management functions in network elements, including physical devices and virtualized network functions (VNF) for NFV.
This Workshop is a best fit for engineers who are involved in the design and development of embedded software for network devices. Attendees will gain a basic understanding of what NETCONF and YANG are and how ConfD provides a solution for embedding this technology in the network devices. More information about ConfD can be found at: https://developer.cisco.com/site/confD/
Watch the DevNet 1216 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92703&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
UCS Management APIs A Technical Deep DiveCisco DevNet
Underneath the UCS API Python SDK, Powershell Libraries and VMware and OpenStack plugins there is the UCS XML API itself. This session will go deep into the API and explain how the SDK, Libraries and plugins actually communicate with UCS components. We will cover API session management, queries, query filters, configuration methods, functions and event subscription. Understanding the low-level UCS APIs and Object Model will enable you to build your own programmatic interface into your UCS environments in the language you like on the platform of your choosing.
Watch the DevNet 3003 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91099&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
The DevOps model is rapidly transforming IT operations and development practices. But what are the precursors necessary to implement DevOps? To achieve an agile, virtualized, and highly automated IT environment, what technological requirements need to be in place? OpenStack has the potential to facilitate DevOps implementation and practices at several different layers in the data center. In this session we'll quickly discuss what DevOps is, then discuss many components that are logically required to move towards DevOps in your environment. Finally we'll explore in depth several ways OpenStack can provide these baseline components.
Watch the DevNet 1104 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92695&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
What is Tropo, how do you use it, and what can you use it for? In this session, you'll learn how Tropo works, see some real-life examples, and learn how to create your own voice and SMS applications in minutes.
Watch the DevNet 1023 replay from the Cisco Live On-Demand Library at:https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=91050&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
DevNet Express - Spark & Tropo API - Lisbon May 2016Cisco DevNet
Direct from the Cisco DevNet Lisbon Portugal Express event in May 2016. Learn about Cisco DevNet, Spark and Tropo APIs any why there's never been a better time to innovate with Cisco.
Direct from DevNet@TAG in Milan and Rome in May 2016! Learn about Cisco DevNet, Spark and Tropo APIs any why there's never been a better time to innovate with Cisco.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Megatrends and transitions are occurring in months rather than years. From mobility and video to cloud and network programmability, there is no end in sight.
The implications of this are amazing. Faster rates of new product introduction. Increasing product complexity. And a highly volatile technology landscape, where disruption occurs more easily.
Innovation within the industry is a pivotal source of growth. IT innovation is overflowing into distant domains, expanding other sectors’ technological frontiers.
Consider, for example, Internet protocols like IPv6. Since its introduction, IPv6 has accelerated innovation across a wide range of industries, including the medical sector with e-health and the automotive industry with connected cars.
Device mobility, security, and configuration aspects have been considered in the design of the protocol.
Many factors contribute to this sustained progression and widening impact, including:
• Increased research and development (R&D) spending: The information and communications technology (ICT) industry invested $139 billion in 2013 and is the largest private-sector R&D investor in the United States. This investment translates yearly into thousands of patents filed with the U.S. Patent and Trademark Office (USPTO).
• Access to venture capital funding: This has allowed for the creation of new ventures and sustained the development of small startups. Venture capitalists have invested considerable funding in the ICT industry, ranging from software to mobility. And, more recently, to the Internet of Things (IoT).
• Talent development: Since the year 2000, the top 250 ICT companies have employed 4 percent of the entire business sector in the United States. The industry consistently attracts and feeds new talent.
Quarterly process based on industry best practices for Technology Intelligence, including work in Deutsche Telekom by Rohrbeck
Cisco-wide collaboration
400+ submissions from 150+ technology scouts across Cisco
Data-driven inputs from VC/patents/academic activities
40+ panelists (FE/DEs, VP/CTOs)
180 published technology profiles
9 technology trends
~1000 unique visitors & 100+ prints quarterly
Internal Radar version with individual technologies: techradar.cisco.com
Internal Radar version with trends: techradar.cisco.com
External Radar with trends: cisco.com/go/techradar
M&A Intucell: http://www.cisco.com/web/about/ac49/ac0/ac1/ac259/intucell.html
From Tech Radar trend to Open Innovation Grand Challenge
The importance of securing the IoT identified early as trend
Launched Open Innovation Grand Challenge to embark ecosystem. Announced Winners.
From Tech Radar technology to ecosystem partnership
Tracked TTEthernet (Deterministic Ethernet) for 2 years on our internal Radar
Launched partnership with industry leader through openBerlin Innovation Center
From Tech Radar technology to academic funding
Identified and tracked RPKI on the Radar, pioneering implementation in a country and funding related academic research
From Tech Radar technology to internal research funding
Autonomic Networking (key to Network Simplification trend) tracked for 2 years, funded internally by Tech Fund, just won Cisco Pioneer Award
Cisco Video Networking Index estimates that sensors connections will match the world population by 2018 (7.3 billions), representing 35% of the 20 billion connected devices globally in 2018.
Key sensor devices are home automation controllers, grid meters, wearable health, performance monitors, and industrial Controllers in connected vehicles, connected oilrigs and connected manufacturing.
We understand why top concerns in IoT are Privacy Protection, Threat Defense and Mobile Device Management.
They represent more than 50% of the top technology conversations covered by the media in 2014
It is exciting to see from our patent analysis also confirm that the industry is coming together to resolve these security challenges. Privacy protection and threat defense are top inventive areas. And patent filings in application, cyber-physical, and cloud security have doubled in the last 5 years.
(North America and Europe continue to be hotspots for innovation.
In the areas of cyber-physical security, privacy protection, and application security, however, innovation is occurring on a global scale—from Asia Pacific to Latin America and the Arab States.)
While large companies and startups lead the innovation effort, the world of academia—and even individual inventors—also play an important role. The Cisco IoT Security Grand Challenge also highlights this trend:
• 29 percent of submissions came from universities and public institutions
• 21 percent came from individuals
In the next two to five years, IT security will extend to OT.
There will be brand new use cases, such as connected vehicles.
The industry is moving from a preventative approach to a “before, during and after” approach.
With this billions of connected devices, traditional data management technologies aren't keeping up with today's large volumes of data in motion, which is flowing at an unprecedented speed. The answer to ths is Real-Time Analytics.
It's a set of technologies that analyses large and unstructured data or resources within seconds or minutes.
Our News Analysis highlights a few of these key technologies like:
Big Data Platforms (Hadoop and Spark)
In-memory Data Grid -- an approach to querying data when it resides in random access memory (RAM), as opposed to querying data that is stored on physical disks.
Scale-out Databases and Data warehouse appliances
In-memory Processing and Massively parallel programming (MPP)
Our analysis shows also business applications where Real-Time Analytics is key:
CRM (customer relations management), Business Intelligence and Busibness Operations represent 40% of the conversations around RT Analytics last year.
Indeed in CRM or BI applications, RT analytics can provide up-to-the-minute information about an enterprise's customers so that better and quicker business decisions can be made -- perhaps even within the time span of a customer interaction.
Real-time analytics can support instant refreshes to corporate dashboards to reflect business changes throughout the day.
Another key application is for Complext Event Processing such as the tracking of a hurricane's path, intensity, and wind field, with the intent of predicting these parameters hours or days in advance.
RT analytics applications are also embedded in networking gear to track operations, capture events, monitor performance, detect anomalies, or optimize configurations in real time.
Since last 10 years, innovations in the domain of RT analytics have multiplied. The proof is more than 7000 patented inventions filed so far worldwide — with much of the focus on the development of Business Intelligence and Mining analytical tools.
The majority of total patented inventions originates from small startups. Clearly, there is considerable excitement and energy in this field.
And the market is listening. VC funding is on the rise, with early stage investments driving the wave and running the gamut from Gaming applications to Cybersecurity and Oil field real-time analytics.
Looking forward, real-time analytics are set to be a game changer for Business Productivity across industries.
Today, we can access tons of data anywhere, at any time, from any device. But the amount of data is so huge that it has become overwhelming — and not always particularly useful. Predictive context-aware computing, addresses this problem.
Our news analysis here shows that Big Data Analytics, Customer Experience and Wearables represent most of the conversations published around ths topic.
Indeed, mobile and wearable devices such as Google Glass, Facebook Oculus or Microsoft Hololens are driving this trend.
Because of the limited size of their display, they can present very limited information and require highly contextual based on current user activity and location.
Latest conversation about top companies Predictive Context:
Google Glass Failure ?
IBM Watson
Apple Siri
Microsoft Cortana, Hololens (just announced)
Samsung S Voice
Intel ?
Facebook
Twitter
Our patent analysis shows that
Predictive context-aware services are still in the early stages of development, but are gathering momentum very quickly. Real-time analytics innovations, a key technical building block, are fueling these services. Location analytics are a particularly critical component. And we are seeing more focused research on location awareness and activity recognition.
User activity and location are the main sources for context. So it makes sense that most innovations today target transportation and consumer goods, including retail. Energy and utility companies are also prime candidates for predictive context-aware computing. By relying on environmental sensor data, for example, energy utilities can better predict peak demand and organize their supply accordingly. This could help lower energy utility rates. One invention in this area is the smart thermostat.
In the future, context-aware services will become available across a wide range of industries.
Innovation is happening at a faster pace and are spreading in distant domains.
That’s the reason why we have developed this technology intelligence to capture emerging technologies and trends and defend Cisco against the coming threats.