From Tech in Asia Product Development Conference (Special Stage)
Speaker : Joel Kereh Hartanto, Founder Citcall
Get more insightful updates from TIA by subscribe to techin.asia/updateselalu
Corporate presentation of Sriyaan technologies, A Mumbai based Pioneer IT com...Hitesh Malviya
Security and Brand presence is always a point to consider at sriyaan. We don't only develop applications for clients but also dedicated to reach them to height of success and make them secure from intruders that makes Sriyaan Unique from its competitors. Sriyaan is an IT product and service based company Providing next level solutions to market.
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
Account takeover (ATO) is the fastest growing vector for fraud. Fraudsters leverage various common entry points to perpetrate ATO, putting your valued customer accounts at risk. Learn how applying techniques for fraud prevention combined with authentication can provide a consistent, superior customer experience for authorizing their riskiest transactions .
Join Scott Olson, VP of Product Marketing at iovation, a TransUnion Company, for this 30-minute webinar as he discusses and demonstrates the use of consumer devices to identify risk, authenticate users and authorize transactions to combat ATO fraud.
Register today to discover more about these key industry shifts:
From different authorization methods for every channel to a consistent omnichannel authentication experience
From front door security to risk-appropriate security
From customer notifications to customer authorizations
From OTP and KBA to in-app authentication for your best customers
Corporate presentation of Sriyaan technologies, A Mumbai based Pioneer IT com...Hitesh Malviya
Security and Brand presence is always a point to consider at sriyaan. We don't only develop applications for clients but also dedicated to reach them to height of success and make them secure from intruders that makes Sriyaan Unique from its competitors. Sriyaan is an IT product and service based company Providing next level solutions to market.
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
Account takeover (ATO) is the fastest growing vector for fraud. Fraudsters leverage various common entry points to perpetrate ATO, putting your valued customer accounts at risk. Learn how applying techniques for fraud prevention combined with authentication can provide a consistent, superior customer experience for authorizing their riskiest transactions .
Join Scott Olson, VP of Product Marketing at iovation, a TransUnion Company, for this 30-minute webinar as he discusses and demonstrates the use of consumer devices to identify risk, authenticate users and authorize transactions to combat ATO fraud.
Register today to discover more about these key industry shifts:
From different authorization methods for every channel to a consistent omnichannel authentication experience
From front door security to risk-appropriate security
From customer notifications to customer authorizations
From OTP and KBA to in-app authentication for your best customers
apidays LIVE Singapore 2021 - Embedding finance into the customer journey by ...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Embedding finance into the customer journey
Justin Xiao, COO, South East Asia & Australia at Railsbank
CodeStore Technologies is a leading web and mobile app development company with a special focus on providing the best digital transformation services. We develop the best and the most flexible E-Wallet mobile apps for your business.
If you have any requirements share them at - sales@codestoresolutions.com.
apidays LIVE Hong Kong - Art and Science of Rate Limits for APIs by Shahnawaz...apidays
apidays LIVE Hong Kong - The Open API Economy: Finance-as-a-Service & API Ecosystems
Art and Science of Rate Limits for APIs
Shahnawaz Backer, Principal Security Advisor at F5 Labs
Are you a small business owner looking for the proper point of sale system? If you are wondering how to choose the best mobile POS system for your business, then you need to ask yourself these 11 questions to determine the best mobile point of sale solution for you.
These days, technological advancements are moving faster and faster, and the point of sale industry is no exception. If you’re still using an old-school clunky cash register, you might want to consider the benefits of switching to a fully mobile POS system.
So what should you consider for your business in a mobile POS system?
Missed calls-OTP for various platforms- cognalys.comCognalys
Cognalys introduces a powerful and cheap two factor authentication for all platforms. Instead of Traditional SMS cognalys is using missed calls method to generate OTP.
Cognalys provides a powerful robust RESTful API for its users to generate missed call OTPs and that OTPs can be used in a veriety of platforms. Cognalys supports international OTP service for more than 200 countries. Cognalys users get powered with an elegent dashboard, RESTful API and REALtime API.
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Why verifying user identity Is not enough In 2021
David Stewart, CEO of Approov
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelCA Technologies
The mobile application is becoming the primary interface between your enterprise and end users — but what will be used to secure this access? Come learn how to leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction.
For more information, please visit http://cainc.to/Nv2VOe
5 Best Identity Verification Software to Look Into in 2022.docxSameerShaik43
In an age where cybercrime is rising, identity verification is one of the critical steps businesses must take to protect themselves. With so many online services available, deciding which identity verification software is best for your needs can be hard. This article outlines the top five identity verification software options for 2022.
https://www.tycoonstory.com/resource/5-best-identity-verification-software-to-look-into-in-2022/
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
The usage of sensitive online services and applications such as online banking, e-commerce etc is increasing day by day. These technologies have tremendously improved making our daily life easier. However, these developments have been accompanied by E-piracy where attackers try to get access to services illegally. As sensitive information flow through Internet, they need support for security properties such as authentication, authorization, data confidentiality. Perhaps static password (User ID & password) is the most common and widely accepted authentication method. Online applications need strong password such as a combination of alphanumeric with special characters. In general, having one password for a single service may be easy to remember, but controlling many passwords for different services poses a tedious task on users online applications . Usually users try to use same password for different services or make slight changes in the password which can be easy for attacker to guess adding increased security threat. In order to overcome this, stronger authentication solutions need to be suggested and adapted for services based network.
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays
apidays London 2023 - APIs for Smarter Platforms and Business Processes
September 13 & 14, 2023
Building Multi-Factor Authentication into your applications
Nathaniel Okenwa, Staff Developer Evangelist at Twilio
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
What, Exactly, is Multi-Factor Authentication, and How To Use It?Caroline Johnson
Multi-factor authentication is a form of authentication that requires more than one piece of information to verify an identity.
Learn more about MFA here: https://bit.ly/3JN9Elx
apidays LIVE Singapore 2021 - Embedding finance into the customer journey by ...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Embedding finance into the customer journey
Justin Xiao, COO, South East Asia & Australia at Railsbank
CodeStore Technologies is a leading web and mobile app development company with a special focus on providing the best digital transformation services. We develop the best and the most flexible E-Wallet mobile apps for your business.
If you have any requirements share them at - sales@codestoresolutions.com.
apidays LIVE Hong Kong - Art and Science of Rate Limits for APIs by Shahnawaz...apidays
apidays LIVE Hong Kong - The Open API Economy: Finance-as-a-Service & API Ecosystems
Art and Science of Rate Limits for APIs
Shahnawaz Backer, Principal Security Advisor at F5 Labs
Are you a small business owner looking for the proper point of sale system? If you are wondering how to choose the best mobile POS system for your business, then you need to ask yourself these 11 questions to determine the best mobile point of sale solution for you.
These days, technological advancements are moving faster and faster, and the point of sale industry is no exception. If you’re still using an old-school clunky cash register, you might want to consider the benefits of switching to a fully mobile POS system.
So what should you consider for your business in a mobile POS system?
Missed calls-OTP for various platforms- cognalys.comCognalys
Cognalys introduces a powerful and cheap two factor authentication for all platforms. Instead of Traditional SMS cognalys is using missed calls method to generate OTP.
Cognalys provides a powerful robust RESTful API for its users to generate missed call OTPs and that OTPs can be used in a veriety of platforms. Cognalys supports international OTP service for more than 200 countries. Cognalys users get powered with an elegent dashboard, RESTful API and REALtime API.
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Why verifying user identity Is not enough In 2021
David Stewart, CEO of Approov
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelCA Technologies
The mobile application is becoming the primary interface between your enterprise and end users — but what will be used to secure this access? Come learn how to leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction.
For more information, please visit http://cainc.to/Nv2VOe
5 Best Identity Verification Software to Look Into in 2022.docxSameerShaik43
In an age where cybercrime is rising, identity verification is one of the critical steps businesses must take to protect themselves. With so many online services available, deciding which identity verification software is best for your needs can be hard. This article outlines the top five identity verification software options for 2022.
https://www.tycoonstory.com/resource/5-best-identity-verification-software-to-look-into-in-2022/
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
The usage of sensitive online services and applications such as online banking, e-commerce etc is increasing day by day. These technologies have tremendously improved making our daily life easier. However, these developments have been accompanied by E-piracy where attackers try to get access to services illegally. As sensitive information flow through Internet, they need support for security properties such as authentication, authorization, data confidentiality. Perhaps static password (User ID & password) is the most common and widely accepted authentication method. Online applications need strong password such as a combination of alphanumeric with special characters. In general, having one password for a single service may be easy to remember, but controlling many passwords for different services poses a tedious task on users online applications . Usually users try to use same password for different services or make slight changes in the password which can be easy for attacker to guess adding increased security threat. In order to overcome this, stronger authentication solutions need to be suggested and adapted for services based network.
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays
apidays London 2023 - APIs for Smarter Platforms and Business Processes
September 13 & 14, 2023
Building Multi-Factor Authentication into your applications
Nathaniel Okenwa, Staff Developer Evangelist at Twilio
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
What, Exactly, is Multi-Factor Authentication, and How To Use It?Caroline Johnson
Multi-factor authentication is a form of authentication that requires more than one piece of information to verify an identity.
Learn more about MFA here: https://bit.ly/3JN9Elx
Balancing Fraud & Customer Experience in a Mobile WorldComrade
Consumers’ reliance on mobile continues to skyrocket in shopping, paying for bills, managing finances and socializing. This poses a great challenge for retailers, financial institutions and technology vendors. Digital account opening is fraught with pitfalls as the identity validation process relies on manual entry of personal information. Similarly account management uses knowledge-based authentication but can add friction to the user experience. How should retailers, banks and merchants integrate fraud protection measures into the user experience with the least amount of friction to the user?
I joined joined Al Pascual from Javelin Strategy & Research in a complimentary webinar to share lessons learned from working with leading companies that have struggled with the issue of fraud and customer experience.
We explored the following:
- Who are leaders in integrating fraud prevention into the user experience?
- Who owns the fraud prevention process in the organization?
- How to overcome legacy design issues that can underwhelm the customer experience and inhibit security measures?
- How to prevent fraud in a low-friction environment, while communicating a security-forward brand experience?
FIDO UAF (Universal Second Factor Framework) Specifications: Overview & Tutorial
by Todd Thiemann, Nok Nok Labs
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Everyone knows that you need to provide your consumers with excellent online experiences, and that you have to do it while also protecting them against account takeovers, session hijacking and credential compromise. But very few know how to do it. Everything you do to improve the login experience for your users erodes assurance and security, right?
In this webinar, we’ll discuss Dynamic Authentication, a method of combining authentication controls in a risk-responsive, user-friendly way. You’ll learn:
* The importance of context in providing the right level of authentication for any circumstance
* The need for authentication that is continuous, throughout the user’s online journey
* How authentication tools in the consumer environment need to become complementary, supporting each other as conditions of risk or context change
We’ll discuss how device intelligence provides the risk insight that can drive authentication decisions in real time, and provide examples of customers in retail, finance and gaming verticals who are achieving this balance today.
How to Launch a Secured Digital Wallet.pdfMarie Weaver
Quick guide to launch a secured digital wallet app to make seamless payment using mobile applications. Hire expert mobile app developer to ensure end-to-end process to build digital wallet.
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
A Simplified Guide to the Evolution of Authentication!Caroline Johnson
Modern users and customers always demand to improve the security level of their accounts and sensitive information. This applies to both individual users and businesses alike. The trend of highly targeted attacks and the potential to inflict massive damage makes everyone concerned about the safety of their login credentials and business data.
It’s vital that you consider all authentication methods available when prioritizing strong authentication systems. Ultimately, there is no one-size-fits-all solution when it comes to authentication.
La aplicación avanzada de autenticación móvil es un componente de un enfoque de seguridad de capas para frustrar los ataques maliciosos de software Man-in-the-Browser - como el vil Zeus Trojan - y está ya disponible como parte de la versión más reciente de Entrust IdentityGuard 9.3.
"Para combatir con efectividad las cadenas cada vez más sofisticadas de software malicioso, incluyendo los ataques Man-in-the-Browser, las instituciones financieras deberían utilizan un enfoque por capas dirigido por soluciones de seguridad basadas en identidad demostradas",
"Además de los sólidos métodos de autenticación y fraude, la verificación de transacciones fuera de banda mediante una aplicación móvil puede demostrar ser efectiva para ayudar a combatir los ataques Man-in-the-Browser".
Fintech App Ideas to Consider in 2021 for StartupsQSS Technosoft
If you are looking to begin your startups on financial platforms you must aware of some most incredible fintech app ideas. In these slides, we have explained exceptional fintech app ideas for business startups.
"ILO's Work on Skills Development" by Project Coordinators International Labo...Tech in Asia ID
This slide was shared at ILO Meetup: “Empowering Female Youth Through ICT Skills” on 19 June 2019.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Women in STEM: Leveraging Talent in ICT Sector" by Maya Juwita (Executive Di...Tech in Asia ID
This slide was shared at ILO Meetup: “Empowering Female Youth Through ICT Skills” on 19 June 2019.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
Laporan Kondisi Pendanaan Startup di Indonesia Kuartal Ketiga Tahun 2018Tech in Asia ID
Bagaimana kondisi ekosistem startup di kuartal ketiga tahun 2018 ini? Siapa yang berhasil mendapat pendanaan besar dan siapa yang akhirnya harus menyerah hingga menutup layanan? Simak selengkapnya di laporan kondisi startup Indonesia Q3 2018 berikut ini.
Laporan Kondisi Pendanaan Startup di Indonesia Kuartal Kedua Tahun 2018Tech in Asia ID
Bagaimana kondisi ekosistem startup di kuartal kedua tahun 2018 ini? Siapa yang berhasil mendapat pendanaan besar dan siapa yang akhirnya harus menyerah hingga menutup layanan? Simak selengkapnya di laporan kondisi startup Indonesia Q2 2018 berikut ini.
Laporan Kondisi Pendanaan Startup di Indonesia Kuartal Pertama Tahun 2018Tech in Asia ID
Bagaimana kondisi ekosistem startup di awal tahun 2018 ini? Siapa yang berhasil mendapat pendanaan besar dan siapa yang akhirnya harus menyerah hingga menutup layanan? Simak selengkapnya di laporan kondisi startup Indonesia Q1 2018 berikut ini.
Laporan Kondisi Pendanaan Startup di Indonesia Tahun 2017Tech in Asia ID
Benarkah iklim pendanaan startup di tahun 2017 yang lalu mengalami penurunan? Startup seperti apa yang paling diminati oleh investor saat ini? Simak ulasan selengkapnya di laporan Tech in Asia Indonesia berikut.
"Less Painful iOS Development" by Samuel Edwin (Tokopedia)Tech in Asia ID
An iOS engineer who loves Swift and recently, Javascript. Always trying to find better ways to make software development less frustrating and more fun.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Product Development Story Loket.com" by Aruna Laksana (Loket.com)Tech in Asia ID
Aruna Laksana is Senior Product Manager at Loket.com The company LOKET.com Provide the end-to-end best technology to support the entertainment industry from event discovery, ticketing platform, ticket distribution, ground handling services (access control & cashless payment), and Brand Activation. All this Support leads to Customer Data Analytics.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Making Data Actionable" by Budiman Rusly (KMK Online)Tech in Asia ID
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"DOKU under the hood : Infrastructure and Cloud Services Technology" by M. T...Tech in Asia ID
M. Triana Waluja Djati or Djati, was assigned as Technical Advisor to DOKU back in 2008 and permanently joining DOKU on 2009. Ever since, he is trusted to manage DOKU’s network, system, and IT infrastructure. He has been working closely with IT developer and IT operations team. He is also in charge for IT security and product’s compliance. Djati began his career working as a developer in a software company in 1998. He worked at PT. Hariff DTE in 2014 as IT Supervisor for ERP System. Djati graduated from Institut Teknologi Bandung with a bachelor degree in Physics.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Functional Programming in a Nutshell" by Adityo Pratomo (Froyo Framework)Tech in Asia ID
Didit is a Unity Certified Developer and Currently working as a Co-founder/ CTO at Labtek Indie, a company’s R&D Technology, as well as the Chief Academic Officer in Froyo Framework. He has created many interactive installations for brands such as Nike, Hero, Dunhill, and Heineken among others. He also taught at Surya University for several years, gaining valuable insight in teaching and researching in the process.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Building High Performance Search Feature" by Setyo Legowo (UrbanIndo)Tech in Asia ID
Setyo is a computer science enthusiast who focuses on software engineering and computer system.
For more than 8 years experience in programming, he has developed various features and projects mostly in websites, desktop, and mobile applications. For him, good software product must have at least clean code, engaging UI/UX, and responsive.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Building Effective Developer-Designer Relationships" by Ifnu Bima (Blibli.com)Tech in Asia ID
Ifnu is a coder at hearth. Love writing code for anything interesting, from small hobby to solve complicated problem that will change Indonesian consumer behavior.
He starts his professional work as Software Developer 10+ years ago, mostly as Consultant for Financial Industry. At Blibli.com, he encourages and help the company to develop its own platform and continuously improve its engineering capability.
Now he assumes Development Manager role that basically an engineering manager role. He oversees development of Blibli.com web UI, mobile apps, Content Management System (CMS) and Search Engine.
He loves to learn and evolve himself to understand deeper about business and engineering culture.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Data Informed vs Data Driven" by Casper Sermsuksan (Kulina)Tech in Asia ID
Casper is currently the Head of Product & Growth at Kulina, an online food subscription service in Jakarta. Casper is responsible for driving product management and growth initiatives as well as leading marketing efforts. Previously, he led the product marketing teams at Product Madness in San Francisco. During his tenure at Product Madness, he helped the company's top app, Heart of Vegas achieve the record of $200M in annual revenue. Outside of his day-to-day work, he advises corporations and startups on product and growth, and writes frequently on Startup Grind, Mind the Product & Muzli. He graduated with a business degree from the University of Southern California in Los Angeles.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Planning Your Analytics Implementation" by Bachtiar Rifai (Kofera Technology)Tech in Asia ID
Bachtiar is a tech startup & science enthusiast with more than 7 years experience in digital marketing, ecommerce, analytics and product development. Bachtiar has spend his career life as marketing leader at top ecommerce such as Lazada & Blanja.com. Currently Bachtiar develop a startup called Kofera, a technology company who provides Software as a Service (SaaS) marketing automation platform powered by Artificial Intelligence (AI) and machine learning. Established in 2016, Kofera helps companies build & optimize PPC campaign using machine learning algorithm to maximize business ROI. Kofera has helped many clients from various industries. Recently, Kofera received pra-series A funding lead by MDI Ventures and followed by Indosterling, DNC & Gunung Sewu.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"How To Build and Lead a Winning Data Team" by Cahyo Listyanto (Bizzy.co.id)Tech in Asia ID
Cahyo is a data geek, gamer and comic nerd.
Excel and Database are his favorite since his middle school.
Having graduated from a Vocational High School of Informatics and Technology
made him able to start his career early and led many DWH BI projects at his early 20.
He currently leading a data team in bizzy.co.id as the Head of Data Analytics.
Previously he worked for Microsoft Indonesia as Data Platform Technology Specialist where he provides strategic technical leadership supporting Microsoft customers and partners to adopt, deploy, and support solutions based on SQL Server and Data Platform related technologies.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"How Scrum Motivates People" by Rudy Rahadian (XL Axiata)Tech in Asia ID
Rudy is graduated from non-IT/ non-Computer Science degree but start his debut as a Junior Web Designer at his own almamater, Brawijaya University - Malang with two silver bullet, Front Page and Photoshop Skill :) .
Ever work for various company scale, from startup to enterprise, even freelancing. Now, working as an Agent of Happyness (read: Scrum Master) in XL Axiata. He is very excited to have awesome team, both business and developer team, together build better software development environment, in Agile way. And the team looks so happy to nurture their 'baby scrum' now.
Also, he is actively going to Agile and Scrum event, meetup, congress, lean coffee, and also organize some scrum event in Jakarta. Means, still learn!
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
"Control Your Mobile Development Cost" by Ray Rizaldy (GITS.ID)Tech in Asia ID
Ray is Business Director at GITS Indonesia, a company with mission to provide solution for good and empowering life using the most personal technology: Mobile!
A fan of agile software development and design thinking, he uses them to help his clients and partners to develop tech products especially mobile.
***
This slide was shared at Tech in Asia Product Development Conference 2017 (PDC'17) on 9-10 August 2017.
Get more insightful updates from TIA by subscribing techin.asia/updateselalu
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
3. 3
VERIFICATION
Verification is an art of confirming the truth of an attribute of a single piece of data claimed
it’s already become an integral part in our life.
Like our name, address, bank account used to verify us
Even more, in digital world where it’s hard to track the truth.
Many ways, been invented to improve that
4. 4
App features compare
WHO NEED
TO VERIFY?
Each factor covers a range of elements used to authenticate or verify a person's identity
Almost every digital company need to do verification, mainly for their user or transaction
7. 7
Verification
Methods
SUBMIT PROOF
It been use widely in the offline world, but the proof need
to be verify again
However, digital still use it like for loan application
Nowadays, “normal” proof been replace with other
method, like
- Bank statement can be replace by transaction history
in tokopedia
Etc
New method focus on the simplicity of collecting the
data
9. 9
Verification
Methods
SUBMIT PROOF
PASSWORD
The most common digital verification available today
Normal password been use in transaction or user sign in
The verification principle is to verify use base on what they
know or we expect they know.
If what they know is match then they will be verified
14. 14
2Factor Authentification or One time password principle is mainly
Combining something that we know the user know and what they have
Something that most people have today is mobile phone, then we send something to that phone
The user is the only one who know the password for that current moment, from his own device
This method is the most simple and secure ways and make the security a lot more higher
15. 15
Verification
Methods
The cost of 2FA or OTP is so expensive
As company need to pay 3rd party each time the user need to
be verify, like sign in or do transaction
16. 16
submit proof
Too Much Hassle
password
Disadvantage
Two Factor
Not Necessary
Not Real-Time
Easy to Lose
Hackable
Not Reliable
Costly
20. 20
02
03
04
01
User input the code miscalled
- Android can auto read the code
User input their phone number in the web or
apps and click verify button
Notification of successful verification will be
seen in web or apps
Citcall will miscall to user using random code
UX FLOW
Verification & OTP
21. 21
PASSWORD
DYING
We belive that normal password is no longer relevant
By creating super economical 2FA, we will create more secure digital world for everyone
This is our mission statement
22. 22
Address
Jl. Pejaten Barat No. 13, Pasar Minggu - Jakarta Selatan 12510
+628194010777 joel@citcall.com
+6282111901011 hendra@citcall.com
FREE
TRIAL Citcall Teknologi Indonesia