Cloud computing has emerged as an innovative and disruptive technology for government and industry.
In this presentation, Intelligo makes a business case for the implementation of Cloud technologies in businesses.
We think it is a source of creativity. Join our interactive session where you will see firsthand how our small charity (a few staff and hundreds of volunteers) are able to be hyper-productive using Salesforce.com and Google Apps. Our live demonstrations will show how we’ve been able to triple our productivity with only double the resources. Framework, the organization that brings you the Timeraiser program, is a small team with limited resources. We’ve made a deliberate decision to invest heavily in our Cloud Computing Strategy - tools like Salesforce.com and Google Apps - to better focus on our mission and collaborate with like-minded organizations. This has lead to improved fundraising and volunteer management capabilities.
Attendees Will Walk Away With:
• Project Management – ideas on how your team can collaborates on social media projects
• Knowledge Management – ideas on how your team can stay on top of technology trends
• Fundraising Management – ideas on how your team can collaborate on Fundraising
• Board Management – ideas on how we organize information for your board
• Volunteer Management – ideas on to track volunteer time and participation
Anil Patel
In 2001, Anil along with some of his university friends co-founded Timeraiser, a program aimed at engaging skilled and energetic Canadians to get involved in the community. The Timeraiser is Part volunteer fair, Part silent art auction, Part night on the town. To date the Timeraiser has generated 55,000 volunteer hours and invested $330,000 in the careers of Canadian artists. View Anil’s profile at http://ca.linkedin.com/in/anilpatrickpatel
Considerations for Cloud Deployment | BP207 from IBM ConnectED 2015Chris Miller
Are you considering a move to the cloud? Where do you start? One of the most important questions you will need to consider is around access and performance. Start your path by gaining insight into actual bandwidth usage for users in the cloud with examples and things to consider. Explore options for designing easy connectivity to the cloud for your organization and users. Take away numerous sample diagrams of deployment and network options and learn the right questions to ask any cloud provider around security, redundancy and more.
Presented by Chris Miller (IdoNotes)
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon
Sitaraman Lakshminarayanan
Sr Security Architect at Pure Storage
Authorization has two components – Policy Definition and Policy Enforcement. Traditionally both used to be centralized and we spent all the time Integrating products- Built or Bought with Centralized Access Management. This typically led to increased cycle time to change any access policy or change software/deployment to fit into one particular authorization model. When that doesn’t fit, we would end up with multiple authorization enforcements written in different languages with or without any adherence to any standards such as XACML or others.
Imagine building few different or hundreds of products or services or micro services and you have to centrally manage all possible access policies. It’s definitely not a scalable solution in fast moving CI/CD world.
Now imagine a way where every developers or products can externalize its authorization and we can modify authorization enforcement in a consistent manner? Imagine where developers can write their own implementation of how authorization should be enforced for their environment? Remember there is no one size fits all authorization policy. A policy that works for your environment does not work for my environment – for any number of reasons from Risk management to type of business applications.
Open Policy Agent provides a consistent way to write authorization logic and expose it as REST API. Applications can easily integrate with OPA and can also write their own authroziation logics. Whether you are shipping products to customers or integrating a Product or Service into your environment, how awesome it would be to enforce your own authorization rules instead of changing your business process of who can gain access to what features.
In this talk we will explore the benefits of Decentralized Authorization and how to use Open Policy Agent to achieve decentralized authorization. A closer look at few applications /integrations whether it is REST API /Micro Services, or Kubernetes to control various authorization policies as to who can deploy/what can you deploy. We will also look at how to build Integration tests to check our authorization policies.
Cloud computing has emerged as an innovative and disruptive technology for government and industry.
In this presentation, Intelligo makes a business case for the implementation of Cloud technologies in businesses.
We think it is a source of creativity. Join our interactive session where you will see firsthand how our small charity (a few staff and hundreds of volunteers) are able to be hyper-productive using Salesforce.com and Google Apps. Our live demonstrations will show how we’ve been able to triple our productivity with only double the resources. Framework, the organization that brings you the Timeraiser program, is a small team with limited resources. We’ve made a deliberate decision to invest heavily in our Cloud Computing Strategy - tools like Salesforce.com and Google Apps - to better focus on our mission and collaborate with like-minded organizations. This has lead to improved fundraising and volunteer management capabilities.
Attendees Will Walk Away With:
• Project Management – ideas on how your team can collaborates on social media projects
• Knowledge Management – ideas on how your team can stay on top of technology trends
• Fundraising Management – ideas on how your team can collaborate on Fundraising
• Board Management – ideas on how we organize information for your board
• Volunteer Management – ideas on to track volunteer time and participation
Anil Patel
In 2001, Anil along with some of his university friends co-founded Timeraiser, a program aimed at engaging skilled and energetic Canadians to get involved in the community. The Timeraiser is Part volunteer fair, Part silent art auction, Part night on the town. To date the Timeraiser has generated 55,000 volunteer hours and invested $330,000 in the careers of Canadian artists. View Anil’s profile at http://ca.linkedin.com/in/anilpatrickpatel
Considerations for Cloud Deployment | BP207 from IBM ConnectED 2015Chris Miller
Are you considering a move to the cloud? Where do you start? One of the most important questions you will need to consider is around access and performance. Start your path by gaining insight into actual bandwidth usage for users in the cloud with examples and things to consider. Explore options for designing easy connectivity to the cloud for your organization and users. Take away numerous sample diagrams of deployment and network options and learn the right questions to ask any cloud provider around security, redundancy and more.
Presented by Chris Miller (IdoNotes)
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon
Sitaraman Lakshminarayanan
Sr Security Architect at Pure Storage
Authorization has two components – Policy Definition and Policy Enforcement. Traditionally both used to be centralized and we spent all the time Integrating products- Built or Bought with Centralized Access Management. This typically led to increased cycle time to change any access policy or change software/deployment to fit into one particular authorization model. When that doesn’t fit, we would end up with multiple authorization enforcements written in different languages with or without any adherence to any standards such as XACML or others.
Imagine building few different or hundreds of products or services or micro services and you have to centrally manage all possible access policies. It’s definitely not a scalable solution in fast moving CI/CD world.
Now imagine a way where every developers or products can externalize its authorization and we can modify authorization enforcement in a consistent manner? Imagine where developers can write their own implementation of how authorization should be enforced for their environment? Remember there is no one size fits all authorization policy. A policy that works for your environment does not work for my environment – for any number of reasons from Risk management to type of business applications.
Open Policy Agent provides a consistent way to write authorization logic and expose it as REST API. Applications can easily integrate with OPA and can also write their own authroziation logics. Whether you are shipping products to customers or integrating a Product or Service into your environment, how awesome it would be to enforce your own authorization rules instead of changing your business process of who can gain access to what features.
In this talk we will explore the benefits of Decentralized Authorization and how to use Open Policy Agent to achieve decentralized authorization. A closer look at few applications /integrations whether it is REST API /Micro Services, or Kubernetes to control various authorization policies as to who can deploy/what can you deploy. We will also look at how to build Integration tests to check our authorization policies.
Many financial sector firms are realizing that the “cloud” can be used for purposes other than the conventional wisdom which was restricted to only back office and administrative systems. This session will focus on how cloud computing can be used in connection with core operations. What developments can we expect to see in the clouds in the near term? Long term? This session will explore available options and the trajectory of the “cloud.”
Moving to the Cloud - Risk vs. Reward.
Presented at Green Data Center Conference: Innovation in the Cloud, by Steven Robert in San Francisco, CA - May 25th, 2011.
In this slide deck, we cover:
- Common obstacles that stand in the way of tracking ROI
- How others in the association space are tackling these challenges
- What drives ROI
- How to start tracking individual component performance
You can view the recording here: https://youtu.be/SuKQnBA3wzs
Are you haunted by volunteer turnover and burnout? Billhighway
If volunteer turnover, burnout or challenges are part of your association's daily life, we're hear to tell you, there is a better way! Walk through the common causes of volunteer challenges along with tactics and strategies to help counteract and get ahead of them in the future.
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
By David F. Larcker, Stephen A. Miles, and Brian Tayan
Stanford Closer Look Series
Overview:
Shareholders pay considerable attention to the choice of executive selected as the new CEO whenever a change in leadership takes place. However, without an inside look at the leading candidates to assume the CEO role, it is difficult for shareholders to tell whether the board has made the correct choice. In this Closer Look, we examine CEO succession events among the largest 100 companies over a ten-year period to determine what happens to the executives who were not selected (i.e., the “succession losers”) and how they perform relative to those who were selected (the “succession winners”).
We ask:
• Are the executives selected for the CEO role really better than those passed over?
• What are the implications for understanding the labor market for executive talent?
• Are differences in performance due to operating conditions or quality of available talent?
• Are boards better at identifying CEO talent than other research generally suggests?
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Behind the Wizard’s Curtain: Scalability and Security at Zuora (Subscribed13)Zuora, Inc.
Ever wonder what's in the Zuora cloud? Join us and learn how Zuora has built a scalable and secure cloud based subscription billing management service. Hear from scalability, security and operations engineers and have your questions answered.
Internet of Things = More Big Data: How Will Cloud Computing Evolve?Codero
Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc.
In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, will discuss how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting - a sustainable solution for the data required to manage IoT devices/technology. There is no one-size-fits-all to the question of data collection and security, but hybrid is the only solution that seamlessly adapts to fit any and all.
Introducing Zia Consulting - What to Give Your CIOZia Consulting
Learn how Alfresco Enterprise Content Management (ECM) can deliver what your CIO wants and needs. As the most flexible and open document and records management platform in the market today, Alfresco addresses major content-related issues across both the public and private sector.
Many financial sector firms are realizing that the “cloud” can be used for purposes other than the conventional wisdom which was restricted to only back office and administrative systems. This session will focus on how cloud computing can be used in connection with core operations. What developments can we expect to see in the clouds in the near term? Long term? This session will explore available options and the trajectory of the “cloud.”
Moving to the Cloud - Risk vs. Reward.
Presented at Green Data Center Conference: Innovation in the Cloud, by Steven Robert in San Francisco, CA - May 25th, 2011.
In this slide deck, we cover:
- Common obstacles that stand in the way of tracking ROI
- How others in the association space are tackling these challenges
- What drives ROI
- How to start tracking individual component performance
You can view the recording here: https://youtu.be/SuKQnBA3wzs
Are you haunted by volunteer turnover and burnout? Billhighway
If volunteer turnover, burnout or challenges are part of your association's daily life, we're hear to tell you, there is a better way! Walk through the common causes of volunteer challenges along with tactics and strategies to help counteract and get ahead of them in the future.
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
By David F. Larcker, Stephen A. Miles, and Brian Tayan
Stanford Closer Look Series
Overview:
Shareholders pay considerable attention to the choice of executive selected as the new CEO whenever a change in leadership takes place. However, without an inside look at the leading candidates to assume the CEO role, it is difficult for shareholders to tell whether the board has made the correct choice. In this Closer Look, we examine CEO succession events among the largest 100 companies over a ten-year period to determine what happens to the executives who were not selected (i.e., the “succession losers”) and how they perform relative to those who were selected (the “succession winners”).
We ask:
• Are the executives selected for the CEO role really better than those passed over?
• What are the implications for understanding the labor market for executive talent?
• Are differences in performance due to operating conditions or quality of available talent?
• Are boards better at identifying CEO talent than other research generally suggests?
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Behind the Wizard’s Curtain: Scalability and Security at Zuora (Subscribed13)Zuora, Inc.
Ever wonder what's in the Zuora cloud? Join us and learn how Zuora has built a scalable and secure cloud based subscription billing management service. Hear from scalability, security and operations engineers and have your questions answered.
Internet of Things = More Big Data: How Will Cloud Computing Evolve?Codero
Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc.
In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, will discuss how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting - a sustainable solution for the data required to manage IoT devices/technology. There is no one-size-fits-all to the question of data collection and security, but hybrid is the only solution that seamlessly adapts to fit any and all.
Introducing Zia Consulting - What to Give Your CIOZia Consulting
Learn how Alfresco Enterprise Content Management (ECM) can deliver what your CIO wants and needs. As the most flexible and open document and records management platform in the market today, Alfresco addresses major content-related issues across both the public and private sector.
Presentation on the current state of cloud computing and the role that open source, containers and microservices are playing in the cloud.
Presented to Florida Linux Users Exchange on April 9th, 2015
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
"You’ve made the move to AWS and are now reaping the benefits of decreased costs and increased business agility. How can you reap those same benefits for your cloud security and compliance operations? As building cloud-native applications requires different skill sets, architectures, integrations, and processes, implementing effective, scalable, and robust security for the cloud requires rethinking everything from your security tools to your team culture.
Attend this session to learn how to start down the path toward security and compliance automation and hear how DevSecOps leaders such as Intuit and Capital One are using AWS, DevOps, and automation to transform their security operations.
Session sponsored by evident.io"
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...Precisely
Splunk, an industry leader in IT operations and security analytics, is moving to the cloud. Adopting Splunk in the cloud can help you make better, faster decisions with real-time visibility across the enterprise. That said, if your critical business services rely on the IBM Z or IBM i, including these systems is a must in your new Splunk environment.
Having these systems in your Splunk environment helps remove a significant blind spot in your modernization efforts - avoiding security risks, failed audits, downtime, and escalating costs.
Join this discussion with presenters Brady Moyer from Splunk and Ian Hartley from Precisely to learn how to seamlessly integrate IBM Z and IBM i into Splunk for a true enterprise-wide view of your IT landscape.
During this on-demand webinar, you will hear:
• How Precisely Ironstream provides integration with Splunk without the need for mainframe or IBM i expertise
• The different types of data that can be collected and forwarded to Splunk
• Example use cases for events, security, and performance data
Coffee and Donuts with AWS Marketplace: Getting Started – A Technical Introdu...Amazon Web Services
Learn how to leverage AWS Marketplace for your business workloads. In this technical overview, we’ll cover how install and use BI solutions using your Redshift data warehouse as well as how to deploy Big IP and WAF products to secure your environment. Pick up your badge and discover how AWS Marketplace can help you accelerate your workloads on AWS.
An introduction to Cloud Computing, the trends from traditional IT that are driving the changes, and an overview of the opportunities and challenges they present.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Cloud Computing
1. Get Your Head in the Cloud
Steven Robert
Chief Information Officer
Billhighway.com
Twitter.com/stevenRobert
2. About Me
Steven Robert | CIO – Billhighway.com
Husband, Dad, Entrepreneur, Optimist, Problem-Solver,
Passionate Technologist, Information Junkie & Life Hacker.
• Billhighway is…
– “Quick Books for Communities”
• > 250,000 members in 50 States & Canada
• Process > $1M in dues, fees & donations per day
• > $2 billion in transactions processed to date
3. “Hell, there are no rules here,
we’re trying to accomplish something”
~ Thomas Edison
4. Define: Cloud Computing
• Platform or “service” accessed over a network to
provide advanced, often transparent functionality
for mass consumption and high-availability.
• Seasonal or as-needed utilization
is a classic use case.
• Evolutionary:
ASP -> SaaS/PaaS -> Cloud
5. Generally Accepted Characteristics
• Self-Service
• Delivered over the network
• Elastic scalability
(grow as big as you need, pay as you go...)
* Think of it as renting IT resources vs. buying.
6. Cloud -> Business Translation
• Consider the cloud a technical utility.
• Understand your risk tolerance and current
business stage to establish a threshold for use.
• Stages of a business:
• Stage 1: Incubator (Speed to Market)
• Stage 2: Growth (Competitive Differentiation)
• Stage 3: Expansion (Core Competency)
• Stage 4: Maturity (R&D)
• Stage 5: Declining Conditions (Defense)
7. Technical Flavors
• Infrastructure Platforms
• Application Development Platforms
• Business App Platforms
• Special App Platforms:
9. Early Adopters
1. Zillow – Amazon EC2
2. Intuit – Amazon S3
3. Animoto – Amazon EC2
– Released Facebook App: users were able to
render photos into MTV like videos
• Ramped from 25,000 users to 250,000 users in 3 days
• Signed up 20,000 new user per hour at peak
• Went from 50 to 3,500 servers in 5 days
• Two weeks later scaled back to 100 servers
10. Sounds Great – Right?
• A few things to think about…
– Downtime: Gmail / Postini – “Going Google”
– Reliability: Twitter API
– Product Maturity
– Security
– Backups
11. Do Your Homework!
• PRO’s • CON’s
– Reduced costs – Compliance/Regulation
laws mandate on-site
– Resource sharing is
ownership of data
more efficient
– Security & Privacy
– Management moves
– Latency & Bandwidth
to cloud provider
guarantees
– Consumption based – Absence of robust SLAs
cost
– Portability & lock-in
– Speed to market – Availability & reliability
– Dynamic allocation
12. Opportunities
• Mashups!
– Consume third party APIs
• Existing Market Places:
– Open Social / Google Wave
– iPhone / App Store
– Facebook
– Salesforce.com