CNL Software is a global leader in Physical Security Information Management software. Our PSIM software IPSecurityCenter™, connects desperate security systems, aggregating intelligence from these to allow organisations react faster and more precisely to incidents. It provides operators with real-time situation awareness, guiding them through a common operating picture at each stage.
Walkthrough of the DJI Mobile SDK tutorials that we converted from Java to Kotlin. See https://youtu.be/f5fWvFD5rwc for recording of the Drone Software SDK meetup
Discuss the basics of the AWS CDK with its pros and cons. Including how the Cloud Development Kit (CDK) helped overcome the challenges faced in their previous serverless IaC solution.
Github repo for the PoC Source Code: https://github.com/dtl-open/cdkpoc
What do you love about sales? We want you to do more of that. At Immediately, we've built a mobile app that enables you to power through administrative (read: snooze-worthy) work so that you can focus on the fun stuff.
CIS Transformation: Unlocking the Value of Utilities' Customer Information Sy...Cognizant
The customer information system (CIS) is a vital part of the meter-to-cash value chain for electric companies and other industries that provide critical commodities like water and natural gas. Yet the complex nature of CIS initiatives has left many utilities saddled with failed or underperforming CIS systems. To overcome these roadblocks, utilities must craft an approach that mitigates the risks and challenges inherent in CIS projects, delivers an exceptional customer experience, and fuels growth to support true business transformation.
Walkthrough of the DJI Mobile SDK tutorials that we converted from Java to Kotlin. See https://youtu.be/f5fWvFD5rwc for recording of the Drone Software SDK meetup
Discuss the basics of the AWS CDK with its pros and cons. Including how the Cloud Development Kit (CDK) helped overcome the challenges faced in their previous serverless IaC solution.
Github repo for the PoC Source Code: https://github.com/dtl-open/cdkpoc
What do you love about sales? We want you to do more of that. At Immediately, we've built a mobile app that enables you to power through administrative (read: snooze-worthy) work so that you can focus on the fun stuff.
CIS Transformation: Unlocking the Value of Utilities' Customer Information Sy...Cognizant
The customer information system (CIS) is a vital part of the meter-to-cash value chain for electric companies and other industries that provide critical commodities like water and natural gas. Yet the complex nature of CIS initiatives has left many utilities saddled with failed or underperforming CIS systems. To overcome these roadblocks, utilities must craft an approach that mitigates the risks and challenges inherent in CIS projects, delivers an exceptional customer experience, and fuels growth to support true business transformation.
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...Amazon Web Services
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Security Week at the San Francisco Loft
Continuous delivery (CD) enables teams to be more agile and quickens the pace of innovation. Too often, however, teams adopt CD without putting the right safety mechanisms in place. In this talk, we discuss opportunities for you to transform your software release process into a safer one. We explore various DevOps best practices, showcasing sample applications and code with AWS CodePipeline and AWS CodeDeploy. We discuss how to set up delivery pipelines with nonproduction testing stages, failure cases, rollbacks, redundancy, canary testing and blue/green deployments, and monitoring. We'll discuss continuous delivery practices for deploying to Amazon EC2, AWS Lambda, and Containers (such as Amazon ECS or AWS Fargate).
Level: 200
Speaker: Leo Zhadanovsky - Principal Solutions Architect, Cloudstart, AWS
Embracing Failure - Fault Injection and Service Resilience at NetflixJosh Evans
A presentation given at AWS re:Invent on how Netflix induces failure to validate and harden production systems. Technologies discussed include the Simian Army (Chaos Monkey, Gorilla, Kong) and our next gen Failure Injection Test framework (FIT).
Want more VC/investment startup pitch decks? We’ve centralised ALL succesful investor pitch decks at: https://chagency.co.uk/getstartupfunding — check all of them out
The effort is adhering to the ideology of “The Future Of Freemium” — read more here: https://chagency.co.uk/blog/ceo/the-future-of-freemium-how-to-get-peoples-attention/
Our library of pitch decks will not have any advertisement, only a signature. We are a design agency that helps SaaS CEOs reduce user churn.
Watch this talk on YouTube: https://youtu.be/-3K74I7t7CQ
Securing the Software Supply Chain has become a focus of cybersecurity efforts the world over. One aspect of this is with the generation and verification of a Software Bill of Materials (SBOM). But what is an SBOM and how would you go about setting this up for your cloud native container/applications/pipeline?
The Flux team recently published a blog on this very topic and how they’ve gone about implementing these measures. During this session, Dan Luhring, OSS Engineering Manager at Anchore, will dive into SBOMs - what they are, why you need them, some common use cases and how to get your pipeline ready for SBOM generation and verification using the Flux SBOM as an example.
Resources
Anchore: A comprehensive, continuous security and compliance platform to protect your cloud-native applications.
Anchore’s OSS tools featured during this session:
- Syft: A CLI tool for generating a Software Bill of Materials (SBOM) from container images and file systems
- Grype: An easy-to-integrate open source vulnerability scanning tool for container images and file systems.
Speaker Bios:
Dan Luhring heads up OSS at Anchore, where he leads the software engineering team that develops Syft and Grype. Dan is drawn deeply into the cloud native security space, where he focuses on container workflows and developer experience. Dan believes in making software more secure by making life better for software engineers and security practitioners. Dan is a maintainer of Sigstore’s Cosign project, and he loves partnering with other people to find solutions to daunting challenges.
Priyanka (aka “Pinky”) is a Developer Experience Engineer at Weaveworks. She has worked on a multitude of topics including front end development, UI automation for testing and API development. Previously she was a software developer at State Farm where she was on the delivery engineering team working on GitOps enablement. She was instrumental in the multi-tenancy migration to utilize Flux for an internal Kubernetes offering. Outside of work, Priyanka enjoys hanging out with her husband and two rescue dogs as well as traveling around the globe.
CNL Software - PSIM for Energy, Oil & GasAdlan Hussain
Economies, both developed and developing, are dependent on oil and gas supply. The security and availability of energy is critical as it directly affects economic, political and social stability. Ultimately risks affecting supply can be generated by freak natural events, accidents or terrorism. The size and complexity of facilities makes them difficult to secure. Monitoring the perimeter fence, multiple process environments including hazardous and toxic gas areas, as well as terminal and tanker loading jetties all require comprehensive management.
Ensuring these facilities have enforced compliance to set procedures is a significant challenge, vital to the protection of assets, the safety of staff, and the public. Maintaining a consistently high level of security requires the best use of technology, people and processes.
IPSecurityCenter PSIM centralizes all security systems, providing complete situational awareness. Operators only see what they need to see, when they need to see it, effectively eliminating information overload. The workflow tools allow security levels to be increased and decreased in line with security policy. All of this ensures consistent, compliant and crucially, auditable security policies.
CNL Software White Paper - Driving Enterprise PSIM Through True SOA Adlan Hussain
In the physical security arena, information and the speed at which it is delivered is key. It is this guiding principal that sees the huge growth in global PSIM deployments. Where information is key, access to information is vital, and nowhere is this more pronounced than in security. During critical events, it is essential that operators have fast and reliable access to relevant security assets, and pertinent information. Failure to deliver this information is not an option.
In any PSIM deployment, the day-to-day information load is relatively minimal. The challenge is the response to a sudden surge in this load, caused by a critical event or disaster scenario, comprised of multiple events happening at the same time. It is in these scenarios that a PSIM solution will need to provide the highest level of assurance that all information required will be available when needed. In addition, the solution will need to remain highly responsive, providing essential intelligence and data analysis, to enable security operators to react and respond immediately.
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and ConsciousnessDaniel Faggella
URL of the original TEDx Talk: https://www.youtube.com/watch?v=PjiZbMhqqTM
Notes from my 2015 TEDx presentation, titled: "We Should Wake Up Before The Machines Do," on the topic of artificial intelligence and consciousness.
Speaker: Daniel Faggella
Location: Southern New Hampshire University
SA is a global optimization technique.
It distinguishes between different local optima.
It is a memory less algorithm & the algorithm does not use any information gathered during the search.
SA is motivated by an analogy to annealing in solids.
& it is an iterative improvement algorithm.
How to Achieve Functional Safety in Safety-Citical Embedded Systemsevatjohnson
Whether they operate in the medical, automotive, avionics, or any other field, developers of safety-critical embedded systems understand the importance of quality assurance, risk and process control, and artifact traceability. Current trends in these industries predict that the challenges of complexity brought about by IoT connectivity, smart system of systems products, and embedded software will become even greater. To tackle these challenges, developers have to come up with innovative strategies to ensure the functional safety and reliability of their products.
In this webinar, we focus on the tools, processes and techniques around requirements and testing that are considered vital to ensuring functional safety in embedded systems. Adequate requirements definition, requirements-based testing, risk management, and test coverage analysis are a few of the techniques that help achieve functional safety in the development of such systems. Our webinar helps you to learn more about ensuring the safety of your mission-critical end products.
How to Achieve Functional Safety in Safety-Critical Embedded SystemsIntland Software GmbH
Whether they operate in the medical, automotive, avionics, or any other field, developers of safety-critical embedded systems understand the importance of quality assurance, risk and process control, and artifact traceability. Current trends in these industries predict that the challenges of complexity brought about by IoT connectivity, smart system of systems products, and embedded software will become even greater. To tackle these challenges, developers have to come up with innovative strategies to ensure the functional safety and reliability of their products.
In this webinar, we focus on the tools, processes and techniques around requirements and testing that are considered vital to ensuring functional safety in embedded systems. Adequate requirements definition, requirements-based testing, risk management, and test coverage analysis are a few of the techniques that help achieve functional safety in the development of such systems. Our webinar helps s to learn more about ensuring the safety of your mission-critical end products.
CNL Software PSIM Presentation - Information Management within Physical SecurityAdlan Hussain
Security is a business with serious challenges…
Security has traditionally been seen as isolated from business objectives
This is now changing, security being required to work more with business
The security challenge is greater than ever, with increasingly mobile workforces and mounting pressure for cost reductions
Technology is aiding both existing challenges and supporting the transition of security into other areas of business
It is allowing security to do more with less people
As a result security issues need to move to “C Level” and the suppliers need to provide business solutions with IT like technology to justify their inclusion at Board Level
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
Do you need to improve how quickly and accurately you can address abnormal situations before they impact operations? Join us for a Webinar this May to learn how to do just that with WIN-911’s software. By pairing WIN-911 with SCADA/HMI software it’s possible to filter on specific alarms and enable instant notification (via Smartphone App, Voice Calls, SMS/Text and Email) to specific users so they can react quickly to those alarms most critical to your process. In this webinar we will learn more about WIN-911, how it is integrated with InduSoft Web Studio, and how you can use both to create smart HMI/SCADA applications that allow you to react quickly to alarms.
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
The digital transformation journey supported by SAP enables our customers to increase business agility, pursue innovation, and demonstrate growth. Cybersecurity is essential to a successful digital transformation and continues to be even more critical as our integrated suite of SAP Ariba solutions drives technologies to promote connected commerce. Join us in this engrossing session as we outline critical steps to securing your organization’s digital transformation.
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...Amazon Web Services
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Security Week at the San Francisco Loft
Continuous delivery (CD) enables teams to be more agile and quickens the pace of innovation. Too often, however, teams adopt CD without putting the right safety mechanisms in place. In this talk, we discuss opportunities for you to transform your software release process into a safer one. We explore various DevOps best practices, showcasing sample applications and code with AWS CodePipeline and AWS CodeDeploy. We discuss how to set up delivery pipelines with nonproduction testing stages, failure cases, rollbacks, redundancy, canary testing and blue/green deployments, and monitoring. We'll discuss continuous delivery practices for deploying to Amazon EC2, AWS Lambda, and Containers (such as Amazon ECS or AWS Fargate).
Level: 200
Speaker: Leo Zhadanovsky - Principal Solutions Architect, Cloudstart, AWS
Embracing Failure - Fault Injection and Service Resilience at NetflixJosh Evans
A presentation given at AWS re:Invent on how Netflix induces failure to validate and harden production systems. Technologies discussed include the Simian Army (Chaos Monkey, Gorilla, Kong) and our next gen Failure Injection Test framework (FIT).
Want more VC/investment startup pitch decks? We’ve centralised ALL succesful investor pitch decks at: https://chagency.co.uk/getstartupfunding — check all of them out
The effort is adhering to the ideology of “The Future Of Freemium” — read more here: https://chagency.co.uk/blog/ceo/the-future-of-freemium-how-to-get-peoples-attention/
Our library of pitch decks will not have any advertisement, only a signature. We are a design agency that helps SaaS CEOs reduce user churn.
Watch this talk on YouTube: https://youtu.be/-3K74I7t7CQ
Securing the Software Supply Chain has become a focus of cybersecurity efforts the world over. One aspect of this is with the generation and verification of a Software Bill of Materials (SBOM). But what is an SBOM and how would you go about setting this up for your cloud native container/applications/pipeline?
The Flux team recently published a blog on this very topic and how they’ve gone about implementing these measures. During this session, Dan Luhring, OSS Engineering Manager at Anchore, will dive into SBOMs - what they are, why you need them, some common use cases and how to get your pipeline ready for SBOM generation and verification using the Flux SBOM as an example.
Resources
Anchore: A comprehensive, continuous security and compliance platform to protect your cloud-native applications.
Anchore’s OSS tools featured during this session:
- Syft: A CLI tool for generating a Software Bill of Materials (SBOM) from container images and file systems
- Grype: An easy-to-integrate open source vulnerability scanning tool for container images and file systems.
Speaker Bios:
Dan Luhring heads up OSS at Anchore, where he leads the software engineering team that develops Syft and Grype. Dan is drawn deeply into the cloud native security space, where he focuses on container workflows and developer experience. Dan believes in making software more secure by making life better for software engineers and security practitioners. Dan is a maintainer of Sigstore’s Cosign project, and he loves partnering with other people to find solutions to daunting challenges.
Priyanka (aka “Pinky”) is a Developer Experience Engineer at Weaveworks. She has worked on a multitude of topics including front end development, UI automation for testing and API development. Previously she was a software developer at State Farm where she was on the delivery engineering team working on GitOps enablement. She was instrumental in the multi-tenancy migration to utilize Flux for an internal Kubernetes offering. Outside of work, Priyanka enjoys hanging out with her husband and two rescue dogs as well as traveling around the globe.
CNL Software - PSIM for Energy, Oil & GasAdlan Hussain
Economies, both developed and developing, are dependent on oil and gas supply. The security and availability of energy is critical as it directly affects economic, political and social stability. Ultimately risks affecting supply can be generated by freak natural events, accidents or terrorism. The size and complexity of facilities makes them difficult to secure. Monitoring the perimeter fence, multiple process environments including hazardous and toxic gas areas, as well as terminal and tanker loading jetties all require comprehensive management.
Ensuring these facilities have enforced compliance to set procedures is a significant challenge, vital to the protection of assets, the safety of staff, and the public. Maintaining a consistently high level of security requires the best use of technology, people and processes.
IPSecurityCenter PSIM centralizes all security systems, providing complete situational awareness. Operators only see what they need to see, when they need to see it, effectively eliminating information overload. The workflow tools allow security levels to be increased and decreased in line with security policy. All of this ensures consistent, compliant and crucially, auditable security policies.
CNL Software White Paper - Driving Enterprise PSIM Through True SOA Adlan Hussain
In the physical security arena, information and the speed at which it is delivered is key. It is this guiding principal that sees the huge growth in global PSIM deployments. Where information is key, access to information is vital, and nowhere is this more pronounced than in security. During critical events, it is essential that operators have fast and reliable access to relevant security assets, and pertinent information. Failure to deliver this information is not an option.
In any PSIM deployment, the day-to-day information load is relatively minimal. The challenge is the response to a sudden surge in this load, caused by a critical event or disaster scenario, comprised of multiple events happening at the same time. It is in these scenarios that a PSIM solution will need to provide the highest level of assurance that all information required will be available when needed. In addition, the solution will need to remain highly responsive, providing essential intelligence and data analysis, to enable security operators to react and respond immediately.
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and ConsciousnessDaniel Faggella
URL of the original TEDx Talk: https://www.youtube.com/watch?v=PjiZbMhqqTM
Notes from my 2015 TEDx presentation, titled: "We Should Wake Up Before The Machines Do," on the topic of artificial intelligence and consciousness.
Speaker: Daniel Faggella
Location: Southern New Hampshire University
SA is a global optimization technique.
It distinguishes between different local optima.
It is a memory less algorithm & the algorithm does not use any information gathered during the search.
SA is motivated by an analogy to annealing in solids.
& it is an iterative improvement algorithm.
How to Achieve Functional Safety in Safety-Citical Embedded Systemsevatjohnson
Whether they operate in the medical, automotive, avionics, or any other field, developers of safety-critical embedded systems understand the importance of quality assurance, risk and process control, and artifact traceability. Current trends in these industries predict that the challenges of complexity brought about by IoT connectivity, smart system of systems products, and embedded software will become even greater. To tackle these challenges, developers have to come up with innovative strategies to ensure the functional safety and reliability of their products.
In this webinar, we focus on the tools, processes and techniques around requirements and testing that are considered vital to ensuring functional safety in embedded systems. Adequate requirements definition, requirements-based testing, risk management, and test coverage analysis are a few of the techniques that help achieve functional safety in the development of such systems. Our webinar helps you to learn more about ensuring the safety of your mission-critical end products.
How to Achieve Functional Safety in Safety-Critical Embedded SystemsIntland Software GmbH
Whether they operate in the medical, automotive, avionics, or any other field, developers of safety-critical embedded systems understand the importance of quality assurance, risk and process control, and artifact traceability. Current trends in these industries predict that the challenges of complexity brought about by IoT connectivity, smart system of systems products, and embedded software will become even greater. To tackle these challenges, developers have to come up with innovative strategies to ensure the functional safety and reliability of their products.
In this webinar, we focus on the tools, processes and techniques around requirements and testing that are considered vital to ensuring functional safety in embedded systems. Adequate requirements definition, requirements-based testing, risk management, and test coverage analysis are a few of the techniques that help achieve functional safety in the development of such systems. Our webinar helps s to learn more about ensuring the safety of your mission-critical end products.
CNL Software PSIM Presentation - Information Management within Physical SecurityAdlan Hussain
Security is a business with serious challenges…
Security has traditionally been seen as isolated from business objectives
This is now changing, security being required to work more with business
The security challenge is greater than ever, with increasingly mobile workforces and mounting pressure for cost reductions
Technology is aiding both existing challenges and supporting the transition of security into other areas of business
It is allowing security to do more with less people
As a result security issues need to move to “C Level” and the suppliers need to provide business solutions with IT like technology to justify their inclusion at Board Level
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
Do you need to improve how quickly and accurately you can address abnormal situations before they impact operations? Join us for a Webinar this May to learn how to do just that with WIN-911’s software. By pairing WIN-911 with SCADA/HMI software it’s possible to filter on specific alarms and enable instant notification (via Smartphone App, Voice Calls, SMS/Text and Email) to specific users so they can react quickly to those alarms most critical to your process. In this webinar we will learn more about WIN-911, how it is integrated with InduSoft Web Studio, and how you can use both to create smart HMI/SCADA applications that allow you to react quickly to alarms.
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
The digital transformation journey supported by SAP enables our customers to increase business agility, pursue innovation, and demonstrate growth. Cybersecurity is essential to a successful digital transformation and continues to be even more critical as our integrated suite of SAP Ariba solutions drives technologies to promote connected commerce. Join us in this engrossing session as we outline critical steps to securing your organization’s digital transformation.
Security in the cloud is fundamentally different. Not so much due to the technology--though there's plenty of differences there--but more with respect to the way that security is applied and how it's run.
Over the past few years, we've seen a radical shift in how development and operational teams work together. Security teams have been left out in the cold and are still viewed as the "No" team.
It doesn't have to be that way.
Cloud technologies have enabled new work flows and models for businesses and other teams...security is no different. We just have to wake up and take advantage of the new ecosystem.
When security teams embrace change, the boundaries start to dissolve and security can finally be built in instead of bolted on.
In this session, we'll look at some of the challenges involved in this shift, how it impacts your teams, your skill set, and how a modern approach to defence will improve your security posture.
Presented at BC Aware Day, 31-Jan-2017
Cloud based remote monitoring and surveillancenitishjambo
Look no further! MonitoringHub offers a tailored solution for all your device monitoring and alert management needs in this sector.
Our software is built to ensure maximum security and comprehensive functionality. Features like video management, event-based alerts, and device health monitoring make our product the perfect fit for critical infrastructure and logistics, ensuring smooth operations.
Empower your team with the necessary tools to monitor their operations securely and confidently. Invest in MonitoringHub today for unparalleled peace of mind!
Physical Security Information Management (PSIM) software enables security departments to manage an enterprise’s exposure to security risk. It is designed to aid decision making and deployment planning within an organization. Within physical security operations it has been widely accepted that critical information from numerous sources is left to system operators to interpret and act upon consistently and correctly. Most end users have video surveillance, access control and building management systems. These systems are not integrated together and work independently with no communication with other systems in the ecosystem.
With cyber-attacks on the rise, companies are transforming their approach to security monitoring from reactive towards intelligence-driven security. We can help you empower your security teams, and your business, to perform better in the digital world with a next-generation Security Information and Event Management (SIEM) platform and Security Operations Center (SOC)
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Splunk
Travis Perkins has a complex hybrid IT infrastructure and is in midst of migrating to the cloud. This session will outline the pitfalls from their initial infrastructure-heavy ‘legacy SOC’ approach with a legacy SIEM and the success they gained when they moved to a cloud-based, data-driven ‘lean SOC’.
Solving for Compliance: Mobile app security for banking and financial servicesNowSecure
Mobile apps fall in scope for a number of regulatory requirements that govern the banking and financial services industries, such as: guidelines from the Federal Financial Institutions Examination Council (FFIEC), the Gramm–Leach–Bliley Act (GLBA), New York State cybersecurity requirements for financial services companies, the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, and more. Luckily, a repeatable mobile app security assessment program and standardized reporting go a long way in both achieving compliance objectives and securing mobile apps and data.
Originally presented on August 22, 2017, NowSecure Security Solutions Engineer Brian Lawrence explains:
-- How and where exactly mobile apps fall in scope for various compliance regimes
-- Mobile app security issues financial institutions must identify and fix for compliance purposes
-- How assessment reports can be used to demonstrate due diligence
Decrypting the security mystery with SIEM (Part 1) Zoho Corporation
Decrypting the security mystery with SIEM - Part I
1. EventLog Analyzer, your complete security arsenal
2. Sealing securityloopholes: Getting to know vulnerable ports, devices, and more.
3. Combating attacks with EventLog Analyzer
a. Mitigating brute force attacks
b. Stopping the rise of ransomware
c. Containing SQL injection attacks
4. Proactively preventing insider attacks
a. Monitoring privileged user activities
5. Securing physical, virtual, and cloud environments
6. Adhering to stringent compliance rules with the integrated compliance management
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
BMC response to the SolarWinds Breach
Critical compromise to the Solarwinds Orion platform has created an immediate need to respond to the threat from a likely state sponsored actor (Russia)
NIST RMF has over 900+ controls and each control has many sub-requirements, most security officers do not like this framework due to its high level of complexity compared to other frameworks. Ignyte assurance platform operationalizes all six steps of the NIST RMF to get you to ATO faster.
Similar to CNL Software - IPSecurityCenter Presentation (20)
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.