The document describes RSA's Data Loss Prevention (DLP) Suite. It discusses how the RSA DLP Solution can help organizations by discovering and mitigating risks from sensitive data across endpoints, networks, applications, file systems and storage. The solution includes policies, system administration, reporting and incident workflow modules. It can enforce controls on data at rest, in motion and in use to reduce risks, costs and disruptions.
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take actions to protect your infrastructure while ensuring your employees can continue to perform their jobs effectively and efficiently. Come to this session to learn how you can leverage the power of Novell ZENworks Endpoint Security Management across your enterprise to achieve this delicate balance—so you and the rest of your organization can sleep at night.
Integrating Apple Macs Using Novell TechnologiesNovell
Apple Macs continue to increase in popularity and make up an increasingly large percentage of enterprise desktops. In this session, we'll explore the various Novell products and technologies that can be used to integrate Macs into your environment. You'll leave with a clear understanding of the issues involved and the options available to support the Mac user community in a Novell environment. You'll also have a chance to discuss suggestions for improving on this support.
The Cloud: A game changer to test, at scale and in production, SOA based web...Fred Beringer
Today in retail, financial services, media, telecommunications and a host of other industries, more and more business is transacted through consumer web sites and mobile applications. With new channels creating spikes in traffic, highly complex system architectures, and internet-savvy customers, websites and web applications must be tested at scale to maximize business results and avoid a catastrophic crash. However, whether due to time or cost or other reasons, upwards of 90 percent of web applications are not fully tested before launching. If testing is done, many times it's with a small percent of expected traffic, which is then extrapolated for an estimation of performance.
Cloud computing is changing the game for testing web applications. Cloud testing enables, for the first time, performance testing that complements the lab and accounts for the conditions in a production environment, such as traffic spikes, network latency, firewalls, and other factors. And it can be done far more affordably than traditional testing methods, as part of agile development cycles, and without an army of highly skilled performance engineers.
Presentation given in Rome for the International SOA conference - Moving SOA into the Cloud in Rome, May 2011
The 5 Keys to Virtual Backup ExcellenceBill Hobbib
ExaGrid and Veeam present the 5 Keys to Virtual Server Backup Excellence. Includes an overview of ExaGrid disk backup with deduplication and Veeam Backup & Replicaiton software, and customer case studies.
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
You've read the documentation, played in the lab, and now you're ready to jump in and upgrade your NetWare environment to Novell Open Enterprise Server 2 on Linux. Attend this session to glean a final few best practices and to learn how to make the most of the migration tools included in the product. You'll also learn about the various pitfalls encountered during real-world upgrades, as well as the solutions used to resolve them.
This session will explore what happens after server consolidation: Workload profiles change, usage patterns change, and resource utilization goes up and down. During this session, we will discuss how the storage footprint changes, and what used to be ideally optimized isn't anymore.
You will learn how to quantify the gap between resource allocation and actual usage, how to recover and redeploy excess capacity, and how to find common virtual machine configuration mistakes that can degrade overall performance.
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take actions to protect your infrastructure while ensuring your employees can continue to perform their jobs effectively and efficiently. Come to this session to learn how you can leverage the power of Novell ZENworks Endpoint Security Management across your enterprise to achieve this delicate balance—so you and the rest of your organization can sleep at night.
Integrating Apple Macs Using Novell TechnologiesNovell
Apple Macs continue to increase in popularity and make up an increasingly large percentage of enterprise desktops. In this session, we'll explore the various Novell products and technologies that can be used to integrate Macs into your environment. You'll leave with a clear understanding of the issues involved and the options available to support the Mac user community in a Novell environment. You'll also have a chance to discuss suggestions for improving on this support.
The Cloud: A game changer to test, at scale and in production, SOA based web...Fred Beringer
Today in retail, financial services, media, telecommunications and a host of other industries, more and more business is transacted through consumer web sites and mobile applications. With new channels creating spikes in traffic, highly complex system architectures, and internet-savvy customers, websites and web applications must be tested at scale to maximize business results and avoid a catastrophic crash. However, whether due to time or cost or other reasons, upwards of 90 percent of web applications are not fully tested before launching. If testing is done, many times it's with a small percent of expected traffic, which is then extrapolated for an estimation of performance.
Cloud computing is changing the game for testing web applications. Cloud testing enables, for the first time, performance testing that complements the lab and accounts for the conditions in a production environment, such as traffic spikes, network latency, firewalls, and other factors. And it can be done far more affordably than traditional testing methods, as part of agile development cycles, and without an army of highly skilled performance engineers.
Presentation given in Rome for the International SOA conference - Moving SOA into the Cloud in Rome, May 2011
The 5 Keys to Virtual Backup ExcellenceBill Hobbib
ExaGrid and Veeam present the 5 Keys to Virtual Server Backup Excellence. Includes an overview of ExaGrid disk backup with deduplication and Veeam Backup & Replicaiton software, and customer case studies.
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
You've read the documentation, played in the lab, and now you're ready to jump in and upgrade your NetWare environment to Novell Open Enterprise Server 2 on Linux. Attend this session to glean a final few best practices and to learn how to make the most of the migration tools included in the product. You'll also learn about the various pitfalls encountered during real-world upgrades, as well as the solutions used to resolve them.
This session will explore what happens after server consolidation: Workload profiles change, usage patterns change, and resource utilization goes up and down. During this session, we will discuss how the storage footprint changes, and what used to be ideally optimized isn't anymore.
You will learn how to quantify the gap between resource allocation and actual usage, how to recover and redeploy excess capacity, and how to find common virtual machine configuration mistakes that can degrade overall performance.
The Efficient Use of Cyberinfrastructure to Enable Data Analysis CollaborationCybera Inc.
Dave Fellinger
CTO, DataDirect Networks
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "What's Next: Key Areas of Emerging Cyberinfrastructure."
This session explored some of the up-and-coming areas of cyberinfrastructure and why they are increasingly being considered as essential elements to innovative research and development.
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsNovell
Let's face it: storage isn't sexy. In fact, it can be a huge challenge. But you can't just make it go away. So why not try and make the best of a bad situation? Join us for this session if you're responsible for planning or managing storage for your enterprise. You'll see how the new Novell File Management Suite can help you clean up your unstructured data and transform storage from a bane to a boon for IT productivity.
Domain Services for Windows: Best Practices for Windows InteroperabilityNovell
Attend this session to learn how Domain Services for Windows can help you enhance Windows interoperability. Find out how to design trees and forests for Domain Services for Windows, how to integrate it into existing Novell eDirectory trees, how to leverage deployment methods that support application access and much more. We'll also discuss how you can deploy Domain Services for Windows with Citrix, VMware and NetApp.
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
File-based data is growing faster, consuming more space and being retained longer than ever before. Attend this session to find out how you can tame the file storage beast! You'll be introduced to the unique new offering from Novell, Novell File Management Suite, and how it can help you reduce storage infrastructure costs, save man hours, enhance existing investments in storage hardware and software, and improve compliance.
For organizations looking to eliminate the Novell client, this session provides a detailed look at what's required to meet that goal. We'll discuss the pros and cons of the Novell client and any pitfalls that eliminating it might create for other Novell products. We'll also show you the significance of Domain Services for Windows and how it can co-exist with a Microsoft Active Directory infrastructure. We'll even perform a test implementation and review what tools are used to manage the mixed environment.
Best Practices for Administering Novell GroupWise 8Novell
Along with a host of new end-user features, Novell GroupWise 8 includes administrative updates to make it easier than ever to keep your system running reliably, safeguard your data and leverage your existing investments. This session will assist you in perfecting the administration of your GroupWise messaging environment. You'll learn how to optimize and manage agents and configuration settings to maximize your system stability and performance.
SOASTA's tens-of-thousands of tests in customer labs and production environments have uncovered issues that range from code level bugs to issues in 3rd party services. Testing early, often and at real scale is the only way to be fully prepared.
So much business happens on the go—in hotel rooms, airports, coffee shops, kitchens or anywhere else your users choose to work. Keeping your users' productivity at peak levels is an imperative for every organization. Attend this session to learn about the new mobility strategy from Novell, focused on the ActiveSync protocol and our own soon-to-be-released data synchronization solution. This session will also cover the variety of third-party mobility solutions available for Novell GroupWise today.
Caffelli is a full service integrated branding agency in Portland, OR founded in 2010. As a
startup company, Caffelli was challenged to scale their IT capabilities quickly to meet their
expanding needs. They chose to deploy an on-premise Intel® Xeon® Processor E3 familybased
server with Intel® RAID Controller RMS2AF080 to serve as the foundation of their small
business’ data, while leveraging the availability, scalability and pay-as-you go model of business
applications in the cloud.
Novell Teaming offers excellent functionality out of the box. It also offers limitless possibilities for customization based on your organization's needs. Attend this session to learn how easily you can create custom branding elements for your Novell Teaming environment—and how you can create extensions from Novell Teaming to other applications. You'll receive step-by-step instructions on the process from Novell Teaming engineers and experts.
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell
See how the popular Novell Storage Manager can help you manage file storage and user administration like never before. Leveraging user identities and roles, you can customize policies based on your business rules, thereby automating redundant tasks and reducing the heavy manual effort typically required for file management. Attend this session to hear from the experts on architecture, deployment patterns and how to get the most bang for your buck!
Advanced DNS/DHCP for Novell eDirectory EnvironmentsNovell
Don't be intimidated by DNS/DHCP. When properly implemented, these powerful tools can enhance your network's performance and stability. Attend this popular session where we'll demystify DNS/DHCP and share best practices for running eDirectory-enabled DNS in Novell Open Enterprise Server 2. You'll also learn how to how to register your own domain name without using an ISP, how to "ransom back" a domain name from a Web hosting provider and much more.
[café techno] Présentation de Backup Exec 2012Groupe D.FI
Présentation de la solution de sauvegarde informatique Backup Exec 2012 :
- Les composants
- L'interface
- Option de déduplication
- Amélioration majeure de Backup Exec 2012
File Access in Novell Open Enterprise Server 2 SP2Novell
This session offers a consolidated view of the various file access protocols (NCP, Novell CIFS, AFP, FTP and Samba) supported in Novell Open Enterprise Server 2 Service Pack 2. We'll also cover the ways in which they can be combined and deployed in order to meet different file access needs. You'll learn about the features and capabilities of each protocol, as well as deployment aspects—such as clustering, auditing and performance—common to them all.
McAfee MOVE (Management for Optimized Virtual Environments) bietet Sicherheitsmanagement für virtuelle Umgebungen. Außerdem werden Lösungen für Endpoint Security vorgestellt.
The Efficient Use of Cyberinfrastructure to Enable Data Analysis CollaborationCybera Inc.
Dave Fellinger
CTO, DataDirect Networks
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "What's Next: Key Areas of Emerging Cyberinfrastructure."
This session explored some of the up-and-coming areas of cyberinfrastructure and why they are increasingly being considered as essential elements to innovative research and development.
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsNovell
Let's face it: storage isn't sexy. In fact, it can be a huge challenge. But you can't just make it go away. So why not try and make the best of a bad situation? Join us for this session if you're responsible for planning or managing storage for your enterprise. You'll see how the new Novell File Management Suite can help you clean up your unstructured data and transform storage from a bane to a boon for IT productivity.
Domain Services for Windows: Best Practices for Windows InteroperabilityNovell
Attend this session to learn how Domain Services for Windows can help you enhance Windows interoperability. Find out how to design trees and forests for Domain Services for Windows, how to integrate it into existing Novell eDirectory trees, how to leverage deployment methods that support application access and much more. We'll also discuss how you can deploy Domain Services for Windows with Citrix, VMware and NetApp.
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
File-based data is growing faster, consuming more space and being retained longer than ever before. Attend this session to find out how you can tame the file storage beast! You'll be introduced to the unique new offering from Novell, Novell File Management Suite, and how it can help you reduce storage infrastructure costs, save man hours, enhance existing investments in storage hardware and software, and improve compliance.
For organizations looking to eliminate the Novell client, this session provides a detailed look at what's required to meet that goal. We'll discuss the pros and cons of the Novell client and any pitfalls that eliminating it might create for other Novell products. We'll also show you the significance of Domain Services for Windows and how it can co-exist with a Microsoft Active Directory infrastructure. We'll even perform a test implementation and review what tools are used to manage the mixed environment.
Best Practices for Administering Novell GroupWise 8Novell
Along with a host of new end-user features, Novell GroupWise 8 includes administrative updates to make it easier than ever to keep your system running reliably, safeguard your data and leverage your existing investments. This session will assist you in perfecting the administration of your GroupWise messaging environment. You'll learn how to optimize and manage agents and configuration settings to maximize your system stability and performance.
SOASTA's tens-of-thousands of tests in customer labs and production environments have uncovered issues that range from code level bugs to issues in 3rd party services. Testing early, often and at real scale is the only way to be fully prepared.
So much business happens on the go—in hotel rooms, airports, coffee shops, kitchens or anywhere else your users choose to work. Keeping your users' productivity at peak levels is an imperative for every organization. Attend this session to learn about the new mobility strategy from Novell, focused on the ActiveSync protocol and our own soon-to-be-released data synchronization solution. This session will also cover the variety of third-party mobility solutions available for Novell GroupWise today.
Caffelli is a full service integrated branding agency in Portland, OR founded in 2010. As a
startup company, Caffelli was challenged to scale their IT capabilities quickly to meet their
expanding needs. They chose to deploy an on-premise Intel® Xeon® Processor E3 familybased
server with Intel® RAID Controller RMS2AF080 to serve as the foundation of their small
business’ data, while leveraging the availability, scalability and pay-as-you go model of business
applications in the cloud.
Novell Teaming offers excellent functionality out of the box. It also offers limitless possibilities for customization based on your organization's needs. Attend this session to learn how easily you can create custom branding elements for your Novell Teaming environment—and how you can create extensions from Novell Teaming to other applications. You'll receive step-by-step instructions on the process from Novell Teaming engineers and experts.
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell
See how the popular Novell Storage Manager can help you manage file storage and user administration like never before. Leveraging user identities and roles, you can customize policies based on your business rules, thereby automating redundant tasks and reducing the heavy manual effort typically required for file management. Attend this session to hear from the experts on architecture, deployment patterns and how to get the most bang for your buck!
Advanced DNS/DHCP for Novell eDirectory EnvironmentsNovell
Don't be intimidated by DNS/DHCP. When properly implemented, these powerful tools can enhance your network's performance and stability. Attend this popular session where we'll demystify DNS/DHCP and share best practices for running eDirectory-enabled DNS in Novell Open Enterprise Server 2. You'll also learn how to how to register your own domain name without using an ISP, how to "ransom back" a domain name from a Web hosting provider and much more.
[café techno] Présentation de Backup Exec 2012Groupe D.FI
Présentation de la solution de sauvegarde informatique Backup Exec 2012 :
- Les composants
- L'interface
- Option de déduplication
- Amélioration majeure de Backup Exec 2012
File Access in Novell Open Enterprise Server 2 SP2Novell
This session offers a consolidated view of the various file access protocols (NCP, Novell CIFS, AFP, FTP and Samba) supported in Novell Open Enterprise Server 2 Service Pack 2. We'll also cover the ways in which they can be combined and deployed in order to meet different file access needs. You'll learn about the features and capabilities of each protocol, as well as deployment aspects—such as clustering, auditing and performance—common to them all.
McAfee MOVE (Management for Optimized Virtual Environments) bietet Sicherheitsmanagement für virtuelle Umgebungen. Außerdem werden Lösungen für Endpoint Security vorgestellt.
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Serhad MAKBULOĞLU, MBA
Serhad Makbuloğlu tarafından verilecek bu web seminerinde, Windows Server 2012 Active Directory Domain and Trust (Forest Trust) konusu anlatılacaktır. Bu web semineri teknik içeriğe sahiptir. Ayrıca Web seminer sonundaki soru&cevap bölümünde de bu ürünle ilgili merak ettiğiniz soruların cevaplarını bulabilirsiniz.
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
Presentation from AWS Worldwide Public Sector team's conference Building and Securing Applications in the Cloud (http://aws.amazon.com/campaigns/building-securing-applications-cloud/).
WatchGuard Extensible Content Security (XCS) solutions deliver the industry's best defense-in-depth security for email, web, and data loss prevention to provide an extensive risk management boundary. With six different models to choose from, XCS appliances meet the messaging security requirements of business of all sizes, including solutions to protect the world's most demanding email and web networks.
La Administración de Información de Seguridad y de Eventos (en inglés: Security Information and Event Management - SIEM) es un tema principal de los CIOs y los CSOs en muchas empresas y organizaciones. EnVision de RSA en una solución centralizada para la administración de seguridad y conformidad que le provee la visibilidad en cuanto a la situación de seguridad de la empresa.
Retos y Tendencias en Redes ConvergentesAEC Networks
Presentación realizada por el Ing. Sergio Rodríguez durante el desayuno con clientes de Extreme Networks el pasado miércoles 14 de octubre en el Rest. Chateau 1525.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
1. RSA Data Loss Prevention(DLP) Suite
Discover and Mitigate Business Risk from Sensitive Data
2. RSA Data Loss Prevention
Data Breaches Overview
RSA DLP Solution
Five Critical Factors
Customer Case Studies
2
2
3. Why is Information Security So Difficult?
Endpoint Network/E-mail Apps/DB FS/CMS Storage
LAN
Internal Enterprise Production File Server
Employees Applications Disk Arrays Backup
WAN Database Tape
VPN
Backup
Business Replica File Server Disk Arrays System
Remote
Analytics
Employees
Disk Arrays Backup Disk
SharePoint and other
Outsourced Staging Collaboration &
Partners Dev. Content Mgmt
Systems
3
Endpoint Network/E-mail Apps/DB FS/CMS Storage
4. We Are Exposed At Every Point
Endpoint Network/E-mail Apps/DB FS/CMS Storage
LAN
Network Leak
Endpoint Privileged User Privileged User Tapes lost or
Internal Email-IM-HTTP- Enterprise File Server
theft/loss
FTP-etc. BreachProduction Breach stolen
Backup
Employees Applications Database Disk Arrays
WAN Tape
VPN
Backup
E-mail leak or Business DB or Replica
App, File Server Disk Arrays System
Endpoint Leak File Server / CMS
Remote packets sniffed Encryption Key
via print/copy
in transit
Analytics
Hack
Hack
Employees
Disk Arrays Backup Disk
SharePoint and other
Public Outsourced Staging Collaboration &
(Semi) Discarded disk
IP Sent to
Partners Unintentional
Infrastructure Dev.
non trusted user
Access Hack
Distribution Content User
Trusted Mgmt exploited
Misuse
Systems
4
Endpoint Network/E-mail Apps/DB FS/CMS Storage
5. There Are Many Point Solutions
Endpoint Network/E-mail Apps/DB FS/CMS Storage
Mobile Email Application File
Encryption Encryption Encryption Encryption
LAN
Tape
Internal Enterprise Production File Server Encryption
Employees Applications Disk Arrays Backup
WAN Database Tape
Port Network Database CMS/FS
Monitoring Monitoring Encryption Access Controls
VPN
Backup
Business Replica File Server Disk Arrays System
Remote
File Network Activity
Encryption Encryption
Analytics
Monitoring
eDRM
Employees
Disk
Encryption
Disk Arrays Backup Disk
App/DB SharePoint and other
eDRM eDRM Outsourced Staging File
Collaboration &
Partners Discovery Discovery
Dev. Content Mgmt
Systems
5
Endpoint Network/E-mail Apps/DB FS/CMS Storage
6. The Business Case for DLP
Reduce Risk | Minimize Cost | Avoid Disruption
Reduce Risk
1. What data can you catch? Where?
2. What can you do about it?
3. Time to Value
Minimize Cost Avoid Disruption
1. Product 1. Consider the “who” not just “what”
2. People
2. Make controls transparent to users
a) Setup/Maintain
b) Investigations 3. Involve the data owners
c) Remediation
3. Infrastructure
6
7. RSA Data Loss Prevention
Data Breaches Overview
RSA DLP Solution
Five Critical Factors
Customer Case Studies
7
7
8. RSA Data Loss Prevention Suite
Policy System RSA DLP Reporting & Incident
Management Administration Dashboard Workflow
Enterprise Manager
Policies Incidents
DLP Datacenter DLP Network DLP Endpoint
Discover sensitive data Monitor all traffic for Discover sensitive data
from everywhere sensitive data and Monitor user actions
Enforce controls on Enforce controls on Enforce controls on both
sensitive data sensitive transmissions data and user actions
Third Party Enforcement Controls
8
9. Reducing Your Sources of Risk: Data at Rest
Discover Analyze Remediate
Rescan sources to measure and manage risk
File shares, Servers, Laptops 300+ File types Databases & Repositories Remediation
•Windows file shares •Microsoft Office Files •SharePoint • Secure Delete
•Unix file shares •PDFs, PSTs •Documentum • Manual/Auto Move
•NAS / SAN storage •Zip files •Microsoft Access • Manual/Auto Quarantine
•Windows 2000, 2003 •CATIA files •Oracle, SQL • Notifications
•Windows XP, Vista •Content Mgmt systems • eDRM
9
10. Protecting Data in the Network: Data in Motion
Monitor Analyze Enforce
Email Instant Messages Web Traffic Remediation
•SMTP email •Yahoo IM •FTP •Audit
•Exchange, Lotus, etc. •MSN Messenger •HTTP •Block
•Webmail •AOL Messenger •HTTPS •Encrypt
•Text and attachments •TCP/IP •Log
10
11. Protecting Data at the Endpoint: Data in Use
Monitor Analyze Enforce
Print & Burn USB Copy and Save As Actions & Controls
•Local printers •External hard drives •Copy to Network shares • Allow
•Network printers •Memory sticks •Copy to external drives • Justify
•Burn to CDs/DVDs •Removable media •Save As to external • Block
drives • Audit & Log
11
12. How Can RSA DLP Solution Help?
Identify and address sources of risk
Discover
Identify broken business processes
Enforce data security policies for compliance
Enforce
Leverage third-party control solutions
Educate employees on policy and risk
Educate
Provide insight into violations & policies
Monitor and protect all egress points
Protect
Prevent sensitive data from leaking out
12
13. How Can DLP Solutions Reduce Risk?
Endpoint Network Apps/DB FS/CMS Storage
Customers Privileged Privileged Privileged Privileged
People Users Users Users Users
• Discover unsafe user behavior and educate
WWW
Internal Production
employees on security policies
Employees
eCommerce
Applications Database
Disk
Arrays
Backup
Tape
WAN
Processes Enterprise Production
Backup
LAN Database File Server Disk
• Identify and fix broken business processes
Remote
Campuses
Applications
Arrays System
VPN
Technology Business
Analytics
Replica
Portals Disk Backup
Remote
• Leverage technology controls more effectively
Employees
Arrays Disk
to secure data Outsourced Staging
Collaboration &
Dev. Disk
Content Mgmt
13 Systems Arrays
Partners
13
14. RSA Data Loss Prevention
Data Breaches Overview
RSA DLP Solution
Five Critical Factors
Customer Case Studies
14
14
15. Top 5 Success Factors for DLP
E
Policy & Identity Incident Enterprise Built-In vs.
Classification Aware Workflow Scalability Bolt-On
More policies and Identity awareness Consolidated alerts Scan more data Common policies
better policies for for classification, with the right faster with lesser across the
classification and controls and information to the hardware and infrastructure -
risk mitigation remediation right people for the resources EMC, Cisco and
right actions Microsoft
15
16. Policy & Classification
More policies and better policies for classification
and risk mitigation
• Unified policy framework
• Best of breed classification
• 150+ built in policy templates
• Information Policy and Classification team
• Highest accuracy per Wipro analysis
16
17. Identity Awareness
Identity awareness for classification, controls and
remediation
• Identity-based Policy
E.g. Group x can send data y out
• Identity-based notification
E.g. Notify the persons manager
• Identity-based control
E.g. Lock this data so only group x can open
• Integration with Microsoft Active Directory
17
18. Incident Workflow
Consolidated alerts with the right information to the
right people for the right actions
• Intelligent correlation of events into incidents
• Right alerts to the right people in the right order
• Intuitive workflow to remediate violations
• Scheduled reports sent to subscribers automatically
• Integration with RSA enVision to simplify security
operations
18
19. Enterprise Scalability
E Scan more data faster with lesser hardware and
resources
• Support distributed deployments
• Scale to 100’s of thousands of users
• Unique Grid Scanning technology
• Scan large amounts of data faster and cheaper
19
20. Built-in Vs. Bolt-on
Common policies across the infrastructure –
Microsoft, Cisco and EMC
• Leverage your existing infrastructure
• Microsoft: Integration with Microsoft RMS and will
also integrate RSA DLP data classification engine
and policies into Microsoft infrastructure
• Cisco: Integration with IronPort
• EMC: Integration with Documentum, Celerra,
SourceOne, etc.
20
21. RSA Data Loss Prevention
Data Breaches Overview
RSA DLP Solution
Five Critical Factors
Customer Case Studies
21
21
23. How Can We Help
Your Current Status We Can Help
Gathering Information By Offering
1. Investigating DLP in general 1. Risk Advisor to discover current risk
2. Identifying business drivers 2. Free Scan to support business case
3. Developing a business case 3. ROI/TCO analysis for DLP
4. Identifying a Project Sponsor 4. DLP workshop
Planning to Procure and Deploy By Providing
1. Have a defined DLP project 1. A framework for DLP evaluation
2. An evaluation environment
2. Developing a detailed DLP project
3. A detailed DLP proposal
3. Evaluating DLP vendors
4. Deployment architecture
23