When you are disrupting an old, tired industry sometimes you need to fake it. This talk is about times where you should fake it, and realizing when you need to actually make it.
#ProductHuntTO
Y&R Advertising sent some of its brightest minds to the SXSW Interactive Festival and here’s what they had to say about the trends at the intersection of technology, innovation, and advertising, and what they mean for brands today.
The want and need to evolve and become more efficient as humans, is what society must hold true to a “common” goal. But where do we draw the line from evolving to human rights. Are the possibilities limited? Are we solving problems, but then creating bigger problems? Does this give data back to the individual? All the while looking at the possibilities between microchips and Covid-19.
Understanding that technology is constantly helping us is important. The human microchip implant is typically an identifying integrated circuit device or RFID (Radio- Frequency Identification) transponder encased in silicate glass and implanted in the body of a human being, (Banafa, 2021). Typically, between the thumb an index finger. This tech was initially used as a listening device in 1945, didn’t become the tracker we call RFID till 1973. The original business plan presented to investors in 1969 showed many usages, transportation, (vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic checkbook, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history), (Global Venture, 2021). The use of a microchip will help us remove human error and increase our own knowledge; ‘data!’ It’s all about presentation! Let’s be real we have had tracking devices for years since phones were mobile. Now we can do a variety of thing on our wrist with smartwatches.
The more we divulge into this tech, the possibilities seem endless. I think of the social inequality and creating a base of what it means to be a citizen of a society. Not needing to be pestered by law enforcement about who you are, because your microchip will be able to let law enforcement know at a safe and long distance, to help avoid deadly confrontations; that we see time and time again in minority groups. Black adults are about five times as likely as whites to say they’ve been unfairly stopped by the police because of their race or ethnicity (44% vs. 9%), (Desilver, Lipka, & Fahmy, 2020). Now imagine removing our human error due to prejudice in instances like this! Creating a new standard of communicating with the public when it comes to policing.
* Artificial Intelligence can revolutionize customer engagement
* Treat the patient journey, not just the stops along the way
* Operating model: “industrialized digital”
Top Trends from SXSW Interactive 2014. The Big Roundup.Ashika Chauhan
SXSW wasn’t just about one or two pieces of new tech, what it actually felt like was a glimpse into the not-so-distant future.
Trends you might of heard of like wearables, data and the internet of things are still around, but they’re beginning to grow-up and different industries are beginning to be disrupted as a result.
More than anything, the conference instilled a sense of responsibility in me. The decisions we make today, as people, as agencies and as brands will define the future we live in tomorrow.
The deck covers the most prominent trends from this year. I'd love to hear your thoughts, say hello @ashikachauhan.
Ashika Chauhan is Big’s Digital Experience Director and is passionate about creative innovation.
Y&R Advertising sent some of its brightest minds to the SXSW Interactive Festival and here’s what they had to say about the trends at the intersection of technology, innovation, and advertising, and what they mean for brands today.
The want and need to evolve and become more efficient as humans, is what society must hold true to a “common” goal. But where do we draw the line from evolving to human rights. Are the possibilities limited? Are we solving problems, but then creating bigger problems? Does this give data back to the individual? All the while looking at the possibilities between microchips and Covid-19.
Understanding that technology is constantly helping us is important. The human microchip implant is typically an identifying integrated circuit device or RFID (Radio- Frequency Identification) transponder encased in silicate glass and implanted in the body of a human being, (Banafa, 2021). Typically, between the thumb an index finger. This tech was initially used as a listening device in 1945, didn’t become the tracker we call RFID till 1973. The original business plan presented to investors in 1969 showed many usages, transportation, (vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic checkbook, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history), (Global Venture, 2021). The use of a microchip will help us remove human error and increase our own knowledge; ‘data!’ It’s all about presentation! Let’s be real we have had tracking devices for years since phones were mobile. Now we can do a variety of thing on our wrist with smartwatches.
The more we divulge into this tech, the possibilities seem endless. I think of the social inequality and creating a base of what it means to be a citizen of a society. Not needing to be pestered by law enforcement about who you are, because your microchip will be able to let law enforcement know at a safe and long distance, to help avoid deadly confrontations; that we see time and time again in minority groups. Black adults are about five times as likely as whites to say they’ve been unfairly stopped by the police because of their race or ethnicity (44% vs. 9%), (Desilver, Lipka, & Fahmy, 2020). Now imagine removing our human error due to prejudice in instances like this! Creating a new standard of communicating with the public when it comes to policing.
* Artificial Intelligence can revolutionize customer engagement
* Treat the patient journey, not just the stops along the way
* Operating model: “industrialized digital”
Top Trends from SXSW Interactive 2014. The Big Roundup.Ashika Chauhan
SXSW wasn’t just about one or two pieces of new tech, what it actually felt like was a glimpse into the not-so-distant future.
Trends you might of heard of like wearables, data and the internet of things are still around, but they’re beginning to grow-up and different industries are beginning to be disrupted as a result.
More than anything, the conference instilled a sense of responsibility in me. The decisions we make today, as people, as agencies and as brands will define the future we live in tomorrow.
The deck covers the most prominent trends from this year. I'd love to hear your thoughts, say hello @ashikachauhan.
Ashika Chauhan is Big’s Digital Experience Director and is passionate about creative innovation.
Now into its ninth year, Fjord’s annual Trends Report 2016 has arrived and, once again, we unveil what we believe to be the most significant technology and business developments emerging and describe how they will transform our world in the coming 12 months.
Our Trends Report is the result of months of research, discussions and debate, pooling the collective experience at Fjord and Accenture Interactive and distilled into ten core ideas.
We believe 2016 will be another defining year for digital and will bring even more transformation, disruption and delight to organizations and their audiences. In the report you can expect to discover more about big data etiquette, the rise of employee experience (EX) design, disappearing apps, the true power of wearables and nearables and much more.
Check out the full Fjord Trends Report 2016 below, visit trends.fjordnet.com, and follow the conversation at #FjordTrends.
Enjoy!
See more at www.trends.fjordnet.com
The Accenture Fjord Trend Report features what we believe to be the most significant technology and business developments emerging and how they will impact our lives.
Our Trends Report is the result of months of research, discussions, and debate, pooling the collective experience at Fjord and Accenture Interactive and distilled into ten core ideas.
Visit trends.fjordnet.com and follow the conversation at #FjordTrends.
Enjoy!
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
Transcript of a discussion on how Bruce Auto Group gained deep insights into their systems, apps, and data to manage and reduce risks across their entire IT and services supply chain.
Defending the Perimeter Evolves Into Securing the User Experience Bubble for ...Dana Gardner
Transcript of a discussion on how Macmillan Cancer Support in the UK places confidence in -- and ease of use of -- overall security as both top IT and health services requirements.
Irene Etzkorn, my guest on the Business901 podcast What it takes to Simplify, is a worldwide authority on simplicity. As executive director of Simplification, she built the Simplification practice of Siegel+Gale. Her clients include the nation’s top banks, brokerage firms, insurance companies, utilities, and health care providers. Irene and Alan Siegel have recently authored Simple: Conquering the Crisis of Complexity describing these practices.
This is a transcription of the podcast. In the podcast, she described the 3 Steps of Simplification that was outlined in her book.
The Future of Insurance special report, published in The Times, reveals how this traditional sector is keeping up with the digital age. The report covers price wars between companies, the impact of technology and how personal data may penalise ‘uninsurables’. Additionally, it includes a pull-out infographic charting the rise of telematics
Cybersecurity is a key ingredient in the digital economyMark Albala
The digital economy is very different. Information is the life blood of the digital economy, and cyber-security attacks are theft of information, sometimes with real financial implications. While too many companies have not revisited their cyber-security arsenal to meet the demands of the digital economy, the regulators have been busy to update the minimally acceptable levels of protection of individuals and their identity in the digital ecosphere. Many companies will be burned by the punitive damages levied by regulators and the reputational damage which impinges upon the ability to conduct digital commerce.
This writing will go through what it means to be cyber-safe in the digital economy and defines a framework that should be used by all organizations to identify the leakages in information either directly leaked by them or syphoned off through imposters misrepresenting the organization. From the regulatory and consumer vantage point, there is not difference, the organizations conducting digital commerce are required to perform the due diligence necessary to provide assurance to consumers that their digital interactions with organizations are secure and safe.
Many companies will appear in the tabloids with massive fines and punishment in the capital markets due to lapses in judgement when it comes to meeting their obligations for cyber-security. Unfortunately, it will take examples made of such companies before the actions necessary to protect the consumer willing to conduct digital commerce is taken seriously. Many of the organizations will not survive the anticipated disruptions.
Building and Scaling a Fintech Startup by Trusting your GutAltar.io
We see iconic entrepreneurs use their intuition to succeed every day – Richard Branson, Bill Gates, Oprah Winfrey.
But knowing when to trust your gut is, I believe, something every entrepreneur struggles with from time to time.
If this is you, I think you’re going to like this conversation with fintech founder, Jan-Philipp Kruip, founder of FitSense, a B2B health and fitness fintech startup.
Copyright of Manufacturers Monthly is the property of Pri.docxbobbywlane695641
Copyright of Manufacturers' Monthly is the property of Prime Creative Media and its content
may not be copied or emailed to multiple sites or posted to a listserv without the copyright
holder's express written permission. However, users may print, download, or email articles for
individual use.
62
September 25, 2017
“It’s about what you
do to communicate
to people why
these things are
important. It’s not
about a tweet”
Megan Murphy: Artificial intelligence. People may not know that IBM
doesn’t call it AI. They call it “cognitive computing.” Tell us why that is.
Ginni Rometty: I have actually had to explain this to my husband
as well, because he said to me, “Ginni, of all words, why cognitive?” It
was really a very thoughtful decision. The world calls it AI. There’s so
much fearmongering about AI. When we started over a decade ago,
the idea was to help you and I make better decisions amid cognitive
overload. That’s what has always led us to cognitive. If I considered the
initials AI, I would have preferred augmented intelligence. It’s the idea
that each of us are going to need help on all important decisions. I’m
always reminded of an interesting statistic: When you’re asked what
percentage of your decisions are right, what percentage would you get?
What would it be?
A study said on average that a third of your decisions are really
great decisions, a third are not optimal, and a third are just wrong.
We’ve estimated the market is $2 billion for tools to make better deci-
sions. That’s what led us all to really calling it cognitive and getting
The leader of America’s oldest tech
company talks to Bloomberg Businessweek
Editor Megan Murphy about the
promise and threat of AI (and Watson),
Charlottesville, and being a role model
Ginni
Rometty
CEO, IBM
Photograph
by Stephanie
Sinclair
through to people that, “Look, we really think this
is about man and machine, not man vs. machine.
This is an era—really, an era that will play out for
decades in front of us.”
The world discovered IBM’s Watson after the
computer system beat human competitors and
won $1 million on Jeopardy! It’s named after your
company’s first CEO. What does Watson mean for
the future of AI—and for your business?
Everything you know until today is program-
mable—an entire era for decades has been pro-
grammable. Watson would be the beginning of
a new era where you didn’t program. Machines
would look at data, understand, reason over it,
and they continue to learn: understand, reason
and learn, not program, in my simple definition.
That to us is a very big difference between what
◼ DEBRIEF
63
Bloomberg Businessweek Month 00, 2017Bloomberg Businessweek Month 00, 2017Bloomberg Businessweek Month 00, 2017
6464
you might experience in what I call consumer AI—that is,
general purpose—vs. business. We set out to build an AI plat-
form for business.
There would be two big differences between business and
consum.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
More Related Content
Similar to Disrupting the Insurance Industry with Tech
Now into its ninth year, Fjord’s annual Trends Report 2016 has arrived and, once again, we unveil what we believe to be the most significant technology and business developments emerging and describe how they will transform our world in the coming 12 months.
Our Trends Report is the result of months of research, discussions and debate, pooling the collective experience at Fjord and Accenture Interactive and distilled into ten core ideas.
We believe 2016 will be another defining year for digital and will bring even more transformation, disruption and delight to organizations and their audiences. In the report you can expect to discover more about big data etiquette, the rise of employee experience (EX) design, disappearing apps, the true power of wearables and nearables and much more.
Check out the full Fjord Trends Report 2016 below, visit trends.fjordnet.com, and follow the conversation at #FjordTrends.
Enjoy!
See more at www.trends.fjordnet.com
The Accenture Fjord Trend Report features what we believe to be the most significant technology and business developments emerging and how they will impact our lives.
Our Trends Report is the result of months of research, discussions, and debate, pooling the collective experience at Fjord and Accenture Interactive and distilled into ten core ideas.
Visit trends.fjordnet.com and follow the conversation at #FjordTrends.
Enjoy!
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
Transcript of a discussion on how Bruce Auto Group gained deep insights into their systems, apps, and data to manage and reduce risks across their entire IT and services supply chain.
Defending the Perimeter Evolves Into Securing the User Experience Bubble for ...Dana Gardner
Transcript of a discussion on how Macmillan Cancer Support in the UK places confidence in -- and ease of use of -- overall security as both top IT and health services requirements.
Irene Etzkorn, my guest on the Business901 podcast What it takes to Simplify, is a worldwide authority on simplicity. As executive director of Simplification, she built the Simplification practice of Siegel+Gale. Her clients include the nation’s top banks, brokerage firms, insurance companies, utilities, and health care providers. Irene and Alan Siegel have recently authored Simple: Conquering the Crisis of Complexity describing these practices.
This is a transcription of the podcast. In the podcast, she described the 3 Steps of Simplification that was outlined in her book.
The Future of Insurance special report, published in The Times, reveals how this traditional sector is keeping up with the digital age. The report covers price wars between companies, the impact of technology and how personal data may penalise ‘uninsurables’. Additionally, it includes a pull-out infographic charting the rise of telematics
Cybersecurity is a key ingredient in the digital economyMark Albala
The digital economy is very different. Information is the life blood of the digital economy, and cyber-security attacks are theft of information, sometimes with real financial implications. While too many companies have not revisited their cyber-security arsenal to meet the demands of the digital economy, the regulators have been busy to update the minimally acceptable levels of protection of individuals and their identity in the digital ecosphere. Many companies will be burned by the punitive damages levied by regulators and the reputational damage which impinges upon the ability to conduct digital commerce.
This writing will go through what it means to be cyber-safe in the digital economy and defines a framework that should be used by all organizations to identify the leakages in information either directly leaked by them or syphoned off through imposters misrepresenting the organization. From the regulatory and consumer vantage point, there is not difference, the organizations conducting digital commerce are required to perform the due diligence necessary to provide assurance to consumers that their digital interactions with organizations are secure and safe.
Many companies will appear in the tabloids with massive fines and punishment in the capital markets due to lapses in judgement when it comes to meeting their obligations for cyber-security. Unfortunately, it will take examples made of such companies before the actions necessary to protect the consumer willing to conduct digital commerce is taken seriously. Many of the organizations will not survive the anticipated disruptions.
Building and Scaling a Fintech Startup by Trusting your GutAltar.io
We see iconic entrepreneurs use their intuition to succeed every day – Richard Branson, Bill Gates, Oprah Winfrey.
But knowing when to trust your gut is, I believe, something every entrepreneur struggles with from time to time.
If this is you, I think you’re going to like this conversation with fintech founder, Jan-Philipp Kruip, founder of FitSense, a B2B health and fitness fintech startup.
Copyright of Manufacturers Monthly is the property of Pri.docxbobbywlane695641
Copyright of Manufacturers' Monthly is the property of Prime Creative Media and its content
may not be copied or emailed to multiple sites or posted to a listserv without the copyright
holder's express written permission. However, users may print, download, or email articles for
individual use.
62
September 25, 2017
“It’s about what you
do to communicate
to people why
these things are
important. It’s not
about a tweet”
Megan Murphy: Artificial intelligence. People may not know that IBM
doesn’t call it AI. They call it “cognitive computing.” Tell us why that is.
Ginni Rometty: I have actually had to explain this to my husband
as well, because he said to me, “Ginni, of all words, why cognitive?” It
was really a very thoughtful decision. The world calls it AI. There’s so
much fearmongering about AI. When we started over a decade ago,
the idea was to help you and I make better decisions amid cognitive
overload. That’s what has always led us to cognitive. If I considered the
initials AI, I would have preferred augmented intelligence. It’s the idea
that each of us are going to need help on all important decisions. I’m
always reminded of an interesting statistic: When you’re asked what
percentage of your decisions are right, what percentage would you get?
What would it be?
A study said on average that a third of your decisions are really
great decisions, a third are not optimal, and a third are just wrong.
We’ve estimated the market is $2 billion for tools to make better deci-
sions. That’s what led us all to really calling it cognitive and getting
The leader of America’s oldest tech
company talks to Bloomberg Businessweek
Editor Megan Murphy about the
promise and threat of AI (and Watson),
Charlottesville, and being a role model
Ginni
Rometty
CEO, IBM
Photograph
by Stephanie
Sinclair
through to people that, “Look, we really think this
is about man and machine, not man vs. machine.
This is an era—really, an era that will play out for
decades in front of us.”
The world discovered IBM’s Watson after the
computer system beat human competitors and
won $1 million on Jeopardy! It’s named after your
company’s first CEO. What does Watson mean for
the future of AI—and for your business?
Everything you know until today is program-
mable—an entire era for decades has been pro-
grammable. Watson would be the beginning of
a new era where you didn’t program. Machines
would look at data, understand, reason over it,
and they continue to learn: understand, reason
and learn, not program, in my simple definition.
That to us is a very big difference between what
◼ DEBRIEF
63
Bloomberg Businessweek Month 00, 2017Bloomberg Businessweek Month 00, 2017Bloomberg Businessweek Month 00, 2017
6464
you might experience in what I call consumer AI—that is,
general purpose—vs. business. We set out to build an AI plat-
form for business.
There would be two big differences between business and
consum.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
3. We’ve re-imagined health benefits.
With a Next
Generation Platform
Employers
Advisory
Plan Design
Insights
Enrolment
Administrators
Customer Care
Reporting
HR Integration
Consolidated Billing
Members
Health Marketplace
Virtual Care
Health Advice
Digital Wallet
Providers
Customer Acquisition
Paperless Payments
Booking
CRM