Learn how to identify what decisions can be made at Board meetings or Members meetings, what documents are required to prepare for the meetings, how to take minutes at the meetings, and how to draft Board resolutions or Members resolutions - all under the Companies Act, Singapore
One of the most expensive forms of workplace communication
Multiply number of attendees x hourly rate x (length of meeting, travel time and prep time)
Balance against outcome(s) and alternatives
Carefully consider length, attendees and frequency
This PPT presentation will allow any used to effectively conduct successful and effective meetings while capturing inputs from all stakeholders to ensure actionable items are communicated and completed.
One of the most expensive forms of workplace communication
Multiply number of attendees x hourly rate x (length of meeting, travel time and prep time)
Balance against outcome(s) and alternatives
Carefully consider length, attendees and frequency
This PPT presentation will allow any used to effectively conduct successful and effective meetings while capturing inputs from all stakeholders to ensure actionable items are communicated and completed.
Attending numerous meetings is a quotidian activity for most professionals. But the major question is how effective are they to solve our problems or achieve the goals we intend to reach? Let's have some insights about the topic in hand while learning about the facts and figures along with ways to use the powerful tool of meeting efficiently !!
Learn how to run meetings that produce results every time.
1. Use Foundation Tools to Set the Stage for Success.
2. Proactively Manage the Three Meeting Phases.
3. Keep Participants Engaged and Accountable.
In our meetings, it is not only about talking, it is also about being productive. To complement our effective meetings, we understand the importance of having a set of awesome meeting minutes to work out our action plans better. Here is a guide on how we take effective meeting minutes in Titansoft!
Meetings PowerPoint Presentation Content slides include topics such as: why meetings are unproductive, 7 group roles and behaviors, effective meeting notes, 6 guidelines for effective meetings, information sharing/gathering, recognizing resistance to accepting change, phases of change transition, problem solving meetings, decision making, before the meeting, agenda and goals, during the meeting, running effective meetings, after the meeting, common scheduling problems, scheduling hints, taking minutes, how to's and much more.
These slides gives the detailed description about meetings and its types, how to plan and how to conduct meeting. Also how to prepare agenda and minutes for a meeting.
Attending numerous meetings is a quotidian activity for most professionals. But the major question is how effective are they to solve our problems or achieve the goals we intend to reach? Let's have some insights about the topic in hand while learning about the facts and figures along with ways to use the powerful tool of meeting efficiently !!
Learn how to run meetings that produce results every time.
1. Use Foundation Tools to Set the Stage for Success.
2. Proactively Manage the Three Meeting Phases.
3. Keep Participants Engaged and Accountable.
In our meetings, it is not only about talking, it is also about being productive. To complement our effective meetings, we understand the importance of having a set of awesome meeting minutes to work out our action plans better. Here is a guide on how we take effective meeting minutes in Titansoft!
Meetings PowerPoint Presentation Content slides include topics such as: why meetings are unproductive, 7 group roles and behaviors, effective meeting notes, 6 guidelines for effective meetings, information sharing/gathering, recognizing resistance to accepting change, phases of change transition, problem solving meetings, decision making, before the meeting, agenda and goals, during the meeting, running effective meetings, after the meeting, common scheduling problems, scheduling hints, taking minutes, how to's and much more.
These slides gives the detailed description about meetings and its types, how to plan and how to conduct meeting. Also how to prepare agenda and minutes for a meeting.
Singapore's National Cyber Security StrategyBenjamin Ang
Singapore's National Cyber Security Strategy was launched by the Singapore government at the inaugural Singapore International Cyber Week 2016. This presentation gives an overview of the 4 pillars of the Strategy and some of its implementation steps so far, including the upcoming new Cybersecurity Act, and the SGD 10 million fund for capacity building in ASEAN. You can download the full Strategy at www.csa.gov.sg
Karate Manitoba 2012 Annual General Meeting (AGM) noticeKarate Manitoba
NOTICE IS HEREBY GIVEN to all members of Karate Manitoba Inc. (the “Corporation”) that:
An annual and special general meeting of members of the Corporation will be held on Saturday,
September 22nd, 2012 at 1:00 p.m. at the Ramada Viscount Gort Hotel,1670 Portage Avenue, Windsor
Room.
Kinds of Company Meetings and Procedure- Corporate lawSparshAgarwal39
The PPT contains all the relevant information regarding the topic "Kinds of Company Meetings and Procedure" under the subject of Company/Corporate Law.
I hope this PPT will help you :)
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
Lecture on cybersecurity in ASEAN and Singapore
- Definitions of cybersecurity in ASEAN (vs western definitions)
- Cyber threat landscape in ASEAN / types of cyber incidents and cyber crime in ASEAN
Why ASEAN is vulnerable
- Characteristics of ASEAN in cyberspace
non-interference, sovereignty
non-attribution of cyber attackers
- ASEAN cooperation in cyberspace
AMCC (ASEAN Ministers Cyber Conference)
ACICE (ADMM Cyber Info Centre of Excellence)
INTERPOL
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
Session 4 - International Cooperation to Impose
Consequences on Malicious Cyber Activities
Many states are concerting joint efforts to impose costs for irresponsible behaviors in
cyberspace by sharing information, jointly disclosing attribution, or issuing joint statements with allies, partners, or like-minded states. Being aware of the importance of the roles played by private sectors for national cybersecurity, states are seeking ways to induce cooperation from private sectors as well.
Session 4 covers cooperation efforts at the international level for imposing consequences on irresponsible state behavior in cyberspace. Speakers are expected to address the following
points.
H. Introduce cases where costs for irresponsible state behavior in cyberspace are effectively
imposed with joint efforts among states.
I. Introduce cases where cooperation between private and public sectors has contributed to
impose costs for irresponsible state behavior in cyberspace.
J. Underscore specific areas where efforts for international cooperation need to be concerted
to effectively impose consequences for irresponsible state behavior in cyberspace.
[Panel]
Moderator: Caitriona Heinl (Azure Forum for Contemporary Security Strategy)
Speaker: James Lewis (Center for Strategic and International Studies)
Speaker: Benjamin Ang (Nanyang Technological University)
Speaker: Karsten Geier (Centre for Humanitarian Dialogue)
[12:00-13:30, KST (GMT+9)] Luncheon
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
CYBERSPACE: A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
Definition
Foreign interference occurs when a foreign entity (state or non-state actor),
with hostile intent,
takes actions to deliberately, covertly and deceptively
disrupt the politics and policies of the target state
Source: Fog of war: how the Ukraine conflict transformed the cyber threat landscape, published by Google TAG (Threat Analysis Group)
Overview
1. Russian government-backed attackers have engaged in an aggressive, multi-pronged effort to gain a decisive wartime advantage in cyberspace, often with mixed results.
2. Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert platforms and accounts – to shape public perception of the war.
3. The invasion has triggered a notable shift in the Eastern European cybercriminal ecosystem that will likely have long term implications for both coordination between criminal groups and the scale of cybercrime worldwide.
Sources: Defending Ukraine: Early Lessons from the Cyber War (Microsoft)*
Defense against a military invasion now requires for most countries the ability to disburse and distribute digital operations and data assets across borders and into other countries.
Recent advances in cyber threat intelligence and end-point protection have helped Ukraine withstand a high percentage of destructive Russian cyberattacks.
As a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine.
In coordination with these other cyber activities, Russian agencies are conducting global cyber-influence operations to support their war efforts.
This calls for a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive, espionage, and influence operations.
The Strontium group was targeting Ukrainian institutions, media organizations, and government institutions and think tanks in the United States and the European Union
Microsoft got court orders 16 times to redirect internet traffic from Strontium domains into a ‘sinkhole’
How to defend the information domain
Public coverage and exposure
Clear counter-messages
Legislation
Build media and digital literacy
Work with citizens, influencers
Detect and expose fake accounts
Active measures
Work strategically, not reactively
Build a strong narrative that is more attractive than the adversary
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
3 areas of cooperation
Council for Security Cooperation in the Asia Pacific (CSCAP)
Track II Network of ASEAN Defence and Security Institutions (NADI)
UN OEWG Open-ended Working Group on security of and in the use of information and communications technologies
Council for Security Cooperation in the Asia Pacific (CSCAP)
non-governmental (second track) process for dialogue on security issues in the Asia Pacific
informal mechanism for scholars, officials and others in their private capacities
to discuss political and security issues and challenges facing the region
provides policy recommendations to inter-governmental bodies
convenes regional and international meetings
establishes linkages with institutions and organisations in other parts of the world
exchanges information, insights and experiences in the area of regional political-security cooperation.
Track II Network of ASEAN Defence and Security Institutions (NADI)
Secretariat is RSIS
Aims of the forum
network and to build confidence and familiarity among the Asean think tanks and research institutions to facilitate closer cooperation.
policy analysts specialising in defence and security issues, academics researching security cooperation and defence officials to discuss issues of security cooperation that the Asean Summit and Asean Defence Ministers have raised
participants to think beyond their governments’ positions and to provide timely fresh ideas and relevant recommendations for the Asean defence track to consider.
UN OEWG on Cyber
Open-ended Working Group on security of and in the use of information and communications technologies
The group is mandated to
further develop the rules, norms and principles of responsible behaviour of States;
consider initiatives of States aimed at ensuring security in the use of information and communications technologies;
establish, under the auspices of the United Nations, regular institutional dialogue with the broad participation of States;
continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security, inter alia, data security, and possible cooperative measures to prevent and counter such threats, and how international law applies to the use of information and communications technologies by States,
as well as confidence-building measures and capacity-building.
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
What is technology disruption?
A new technology that changes
The way things are done
Expectations and behaviors
Market or industry
Uber/Grab vs taxi business
Airbnb vs hotel business
Netflix vs TV, DVD, cinemas
Blockchain vs financial institutions
Google vs books, libraries
ChatGPT vs Google
How can technology disrupt the Law?
DoNotPay
https://donotpay.com/
Bizibot
https://www.btlnet.co.uk/digital-transformation-solutions-overview/bizibot
WeVorce
https://www.wevorce.com
OCBC Online Will Generator
https://www.ocbc.com/personal-banking/lifegoals/willgenerator/#/
Transcripts
https://fortherecord.com/transcript-express/
Law firms using Blockchain
https://www.raconteur.net/technology/blockchain/blockchain-revolutionising-legal-sector/
LawGeex AI vs human lawyers, on reviewing standard contracts
Accuracy
Time taken to review contract
Courts used technology to deliver justice during COVID
But litigants with resources had the advantage
https://www.pewtrusts.org/en/research-and-analysis/reports/2021/12/how-courts-embraced-technology-met-the-pandemic-challenge-and-revolutionized-their-operations
Disruption has no ethics. But we do.
Must bridge the Digital Divide
Parties may need help
https://www.ncsc.org/__data/assets/pdf_file/0026/53738/PPP-Technology-Digital-Divide-Considerations.pdf
Using AI for judgments
Benefits
Exclude legally irrelevant factors
Standardise decisions
Help courts to prioritise cases, increase efficiency
Encourage parties to settle if success is predicted to be unlikely
https://www.cppr.in/articles/predictive-justice-using-ai-for-justice-introduction
Risks
Over reliance on machine decisions
Algorithmic bias: bad history = bad future
Bad data feedback into bad data
Inability to explain decisions: bad for rule of law
https://www.suls.org.au/citations-blog/2020/9/25/predictive-judicial-analytics-implications-for-rule-of-law-and-the-legal-profession
Cases of AI bias in justice system
COMPAS (for probation)
Black defendants were 2x wrongly predicted to be high risk of recidivism
White defendants were 2x wrongly predicted to be low risk of recidivism
Black defendants were 2x more likely to be misclassified as high risk of violent recidivism
White violent recidivists were 63% more likely to have been misclassified as low risk
https://www.propublica.org/article/how-we-analyzed-the-compas-recidivism-algorithm
Public Safety Assessment (for bail)
More likely to recommend high bail for males than females
https://venturebeat.com/ai/study-finds-crime-predicting-judicial-tool-exhibits-gender-bias/
How does this type of AI work?
How does this type of AI work?
Where did the ML (Machine Learning) come from?
Garbage In = Garbage Out
Always check what’s going in and what’s coming out
Rand Report on Protecting Individuals using tech in the Justice
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
There is no international definition of these concepts in cyberspace
Armed attack
Use of force
Act of war
Traditional definitions require physical damage or physical injury
Rules of Law of Armed Conflict / International Humanitarian Law(but in cyber?)
Distinction – must distinguish between civilians and military targets
Proportionality – must avoid excessive harm to civilians / objects
Military necessity – allows force that is reasonable, lawful (see above), and operationally justified
Limitation – prohibits tactics that cause unnecessary suffering
Humane treatment – e.g., of captured prisoners
Do we need a Binding Legal Instrument?
US - No new international legal instrument needed, can interpret existing law
China - States must reach international consensus, new international legal instruments
EU - No new international legal instrument needed, can interpret existing law
ASEAN chooses its own terms on norms/law
ASEAN supported both UNGGE and OEWG tracks in 2018 – Indonesia, Singapore, and the Philippines said both processes were not incompatible
ASEAN has always followed its instinct of creating an internationally agreed, rules-based order based on its own interests, which is consistent with other arenas where international law or rules are unsettled
ASEAN may even consider plurilateral treaties
What ASEAN states need to move forward
Common language related to cyberspace
Legislation that can be translated across members
Capacity building in
Cyber issues, policy making, critical infrastructure protection (ASCCE) and
Military operations (ADMM Cyber and Information COE)
Confidence building measures e.g., CERT-CERT communications, contact lists
More participation from states, academia, and civil society
What is Cybersecurity – C, I, A?
Cybersecurity or Information Security?
Activities of foreign political, economic, military, intelligence, and information entities
The striving of countries toward dominance in the world information space
Development (by states) of information war concepts that create means for dangerous attack on the information spheres of other countries
Infringing the state’s control over information flows and public opinion (called “cyber sovereignty”)
ASEAN leaders
Value the principles of “mutual respect” and “non-interference”
View sovereignty as sacrosanct principle among ASEAN member states
Do not define ‘sovereignty’ – this provides flexibility in foreign and domestic policy
ASEAN member states also attach great importance to the creation of an international rules-based order,
which includes forming and adhering to international law and norms.
like the UN Convention of the Law of the Sea or UNCLOS.
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
Capacity building is recognized as a key to promote the adoption and implementation of international norms of responsible state behaviour in cyberspace. States at varying levels of cyber maturity benefit from these efforts, to develop a shared understanding of how international cyber norms support the stability of cyberspace, and to grow their own capacity and capabilities to implement these norms. This presentation draws on the experiences of the academics and practitioners who have been conducting cyber capacity building activities in southeast Asia and beyond, to derive lessons of what has (or has not) worked, some potential best practices, and to provide suggestions on how cyber capacity building can provide more value to the further growth of international cyber norms in the world.
UNGGE 2015 Cyber Norms
UN Open Ended Working Group (UN OEWG)
UN Singapore Cyber Programme (UNSCP)
Norms Implementation Checklist
RAP Matrix
ASEAN Ministers Cyber Conference (AMCC)
Capacity building
Confidence Building Measures (CBMs)
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
Two mistaken views of Cybersecurity and Geopolitical Risk:
1. “It doesn’t affect me because I’m not a government entity or major target”
2. “There’s nothing I can do about it anyway”
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
Slides from a talk given to Eunoia Junior College, Singapore
-------------------
Cyber Warfare questions
Are the concerns about cyber warfare overblown?
Why should young people care about cyber warfare?
What are the national/international systems or structures currently in place to protect us from cyber warfare? Are these protections adequate?
Considering that Singapore is a small country, is there really anything we can do in the face of the challenges posed by cyber warfare?
-------------------
Cybercrime Questions
How do scammers make Singaporeans lower their guard despite them already knowing that scams are prevalent in our society? Why do you think people still fall for scams?
By the time new types of scams are reported, new types of scams are already being created. How do you think the Singapore government can break this cycle?
How hard is it to find out criminals behind cyber attacks?
-----------
Information Operations questions
The Russo-Ukraine War, what are your thoughts on it being publicized on social media unlike many wars from the past?
Are there any political implications regarding the publication of the war on TikTok? Could posting the war on TikTok create any social issues?
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
Case studies of disinformation and misinformation from Southeast Asia including Asian examples of Pro-Russia Anti-Ukraine narratives at the start of the Russian invasion of the Ukraine. Presented at the Conference on Disinformation and Cybersecurity of the War Studies University, Warsaw Poland, in 2022. Refers to the RSIS Framework on Information, Influence and Interference, from the Centre of Excellence for National Security at the S Rajaratnam School of International Studies (RSIS) at Nanyang Technological University (NTU) Singapore
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
[ To read and download the Policy Report that this presentation is based on, see https://www.rsis.edu.sg/rsis-publication/cens/cases-of-foreign-interference-in-asia/ ]
The Public and International Law Committee of the Law Society of Singapore invites you to join us for the Public Law Conference 2021 which aims to promote interest in the administrative and constitutional law of Singapore, highlight new judicial decisions, and facilitate discussion of recent developments.
To be held online on 15 September, we are pleased to have the Minister for Home Affairs and Law, Mr K Shanmugam, deliver a keynote speech on the public law issues relating to online harms and foreign interference. These issues are important and topical as they have a significant impact on society today, not just in Singapore, but worldwide. This will be followed by a panel that will analyse and develop the themes raised in the keynote, as well as discuss possible solutions, including legislative solutions, to such issues, in the context of public law. The panellists will comprise the Honourable Minister himself, practitioners, legal officers and academics active in the fields of administrative and constitutional law.
This conference provides a platform to hear from legal experts, and for different sectors of the legal industry to share ideas. We hope it will be relevant to all legal practitioners, government decision-makers, public-sector policy makers, academics and law students interested in public law.
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
Infographic of the flow of Contract Law
Formation of Valid Contract
Offer, Acceptance, Consideration, Intention
Vitiating Factors which make a contract not valid
Misrepresentation, Mistake, Minor
Terms of Contract
Promises, Representations vs Warranties
Express vs Implied Terms
Discharge of Contract
Discharge by Breach - Actual and Anticipatory
Discharge by Agreement, Frustration of Contract
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
This lecture covers the The Legal Technology Vision which is a five-year roadmap to help the legal industry in Singapore to leverage technology to enhance their practice. It is also a call to action for legal technology providers to engage in public-private collaboration for the building of a legal tech ecosystem. You can find it at https://www.sal.org.sg/Resources-Tools/Legal-Technology-Vision
You can follow Benjamin Ang on Twitter for updates and commentary on technology policy and legal issues at http://twitter.com/benjaminang
Thinking of a career as a paralegal, lawyer, prosecutor, in-house counsel, or even outside the legal industry, or starting your own business as an entrepreneur? You'll be surprised what Legal Technology could mean for your future.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. OBJECTIVES
Identify the documents to be prepared
for convening members and directors
meeting
Distinguish between matters at directors
and members meeting
Draft documents required for convening
members and directors meeting
Draft resolutions and minutes of meeting
3. WHY HAVE MEETINGS?
A company is owned by its members/
shareholders
Ultimate control of a company lies with its
members
Members control the company
By voting at meetings and
By appointing the company’s Board of Directors
The Board of Directors has its own meetings
At meetings, decisions are made by
passing resolutions
4. WE NEED TO HAVE A
MEETING
You are the Company Secretary of
Spendz Big Buckz Pte Ltd
The Company wants to pass resolutions
to
Sign a Tenancy Agreement with CashLand
Malls
Change its name to Earnz Big Bucks Pte Ltd
Issue 100 shares to Mr. Kash Money for
$10,000
What do you need to do?
5.
6. WHAT TYPE OF MEETING IS
NEEDED?
Directors / Board Meeting Members / General
Meeting
Purchase or disposal of
substantial property or
assets of company
Company is required to
incur substantial liability
Tenancy agreement
Bank account
Loan facility
Issuing of shares
Amending the
Memorandum and
Articles of Association
Reducing the share
capital of the company
Changing the name of
the company
Liquidating the company
7. OTHER TYPES OF
MEETINGS
Annual General Meeting Statutory Meeting
Compulsory: Every
calendar year and not
more than 15 months
after the last AGM –
Section 175(1)
A private company may,
by unanimous resolution
passed at a general
meeting, dispense with
the holding of AGM –
s175A
Compulsory for every
public company limited
by shares
Not less than one month
and not more than three
months after
commencing business –
Section 174 (1)
One time only
8. Discussion
What kind of meeting(s) does the
Company need to have in order to:
Sign a Tenancy Agreement with CashLand
Malls
Change its name to Earnz Big Bucks Pte Ltd
Sell 80% of its assets to another company,
Little Buckz Pte Ltd
9.
10. DOCUMENTS FOR BOARD
MEETINGS
The articles do not
usually provide any form
or period of notice for
directors’ meetings.
It depends on the usual
practice of a company
You should ensure that
all those attending are
aware that the occasion
is a directors’ meeting
Otherwise the decisions
may not be valid
11. DOCUMENTS FOR MEMBERS’
MEETINGS
AGM EGM
Notice of AGM with
proposed resolutions
Proxy forms
Internal documents
Previous minutes
Profit & loss
Balance sheet
Consolidated accounts
Notice of EGM with
proposed resolutions
Proxy Forms
Any relevant
attachments
12. NOTICE: What it must
contain
All members must be given written
notice of meetings
The notice must contain sufficient
information to enable a member to
decide whether or not to attend.
A member who is absent from the
meeting is bound by the resolutions
passed at the meeting
except where a material fact was not
disclosed in the notice.
13. NOTICE: When it must be
given
Private
Company
Public
Company
Notice of
meetings to pass
ordinary
resolutions
Not less than
14 days
Not less than
14 days
Notice of
meetings to pass
special
resolutions
Not less than
14 days
Not less than
21 days
A Special Resolution can be passed with short notice if it
is agreed by not less than 95% majority of the members
who have the right to vote – Section 184(2) Companies
Act
14. NOTICE – What happens if it’s
done wrong
Any irregularity, including a defect in the
notice,
does not automatically invalidate a proceeding
unless the High Court is of the view that
substantial injustice has been caused – Section
392(2)
Any member can apply to court to declare
the meeting null and void – Section 392 (3)
Where a member is not served with a
notice, the Court would be more inclined to
declare the proceedings void
15. QUORUM – Why Proxy is
needed
In order for a general meeting to be valid,
there must at least be 2 members present
– Section 179(1)(a) Companies Act
For companies with only one member, that
member constitutes a quorum and can
pass a resolution - Section 184G
Companies Act
Members unable to attend meetings
personally can appoint a proxy (agent) to
attend and vote on their behalf - Section
181(1) Companies Act
16. PROXIES – How they work
Proxies need not be members; one person
may be proxy of more than one member
If no proxy forms are lodged, then the proxy
cannot attend and vote
A member may wish to state on the proxy form
the manner in which he would like his vote to
be exercised.
If a member wishes to retain the option of
changing his instructions to his proxy, he
should not specify in the proxy form which way
the proxy was to vote. However, by doing so,
he takes the risk - Tong Keng Meng v Inno-
Pacific Holdings Ltd
19. WHY DO WE NEED
MINUTES?
Minutes are the records of the proceedings
of a meeting
Every company must cause minutes of all
proceedings of general meetings and of
meetings of its directors and of its
managers (if any) to be entered in books
kept for that purpose (s 188(1)(a))
They must be signed by the chairman of
the meeting at which the proceedings were
held or by the chairman of the next meeting
20. HOW TO TAKE EFFECTIVE
MINUTES
Agenda
Templates
Tools
Focus
21. AGENDA
How to do it
Contact chairman or participants before the
meeting
Ask them what they want to discuss
Benefits
Ensures that all business is covered
Prevents members, board members, and
participants from wasting time
Keeps meeting length to a reasonable time
Helps you prepare the Template
22. TEMPLATE
Attendance sheet
Seating Plan
Standard Template
Time and date
Reports of Officers
Directors
Ongoing projects
Agenda Items
New proposals /
Announcements
Old Business
New Business
Follow up required
(and by who)
Date of next meeting
23. TOOLS
Laptop / Tablet
Voice recorder – but don’t rely on it
Power supply / batteries
Pen and paper – important backup
24. FOCUS
Summarize the main point of each topic
discussion
BUT copy motions, amendments and other
items to be voted on word for word
Use short forms (that you can remember)
Write the name of any person making a
motion
Ask for clarification, don’t get it wrong
Sit as close as possible to the chair of the
meeting (in case you need to ask)
25. FOCUS
Write things as they happen, do not try to
group topics together
Record the actions that are performed during
the meeting
After discussion, write down any agreed-upon
next steps or decisions
recommended actions
date due
responsible persons or department
Record the number of votes for a resolution
Ordinary: More than 50%
Special: More than 75%
26. AFTER THE MEETING
Transcribe immediately, while the
experience is fresh
Compare your first draft of the minutes
with your audio recording
Circulate the draft to all board members
to ensure there are no
miscommunications
27. TIME TO TAKE MINUTES
We will now have a Board Meeting to
decide on whether or not to
Sign the Tenancy Agreement with CashLand
Malls
Issue the shares to Mr. Kash Money
Use the sample templates given
28.
29. Drafting Effective
Resolutions
Check if they require shareholder approval
Principle: anybody referring it later date will
know clearly what the decision was at the
meeting without referring to any other
document.
Be thorough and detailed
Issuing shares? State how many, when, to
whom
Authorizing contracts? List them all
State type of meeting (Board or General)
State type of resolution (Ordinary, Special,
Simple Majority).
30. Drafting Effective
Resolutions
Refer to Articles, Rules, Act if needed
Refer to documents where needed e.g.
letter of appointment
State if resolutions are subject to
approval of authorities
State when resolutions take effect
Keep to one subject matter per
resolution.
31. TIME TO DRAFT
RESOLUTIONS
Draft a resolution to sign a 2 year
tenancy agreement with CashLand
Malls for a commercial unit of 1,000
square feet, at the rate of $10 per
square foot
Draft a resolution to issue 100 shares to
Mr. Kash Money for $10,000
Refer to the samples