Cloud Security Monitoring at Auth0 - Security BSides SeattleEugene Kogan
The slides from Eugene Kogan's talk on cloud security monitoring at Auth0, presented at Security BSides Seattle, 2017. More details at our blog: https://auth0.engineering/cloud-security-monitoring-at-auth0-ff5e87ad1141
Big data and analytics can drive business value for consumer packaged goods (CPG) and over-the-counter (OTC) companies by gathering valuable consumer data and turning that understanding into a competitive advantage. However, many companies face challenges like internal IT focusing only on back-office data and failed Hadoop projects with no proven value. To succeed, companies should embrace cloud-based big data platforms, connect diverse data sources, empower business users, invest in skills over software licenses, and start small by driving value at scale.
Big Data Expo 2015 - Hortonworks Common Hadoop Use CasesBigDataExpo
When evaluating Apache Hadoop organizations often identifiy dozens of use cases for Hadoop but wonder where do you start? With hundreds of customer implementations of the platform we have seen that successful organizations start small in scale and small in scope. Join us in this session as we review common deployment patterns and successful implementations that will help guide you on your journey of cost optimization and new analytics with Hadoop.
Oracle OpenWorld - A quick take on all 22 press releases of Day #1 - #3Holger Mueller
Take a look at Constellation Research Analyst Holger Mueller walking through all 22 Oracle OpenWorld pres releases - capturing Day #1 till Day #3 - and ongoing in San Francisco.
This document provides an overview of cyber crime history, laws, and issues in India. It discusses:
- A brief history of cyber crime from the 1820s to modern day, including early computer crimes and the development of hacking.
- An introduction to cyber law in India, including the Information Technology Act of 2000 which is the primary law governing cyber crimes.
- Categories and common types of cyber crimes such as hacking, viruses, phishing, and online fraud.
- The need for strong cyber laws to address issues like privacy, intellectual property, and the growing nature of cyber threats to individuals and organizations.
- Cyber crime statistics that illustrate India's vulnerability, such as being the 3rd
This document is an alphabetized science glossary containing definitions of scientific terms from A to Z. It defines terms such as atmosphere, burrow, climate, data, erosion, fungi, galaxy, hibernate, ion, Jupiter, kinetic energy, life cycles, mantle, nervous system, ozone, periodic table, quartz, rotation, surface water, tectonic plates, universe, volcano, weathering, xenon, year, and zinc. The glossary is intended to teach elementary science vocabulary terms from A to Z.
Cloud Security Monitoring at Auth0 - Security BSides SeattleEugene Kogan
The slides from Eugene Kogan's talk on cloud security monitoring at Auth0, presented at Security BSides Seattle, 2017. More details at our blog: https://auth0.engineering/cloud-security-monitoring-at-auth0-ff5e87ad1141
Big data and analytics can drive business value for consumer packaged goods (CPG) and over-the-counter (OTC) companies by gathering valuable consumer data and turning that understanding into a competitive advantage. However, many companies face challenges like internal IT focusing only on back-office data and failed Hadoop projects with no proven value. To succeed, companies should embrace cloud-based big data platforms, connect diverse data sources, empower business users, invest in skills over software licenses, and start small by driving value at scale.
Big Data Expo 2015 - Hortonworks Common Hadoop Use CasesBigDataExpo
When evaluating Apache Hadoop organizations often identifiy dozens of use cases for Hadoop but wonder where do you start? With hundreds of customer implementations of the platform we have seen that successful organizations start small in scale and small in scope. Join us in this session as we review common deployment patterns and successful implementations that will help guide you on your journey of cost optimization and new analytics with Hadoop.
Oracle OpenWorld - A quick take on all 22 press releases of Day #1 - #3Holger Mueller
Take a look at Constellation Research Analyst Holger Mueller walking through all 22 Oracle OpenWorld pres releases - capturing Day #1 till Day #3 - and ongoing in San Francisco.
This document provides an overview of cyber crime history, laws, and issues in India. It discusses:
- A brief history of cyber crime from the 1820s to modern day, including early computer crimes and the development of hacking.
- An introduction to cyber law in India, including the Information Technology Act of 2000 which is the primary law governing cyber crimes.
- Categories and common types of cyber crimes such as hacking, viruses, phishing, and online fraud.
- The need for strong cyber laws to address issues like privacy, intellectual property, and the growing nature of cyber threats to individuals and organizations.
- Cyber crime statistics that illustrate India's vulnerability, such as being the 3rd
This document is an alphabetized science glossary containing definitions of scientific terms from A to Z. It defines terms such as atmosphere, burrow, climate, data, erosion, fungi, galaxy, hibernate, ion, Jupiter, kinetic energy, life cycles, mantle, nervous system, ozone, periodic table, quartz, rotation, surface water, tectonic plates, universe, volcano, weathering, xenon, year, and zinc. The glossary is intended to teach elementary science vocabulary terms from A to Z.
Presentatie van dhr. prof. dr. Frank Verhulst op het Infantscongres Nijmegen op 28 juni 2016 over de verschillen in ontwikkeling van kinderen, het onderzoek GenerationR.
Delivering architecture@internet-scale has several challenges to be solved to be ready for extreme scalable architectures. This session is about the art of scale, scalability, and scaling of web architectures. It will give an overview of challenges, good practices and solutions to achieve high scalability for web-based systems.
This document discusses DevOps practices at Amazon, including:
1. Amazon uses DevOps practices like continuous integration, deployment, and automation to deploy code changes frequently and reliably, with mean deployment times of 11.6 seconds and up to 10,000 deployments in an hour.
2. Adopting DevOps practices has led to a 75% reduction in outages from software deployments and a 90% reduction in outage minutes since 2006.
3. The document outlines DevOps tools and practices used at Amazon like AWS services for version control, continuous integration, deployment automation, and monitoring.
(BDT306) Mission-Critical Stream Processing with Amazon EMR and Amazon Kinesi...Amazon Web Services
Organizations processing mission critical high-volume data must be able to achieve high levels of throughput and durability in data processing workflows. In this session, we will learn how DataXu is using Amazon Kinesis, Amazon S3, and Amazon EMR for its patented approach to programmatic marketing. Every second, the DataXu Marketing Cloud processes over 1 Million ad requests and makes more than 40 billion decisions to select and bid on ad impressions that are most likely to convert. In addition to addressing the scalability and availability of the platform, we will explore Amazon Kinesis producer and consumer applications that support high levels of scalability and durability in mission-critical record processing.
JAX 2017 talk to use Oracle Management Cloud to improve efficiency for application performance monitoring, log analytics and better feedback (insides) for your DevOps
Print this out and use it as a guide for writing your resume. This is a great tool for high school students and graduates translate their skills and experience to apply to real world careers.
This document provides an overview of a training on Amazon Web Services (AWS). It includes 5 modules that cover topics such as Introduction to AWS, AWS Storage, AWS Compute and Networking, Managed Services and Databases, and Deployment and Management. The training will describe the fundamental elements of each topic and help attendees learn how to navigate the AWS Management Console, identify AWS storage options, and create Amazon S3 buckets.
Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...SolarWinds Loggly
With Loggly, Stanley Black & Decker:
• Provides team with troubleshooting capabilities for mobile and IoT applications running on traditional and serverless architectures
• Supports performance monitoring, security, and PCI compliance needs
• Enables quick scalability as new innovations are launched
This document contains various legal notices and disclaimers regarding the use of information presented, including:
- Copyright and ownership restrictions on reproducing or transmitting the content.
- Disclaimers of warranties and liabilities for any technical or typographical errors or inaccuracies in the information.
- Statements that IBM products and services are warranted under existing agreements only.
- Clarifications that performance claims are from controlled environments and may vary elsewhere.
- Clarifications on the scope of references to IBM products, programs, and services.
- A disclaimer of endorsements of any third-party products discussed.
- Clarifications that the document does not constitute legal guidance.
Big data analytics can provide businesses with new insights from large volumes of structured and unstructured data. It allows analyzing customer sentiment, detecting medical conditions, predicting weather patterns, assessing risk, and identifying threats. To leverage big data, businesses need to capture data from various sources, analyze it in real-time, and turn it into insights to predict customer, competitive, and market behavior. Deploying big data analytics competencies consistently across an enterprise correlates with higher financial performance and competitive advantage long-term.
Presentatie van dhr. prof. dr. Frank Verhulst op het Infantscongres Nijmegen op 28 juni 2016 over de verschillen in ontwikkeling van kinderen, het onderzoek GenerationR.
Delivering architecture@internet-scale has several challenges to be solved to be ready for extreme scalable architectures. This session is about the art of scale, scalability, and scaling of web architectures. It will give an overview of challenges, good practices and solutions to achieve high scalability for web-based systems.
This document discusses DevOps practices at Amazon, including:
1. Amazon uses DevOps practices like continuous integration, deployment, and automation to deploy code changes frequently and reliably, with mean deployment times of 11.6 seconds and up to 10,000 deployments in an hour.
2. Adopting DevOps practices has led to a 75% reduction in outages from software deployments and a 90% reduction in outage minutes since 2006.
3. The document outlines DevOps tools and practices used at Amazon like AWS services for version control, continuous integration, deployment automation, and monitoring.
(BDT306) Mission-Critical Stream Processing with Amazon EMR and Amazon Kinesi...Amazon Web Services
Organizations processing mission critical high-volume data must be able to achieve high levels of throughput and durability in data processing workflows. In this session, we will learn how DataXu is using Amazon Kinesis, Amazon S3, and Amazon EMR for its patented approach to programmatic marketing. Every second, the DataXu Marketing Cloud processes over 1 Million ad requests and makes more than 40 billion decisions to select and bid on ad impressions that are most likely to convert. In addition to addressing the scalability and availability of the platform, we will explore Amazon Kinesis producer and consumer applications that support high levels of scalability and durability in mission-critical record processing.
JAX 2017 talk to use Oracle Management Cloud to improve efficiency for application performance monitoring, log analytics and better feedback (insides) for your DevOps
Print this out and use it as a guide for writing your resume. This is a great tool for high school students and graduates translate their skills and experience to apply to real world careers.
This document provides an overview of a training on Amazon Web Services (AWS). It includes 5 modules that cover topics such as Introduction to AWS, AWS Storage, AWS Compute and Networking, Managed Services and Databases, and Deployment and Management. The training will describe the fundamental elements of each topic and help attendees learn how to navigate the AWS Management Console, identify AWS storage options, and create Amazon S3 buckets.
Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...SolarWinds Loggly
With Loggly, Stanley Black & Decker:
• Provides team with troubleshooting capabilities for mobile and IoT applications running on traditional and serverless architectures
• Supports performance monitoring, security, and PCI compliance needs
• Enables quick scalability as new innovations are launched
This document contains various legal notices and disclaimers regarding the use of information presented, including:
- Copyright and ownership restrictions on reproducing or transmitting the content.
- Disclaimers of warranties and liabilities for any technical or typographical errors or inaccuracies in the information.
- Statements that IBM products and services are warranted under existing agreements only.
- Clarifications that performance claims are from controlled environments and may vary elsewhere.
- Clarifications on the scope of references to IBM products, programs, and services.
- A disclaimer of endorsements of any third-party products discussed.
- Clarifications that the document does not constitute legal guidance.
Big data analytics can provide businesses with new insights from large volumes of structured and unstructured data. It allows analyzing customer sentiment, detecting medical conditions, predicting weather patterns, assessing risk, and identifying threats. To leverage big data, businesses need to capture data from various sources, analyze it in real-time, and turn it into insights to predict customer, competitive, and market behavior. Deploying big data analytics competencies consistently across an enterprise correlates with higher financial performance and competitive advantage long-term.
3. Kansen
– Geen informatiedouche
– Hapklare brokjes
– Verandering van spijs doet eten
– Eco-logisch en -nomisch
– À la carte studeren
– Schaalbaar en direct inzetbaar
– Welkom in het land van de pioniers
– Leren is tweerichtingsverkeer
– Extra motivatie om door te zetten
– Voor sommigen laagdrempeliger
– Automatische certificaten
Aandachtspunten
– Wie zit aan de computer?
– Onpersoonlijk en individueel
– De onverbiddelijkheid van het
geschreven woord
– Het bos en de bomen
– Technische problemen en
computervaardigheden
– Goede voorbereiding
– Voor sommigen hoogdrempeliger
– Voldoende variatie
4. Aandachtspunten bij e-learning
– Wie zit aan de computer?
– Onpersoonlijk en individueel
– De onverbiddelijkheid van het geschreven
woord
– Het bos en de bomen
– Technische problemen en
computervaardigheden
– Goede voorbereiding
– Voor sommigen hoogdrempeliger
– Voldoende variatie
1. Wie ben ik?
Jurgen Gaeremyn
CPA katholiek onderwijs Vilvoorde gedurende 6 jaar
5 jaar lid van Coprant
Actief bijdragen aan uitwisseling
Veiligheidspictogrammen.be
Actieve deelname op PreBes forum, in LinkedIn groepen
Geloof in delen van informatie en kennis
Oprichter Veiligheid in de Vingers
2. Sjette Online en Veiligheid in de Vingers
Onlangs de sprong gewaagd – professioneel websites
ViV: leerplatform en uitwisselingsplatform voor PA’s
Tot nu toe hebben we gesproken over klassieke opleidingen. Voor deze opleidingen doen we beroep op deskundigen van op het werkveld. Zo zijn we momenteel op zoek naar iemand om een cursus basiselektriciteit uit te werken in het kader van BA4 bevoegdheden in de scholen. Daarnaast hoop ik ook iemand te vinden die een opleiding wil uitwerken rond veiligheid in het labo. Mocht jij – vanuit je opdracht als PA, of als zelfstandige activiteit – interesse hebben om zo’n opleiding uit te werken, dan mag je me persoonlijk contacteren en dan bespreken de de praktische kant van het verhaal.
Een belangrijke pijler in elk welzijnsbeleid, is natuurlijk hoe we omgaan met nieuwe collega’s. In de meeste scholen start begin september de grootste groep nieuwe werknemers. Daarnaast heb je een aantal mensen die een nieuwe opdracht hebben. Doorheen de loop van het jaar, komen dan ook nog sporadisch mensen bij...