Empowering Marketing Solutions Teams is presented by Axicom's Luke Lofgren (Expert Infrastructure Architect).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Grainger's Our Rookie Year with Zenoss is presented by Mark Cochrane (Manager, Enterprise Systems Management) and Dan Ozanich (Infrastructure Software Admin).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Growing Monitoring to Keep Up with Technology and Business DemandsZenoss
NetApp's Ed Wang (Senior Manager, Automation and Monitoring Tools) presents Growing Monitoring to Keep Up with Technology and Business Demands.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Paul Johnston, a Zenoss Staff Client Services Engineer, presents Product Overview: An Analytics Primer.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
The Newgistics Digital Transformation JourneyZenoss
Rodeny McCarter, Newgistics VP of Infrastructure, presents The Newgistics Digital Transformation Journey.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Zenoss' Adelle Ryman (Director of Sales) and Ramil Reyes (Director of Sales) present: Why Zenoss is Right for You.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Zenoss' own Nick Turner (Director, IT Operations) and Jacob Keith (Deployment Architect) present Zenoss as a Service: How to Get There.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Secure-24's Ryan Youngs (Monitoring Engineer) presents Empathy in Monitoring.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Grainger's Our Rookie Year with Zenoss is presented by Mark Cochrane (Manager, Enterprise Systems Management) and Dan Ozanich (Infrastructure Software Admin).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Growing Monitoring to Keep Up with Technology and Business DemandsZenoss
NetApp's Ed Wang (Senior Manager, Automation and Monitoring Tools) presents Growing Monitoring to Keep Up with Technology and Business Demands.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Paul Johnston, a Zenoss Staff Client Services Engineer, presents Product Overview: An Analytics Primer.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
The Newgistics Digital Transformation JourneyZenoss
Rodeny McCarter, Newgistics VP of Infrastructure, presents The Newgistics Digital Transformation Journey.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Zenoss' Adelle Ryman (Director of Sales) and Ramil Reyes (Director of Sales) present: Why Zenoss is Right for You.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Zenoss' own Nick Turner (Director, IT Operations) and Jacob Keith (Deployment Architect) present Zenoss as a Service: How to Get There.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Secure-24's Ryan Youngs (Monitoring Engineer) presents Empathy in Monitoring.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Steve Loyd, VP Engineering Operations at Zendesk, talks about performance monitoring between data centers, IaaS providers and within new regions, such as China.
NWN Corporation's Doug Syer, VP of Technology, presents Practical DMD Scripting.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Delivering Predictable Financial Services Applications over the Internet with...ThousandEyes
Adam Litman presents at ThousandEyes Connect in London on how Refinitiv is using ThousandEyes to help deliver exceptional digital experiences to its customers.
Everbridge's Vincent Geffray, Senior Director of Product Marketing, presents: Lack of Automation Hinders Speed of Response to IT Critical Events...And Ruins Lives.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Oracle Public Cloud Operations from ThousandEyes ConnectThousandEyes
Alex Barerre presents at ThousandEyes Connect on monitoring Oracle’s diverse set of cloud services, from SaaS to PaaS to IaaS including a new project using clusters of ThousandEyes agents to simulate end user traffic.
Slides from ThousandEyes EMEA webinar on Tuesday June 5th at 1000 BST. Delivered by Ian Waters, Solutions Marketing Director and Nitin Nayar, Senior Solutions Engineer.
Andrea Di Lecce, IT Technical Project Manager at Cisco, describes how Cisco IT uses ThousandEyes for insights into the Cisco WAN, CDNs like Akamai, customer-facing apps like WebEx and SaaS apps like Salesforce.
Monitoring Consumer Digital ExperienceThousandEyes
Internet-facing applications rely on multiple dependencies for delivery, including ISPs, DNS, CDNs and 3rd party APIs. If you’re tasked with keeping your applications available and high-performing, you need to know when and where issues occur across the delivery network, so you can rapidly address them.
ThousandEyes enables you to monitor Internet-facing applications from the vantage of your consumer and SMB customers. This presentation will show you how you can improve your customers’ digital experience, reduce churn and improve MTTR.
Managing Network Performance Within and Beyond Your EnterpriseThousandEyes
Your organization relies on the public Internet to deliver both on-premises and SaaS applications across a geographically distributed employee base. In these slides, see traditional enterprise networks vs. the complex topologies you rely on today, three problems with using traditional network performance management tools and the foundational technologies ThousandEyes has built to address the performance challenges of the modern enterprise. View the webinar with live demo here: http://ow.ly/BzAkM
Microsoft Azure Identity and ThousandEyesThousandEyes
Andy Quig, Service Engineer at Microsoft Azure Identity, talks at ThousandEyes Connect SF 2016 about how the Azure instruments their environment to understand application reachability and how they integrate this into incident management and big data systems.
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...CA Technologies
bet365 is one of the world’s largest online gambling companies. The company’s IT infrastructure powers the experience for more than 22 million customers worldwide. Whether a router's CPU is running hot, or a third-party payments provider is having a bad day, members of the IT operations team at bet365 are the first responders, and they're expected to respond quickly. Discover how bet365's unique use of CA Unified Infrastructure Management (CA UIM) has evolved over the past five years to give it the edge in reducing incident response and recovery time. The bet365 team will also share how it is planning to leverage log analytics in conjunction with CA UIM to speed mean time to repair.
For more information on DevSecOps, please visit: http://ow.ly/JPst50g61rR
In a world of business that has increasingly become more and more distributed, and with our relationship with data having changed, we need to begin expanding the way we look at innovation in IT from solely focusing on the data center, to considering the requirements, challenges and costs associated with the edge. This presentation focuses on extending data center investments to all remote sites, and new opportunities to connect IT with today's business requirements through a Software-Defined Edge.
Reverse Path Visibility with Agent-to-Agent TestsThousandEyes
In this new webinar, learn why packet's don't flow symmetrically over a network and how the new Agent-to-Agent tests can now give enhanced visibility into both forward and reverse paths and also get more precise network diagnostic data.
See the recording of the live webinar here : https://www.thousandeyes.com/resources/reverse-path-visibility-webinar
Webinar: What's New In FlexNet Manager Suite 2018 R1Rana Zayed
Learn about the new features in FlexNet Manager Suite for Enterprises 2018, which brings new capabilities to extend Flexera's leadership in Software Asset Management.
Six Steps to Secure Access for Privileged Insiders & VendorsBomgar
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But this is only half the battle. Securing the access pathways is just as crucial to protect your critical systems and data from cyber threats. This session will outline the six steps companies need to take to secure privileged access, while simultaneously improving business productivity.
This is the presentation used in Check Point's November 20th webinar on "Securing Your Cloud With vSEC". Be sure to check out the webinar replay here: <bitly/UTM>
Steve Loyd, VP Engineering Operations at Zendesk, talks about performance monitoring between data centers, IaaS providers and within new regions, such as China.
NWN Corporation's Doug Syer, VP of Technology, presents Practical DMD Scripting.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Delivering Predictable Financial Services Applications over the Internet with...ThousandEyes
Adam Litman presents at ThousandEyes Connect in London on how Refinitiv is using ThousandEyes to help deliver exceptional digital experiences to its customers.
Everbridge's Vincent Geffray, Senior Director of Product Marketing, presents: Lack of Automation Hinders Speed of Response to IT Critical Events...And Ruins Lives.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Oracle Public Cloud Operations from ThousandEyes ConnectThousandEyes
Alex Barerre presents at ThousandEyes Connect on monitoring Oracle’s diverse set of cloud services, from SaaS to PaaS to IaaS including a new project using clusters of ThousandEyes agents to simulate end user traffic.
Slides from ThousandEyes EMEA webinar on Tuesday June 5th at 1000 BST. Delivered by Ian Waters, Solutions Marketing Director and Nitin Nayar, Senior Solutions Engineer.
Andrea Di Lecce, IT Technical Project Manager at Cisco, describes how Cisco IT uses ThousandEyes for insights into the Cisco WAN, CDNs like Akamai, customer-facing apps like WebEx and SaaS apps like Salesforce.
Monitoring Consumer Digital ExperienceThousandEyes
Internet-facing applications rely on multiple dependencies for delivery, including ISPs, DNS, CDNs and 3rd party APIs. If you’re tasked with keeping your applications available and high-performing, you need to know when and where issues occur across the delivery network, so you can rapidly address them.
ThousandEyes enables you to monitor Internet-facing applications from the vantage of your consumer and SMB customers. This presentation will show you how you can improve your customers’ digital experience, reduce churn and improve MTTR.
Managing Network Performance Within and Beyond Your EnterpriseThousandEyes
Your organization relies on the public Internet to deliver both on-premises and SaaS applications across a geographically distributed employee base. In these slides, see traditional enterprise networks vs. the complex topologies you rely on today, three problems with using traditional network performance management tools and the foundational technologies ThousandEyes has built to address the performance challenges of the modern enterprise. View the webinar with live demo here: http://ow.ly/BzAkM
Microsoft Azure Identity and ThousandEyesThousandEyes
Andy Quig, Service Engineer at Microsoft Azure Identity, talks at ThousandEyes Connect SF 2016 about how the Azure instruments their environment to understand application reachability and how they integrate this into incident management and big data systems.
Case Study: bet365 Improves Its Odds for Site Reliability With Unified Monito...CA Technologies
bet365 is one of the world’s largest online gambling companies. The company’s IT infrastructure powers the experience for more than 22 million customers worldwide. Whether a router's CPU is running hot, or a third-party payments provider is having a bad day, members of the IT operations team at bet365 are the first responders, and they're expected to respond quickly. Discover how bet365's unique use of CA Unified Infrastructure Management (CA UIM) has evolved over the past five years to give it the edge in reducing incident response and recovery time. The bet365 team will also share how it is planning to leverage log analytics in conjunction with CA UIM to speed mean time to repair.
For more information on DevSecOps, please visit: http://ow.ly/JPst50g61rR
In a world of business that has increasingly become more and more distributed, and with our relationship with data having changed, we need to begin expanding the way we look at innovation in IT from solely focusing on the data center, to considering the requirements, challenges and costs associated with the edge. This presentation focuses on extending data center investments to all remote sites, and new opportunities to connect IT with today's business requirements through a Software-Defined Edge.
Reverse Path Visibility with Agent-to-Agent TestsThousandEyes
In this new webinar, learn why packet's don't flow symmetrically over a network and how the new Agent-to-Agent tests can now give enhanced visibility into both forward and reverse paths and also get more precise network diagnostic data.
See the recording of the live webinar here : https://www.thousandeyes.com/resources/reverse-path-visibility-webinar
Webinar: What's New In FlexNet Manager Suite 2018 R1Rana Zayed
Learn about the new features in FlexNet Manager Suite for Enterprises 2018, which brings new capabilities to extend Flexera's leadership in Software Asset Management.
Six Steps to Secure Access for Privileged Insiders & VendorsBomgar
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But this is only half the battle. Securing the access pathways is just as crucial to protect your critical systems and data from cyber threats. This session will outline the six steps companies need to take to secure privileged access, while simultaneously improving business productivity.
This is the presentation used in Check Point's November 20th webinar on "Securing Your Cloud With vSEC". Be sure to check out the webinar replay here: <bitly/UTM>
We live in a mobile world. As a society, we are increasingly becoming more mobile, and our technology is evolving with us. Almost everyone has some form of mobile computer within reach at any given time. Many of us have more than one set of these devices – a personal device and a work device.
The current generation has grown up while being immersed in modern digital technology. The lines between work and personal life are blurred, and this is best shown in how they want to consume technology. The status quo of work devices and personal devices is no longer good enough. The latest generation to enter the workforce wants to be able to work anytime, anywhere, and from any device, and they will expect IT to deliver on this.
In this session, you'll learn how you can deliver an always on workspace that enables the business to work anywhere from any device while keeping security and user experience at the forefront.
If businesses want to remain competitive in the digital age, they must increase efficiency with technology wherever possible! Microsoft Office 365 has everything you need to increase efficiency and more.
With the recent release of Mule 4, WHISHWORKS, MuleSoft and Flyin.com got together to discuss what’s new in Anypoint Platform’s new engine and how to streamline the migration from Mule 3 to Mule 4.
The agenda included:
Customer Success Story
What’s new in Anypoint Platform
What’s new in Mule 4
Upcoming Mule 4 Migration toolkits:
- MuleSoft Application Migration Toolkit
- WHISHWORKS Custom Migration Toolkit
Migrating Mule 3 Connectors to Mule 4 with Mule SDK
- Demo
Adapting Mule 4
Zero trust for everybody: 3 ways to get there fastCloudflare
The COVID-19 pandemic has exposed the weaknesses of the traditional ‘castle-and-moat’ security model. Remote work has expanded attack surfaces infinitely outwards, and more than ever, organizations need to start from the assumption that their ‘castle’ is already compromised. Zero Trust has emerged as a compelling security framework to address the failures of existing perimeter-based security approaches. It’s aspirational, but not unachievable.
At Cloudflare, we’re making complicated security challenges easier to solve. Since 2018, Cloudflare Access has helped thousands of organizations big and small take their first steps toward Zero Trust.
In this presentation, Cloudflare will share their perspective on what the most successful organizations do first on their journey to Zero Trust.
We’ll cover:
-The Zero Trust framework, and our recommended ZT security model
-How 3 organizations of differing size and security maturity have implemented Zero Trust access
-Cloudflare’s Zero Trust implementation and lessons learned
How to Deliver an Exceptional End User Experience in your Citrix EnvironmenteG Innovations
Citrix Cloud services simplify the delivery and management of Citrix solutions, helping our users to extend their existing on-premises software deployments or even move one hundred percent to the cloud. Citrix Cloud services deploy secure digital workspaces in hours, placing the sensitive app, desktop and data resources on any cloud or hybrid cloud. Accessing the apps, desktops and any data has become easy than ever with Citrix Workspace. Citrix Workspace fully aggregates all apps, data, and files across all applications, and it offers a user-centric experience where everything you need to work is in one unified app, with conditional access and performance made simple based on user context and IT-designed policies.
Citrix Cloud services support the integration with different technologies that vary significantly from one organization to another. The first step for users is to access their provisioned desktops, applications, and files, which is why monitoring the logon performance has become critical for Citrix solutions. That's why eG Innovations provides a free login simulator for Citrix Workspace, through their eG Enterprise solution which is verified as Citrix Ready.
One of the primary requirements by organisations is to achieve exceptional Citrix user experience and service quality. eG Enterprise helps to proactively monitor all aspects of Citrix user experience - login times, application launch times, screen refresh latencies, virtual channel bandwidth usage, etc., and more importantly helps to identify underlying infrastructure tiers to help determine where the root cause of a problem lies; whether it is network, database, application, Citrix, or storage.
Discover how Citrix and eG Innovations combine to provide you with end-to-end performance management and learn how to:
• Deliver a secure digital workspace, and to improve business productivity with a fully integrated digital workspace from any cloud or hybrid cloud.
• Ensure the success of new deployments and migration to Citrix Cloud with pre-built migration reports
• End-to-end monitoring of Citrix services across user experience, session performance, connectivity, licensing, infrastructure health and capacity
• Monitor Citrix services on physical, virtual and cloud infrastructures from Single pane of glass.
2018年11月5日(月)開催セミナー
DBを10分間で1000個構築するDB仮想化テクノロジーとは?
~Database as code in Devops~
講演資料です。
"What is DevOps"
Office of the CTO, Delphix Adam Bowen
Devopsとは何か?DevopsにおけるDB環境はどうあるべきか?Facebook,ebay,WallmartのDevpos事例を交えて、DevopsとDBのベストプラクティスを解説します。
Expression Cloud Development Framework for DevelopersMatthew McKinney
Expression is a cloud-based, api-first development framework for developers. It allows developers to write, structure, and maintain beautiful code using their favorite tools and libraries. Build in CMS, eCommerce framework, pre-built templates, fully extensible with a documented API.
Keynote: Software Kept Eating the World (Pivotal Cloud Platform Roadshow)VMware Tanzu
Software Kept Eating the World
Software is transforming our world at an ever quickening page. In the modern world, realtime information drives decision making in enterprises that were not traditionally considered technology companies. If you recognize software is a competitive advantage, delivering software rapidly and reliably takes the advantage to the next level.
Seamless ERP integrates all daily business process operations in the organization and provides a common platform to access them. Activities pertained to accounting, maintenance, inventory management, project management, human resource management and customer relationship management can all be executed from a single web based interface, with separate modules dedicated to each operation. This business process management software is designed to generate a range of historical and current activity reports. The panoramic view provided by Seamless ERP, is highly beneficial for keeping a track on the official activities and taking prompt decisions whenever needed. Customizable and user friendly, this ERP solution targets those enterprises whose requirements are not covered by any standard software available readily in the market.
Does your service desk use accounts that have Workstation Admin credentials to support users? If so, your service desk staff are “privileged” users. If those credentials are stolen or compromised, they can be used by an attacker to move laterally across your network in mere hours or minutes. Security professionals have often overlooked help desks as privileged users, but more and more are looking to lock down these accounts or take privileges away. But admin credentials are crucial for service desks to be productive. How can your organization balance both productivity and security?
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceeG Innovations
Citrix XenApp and XenDesktop are two of the most performance-sensitive applications being used in enterprise networks today. Citrix performance management is of critical importance because even a small glitch – anywhere in your infrastructure – can negatively affect the user experience and, ultimately, result in lost business revenue.
These slides are from our recent webinar, ‘How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance’, where Raymond Otero, Manager of End-User Computing, Anexinet – a leading Citrix Gold Solution Advisor, and Srinivas Ramanathan, CEO of eG Innovations, discussed the top seven mistakes that IT professional make when managing their Citrix-based services as well as the best practices to address and avoid these mistakes to ensure a positive user experience and business continuity.
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceChristine Ackley
Citrix XenApp and XenDesktop are two of the most performance-sensitive applications being used in enterprise networks today. Citrix performance management is of critical importance because even a small glitch – anywhere in your infrastructure – can negatively affect the user experience and, ultimately, result in lost business revenue.
These slides are from our recent webinar , ‘How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance’, where Raymond Otero, Manager of End-User Computing, Anexinet – a leading Citrix Gold Solution Advisor, and Srinivas Ramanathan, CEO of eG Innovations, discussed the top seven mistakes that IT professional make when managing their Citrix-based services as well as the best practices to address and avoid these mistakes to ensure a positive user experience and business continuity.
DevOps Introduction - AWS Boston Meetup - AWS PresentationZenoss
Boston Amazon Web Services Meetup –– AWS presentation. DevOps introduction, which covers topics like what is DevOps, DevOps culture, DevOps practices, the benefits of DevOps and more.
SOPRIS Technologies' David Stevenson (Chief Strategy Officer) presents Zenoss as Core Element for Video QOS.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Troubleshooting Zenoss: A Support PerspectiveZenoss
Zenoss' Adam McCurdy (Manager, Customer Support) and Mike Rogers (Senior Customer Support Engineer) present Troubleshooting Zenoss: A Support Perspective.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Art Rogers, TransUnion's Director of Enterprise Services, presents Impact of Impact.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Skeptics in the Church of Data: Getting EvangelicalZenoss
Presented by Cage Data's Aaron Aldrich, DevOps Consultant and Evangelist.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Leveraging the JSON API as a Self-Service ToolZenoss
Presented by Portland GE's Chad Beers (Enterprise OPS, PGE) and Anthony Thayer-Osborne (Enterprise OPS, PGE).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
IT4IT: Realize a Digital Strategy with ServiceNowZenoss
ServiceNow's Senior Product Manager, Mark Bodman, presents IT4IT: Realize a Digital Strategy with ServiceNow.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Developing ZenPacks the Right Way: Introducing the SDK Zenoss
Developing ZenPacks: Presented by Zenoss' Chet Luther (Principal Engineer) and Joseph Anderson (Senior Solutions Engineer)
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Event Manipulation and Testing, presented by PNC's Jason Stanley (IT System Engineer).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Demystifying Network Function Virtualization (NFV) Service AssuranceZenoss
Presented by SOPRIS Technologies and Zenoss by SOPRIS' David Stevenson (CSO), and Zenoss' Kent Erickson (Senior Manager, Channel Marketing) and Laszlo Bojtos (Staff Sales Engineer).
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on: