Presented by Mr Poon See Hong, Deputy Director (Planning), Police Logistics Department, Singapore Police Force, at our 14th Architecture Community of Practice Forum on 21 Jul 2016.
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
The Briefing Room with Dr. Robin Bloor and HP Security Voltage
Live Webcast September 22, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=45ece7082b1d7c2cc8179bc7a1a69ea5
Hadoop is rapidly becoming a development platform and dominant server environment, and organizations are keen to take advantage of its massively scalable – and relatively inexpensive – resources. It is not, however, without its limitations, and it often requires a contingent of complementary components in order to behave within an information architecture. One area often overlooked is security, a factor that, if not considered from the onset, can insert great risk when putting sensitive data in Hadoop.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor as he discusses how security was never a design point for Hadoop and what organizations can do about it. He’ll be briefed by Sudeep Venkatesh of HP Security Voltage, who will explain the intricacies surrounding a secure Hadoop implementation. He will show how techniques like format-preserving and partial-field encryption can allow for analytics over protected data, with zero performance impact.
Visit InsideAnalysis.com for more information.
Demystify big data data science
An overview of the shift to Data Science Platforms
The 3 critical components of a Data Science platform
Industries that are most likely to get disrupted and shift to Data Science
Characteristics of firms that get left behind the Data Science wave
Factors that push an industry towards Data Science
A brief overview of aspects of platform architecture beyond technology
The only way to get where we need to be in security analysis is if we use Security Intelligence. This means working harder and understanding the big picture of your data.
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
The Briefing Room with Dr. Robin Bloor and HP Security Voltage
Live Webcast September 22, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=45ece7082b1d7c2cc8179bc7a1a69ea5
Hadoop is rapidly becoming a development platform and dominant server environment, and organizations are keen to take advantage of its massively scalable – and relatively inexpensive – resources. It is not, however, without its limitations, and it often requires a contingent of complementary components in order to behave within an information architecture. One area often overlooked is security, a factor that, if not considered from the onset, can insert great risk when putting sensitive data in Hadoop.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor as he discusses how security was never a design point for Hadoop and what organizations can do about it. He’ll be briefed by Sudeep Venkatesh of HP Security Voltage, who will explain the intricacies surrounding a secure Hadoop implementation. He will show how techniques like format-preserving and partial-field encryption can allow for analytics over protected data, with zero performance impact.
Visit InsideAnalysis.com for more information.
Demystify big data data science
An overview of the shift to Data Science Platforms
The 3 critical components of a Data Science platform
Industries that are most likely to get disrupted and shift to Data Science
Characteristics of firms that get left behind the Data Science wave
Factors that push an industry towards Data Science
A brief overview of aspects of platform architecture beyond technology
The only way to get where we need to be in security analysis is if we use Security Intelligence. This means working harder and understanding the big picture of your data.
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...APNIC
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets, by Yuji Sekiya.
Presented at the APNIC 40 APOPS 1 session, Tue 8 Sep 2015.
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
Chief Architect Francois Lascelles gave this presentation at Gartner Catalyst 2013. The user experience associated with mobile applications is a critical determinant of the adoption of the APIs that powers them. Mobile platforms and their public app stores create challenges when it comes to securing APIs consumed by mobile applications in such a way that does not require constant user prompts. This presentation will describe the challenge of providing positive UX patterns such as single sign-on on mobile platforms and explore API provider-side architectures enabling them.
Real time big data analytical architecture for remote sensing applicationLeMeniz Infotech
Real time big data analytical architecture for remote sensing application
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
As Hadoop becomes a critical part of Enterprise data infrastructure, securing Hadoop has become critically important. Enterprises want assurance that all their data is protected and that only authorized users have access to the relevant bits of information. In this session we will cover all aspects of Hadoop security including authentication, authorization, audit and data protection. We will also provide demonstration and detailed instructions for implementing comprehensive Hadoop security.
Big Data and the Energy domain (vis-a-vis the respective H2020 Societal Challenge) - Opportunities, Challenges and Requirements. As presented and discussed in the public launch of the BigDataEurope project.
The fundamentals and best practices of securing your Hadoop cluster are top of mind today. In this session, we will examine and explain the components, tools, and frameworks used in Hadoop for authentication, authorization, audit, and encryption of data and processes. See how the latest innovations can let you securely connect more data to more users within your organization.
It introduces and illustrates use cases, benefits and problems for Kerberos deployment on Hadoop; how Token support and TokenPreauth can help solve the problems. It also briefly introduces Haox project, a Java client library for Kerberos.
Building Hadoop Data Applications with Kite by Tom WhiteThe Hive
With a such a large number of components in the Hadoop ecosystem, writing Hadoop applications can be a big challenge for newcomers. In this talk Tom looks at best practices for building data applications that run on Hadoop, and introduces the Kite SDK, an open source project created at Cloudera with the goal of simplifying Hadoop application development by codifying many of these best practices.
Meet with Tom White:
Tom White is one of the foremost experts on Hadoop. He has been an Apache Hadoop committer since February 2007, and is a Member of the Apache Software Foundation. Tom is a software engineer at Cloudera, where he has worked, since its foundation, on the core distributions from Apache and Cloudera. Previously he was an independent Hadoop consultant, working with companies to set up, use, and extend Hadoop. He has written numerous articles for O’Reilly, java.net and IBM’s developerWorks, and has spoken at many conferences, including ApacheCon and OSCON. Tom has a B.A. in mathematics from the University of Cambridge and an M.A. in philosophy of science from the University of Leeds, UK. He currently lives in Wales with his family.
Suggest to practice EA in a three tier approach rather than a big bang. Point out EA is a planning effort rather than an engineering effort. EA is not the enterprise wide solution architecture. Clarify the confusion of business capability and business process. EA is not business process centric it is the mean to support the end of business capability. Introduce the concept of business floor plan and EA landscape. The business floor plan is similar to the floor plan of a house. EA landscape to present the situation of usage such as the landscape of application, data and technology. Practical EA use the popular EA method such as FEAF, TOGAF, DODAF to design the segment architecture .
The Ontology-based Business Architecture Engineering FrameworkDmitry Kudryavtsev
Business architecture became a well-known tool for business transformations. According to a recent study by Forrester, 50 percent of the companies polled claimed to have an active business architecture initiative, whereas 20 percent were planning to engage in business architecture work in the near future. However, despite the high interest in BA, there is not yet a common understanding of the main concepts. There is a lack for the business architecture framework which provides a complete metamodel, suggests methodology for business architecture development and enables tool support for it. The ORGMaster framework is designed to solve this problem using the ontology as a core of the metamodel. This paper describes the ORG-Master framework, its implementation and dissemination.
the presentation was given within the SOMET 2011 conference: http://www.somet.soft.iwate-pu.ac.jp/somet_11/
see the text in proceedings here: http://www.booksonline.iospress.nl/Content/View.aspx?piid=21454
Kudryavtsev, D., & Grigoriev, L. (2011). The ontology-based business architecture engineering framework. In proceedings of the 10th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET), September 28-30, 2011, Saint-Petersburg, Russia. P. 233-252.
Master Plan and Notional Target ArchitectureJohn Wu
Master plan and notional Target Architecture inherit the top down and vertical architecture theory from traditional architecture development method. It is the first architecture theory among the Light Enterprise Architecture concept of vertical, horizontal and circular architecture theory.
LEA takes the light approach to conduct master plan and the notional target architecture because it is futile to design a frozen blueprint in an organic enterprise.
LEA adopt the ideal of master planning comes from city planning. Master plan and notional target architecture represent the construct and the notion of enterprise target architect. However, it serve as the mean of Enterprise Architecture rather than the end. EA is not only about drawing some high level architecture drawings. It is long term guideline not only for the enterprise mechanical architecture but also used to facilitate collaboration and knowledge sharing.
It is intended for both business and engineering community. It shows how business take advantage of different resources which include not only IT but also human and financial resources. It is not intended as the guideline on how to design or create these resources. EA should not be confused as the enterprise wide solution architecture.
Master plan and notional architecture is delivered in architecture drawing sets and spread sheet for the purpose of intuitive and comprehension by the business community. The notional architecture drawing is not as rigid a the engineering blueprint, It is flexible and creative.
The LEAF is a 3x3 matrix to illustrate EA comprehensively with three main goals suggest to practice EA in three tiers instead of a big bang approach.
The main goals of EA are Align IT to Business; Enable enterprise agility via interoperability, reuse and sharing; Adapt to change in the organic enterprise. To achieve these goals, it takes three architecture disciplines in vertical, horizontal and circular direction..
LEAF suggest to practice EA in three tier approach of Notional EA, Practical EA and Daily EA. A big bang EA approach requires significant investment of time and resources, In the three tier approach, The Notional Architecture is relatively light, The practical EA in segment scope is also light.
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...APNIC
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Datasets, by Yuji Sekiya.
Presented at the APNIC 40 APOPS 1 session, Tue 8 Sep 2015.
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
Chief Architect Francois Lascelles gave this presentation at Gartner Catalyst 2013. The user experience associated with mobile applications is a critical determinant of the adoption of the APIs that powers them. Mobile platforms and their public app stores create challenges when it comes to securing APIs consumed by mobile applications in such a way that does not require constant user prompts. This presentation will describe the challenge of providing positive UX patterns such as single sign-on on mobile platforms and explore API provider-side architectures enabling them.
Real time big data analytical architecture for remote sensing applicationLeMeniz Infotech
Real time big data analytical architecture for remote sensing application
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
As Hadoop becomes a critical part of Enterprise data infrastructure, securing Hadoop has become critically important. Enterprises want assurance that all their data is protected and that only authorized users have access to the relevant bits of information. In this session we will cover all aspects of Hadoop security including authentication, authorization, audit and data protection. We will also provide demonstration and detailed instructions for implementing comprehensive Hadoop security.
Big Data and the Energy domain (vis-a-vis the respective H2020 Societal Challenge) - Opportunities, Challenges and Requirements. As presented and discussed in the public launch of the BigDataEurope project.
The fundamentals and best practices of securing your Hadoop cluster are top of mind today. In this session, we will examine and explain the components, tools, and frameworks used in Hadoop for authentication, authorization, audit, and encryption of data and processes. See how the latest innovations can let you securely connect more data to more users within your organization.
It introduces and illustrates use cases, benefits and problems for Kerberos deployment on Hadoop; how Token support and TokenPreauth can help solve the problems. It also briefly introduces Haox project, a Java client library for Kerberos.
Building Hadoop Data Applications with Kite by Tom WhiteThe Hive
With a such a large number of components in the Hadoop ecosystem, writing Hadoop applications can be a big challenge for newcomers. In this talk Tom looks at best practices for building data applications that run on Hadoop, and introduces the Kite SDK, an open source project created at Cloudera with the goal of simplifying Hadoop application development by codifying many of these best practices.
Meet with Tom White:
Tom White is one of the foremost experts on Hadoop. He has been an Apache Hadoop committer since February 2007, and is a Member of the Apache Software Foundation. Tom is a software engineer at Cloudera, where he has worked, since its foundation, on the core distributions from Apache and Cloudera. Previously he was an independent Hadoop consultant, working with companies to set up, use, and extend Hadoop. He has written numerous articles for O’Reilly, java.net and IBM’s developerWorks, and has spoken at many conferences, including ApacheCon and OSCON. Tom has a B.A. in mathematics from the University of Cambridge and an M.A. in philosophy of science from the University of Leeds, UK. He currently lives in Wales with his family.
Suggest to practice EA in a three tier approach rather than a big bang. Point out EA is a planning effort rather than an engineering effort. EA is not the enterprise wide solution architecture. Clarify the confusion of business capability and business process. EA is not business process centric it is the mean to support the end of business capability. Introduce the concept of business floor plan and EA landscape. The business floor plan is similar to the floor plan of a house. EA landscape to present the situation of usage such as the landscape of application, data and technology. Practical EA use the popular EA method such as FEAF, TOGAF, DODAF to design the segment architecture .
The Ontology-based Business Architecture Engineering FrameworkDmitry Kudryavtsev
Business architecture became a well-known tool for business transformations. According to a recent study by Forrester, 50 percent of the companies polled claimed to have an active business architecture initiative, whereas 20 percent were planning to engage in business architecture work in the near future. However, despite the high interest in BA, there is not yet a common understanding of the main concepts. There is a lack for the business architecture framework which provides a complete metamodel, suggests methodology for business architecture development and enables tool support for it. The ORGMaster framework is designed to solve this problem using the ontology as a core of the metamodel. This paper describes the ORG-Master framework, its implementation and dissemination.
the presentation was given within the SOMET 2011 conference: http://www.somet.soft.iwate-pu.ac.jp/somet_11/
see the text in proceedings here: http://www.booksonline.iospress.nl/Content/View.aspx?piid=21454
Kudryavtsev, D., & Grigoriev, L. (2011). The ontology-based business architecture engineering framework. In proceedings of the 10th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET), September 28-30, 2011, Saint-Petersburg, Russia. P. 233-252.
Master Plan and Notional Target ArchitectureJohn Wu
Master plan and notional Target Architecture inherit the top down and vertical architecture theory from traditional architecture development method. It is the first architecture theory among the Light Enterprise Architecture concept of vertical, horizontal and circular architecture theory.
LEA takes the light approach to conduct master plan and the notional target architecture because it is futile to design a frozen blueprint in an organic enterprise.
LEA adopt the ideal of master planning comes from city planning. Master plan and notional target architecture represent the construct and the notion of enterprise target architect. However, it serve as the mean of Enterprise Architecture rather than the end. EA is not only about drawing some high level architecture drawings. It is long term guideline not only for the enterprise mechanical architecture but also used to facilitate collaboration and knowledge sharing.
It is intended for both business and engineering community. It shows how business take advantage of different resources which include not only IT but also human and financial resources. It is not intended as the guideline on how to design or create these resources. EA should not be confused as the enterprise wide solution architecture.
Master plan and notional architecture is delivered in architecture drawing sets and spread sheet for the purpose of intuitive and comprehension by the business community. The notional architecture drawing is not as rigid a the engineering blueprint, It is flexible and creative.
The LEAF is a 3x3 matrix to illustrate EA comprehensively with three main goals suggest to practice EA in three tiers instead of a big bang approach.
The main goals of EA are Align IT to Business; Enable enterprise agility via interoperability, reuse and sharing; Adapt to change in the organic enterprise. To achieve these goals, it takes three architecture disciplines in vertical, horizontal and circular direction..
LEAF suggest to practice EA in three tier approach of Notional EA, Practical EA and Daily EA. A big bang EA approach requires significant investment of time and resources, In the three tier approach, The Notional Architecture is relatively light, The practical EA in segment scope is also light.
Mr. Dennis E. Wisnosky is the Chief Architect and Chief Technical Officer (CTO) of the Department of Defense (DOD) Business Mission Area within the office of the Deputy Under Secretary of Defense for Business Transformation. As Chief Architect and CTO, Mr. Wisnosky is responsible for providing expert guidance and oversight in the design, development, and modification of the federated architectures supporting the Department's Business Mission Area.
153
مبادرة
#تواصل_تطوير
المحاضرة ال 153 من المبادرة
المهندس / محمد زكريا
أخصائي البنية المؤسسية والاستراتيجية الرقمي
بعنوان
"مقدمة عن البنية المؤسسية"
وذلك يوم الإثنين 21مارس 2022
الثامنة مساء توقيت القاهرة
التاسعة مساء توقيت مكة المكرمة
و الحضور عبر تطبيق زووم من خلال الرابط
https://us02web.zoom.us/meeting/register/tZIqcu-spjoiH902NOccdtAoNJnGQ35joBnv
علما ان هناك بث مباشر للمحاضرة على القنوات الخاصة بجمعية المهندسين المصريين
ونأمل أن نوفق في تقديم ما ينفع المهندس ومهمة الهندسة في عالمنا العربي
والله الموفق
للتواصل مع إدارة المبادرة عبر قناة التليجرام
https://t.me/EEAKSA
ومتابعة المبادرة والبث المباشر عبر نوافذنا المختلفة
رابط اللينكدان والمكتبة الالكترونية
https://www.linkedin.com/company/eeaksa-egyptian-engineers-association/
رابط قناة التويتر
https://twitter.com/eeaksa
رابط قناة الفيسبوك
https://www.facebook.com/EEAKSA
رابط قناة اليوتيوب
https://www.youtube.com/user/EEAchannal
رابط التسجيل العام للمحاضرات
https://forms.gle/vVmw7L187tiATRPw9
ملحوظة : توجد شهادات حضور مجانية لمن يسجل فى رابط التقيم اخر المحاضرة.
Designing Impactful Services and User Experience - Lim Wee KheeNUS-ISS
In this engaging talk, we explore crafting impactful user-centric services, revealing the design principles that drive exceptional experiences. From empathetic customer journeys to innovative interfaces, learn how design can create meaningful connections, inspiring you to revolutionise your approach and drive lasting change in user satisfaction and brand success.
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
In today's digital age, the key to true transformation lies in our people. This talk will highlight the importance of digital fluency, emphasizing that everyone in an organization is now a digital professional. By synergizing the fundamental digital skills ranging from an agile mindset to making data-informed decisions and design thinking, we will discuss how a digitally skilled workforce can propel organizations to drive digital transformation with new heights of value creation. Though widespread workforce upskilling presents its challenges, this talk offers innovative organizational learning approaches that may pave the way to success. Join us to find out how to shape the future of your organization where success is defined not just by technology but by a workforce fully equipped with digital competencies, ready to take on whatever the future holds.
How the World's Leading Independent Automotive Distributor is Reinventing Its...NUS-ISS
In this captivating session, we'll unveil the profound impact of AI, poised to revolutionise the business landscape. Prepare to shift your perspective, as we transition from the lens of a data scientist to the visionary mindset of a product manager. We're about to demystify the captivating world of Generative AI, dispelling myths and illuminating its remarkable potential. We will also delve into the pioneering applications that Inchcape is leading, pushing the boundaries of what's achievable. Join us for an exhilarating journey into the future of AI, where professionalism meets unparalleled excitement, and innovation takes center stage!
The Importance of Cybersecurity for Digital TransformationNUS-ISS
In the rapidly evolving landscape of digital transformation, the importance of cybersecurity cannot be overstated. As organizations embrace digital technologies to enhance their operations, innovate, and connect with customers in new and dynamic ways, they simultaneously become more vulnerable to cyber threats.
This talk will discuss the importance of having a well thought through approach in dealing with cybersecurity in the form of a strategy that lays out the various programmes and initiatives that will underpin a secure and resilient digital transformation journey. Not surprisingly, having a pool of well-trained cybersecurity personnel is one of the key ingredient in a cyber strategy as exemplified in Singapore's own national cybersecurity strategy.
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...NUS-ISS
Join us for a deep dive into the art of architecting Customer Experience (CX) measurement frameworks and ensuring that CX metrics are precisely tailored for their intended purpose. In this engaging session, you'll walk away with actionable insights and a tangible plan for refining your measurement strategies. Discover how to craft CX measurement frameworks that align seamlessly with your business objectives, ensuring that your metrics deliver meaningful and robust insights. Whether you're seeking to enhance customer satisfaction, optimise processes, or drive innovation, this session will provide you with potential approaches and practical steps to bolster the effectiveness and relevance of your CX metrics. It's your blueprint for creating a customer-centric roadmap to success.
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
With the recent buzz on Generative AI & Large Language Models, the question is to what extent can these technologies be applied at work or when you're studying and how easy is it to manage/develop your own models? Hear from our guest speaker from Google as he shares some insights into how industries are evolving with these trends and what are some of Google's offerings from Duet AI in Google Workspace to the GenAI App Builder on Google Cloud.
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeNUS-ISS
Enterprises striving to unlock value through digital products face a pivotal shift towards product-centric management, a transformation that carries its share of challenges. To navigate this journey successfully, close collaboration between Enterprise Architects and Digital Product Managers is essential. Together, they can craft the ideal strategy to deliver digital products on a grand scale. Join us in this session as we shed light on the critical interactions and activities that foster synergy between Enterprise Architects and Digital Product Managers. Discover how this collaboration paves the way for effective product-centric management, enabling enterprises to harness the full potential of their digital offerings.
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...NUS-ISS
We find ourselves in an era of exponential growth and transformation. The relentless pace of technological advancement is reshaping our world at a rate never seen before, making it increasingly challenging to stay abreast of these rapid developments. Join us for an insightful talk where we embark on a journey to explore the most significant technology trends set to unfold over the next decade. These trends promise to be nothing short of seismic, with the power to reshape every facet of our lives, from the way we work and learn to how we forge relationships and structure our society. Prepare to be enlightened as we delve into a future where the very fabric of our existence is on the brink of transformation. This talk is your compass to navigate the uncharted territory of tomorrow's world, and it's an opportunity you won't want to miss.
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...NUS-ISS
The hottest topic in the tech world right now is generative AI. In this session, we go beyond the hype to delve into honest answers about how generative AI is impacting the future of work. This is an important topic for all digital leaders to have a thorough understanding of when driving digital transformation.
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
Containers have emerged as an indispensable component of modern cloud-native applications, serving diverse roles from development environments to application distribution and deployment on platforms like Azure's App Service and Kubernetes. In this presentation, we will delve into a suite of powerful tools designed to ensure the adoption of best practices in container management. You'll gain insights into how to scan container images rigorously, identifying and mitigating vulnerabilities effectively. We'll also explore the art of generating comprehensive software bill of materials (SBOM) for your containers and the significance of signing container images for enhanced security. The ultimate goal of this presentation is to empower you with the knowledge and skills necessary to seamlessly integrate these tools and practices into your CI (Continuous Integration) pipelines. By the end of this session, you'll be well-equipped to fortify your container workflows, delivering secure and robust cloud-native applications that thrive in today's dynamic digital landscape.
The future is always uncertain. To be truly future-ready, companies need the ability to quickly learn and adapt and to foster a culture of continuous curiosity and experimentation. But how can we facilitate rapid learning throughout the organisation? What will the future of learning look like for you? How can we ensure our organisations become engines of growth through learning?
The future is always uncertain. To be truly future-ready, companies need the ability to quickly learn and adapt and to foster a culture of continuous curiosity and experimentation. But how can we facilitate rapid learning throughout the organisation? What will the future of learning look like for you? How can we ensure our organisations become engines of growth through learning?
Site Reliability Engineer (SRE), We Keep The Lights On 24/7NUS-ISS
There are many phases in the software development cycle, from requirements to development and testing, but at the tail of the process, is an often overlooked aspect: deployment and delivery. With the paradigm shift of delivering on-site software to offering software-as-a-service, Site Reliability Engineering is beginning to take a greater role in product delivery.
This session aims to give a glimpse of the work that goes into site reliability engineering (SRE) and effort that goes into keeping a service going 24/7.
Product Management in The Trenches for a Cloud ServiceNUS-ISS
More often than not, people’s perception of Product Management is usually centred around the definition, management and prioritisation of software features and functionality. While that is largely true, it is also one of many things that a Product Manager needs to focus on, given limited time and resources.
This session aims to provide an unfiltered view of how Product Management looks like in the context of Enterprise Cloud Applications development, the challenges confronting Product Managers, and the tradeoff decisions to be made in order to overcome these challenges.
All this, while shipping a working product with each release that will surprise and delight the end user.
Overview of Data and Analytics Essentials and FoundationsNUS-ISS
As companies increasingly integrate data across functions, the boundaries between marketing, sales and operations have been blurring. This allows them to find new opportunities that arise by aligning and integrating the activities of supply and demand to improve commercial effectiveness. Instead of conducting post-hoc analyses that allow them to correct future actions, companies generate and analyze data in near real-time and adjust their operations processes dynamically. Transitioning from static analytics outputs to more dynamic contextualized insights means analytics can be delivered with increased relevance closer to the point of decision.
This talk will cover the analytics journey from descriptive, predictive and prescriptive analytics to derive actionable and timely insights to improve customer experience to drive marketing, salesforce and operations excellence.
With the use of Predictive Analytics, companies are able to predict future trends based on existing available data. The actionable business predictions can help companies achieve cost savings, higher revenue, better resource allocation and efficiency. Predictive analytics has been used in various sectors such as banking & finance, sales & marketing, logistics, retail, healthcare, F&B, etc. for various purposes.
Get set to learn more about the different stages of predictive analytics modelling such as data collection & preparation, model development & evaluation metrics, and model deployment considerations will be discussed.
In this digital transformation era, we have seen the rise of digital platforms and increased usages of devices particularly in the area of wearables and the Internet of Things (IoT). Given the fast pace change to the IoT landscape and devices, data has become one of the important source of truth for analytics and continuous streaming of data from sensors have also emerged as one of the fuel that revolutionise the emergence of IoT. These includes health telematics, vehicle telematics, predictive maintenance of equipment, manufacturing quality management, consumer behaviour, and more. With this, we will give you an introduction on how to leverage the power of data science and machine learning to understand and explore feature engineering of IoT and sensor data.
Diagnosing Complex Problems Using System ArchetypesNUS-ISS
In today’s VUCA world, we are faced with problems coming in fast and furious. In order to resolve such problems quickly, we need to first understand the problems. One of the techniques to understand complex problem is through the use of system archetypes. System archetypes are patterns of behaviour of a system. Let’s us explore some of the system archetypes in this session as well as tips on how to resolve them.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Enterprise Approach towards Cost Savings and Enterprise Agility
1. Enterprise Approach towards
Cost Savings and Enterprise Agility
14th Architecture Community of Practice (ACoP) Forum
21 July 2016
Poon See Hong
pseehong@gmail.com
“The adventure of life is to learn. The beauty of life
is to give.”
UNCLASSIFIED
2. Disclaimer
Views expressed in this presentation
are solely that of the speaker's and
shared in the spirit of knowledge
sharing. They DO NOT necessarily
represent MHA's or SPF's views
UNCLASSIFIED
3. Scope of Presentation
Our approach to Enterprise Architecture (EA)
Development and Management
EA Value Realisation - Architecture-driven
Business Process Management (BPM)
Initiatives
UNCLASSIFIED
5. Definitions of Enterprise Architecture
“A Rose by any other name.........”
Enterprise architectures are like blueprints,
drawings or models
Enterprise architectures refer to an organised set
of elements with clear relationships to one another
which together form a whole defined by its finality
Enterprise architectures define the style and
method of design and construction that comprise the
elements of a system and define the purposes and
interrelationships of those elements
UNCLASSIFIED
6. Definitions of Enterprise Architecture
We view EA as an Enterprise Approach for:
Ensuring Business-IT alignment
Managing the complexities of IT
Breaking the silo barriers
Moving up the maturity ladder
Supported by:
Pragmatic and disciplined execution at a measured
pace
A culture of openness and transparencies to instill
enterprise awareness
UNCLASSIFIED
7. It’s a
Fan!
It’s a
Spear!
It’s a Snake!
It’s a
Rope!
It’s a Wall!
It’s a Tree!
EA provides a “Big Picture” view of the different elements of a
business and how they are related, helping business and IT functions
to jointly understand, plan and successfully deliver change
Functionally Centric
“blind men saw the elephant”
UNCLASSIFIED
9. Vision Architect's Views
Plumbing Drawing Electrical Drawing Structural Drawing
Engineer's Views
Learning from the Building Industry
Getting Everyone on the Same Page
UNCLASSIFIED
11. How do we build the Integrated
Enterprise Architecture?
A way to understand enterprise complexity through
decomposition
A method of structuring the enterprise with
architectures at each level of decomposition
A common language to communicate and create a
shared understanding across and throughout the
enterprise
We have a committed leadership team, shared expectations
and knowledgeable personnel to achieve success
UNCLASSIFIED
12. The Business Reference Model Structure
Line of Business (LOB)
(e.g. Supply Chain
Management)
Business Function
(e.g. Inventory
Management)
Mission Area
(e.g. Corporate Business
Mission Area)
A taxonomical structure that gives a cross-LOB view for
aligning IT investments, identifying hand-offs and
connections, and facilitating architecture integration
UNCLASSIFIED
OV-0
OV-0
OV-0
13. Business Architecture - Understanding
Complexity Through Decomposition
Manage Stock Transfer
(Scenario)
Perform One Step / Two Steps
Stock Transfer
(Process)
Perform Goods Receipt
(Process Step)
BA is the highest and most dominant architecture, the central plexus
and equivalent to the structural architecture for your dream home
UNCLASSIFIED
OV-5
OV-6
OV-6
16. Legend:
Level 2 Business
Function
Level 3 Business
Function or known as
Business Scenario*
The Process
Model of
Supply Chain
Management
* On average, each Business
Scenario consists of 5 to 10
Business Processes
UNCLASSIFIED
17. Legend:
Level 2 Business
Function
Level 3 Business
Function or known as
Business Scenario
The Process
Model of
Engineering &
Maintenance
Management
UNCLASSIFIED
20. The principle is that projects aim to improve the
performance of business functions, and the
improved performance of business functions
results in the advancement of capabilities and
achievement of strategic outcomes.
Project on a business function
Capabilities
Strategic Outcomes
To actualise the alignment between projects and
strategic outcomes, the Balanced Score Card
(BSC) capabilities in the organisation BSC
strategy map will need to be developed.
Alignment to BSC and Outcomes
Vision: Delivering User Centric Information Capabilities
The Business Map (OV-0)
UNCLASSIFIED
Information
Infrastructure
Business Area
Logistics
Business Area
21. Once the capabilities are established, we will support the
business area leads to map and manage these internal
processes, which are essentially end-to-end processes that
integrate the Lines of Business (LOBs) to deliver common
outcomes to the Training, People, Logistics System and
Infrastructure capabilities.
The Value Chain of each capability can
be used for analysis by Enterprise
Architects to integrate LOBs.
The Value Chains would comprise
business functions depicted in the OV-0
Cross LOB Integration
Vision: Delivering User Centric Information Capabilities
UNCLASSIFIED
The Business Map (OV-0)
Information
Infrastructure
Business Area
Logistics
Business Area
22. EA: Enabling Business and IT Coherence
Business architecture
Process architecture
OV-2
OV-3
OV-7
OV-0
OV-1
OV-5
OV-6
SV-1
SV-2
SV-6
TV-1
EA describes the current and future states of an enterprise
using a broad set of Operational, System and Technical Views
Technical
Facing
Business
Facing
UNCLASSIFIED
23. Needline
External Needline
Node
ActivityActivity
Node
ActivityActivity
Node
OrganizationOrganization
Process Area
(Business
Function) 1.1
Process Area
(Business
Function) 1.2
Process Area
(Business
Function) 1.3
Process Area
(Business
Function) 1.4
Policy name 1
Policy name 2
Policy name 3
Policy name 4
Policy name 1
Policy name 2
Department 1
Resources &
Facilities
Department 2
Application system 1
Department 1
Department 2
Application system 1
Application system 2
Policy name 1
Policy name 2
Application system 1
Application system 2
System/ILS Mgr
Input 1
Input 2
Input 3
Output 1
Output 2
Output 3
Output 4
Output 5
Output 6Department 1
Department 1
OV- 2
EPC
OV- 1
BPMN
OV- 3 IOD IEDM
Role
Organization
Organization
Ty pe
Organization Organization
Role
OV- 4
OD
Operational
Activity
Operational
Activity
Operational
Activity
Operational
Capability
Operational
Activity
OV- 5
OV- 6
SV- 1
SV- 2
TV- 1
FTIDEF
EPC
BPMN ASD
AD
ND
TT
Node Tree
Operational
Activity
Organization
Event
Event
Event
Operational
Activity
Event
Information
Exchange
Requirement
Human Role
Information
Element
AD
System
System
Type
System
Component
is of type
encompasses
System
Organization Organization
SystemInterface
Communications
System
Communications
Link
Network
Network
Organization
Pathway
Interface
Network type
Operational
ActivityOrganization
Mission
Organization Type
Needline
Performance Parameter Set
Operational
Capability
System
Node
Node A1 Node A2
Function Output Output Output Output Output Output Output Output Output Output
FunctionInputInputInputInputInputInputInputInputInputInput
Operational
Activity
Information
Exchange
Requirement
Information
Element
Operational
Activity
Activity
Activity
Needline
Information
Exchange
Requirement
Information
Element
Information
Element
Organization Output Output Output Output Output Output Output Output Output Output
OrganizationInputInputInputInputInputInputInputInputInputInput
Organization
Organization Organization Type
Organization Type
Needline
Needline
Node
NeedlineNode
System SystemInterface
Organizatio
n Type
Standard
System Function
Node
SystemSystem
Node
System FunctionSystem Function
Needline
Interface
Node
Timed Standards
Forecast
Standards Forecast
Profile
Reference Model
ServiceService Area
SV- 7KPI
System Function
Performance
Parameter Set
System
Interface Standard
SV- 6UML IEDM
Data Flow
Information
Element
Interface
Information
Exchange
Requirement
Interface Interface
OV- 0
Process Area
(Business
Function)1.1
Process Area
(Business
Function)1.2
Process Area
(Business
Function)1.3
Process Area
(Business
Function)1.4
Process Area
(Business
Function)1.5
Department 1 Department 2Department 1 Department 2 Department 2
Simplified
EPC
Process Area
(Business
Function) 2.5
Process Area
(Business
Function) 3.5
Process Area
(Business
Function) 1.1
Process Area
(Business
Function) 1.2
Process Area
(Business
Function) 1.3
Process Area
(Business
Function) 1.4
Process Area
(Business
Function) 1.5
Enterprise
Process
Overview
Process Area
(Business
Function) 2.1
Process Area
(Business
Function) 2.2
Process Area
(Business
Function) 2.3
Process Area
(Business
Function) 2.4
Process Area
(Business
Function) 3.1
Process Area
(Business
Function) 3.2
Process Area
(Business
Function) 3.3
Process Area
(Business
Function) 3.4
Enterprise Process
(Line of Business)
4
Enterprise
Process
(Line of
Business) 1
Enterprise Process
(Line of Business)
2
Enterprise Process
(Line of Business)
3
Process Area
(Business
Function) 4.1
Process Area
(Business
Function) 4.2
Process Area
(Business
Function) 4.3
Process Area
(Business
Function) 4.4
Process Area
(Business
Function) 4.5
FT
Uses of EA Views to Answer Questions
The Business Map
High-Level Operational Concept Graphic
Operational Node
Connectivity Description
Operational Information
Exchange Matrix
Organizational Relationships Chart
Operational Activity Model
Operational Activity Sequence and
Timing Descriptions
System Interface
Description
System Communications
Description
Systems Data Exchange Matrix
Systems Performance Parameters Matrix
Technical Standards Profile
UNCLASSIFIED
26. Paint Car
Spouse’s
Input
Car Needs
Painting
Vendor
(Car Painter)
Painted Car
Context Diagram (From the Viewpoint of the Car Owner)
Budget
Constraints
Time Limitations
Painting
Facility
Painting
Specs
UNCLASSIFIED
27. • Value people – Power of Leverage
• Communicated – Be Understood
• Keep it simple
• Embrace change: Keep up the Fire!
• Choose the right solution for the enterprise
• Delivery quality
• Model and document in an agile fashion
Principles of Agile Architecture
Building the Plane as it Flies
UNCLASSIFIED
28. • To understand how operations function, organisations have
to model the who, what and how of their business processes
– Who : Know the role-players and users
• Deliver value
• Listen to the business, hear what they truly want
– What : Define the end-to-end business processes
• Ensure they get used and re-used
– How : Get organised
• Stay relevant
• Adopt industry best practices
• Embedding new behaviours is crucial to implementing EA
Sustaining – An Attitude of Mind
EA brings together information, ideas and technologies and
makes them go where you want
UNCLASSIFIED
29. • Success in IT is all about people
– Good people + optimal process = success
– Good process + poor people = failure
• EA = Optimisation of business processes
– It's not just about automation nor just an IT system
• Encourage, empower and motivate
• Inspire and give space to your people!
What do we believe?
Nevertheless, robust Business Process Governance is key!
UNCLASSIFIED
30. Becoming a Trusted Partner will need
some New Behaviours
Central EA
Function
Projects,
Business Units/
LOBs
Engagement in Advance,
Time for Dialogue with HQ
Time for Dialogue
& Contracting
with Projects &
Business Units
Develop Solutions
Together, Commitment
Demonstration of Benefits to
Business: Time for Pilot
Experience Collaboration
as Adding Value
Focus on new Business
Opportunities, not just
Transformation
EA Input on
Strategy Valued
Making Everyone Matter! We should be walking the EA journey with
the Business Stakeholders and we must not Drive People off The Road
EA seen as a
Business Partner
UNCLASSIFIED
31. EA Value Realisation –
Architecture-driven Business Process
Management (BPM) Initiatives
UNCLASSIFIED
32. Useful models take you just
beyond the horizon … but
not further
What if the model actually become reality?
What if the model and the real thing are
directly connected together?
What if what you model is what you run?
UNCLASSIFIED
33. • Process Performance Manager
• Central Process Scheduling
• Root Cause Analysis
• ARIS Business Architect
• ARIS Business Publisher
• ARIS Business Simulator
• SAP Solution Manager
- Business Blueprint
- Change Management
- Business Process Change
Analyzer
- Test Workbench
Test Automation (HP QC & TAO)
Business-to-
Model
EA
MDA
Business-IT
Integration
Oversight
E2B
ARIS/SAP Tools
Model-to-
Execution
Execution-to-
Business
An Overview of the MDAApproach to
Business-IT Integration
Moving Up The Maturity Ladder
Foresight
B2M
ARIS Business
Architect
Insight
M2E
SAP Solution
Manager
What is Modelled = What is Built = What is Used
UNCLASSIFIED
34. ARIS – Solution Manager Synchronisation
for System Configuration Control
UNCLASSIFIED
36. Let your creative juices flow,
get passionate,
resist the urge to do only the minimum
– specifically:
A Challenge:
If you learn only methods you will be tied to
your methods, if you learn the principles,
you can create your own methods!
UNCLASSIFIED