This document discusses approaches to electronic and ICT equipment disposal. It notes that ICT equipment has a service life determined by factors like brand, quality, warranty and software updates. The average disposal age is 3-5 years. Benefits of asset management include cost savings, compliance and decision-making. Disposal options include refurbishing, clearing data, and destroying equipment through degaussing, shredding or incineration. Legislation governs environmental protection, electrical safety, and data security. Challenges include a lack of e-waste regulations and infrastructure. The document advocates generating value from disposal through smart aging and procurement. It also discusses avoiding risks to the environment, data and electrical safety through oversight and sustainable
Smart Manufacturing Workshop: An Interactive Improv SessionSkoda Minotti
Learn how you can increase revenue, decrease costs and improve profitability all while improving your overall equipment effectiveness, quality, on-time delivery and much more!
Designing Next Generation Smart City Initiatives:Harnessing Findings And Les...Edward Curry
The proliferation of “Smart Cities” initiatives around the world is part of the strategic response by governments to the challenges and opportunities of increasing urbanization and the rise of cities as the nexus of societal development. As a framework for urban transformation, Smart City initiatives aim to harness Information and Communication Technologies and Knowledge Infrastructures for economic regeneration, social cohesion, better city administration and infrastructure management. However, experiences from earlier Smart City initiatives have revealed several technical, management and governance challenges arising from the inherent nature of a Smart City as a complex “Socio- technical System of Systems”. While these early lessons are informing modest objectives for planned Smart Cities programs, no rigorous developed framework based on careful analysis of existing initiatives is available to guide policymakers, practitioners, and other Smart City stakeholders. In response to this need, this paper presents a “Smart City Initiative Design (SCID) Framework” grounded in the findings from the analysis of ten major Smart Cities programs from Netherlands, Sweden, Malta, United Arab Emirates, Portugal, Singapore, Brazil, South Korea, China and Japan. The findings provide a design space for the objectives, implementation options, strategies, and the enabling institutional and governance mechanisms for Smart City initiatives.
Green Computing is a way of study of ending reutilizing and rebuilding of computers and electronic devices is overall analysis. The goal of green computing is to reduce the dangerous material increasing the utilization of energy. Green computing implies to practices and ways of utilizing computing resources in an ecofriendly way while maintaining overall computing .green IT refers to computer and information system and IT applications and predominant strategy to help save and enrich an environment, an increase in the eco logical sustainability in today times. Green computing is under consideration of all the business organization and leading companies with the advancement of new technologies and its varieties of applications. In yester years, especially during last 10 years, computer and IT industries realized the importance of going green an addressing the major concern relating to environment and also to minimize the cost which has led to sharp drift in strategy and policy to IT industry. The importance behind this change arise from computing demand and emerging cost of energy, global warning issues ,this paper present ecofriendly initiatives under way in IT industry and in brief covers the main research challenges which are still gazing to meet green computing requirements. Ms. Amritpal Kaur | Ms. Saravjit Kaur "Green Computing: Emerging Issues in IT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25311.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25311/green-computing-emerging-issues-in-it/ms-amritpal-kaur
Business Sustainability is becoming increasingly important with the need to wisely consume the scarce resources such as water, energy etc.
IT industry is not an exception and IT professionals are obliged to think about ways and means to maintain a sustainable IT business while helping other businesses be more sustainable by developing innovative IT solutionsfor these businesses.
This lesson will discuss sustainability issues resulting from usage of IT solutions and how such issues can be addressed. We will also investigate some of ICT innovative ways of helping business sustainability
Green IT is another term used to refer to IT sustainability
Smart Manufacturing Workshop: An Interactive Improv SessionSkoda Minotti
Learn how you can increase revenue, decrease costs and improve profitability all while improving your overall equipment effectiveness, quality, on-time delivery and much more!
Designing Next Generation Smart City Initiatives:Harnessing Findings And Les...Edward Curry
The proliferation of “Smart Cities” initiatives around the world is part of the strategic response by governments to the challenges and opportunities of increasing urbanization and the rise of cities as the nexus of societal development. As a framework for urban transformation, Smart City initiatives aim to harness Information and Communication Technologies and Knowledge Infrastructures for economic regeneration, social cohesion, better city administration and infrastructure management. However, experiences from earlier Smart City initiatives have revealed several technical, management and governance challenges arising from the inherent nature of a Smart City as a complex “Socio- technical System of Systems”. While these early lessons are informing modest objectives for planned Smart Cities programs, no rigorous developed framework based on careful analysis of existing initiatives is available to guide policymakers, practitioners, and other Smart City stakeholders. In response to this need, this paper presents a “Smart City Initiative Design (SCID) Framework” grounded in the findings from the analysis of ten major Smart Cities programs from Netherlands, Sweden, Malta, United Arab Emirates, Portugal, Singapore, Brazil, South Korea, China and Japan. The findings provide a design space for the objectives, implementation options, strategies, and the enabling institutional and governance mechanisms for Smart City initiatives.
Green Computing is a way of study of ending reutilizing and rebuilding of computers and electronic devices is overall analysis. The goal of green computing is to reduce the dangerous material increasing the utilization of energy. Green computing implies to practices and ways of utilizing computing resources in an ecofriendly way while maintaining overall computing .green IT refers to computer and information system and IT applications and predominant strategy to help save and enrich an environment, an increase in the eco logical sustainability in today times. Green computing is under consideration of all the business organization and leading companies with the advancement of new technologies and its varieties of applications. In yester years, especially during last 10 years, computer and IT industries realized the importance of going green an addressing the major concern relating to environment and also to minimize the cost which has led to sharp drift in strategy and policy to IT industry. The importance behind this change arise from computing demand and emerging cost of energy, global warning issues ,this paper present ecofriendly initiatives under way in IT industry and in brief covers the main research challenges which are still gazing to meet green computing requirements. Ms. Amritpal Kaur | Ms. Saravjit Kaur "Green Computing: Emerging Issues in IT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25311.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25311/green-computing-emerging-issues-in-it/ms-amritpal-kaur
Business Sustainability is becoming increasingly important with the need to wisely consume the scarce resources such as water, energy etc.
IT industry is not an exception and IT professionals are obliged to think about ways and means to maintain a sustainable IT business while helping other businesses be more sustainable by developing innovative IT solutionsfor these businesses.
This lesson will discuss sustainability issues resulting from usage of IT solutions and how such issues can be addressed. We will also investigate some of ICT innovative ways of helping business sustainability
Green IT is another term used to refer to IT sustainability
Greenethiquette is aimed at service providers as well as users of digital services, especially where services are operated by a third party: cloud computing, Software as a Service, hosted web sites, hosted applications, outsourced information systems, etc.. The Greenethiquette charter requires service providers to take account of their environmental responsibilities and commits them to implementing and developing eco-friendly methods in IT services.
Any business or organisation which deals with hosted services can subscribe to the Greenethiquette charter at no cost by simply completing the electronic contract on the Greenethiquette website. The contract outlines criteria for hosted service providers, based on existing guidelines, such as the European Code of Conduct for data-centre efficiency and the Climate Savers computing initiative. Greenethiquette commits service providers to report on their eco-efficiency in hosted applications.
How to create a Circular IT Economy with your old IT assetsSteven Coates
A simple technology disposal project can be transformed into a Circular IT Economy by delivering three elements:
1. First you must have a secure delivery mechanism
2. Second you must be able to minimise the impact on the environment.
3. Finally you must be able to maximise the benefit to society.
ICTR has developed a unique solution to do this and has officially been named as the most secure IT disposal company in the UK by ADISA.
Patrick Zandl: Energy industry post Edison, Křižík & IoTWebExpo
“Electricity, Internet of things, big data, smart data, smart grid, smart metering”
More at http://webexpo.net/prague2013/talk/power-industry-and-internet-of-things/
Sustainable IT Lifecycle Innovation ManagementMatt Deacon
Sustainable Lifecycle Innovation Management (SLIM) is a simple but effective aprroach to making efficiency central to IT operations and in moving IT from being a cost centre to an centre for Innovation and lean efficiency
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
4. ICT procured equipments
Electronic Spendings in Bahrain
(2009)
AV devices Computer
37% hardware
48%
Notebook account
for about 60% of
Computer Sales
Mobile handset
15%
Source: Bahrain Consumer Electronics Report Q1 2011 - Source: National Audit Office survey and analysis – UK
Business Monitor International (December 2010) 2005-06 (million of Units)
http://www.reportlinker.com/p0169782/Bahrain-Consumer-
Electronics-Report-Q1.html
5. The average age of ICT
equipment at disposal
Source: National Audit Office survey and analysis – UK 2005-06 (million of Units)
6. ICT Age Factors
Brand, Equipment Quality &
Configuration
Supplier Support and Spare
parts availability
Warranty Period
Software/System update,
version Requirements
User & Business Demands
Usage, Carefulness, Damages
8. Benefits of Asset Management System
& Refresh Period
• Inventory Control
• Total Cost of Ownership
• Software License Compliance
• Operational Monitoring and
Control
• Decision Making about IT
Resource Deployment
• Zero-day Employee Provisioning
• Standardization and Compliance
• More Informed Purchasing
• Business Resumption
Reducing operating costs (10%-40% cost
savings of operating cost)
Source: National Audit Office survey and analysis – UK 2007
9. Minimize Total Cost of Ownership
•Dispose before end of life
•End of Warranty
•Buy-Back before End of Life
IT is a Business Decision
14. Disposal options
IT conforms to the European Directive on
Waste Electrical and Electronic Equipment
(WEEE) to dispose of its IT equipment.
Source: National Audit Office survey and analysis – UK 2007
15. Refining Methods
• Clear
– use software or hardware products to
overwrite storage space on the media with
non-sensitive data.
• Purge
– Degaussing is exposing the magnetic media
to a strong magnetic field in order to
disrupt the recorded magnetic domains.
• Destroy
– Disintegration, Pulverization, Melting, and
Incineration
– Shredding.
16. Legislation
•Environmental Protection
•The Environmental Act (1994), Section 34: Duty of care and The
Environmental Protection (Duty of Care) Regulations 1991
•Hazardous Waste Regulations (2005)
•Waste Electrical and Electronic Equipment Regulations (2006)
•Electrical Safety
•The Electrical Equipment (Safety) Regulations 1994
•The Health and Safety at Work Act 1974
•Data Protection & Security
•Data Protection Act (1998)
•Official Secrets Act (1989)
17. Challenges with e-waste
• Lack of legislation on the control of second hand electrical/electronic goods;
• Inadequate awareness and public education on the dangers associated with the
environmentally sound management of e‐waste;
• Absence of national infrastructure for formal recycling;
• Inadequate public‐private partnerships in e‐waste control;
• Poor corporate responsibility by the industry;
• Weak global and regional response to e‐waste issues.
19. Generate Better Value
• Smart Aging (Refresh Period) Avoid the time when
– to have no value;
– Define the optimum age for your corporate disposal (3 to 5 – to be unserviceable or beyond
years) economical repair; or
– Consider Reducing the costs of resale and increasing resale – that the disposal cost is higher
than the likely return.
revenues;
– Dispose whenever is practical and cost effective
– Contract for buy-back “revenue sharing”, “zero-cost” or “at cost”,
• Smart ICT Procurement Effective ICT Asset
– Awareness of the longer life items and commercial market values Management and
for used equipments Disposal Policy
20. Avoid the Wider Risk
• Environmental Protection Consider the use of
– Awareness about relevant legislation environmentally sustainable
– Oversight of the disposal agents’ practices methods of
destruction/recycling.
• Data protection and security
– Oversight of Data wiping standard
– Oversight over approaches being used by the disposal agent
• Electrical safety Check
– ICT equipments before resale or donation
21. Be Innovative - 50:50 Scheme
Value Employee Recovered
Year 0 100% 25% 25% Employee Financial
Motivation Reward
Year 1 67% 12.5% 37.5%
Year 2 33% 12.5% 50%
Year 3 0% 0% 0%
Operational Environment
• It is Optional Excellence Protection
• Careful Usage Longer Service Life
• Faster Refresh Period
22. Replace Cost by Benefits
Cost Benefits Cost Benefits
“Problems can become opportunities when the right people come together.” Robert South