How do technology adoption trends impact the entire supply chain? What future opportunities are shaping today's raw materials, semiconductors, and displays?
It's a brave new world where "everything technology" is a common denominator for an otherwise uncommon explosion in disruptive innovations, shifting consumer behaviors, and volatile swings in supply and demand that reverberate throughout all technology-consuming markets. As the downstream battle for subscribers intensifies, the upstream battle for the silicon, intellectual property, and raw materials that are increasingly used within automotive, medical, industrial, and other sectors is just as fierce.
While most savvy organizations understand the interconnected nature of the supply chain, many also lack a fundamental understanding of the issues that will impact them most.
Join IHS and Supply & Demand Chain Executive as they share insights into some of the top issues impacting technology, media, and telecommunications value chains. They will raise questions to key issues like the future of pay-TV and how this impacts set-top boxes, software platforms, mobile devices, network operators, and chip production. They will outline the importance of having supply chain intelligence from "subscriber to silicon" by addressing such topics as:
How do technology adoption trends impact the entire supply chain?
How is the consumer having such a major impact on operator strategies and subscribers?
What future opportunities are shaping today's raw materials, semiconductors, and displays?
How are themes like higher resolution, touch, or interface adoption driving the supply chain?
How are pay-TV, smart technology, and other ecosystems disrupting adjacent markets?
Who are the winners and losers and why should you care?
Rapidly changing upstream and downstream events shape today's technology landscape, the effects of which can create immediate winners and losers in the supply chain. Don't miss this chance to learn the importance of understanding the end-to-end dynamics influencing your supply chain.
From a philosophical point of view, everybody loves open source software: you, your wife or girl friend, your father, your mother, grand-father or grand-mother, your children, your boss, your employees, your custormers, your students, your teachers, your cat even your fish, everybody.
Once the first enthusiasm gone (it takes arount 10 minutes for persons and 3 sec. for the fish), a simple question arises : ok, open source is not gratis, however, a consequence of the open redistribution is gratuity, so how are you making a living with open source software ? Is it viable in the long term ?
The conference will present the mechanisms (the "business models") around open source software and especially those for software editors.
Facebook of Things - The importance of End Users within M2M SystemsPeter Decker
Machine-2-machine (M2M) comes with the promise of e.g. 3-5 devices per person and brings back growth opportunities in times of wireless saturation in many countries in Europe, Asia and US.
But the classical M2M systems mainly focus on remote monitoring and control of systems and devices, the access to the M2M system is limited to trained professionals only.
How will M2M change, and how does M2M need to change, when end users become an integral part of the M2M scenarios, as in vehicle telematics, wireless healthcare or retail and automation. The end user interfaces to the system, he might own parts of the M2M system or he has strong dependencies to its successful functioning.
From a philosophical point of view, everybody loves open source software: you, your wife or girl friend, your father, your mother, grand-father or grand-mother, your children, your boss, your employees, your custormers, your students, your teachers, your cat even your fish, everybody.
Once the first enthusiasm gone (it takes arount 10 minutes for persons and 3 sec. for the fish), a simple question arises : ok, open source is not gratis, however, a consequence of the open redistribution is gratuity, so how are you making a living with open source software ? Is it viable in the long term ?
The conference will present the mechanisms (the "business models") around open source software and especially those for software editors.
Facebook of Things - The importance of End Users within M2M SystemsPeter Decker
Machine-2-machine (M2M) comes with the promise of e.g. 3-5 devices per person and brings back growth opportunities in times of wireless saturation in many countries in Europe, Asia and US.
But the classical M2M systems mainly focus on remote monitoring and control of systems and devices, the access to the M2M system is limited to trained professionals only.
How will M2M change, and how does M2M need to change, when end users become an integral part of the M2M scenarios, as in vehicle telematics, wireless healthcare or retail and automation. The end user interfaces to the system, he might own parts of the M2M system or he has strong dependencies to its successful functioning.
Tablets and Smartphones are the key accelerators to mobilize your business. This presentation shows, how you can mobilize your business towards your employees, partners and customers.
I invite you to gain insight into the new XO; who we are, what we do, service delivery, technology innovations, Intelligent WAN, Application Acceleration, VoIP, Hosted PBX, IVR, ICR, BYOD, CDN, OVMP, CaaS, DRaaS, PaaS and SaaS.
Slides from our Lunch n' Learn webinar show how a Cisco Business Edition VOIP phone solution and related collaboration technologies deliver immediate and lasting benefits for companies who are not willing to settle for less than what they need to get the job done. We'll even show you some great financing offers to help make the transition even easier on your budget.
Request link to recording at: http://info.ali-inc.com/UnifiedCommunications_WebinarRegistration.html
Ericsson Labs is a website primarily provided to you as a developer and innovator of new applications where we will provide you early prototypes of new enabling technologies for you to experiment with.
Presentation from Embedded Solutions 2010 entitiled " Unstoppable Wireless Forces".
Karl Wale, Director PLM, Continuous Computing
When: Thursday, June 24
Time: 9:40-10:05 a.m.
Track: Hardware & Systems Solutions
Topic: Unstoppable Wireless Forces – the mobile broadband demand and challenges, what is driving this growth.
Watch the full webinar with audio and video here: http://moto.ly/killthelaptopwebinar
Business users need to stay connected to company systems while on the go, and developers need to create apps that empower their mobile workforce. How can you create apps that meet user needs and company requirements?
Jason Ruger, Senior Director of IT Strategy and Information Security for Motorola Mobility, explains the challenges and solutions for building enterprise mobile apps.
Webinar topics include:
-Mobile app security and misconceptions
-Designing an app that works across multiple platforms
-Testing across multiple Android™ versions
-Deploying enterprise apps and updates
-Learn how to free your clients from their laptops and make them even more productive with your Android apps.
IP's 20 year evolution - adaptation or extinction Design And Reuse
From its infancy 20 years ago, the semiconductor IP industry has evolved into the major driving force of today’s semiconductor landscape. This talk will take a historical view of the changes in the industry over the past twenty years, looking at how the landscape (environment) has changed and how individual companies either adapted or simply went away. What will the IP industry and players in the future look like?
my students use ideas from my class on business models to develop a business model for the LEAP, a new user interface for electronic systems. Users can interact with electronic products by moving their hands and the LEAP system recognizes and interprets the gestures. These slides discuss the value propositions for various customer segments including video games, robotics, and 3D modeling. Also discussed are the methods of value capture and strategic control for the LEAP.
Tablets and Smartphones are the key accelerators to mobilize your business. This presentation shows, how you can mobilize your business towards your employees, partners and customers.
I invite you to gain insight into the new XO; who we are, what we do, service delivery, technology innovations, Intelligent WAN, Application Acceleration, VoIP, Hosted PBX, IVR, ICR, BYOD, CDN, OVMP, CaaS, DRaaS, PaaS and SaaS.
Slides from our Lunch n' Learn webinar show how a Cisco Business Edition VOIP phone solution and related collaboration technologies deliver immediate and lasting benefits for companies who are not willing to settle for less than what they need to get the job done. We'll even show you some great financing offers to help make the transition even easier on your budget.
Request link to recording at: http://info.ali-inc.com/UnifiedCommunications_WebinarRegistration.html
Ericsson Labs is a website primarily provided to you as a developer and innovator of new applications where we will provide you early prototypes of new enabling technologies for you to experiment with.
Presentation from Embedded Solutions 2010 entitiled " Unstoppable Wireless Forces".
Karl Wale, Director PLM, Continuous Computing
When: Thursday, June 24
Time: 9:40-10:05 a.m.
Track: Hardware & Systems Solutions
Topic: Unstoppable Wireless Forces – the mobile broadband demand and challenges, what is driving this growth.
Watch the full webinar with audio and video here: http://moto.ly/killthelaptopwebinar
Business users need to stay connected to company systems while on the go, and developers need to create apps that empower their mobile workforce. How can you create apps that meet user needs and company requirements?
Jason Ruger, Senior Director of IT Strategy and Information Security for Motorola Mobility, explains the challenges and solutions for building enterprise mobile apps.
Webinar topics include:
-Mobile app security and misconceptions
-Designing an app that works across multiple platforms
-Testing across multiple Android™ versions
-Deploying enterprise apps and updates
-Learn how to free your clients from their laptops and make them even more productive with your Android apps.
IP's 20 year evolution - adaptation or extinction Design And Reuse
From its infancy 20 years ago, the semiconductor IP industry has evolved into the major driving force of today’s semiconductor landscape. This talk will take a historical view of the changes in the industry over the past twenty years, looking at how the landscape (environment) has changed and how individual companies either adapted or simply went away. What will the IP industry and players in the future look like?
my students use ideas from my class on business models to develop a business model for the LEAP, a new user interface for electronic systems. Users can interact with electronic products by moving their hands and the LEAP system recognizes and interprets the gestures. These slides discuss the value propositions for various customer segments including video games, robotics, and 3D modeling. Also discussed are the methods of value capture and strategic control for the LEAP.
•Microtracking lets you scan barcodes and RFID tags with your mobile phone.
•Then track items and assets on your phone or web browser.
•It is entirely standards compliant and integrates with existing Barcode, QR Codes, RFID, SCM and ERP systems.
•It is already in use in large and small projects throughout Europe.
Presentation given by Mitch Lieberman, VP of Market Strategy for Sword Ciboodle, and Chae An, VP of Industry Solutions for FSS for IBM.
Date: Friday 15th June
Location: Beyond the Ivy Rooftop, Wrigleyville
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Radisys Corporation
ETSI Workshop – RCS VoLTE and Beyond
Kranj, Slovenia
October 11, 2012
Adnan Saleem discusses the advantages of moving to VoLTE/RCS for mixed mobile operators – and addresses the key challenges along the way.
<p>
[데브멘토 동영상] Meego for Intel Atom Processor and AppUp Center 1부(총2부)</p>
<p>
이진용 Intel Korea 차장(Application Engineer)</p>
<p>
전LG전자 소프트웨어센터 책임연구원</p>
<p>
전PalmPalm Technology 신임연구원</p>
<p>
전Nexen 선임연구원</p>
<p>
중앙대학교 컴퓨터공학과 대학원 분산 및 운영체제 전공</p>
Similar to From Subscriber to Silicon: Why end-to-end technology value chain insight is critical to your supply chain survival (20)
IHS Material Price Outlook: A 2014 Buyer’s GuideIHS
Where are prices headed? How can I reach cost savings targets amidst volatile commodity markets?
The cost of raw material is hitting the bottom line of organizations across all industries around the world pushing the price of material inputs to one of the top five global business risks in the Lloyd’s Risk Index, climbing three spots since 2011.
Amidst today’s global economic uncertainty and volatile commodity markets, organizations are increasingly focused on finding ways to reduce material costs. Having an effective procurement strategy that drives Operational Excellence is critical to reaching cost savings targets.
During budget planning, using last year’s escalation rate can be a mistake in volatile markets, and broad measures like the CPI fail to capture the individual components that make up the category spend. Join this 1-hour webcast to obtain price forecasts and cost insight directly from leading economists and industry analysts to derive your 2014 purchasing strategy, minimize material costs and achieve a competitive advantage.
Gain answers to questions, including:
-Steel: Are low prices the double-edged sword that threaten your supply chain?
-Energy and Chemicals: When will chemicals and plastics buyers see benefits from advantaged natural gas costs in the United States?
-Nonferrous metals: What is the two-year pricing outlook?
Global Construction Outlook: Wage Growth, Labor Shortages and Implications IHS
According to a 2012 industry survey, 34 percent of employers reported difficulty filling jobs, up from 30 percent of employers in 2009. In addition, many countries are experiencing double-digit wage growth, resulting in cost overruns, project delays, and cancellations.
Understanding the drivers of wage growth can allow cost estimators to identify potential skills shortages and plan accordingly. Join this 1-hour webcast where IHS Economists will analyze the current labor market and provide insights to help you understand current and future pressures.
The presentation will answer questions, including:
- What are the primary drivers of wage growth?
- What does the future hold for these wage drivers?
- Which regions will experience the greatest inflation rates?
- What industries will experience the most CAPEX growth?
- Where can you expect strong wage growth?
- What is the global labor cost outlook?
A recording of this presentation can be viewed here: http://www.slideshare.net/ihs_supplychain/ihs-webcast-global-construction-outlook-wage-growth-labor-shortages-and-implications
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingIHS
Supply Chain Risk Insight into Market Sense and Respond Actions of Counterfeiters
Rory King
Global Director, Supply Chain, IHS Inc.
Counterfeit parts have proliferated dramatically in recent years, presenting huge challenges for electronics manufacturing and specifically military and aerospace application. This session will offer unique new market trends, observations, and best practices on the issue of economics, semiconductor value chains, obsolescence, counterfeit electronics, and market impacts such as fact-based insight into market indicators like correlation among counterfeits, semiconductor factory utilization, component obsolescence, semiconductor availability, price volatility, and supply-and-demand equilibrium.
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...IHS
Supply chain disruptions are occurring at an alarming rate. An unrelenting barrage of man-made risk and natural disasters has made a profound and highly-visible impact on many global operations. Despite immediate attention on short term recovery, companies affected experience sustained, long-term impacts to share price, shareholder value, and operating performance.
Companies can no longer afford to be unprepared for the inevitability of disruption. As simple players within large, globally-integrated supply chains, they must become resilient to the volatile factors threatening sustained performance. And, resilience will only be achieved when companies master the ability to sense and respond to changes -- before they occur.
Join this 1-hour webcast where IHS experts will discuss supply chain risk and outline the importance of becoming resilient:
Who is at risk from supply chain disruption?
What does it mean to be resilient?
Where do traditional approaches to risk fail?
Why are leaders re-tooling their super-lean supply chains?
How can your organization sense and respond to change?
A recording of this presentation can be viewed here: http://www.slideshare.net/ihs_supplychain/resilient-supply-chains-how-to-dynamically-manage-risk-opportunity-and-business-continuity-25924392
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...IHS
Do you know the drivers of commodity volatility? Do you know the impact of conflict minerals regulations on supply and demand?
Commodity volatility and materials risk have plagued buyers in recent years, and today’s volatility is felt throughout the supply chain to a greater degree and at a greater speed than in previous decades.
oin IHS for this 1-hour webcast where experts will discuss quantifying supply chain risk with specific focus on commodity risk, country risk, and compliance risk. They will outline the importance of having supply chain intelligence to address topics including:
- Quantification of risk: understanding the interaction between concentration of production and political instability
- Comparing commodities: evaluation of different commodities to identify the relationship between inputs, high risk, and volatility of price
- Regulatory risk: current impact of conflict minerals regulations on material pricing and availability
A recording of this presentation can be viewed here: http://www.slideshare.net/ihs_supplychain/quantifying-sourcing-risk-building-commodity-risk-ratings-to-mitigate-geopolitical-uncertainty-commodity-volatility-and-conflict-minerals-risk-26064687
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...IHS
Suppliers are always quick to point to higher input costs, but when was the last time a supplier awarded you with lower prices?
When negotiating price, there’s no better position you can be in than one of an informed buyer with a complete understanding of your suppliers cost structures. Join IHS for this 1-hour webcast, to obtain best practices for improving your negotiating position with suppliers. We will highlight key commodities which have seen falling prices in the past six months, and look at ways to highlight these declines with your suppliers. Learn how to take advantage of falling prices in key cost components to improve your negotiating position.
A recording of this presentation can be viewed here: http://www.slideshare.net/ihs_supplychain/improve-your-negotiating-position-achieve-cost-savings-with-supplier-cost-insight-improve-contract-negotiations
For years, labor rates have been the primary advantage Chinese manufacturers have benefited from, however, wage rates in China are growing at an accelerated rate, with some reports indicating they will surpass rates in Mexico and other developing countries very soon.
What does this mean for your supply chain? Should you be concerned?
A recording of this presentation can be viewed here: http://www.slideshare.net/ihs_supplychain/when-will-china-lose-its-lowcost-edge
Commodities Through 2013: Buying Opportunities, or Buyer Beware? IHS
As the reigning global economic uncertainty continues, companies are busy setting their budgets and planning for 2013. It is critical to know what you’ll pay for key commodities, raw materials and other cost inputs and how the reining global demand and supply balances will impact prices. The IHS Pricing and Purchasing service supports our clients by providing key buying insights and market advice for more effective planning and procurement decisions. In these volatile times, ensure you know the whole picture to eliminate risks and identify opportunities. Ensure your company has the power of perspective that IHS brings to our clients each and every day.
View recording here: http://www.slideshare.net/ihs_supplychain/commodities-through-2013-buying-opportunity-or-buyer-beware
Counterfeit electronics pose serious economic, national security, and safety threats, while reports of counterfeits have soared dramatically in recent years. This presents huge challenges for electronics manufacturing at a time when the United States has created strict new regulations for the detection and avoidance of counterfeit electronic parts.
In the National Defense Authorization Act (NDAA) for Fiscal 2012, the U.S. now requires that members at all tiers of its global defense supply chain put in place systems and processes to address counterfeits. It’s not exclusively a U.S. concern. The regulation and its mandatory flow down requirements will impact international companies participating in global defense and electronics value chains.
If matters couldn’t be more challenging, the semiconductor industry’s infamous silicone cycle is forecasted to enter into growth period in 2012 characterized by extended lead times, higher prices, and potential shortages – a vulnerable situation for counterfeiting to take off.
Join Supply & Demand Chain Executive as they host experts from IHS and ERAI who will share trends, insight, and information on new defense regulations, counterfeit electronics, and the semiconductor industry. They will discuss what you need to know about counterfeits, regulations, and risk in 2012.
- What are U.S. regulations for the detection and avoidance of counterfeit electronic parts?
- What tools, processes, and insight can be used to comply with regulations and avoid risk?
- What is the relationship between semiconductor industry trends and counterfeiting?
- Could industry price and availability metrics foretell pending counterfeit activity?
What products will have the greatest risk in the near future?
Serious cost, risk, and regulations threaten to transcend fragile supply chains already strained by natural disasters, Geo-political turmoil, and economic instability. Don't miss this chance to learn how to combat electronics price and counterfeit risk while helping comply with regulations. Join now.
Rick PiersonRick Pierson - Senior Analyst, Semiconductors/CPT, IHS iSuppli
Rick carries with him 21 years of combined experience in the semiconductor industry with an extensive background in semiconductor product manufacturing. Leading IHS iSuppli’s Component Price Tracking (CPT) Service, Rick is responsible for leading, creating and delivering research and analysis on the electronics components market. Rick delivers business analysis and actionable advice to the suppliers and buyers of electronic components used across the electronics value chain.
Rick PiersonKristal Snider - Vice President, ERAI, Inc.
With almost two decades of experience, Kristal Snider has developed a keen understanding of the problems affecting the global electronics supply chain. Kristal is responsible for mana
How much do you really know about your suppliers? How could your supply chain be impacted by a natural disaster, another recession, or limited inventories?
Global supply chains have been brought to their knees in recent years as the result of host of massively disruptive events including devastating natural disasters, economic crisis, turbulent commodity prices, product recalls, and other unforeseen disruptions. These catastrophic events including Hurricane Irene, the eruption of the Eyjafjallajokull volcano in Iceland, the Japan earthquake and tsunami, and the most recent Thailand flooding have put many suppliers out of business, leaving manufacturers stranded and production lines halted.
Executives are becoming increasingly aware of the risks of doing business on a global scale and are experiencing first-hand the havoc these supply chain disruptions pose to their bottom lines, brand reputation, and stock value.
Join Supply & Demand Chain Executive and IHS as they share expertise, tools, and best practices in supply chain risk mitigation, and supplier risk scoring. Speakers will discuss why managing risk in the supply chain needs to be a multidimensional approach taking into account:
Materials risk, knowing where volatile raw material prices are headed
Electronic Parts risk, ensuring the sustainability and authenticity of the components within your supply chain
Supplier risk, understanding what potential obstacles your suppliers might face
Global supply chains need this critical information now more than ever. Don't miss this chance to hear industry experts share actionable advice on leading tools and best practices for supplier risk management.
Tools and Techniques to Effectively Manage EHS Regulatory ComplianceIHS
Join regulatory experts from IHS and Citation Technologies as they discuss the complexity of the global EHS regulatory environment and offer very simple and straightforward advice to help companies eliminate cost and risk associated with ever-changing environmental, occupational health, physical facility security and safety regulations.
Original event date: 12-16-10
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...IHS
Join IHS and GreenBiz Group on this live webcast as they unveil the results of an exclusive survey that gauged awareness, sentiment, concern, and preparedness of the supply chain in response to conflict minerals traceability and accountability. They will share findings from the study and share practitioner insight.
Original event date: 1-20-11
Environmental Compliance, Risk and Product StewardshipIHS
Join regulatory expert representatives of the industry-recognized EIATRACK service on this one-hour briefing where speakers will share best practices in product stewardship as well as provide an update on key legal developments expected in 2011.
Original event date: 3-30-11
Avoiding Counterfeit Risk: How to mitigate part and supplier risk IHS
Just one counterfeit incident poses risk ranging from catastrophic brand damage to costly halts in production or unnecessary design and development. Your supply chain is under assault and may already be infiltrated.
It's time to act. Join Supply & Demand Chain Executive magazine as they host experts from ERAI and IHS and L-3 Communications who will share best practices, tools, and technique for mitigating electronics value chain risks.
Original event date: 2-23-11
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
4. From Subscriber to Silicon
Why End-to-End Technology Value Chain Insight
is Critical to Your Supply Chain Survival
Research Director, Digital Media
408 654 1707
10. From Subscriber to Silicon
Why End-to-End Technology Value Chain
Insight is Critical to Your Supply Chain Survival
Research Director, Digital Media
408 654 1707