Netrac is a fault management solution that helps communication service providers manage complex, multi-vendor networks. It collects data from various sources, correlates issues, and provides interactive tools to monitor, analyze, and resolve problems. Netrac's automated processes can identify root causes faster to reduce repair times and improve customer experience. It offers scalable and flexible architecture to support large networks as they grow.
Top 10 Network Operation Center Best Practices
In this free ebook you'll find tips
and best practices related to:
5 Essential tools NOC must have:
1. How to develop and maintain team knowledge and skills
2. Training new NOC Team
3. Improving communication and collaboration within and outside the NOC
4. Escalating, prioritizing, and handling problems
This document provides an overview of security operations centers (SOCs) including their evolution, how they work with security information and event management (SIEM) systems, and key aspects of running an effective SOC. It discusses how SOCs have developed from manual incident response to more automated workflows using SIEM systems. The document outlines typical SOC roles and responsibilities, components of an SOC workflow including detecting anomalies, generating alerts, and incident response. It emphasizes the importance of continual process improvement through gathering feedback, tuning systems, and refining processes.
Building a World-Class Proactive Integrated Security and Network Ops CenterPriyanka Aash
The SNOC (Security & Network Operations Center) is a cost-effective, world-class, proactive integrated function that leverages and optimizes your current NOC members while hiring a minimal number of additional security professionals. Learn how to use the SNOC framework to transform your existing NOC into a single effective team that is responsible for both network and security functions.
(Source: RSA USA 2016-San Francisco)
Network Operation Centre Highlights and Practices
In complex networks, the telecom operators and IT organizations can consider the report for high level planning and operations
The document discusses a Network Operations Center (NOC). A NOC monitors and manages an organization's entire network infrastructure, including servers, switches, routers and other devices. It aims to ensure optimal network performance, availability and security through around-the-clock monitoring by a team of network engineers and security experts.
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
Top 10 tips for effective SOC/NOC collaboration or integration. In 5 years the security operation center and IT operation center will integrate and bring more context to security events and help to search, store, and analyze machine data for operational intelligence
The document outlines the key tools, processes, and operations used to efficiently run a Network Operations Center (NOC). It discusses (1) tools like ticketing systems, knowledge bases, monitoring, and automation that help manage incidents and tasks. It also discusses (2) important processes like escalation, prioritization, incident handling, change management, and maintenance. Finally, it provides examples of (3) daily operational processes for fault notification, resolution, client provisioning and decommissioning, and datacenter access control. The goal is to deliver proper service, meet business goals, and optimize NOC management through best practices and appropriate resources.
Netrac is a fault management solution that helps communication service providers manage complex, multi-vendor networks. It collects data from various sources, correlates issues, and provides interactive tools to monitor, analyze, and resolve problems. Netrac's automated processes can identify root causes faster to reduce repair times and improve customer experience. It offers scalable and flexible architecture to support large networks as they grow.
Top 10 Network Operation Center Best Practices
In this free ebook you'll find tips
and best practices related to:
5 Essential tools NOC must have:
1. How to develop and maintain team knowledge and skills
2. Training new NOC Team
3. Improving communication and collaboration within and outside the NOC
4. Escalating, prioritizing, and handling problems
This document provides an overview of security operations centers (SOCs) including their evolution, how they work with security information and event management (SIEM) systems, and key aspects of running an effective SOC. It discusses how SOCs have developed from manual incident response to more automated workflows using SIEM systems. The document outlines typical SOC roles and responsibilities, components of an SOC workflow including detecting anomalies, generating alerts, and incident response. It emphasizes the importance of continual process improvement through gathering feedback, tuning systems, and refining processes.
Building a World-Class Proactive Integrated Security and Network Ops CenterPriyanka Aash
The SNOC (Security & Network Operations Center) is a cost-effective, world-class, proactive integrated function that leverages and optimizes your current NOC members while hiring a minimal number of additional security professionals. Learn how to use the SNOC framework to transform your existing NOC into a single effective team that is responsible for both network and security functions.
(Source: RSA USA 2016-San Francisco)
Network Operation Centre Highlights and Practices
In complex networks, the telecom operators and IT organizations can consider the report for high level planning and operations
The document discusses a Network Operations Center (NOC). A NOC monitors and manages an organization's entire network infrastructure, including servers, switches, routers and other devices. It aims to ensure optimal network performance, availability and security through around-the-clock monitoring by a team of network engineers and security experts.
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
Top 10 tips for effective SOC/NOC collaboration or integration. In 5 years the security operation center and IT operation center will integrate and bring more context to security events and help to search, store, and analyze machine data for operational intelligence
The document outlines the key tools, processes, and operations used to efficiently run a Network Operations Center (NOC). It discusses (1) tools like ticketing systems, knowledge bases, monitoring, and automation that help manage incidents and tasks. It also discusses (2) important processes like escalation, prioritization, incident handling, change management, and maintenance. Finally, it provides examples of (3) daily operational processes for fault notification, resolution, client provisioning and decommissioning, and datacenter access control. The goal is to deliver proper service, meet business goals, and optimize NOC management through best practices and appropriate resources.
Read our latest issue "Horizons 2013" featuring GBM's latest news, achievements, events and partnerships. Our special bonus "In the Media"sections allows you to view at a glance what our executives had to say on the hottest IT trends.
GBM helped Bahrain Internet Exchange (BIX) build a national broadband network using Cisco IPoDWDM technology. This enhanced Bahrain's telecom infrastructure by providing high bandwidth connectivity over IP/MPLS. It allowed BIX to reduce costs and increase internet bandwidth and reliability. The network management solutions deployed enabled BIX to achieve its strategic goals and deliver improved e-services across Bahrain. BIX's executive director praised GBM's support in helping BIX achieve its objectives for the national broadband initiative.
Gulf Business Machines (GBM), the region’s leading Systmes Integrators, offer an advanced technology portfolio of complete intelligent network solutions and a wealth of expertise for your intelligent business network needs.
The 2011 newsletter from GBM highlights:
1) GBM was named System Integrator of the year and will develop healthcare infrastructure for Bahrain's King Hamad University Hospital.
2) GBM launched the first educational cloud computing platform in Abu Dhabi and provides hardware solutions for Oman Cement Company.
3) The CEO discusses how GBM has adapted to changes in technology and customer needs, such as launching the first network operations center in the Middle East and increasing server consolidation projects.
The document profiles Gulf Business Machines (GBM), the leading IT solutions provider in the GCC region. It discusses GBM's six business units: Systems Group, Software Group, Integrated Networking & Site Services, Integrated Technology Services, Professional Services, and Learning Services. GBM was established in 1990 as an IBM spin-off and is the sole distributor of IBM products and services in the GCC. It has over 1,000 employees providing IT solutions to over 2,000 customers across multiple industries in the GCC.
GBM is the leading IT solutions provider in the GCC, founded in 1990 as a spin-off from IBM. It is the sole distributor for IBM in the GCC (excluding Saudi Arabia) and holds the highest level of recognition from Cisco as a Gold Partner. With over 1000 employees across offices in multiple GCC countries and Pakistan, GBM offers a range of IT infrastructure, solutions, and services. Its Systems Group provides industry-leading IBM systems to help clients build dynamic infrastructures and transform IT assets into valued services.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Read our latest issue "Horizons 2013" featuring GBM's latest news, achievements, events and partnerships. Our special bonus "In the Media"sections allows you to view at a glance what our executives had to say on the hottest IT trends.
GBM helped Bahrain Internet Exchange (BIX) build a national broadband network using Cisco IPoDWDM technology. This enhanced Bahrain's telecom infrastructure by providing high bandwidth connectivity over IP/MPLS. It allowed BIX to reduce costs and increase internet bandwidth and reliability. The network management solutions deployed enabled BIX to achieve its strategic goals and deliver improved e-services across Bahrain. BIX's executive director praised GBM's support in helping BIX achieve its objectives for the national broadband initiative.
Gulf Business Machines (GBM), the region’s leading Systmes Integrators, offer an advanced technology portfolio of complete intelligent network solutions and a wealth of expertise for your intelligent business network needs.
The 2011 newsletter from GBM highlights:
1) GBM was named System Integrator of the year and will develop healthcare infrastructure for Bahrain's King Hamad University Hospital.
2) GBM launched the first educational cloud computing platform in Abu Dhabi and provides hardware solutions for Oman Cement Company.
3) The CEO discusses how GBM has adapted to changes in technology and customer needs, such as launching the first network operations center in the Middle East and increasing server consolidation projects.
The document profiles Gulf Business Machines (GBM), the leading IT solutions provider in the GCC region. It discusses GBM's six business units: Systems Group, Software Group, Integrated Networking & Site Services, Integrated Technology Services, Professional Services, and Learning Services. GBM was established in 1990 as an IBM spin-off and is the sole distributor of IBM products and services in the GCC. It has over 1,000 employees providing IT solutions to over 2,000 customers across multiple industries in the GCC.
GBM is the leading IT solutions provider in the GCC, founded in 1990 as a spin-off from IBM. It is the sole distributor for IBM in the GCC (excluding Saudi Arabia) and holds the highest level of recognition from Cisco as a Gold Partner. With over 1000 employees across offices in multiple GCC countries and Pakistan, GBM offers a range of IT infrastructure, solutions, and services. Its Systems Group provides industry-leading IBM systems to help clients build dynamic infrastructures and transform IT assets into valued services.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.