Understand what Governance Is
We start with a definition of governance, its constituent parts, and their purpose
Identify Core Taxonomy Governance Processes
There are certain functions that any governance effort must perform . We show how these apply to taxonomy governance, and why
Identify Standard Processes and Tools
Business and supporting IT organizations already perform tasks that are in many ways similar to those needed for successful taxonomy governance. To minimize new investment in tools and training, it makes sense to use these where possible
Tricks of the Trade
We’ll show some of the detailed considerations that are important when setting up a taxonomy governance effort, and how we’ve handled them
Context
We’ll discuss how taxonomy governance fits in the broader operational context of an organization: specifically, how it connects with an IT organization and with business stakeholders
Best practices, lessons learned, and examples for taxonomy governance and iteration. Developed by Enterprise Knowledge and originally presented for the Knowledge Management Institute.
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...Element22
DCAM stands for Data management Capability Assessment Model. DCAM is a model to assess data management capabilities within the financial industry. It was created by the EDM Council in collaboration with over 100 financial institutions. This presentation provides an overview of DCAM and how financial institutions leverage DCAM to improve or establish their data management programs and meet regulatory requirements such as BCBS 239. Also the benefits of DCAM are described as part of this presentation.
Introduction to DCAM, the Data Management Capability Assessment ModelElement22
DCAM is a model to assess data management capability within the financial industry. It was created by the EDM Council. This presentation provides an overview of DCAM and how financial institutions leverage DCAM to improve or establish their data management programs and meet regulatory requirements such as BCBS 239.
New Analytic Uses of Master Data Management in the EnterpriseDATAVERSITY
Companies all over the world are going through digital transformation now, which in many cases is all about maturing the data environment and the use of data. Master data is key to this effort. All transformative projects require master data and usually many subject areas.
What could you accomplish if cultivating master data didn’t have to be part of every project and could be accessed as a service?
We’ll look at creative enterprise use cases of Master Data Management in the enterprise. We’ll see what some MDM vendors are doing with AI and how the future of MDM will be shaped by looking at some specific MDM actions influenced by AI.
Best practices, lessons learned, and examples for taxonomy governance and iteration. Developed by Enterprise Knowledge and originally presented for the Knowledge Management Institute.
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...Element22
DCAM stands for Data management Capability Assessment Model. DCAM is a model to assess data management capabilities within the financial industry. It was created by the EDM Council in collaboration with over 100 financial institutions. This presentation provides an overview of DCAM and how financial institutions leverage DCAM to improve or establish their data management programs and meet regulatory requirements such as BCBS 239. Also the benefits of DCAM are described as part of this presentation.
Introduction to DCAM, the Data Management Capability Assessment ModelElement22
DCAM is a model to assess data management capability within the financial industry. It was created by the EDM Council. This presentation provides an overview of DCAM and how financial institutions leverage DCAM to improve or establish their data management programs and meet regulatory requirements such as BCBS 239.
New Analytic Uses of Master Data Management in the EnterpriseDATAVERSITY
Companies all over the world are going through digital transformation now, which in many cases is all about maturing the data environment and the use of data. Master data is key to this effort. All transformative projects require master data and usually many subject areas.
What could you accomplish if cultivating master data didn’t have to be part of every project and could be accessed as a service?
We’ll look at creative enterprise use cases of Master Data Management in the enterprise. We’ll see what some MDM vendors are doing with AI and how the future of MDM will be shaped by looking at some specific MDM actions influenced by AI.
Introduction to Enterprise Architecture Leo Shuster
If you ever wanted to find out what Enterprise Architecture was, this is the presentation for you. It gives you a basic understanding of Enterprise Architecture, its goals, objectives, and benefits.
How to tackle the complex problem of merging two or more Salesforce.com instances. The challenges and benefits of a single org. Establishing the right project team. Systems review, data considerations, migration strategy, migration tools. When to use the data loader, metadata API. How to handle duplicate records. Post go-live clean up.
Financial Services - New Approach to Data Management in the Digital Eraaccenture
How current is your data management strategy? As technology—and the requirements and business drivers around it—changes, financial services firms will need to change their approach to data management. To guide your approach, see the three building blocks to Accenture’s data management framework covered in this presentation.
Gathering And Documenting Your Bi Business RequirementsWynyard Group
Business requirements are critical to any project. Recent studies show that 70% of organisations fail to gather business requirements well. What is worse is that poor requirements can lead a project to over spend its original budget by 95%.
Business Intelligence and Performance Management projects are no different. This session will provide a series of tips, techniques and ideas on how you can discover, analyse, understand and document your business requirements for your BI and PM projects. This session will also touch on specific issues, hurdles and obstacle that occur for a typical BI or PM project
• The importance of business requirements and a well defined business requirements process
• Understanding the difference between a “wish-list” or vision and business requirements
• The need and benefits of having a business traceability matrix
Start your BI projects on the right foot – understand your requirements
VILT - Archiving and Decommissioning with OpenText InfoArchiveVILT
OpenText InfoArchive is an application-agnostic solution, for managing information and archiving, supporting different enterprise needs of information ingestion, for all kinds of applications.
It allows for the application management cost reduction, an information governance enhancement while adding value to the business process through information re-utilization.
It provides four information ingestion methods, in order to cover the most demanding requirements on all concurrent projects, while optimizing the information source application.
With OpenText InfoArchive there is no need to go for a single approach for all archiving and decommissioning needs.
Difference Between TOGAF 9 and TOGAF 10Ashish Tandon
Dont't know the Difference Between TOGAF 9 and TOGAF 10? Dont't worry this Presentation tells you the Difference Between TOGAF 9 and TOGAF 10 by Mr. Ashish Tandon, it clarifies the difference between TOGAF 9 and TOGAF 10 in detail. To know more go through this PDF.
Do-It-Yourself (DIY) Data Governance FrameworkDATAVERSITY
A worthwhile Data Governance framework includes the core component of a successful program as viewed by the different levels of the organization. Each of the components is addressed at each of the levels, providing insight into key ideas and terminology used to attract participation across the organization. A framework plays a key role in setting up and sustaining a Data Governance program.
In this RWDG webinar, Bob Seiner will share two frameworks. The first is a basic cross-reference of components and levels, while the second can be used to compare and contrast different approaches to implementing Data Governance. When this webinar is finished, you will be able to customize the frameworks to outline the most appropriate manner for you to improve your likelihood of DG success.
In this webinar, Bob will discuss and share:
- Customizing a framework to match organizational requirements
- The core components and levels of an industry framework
- How to complete a Data Governance framework
- Using the framework to enable DG program success
- Measuring value through the DIY DG framework
Simplified application management framework created taking information from PMBOK, ITIL, COBIT5, CMMI, ASL and Microsoft compliance. This aims at putting the first steps in place to be able to understand and manage an applications life cycle.
The project was undertaken to try and identify how to reduce risk associated with the applications that the department create, implement and manage. It dovetailed into an audit of the applications that the department use and have implemented in the past 5 years.
The data governance function exercises authority and control over the management of your mission critical assets and guides how all other data management functions are performed. When selling data governance to organizational management, it is useful to concentrate on the specifics that motivate the initiative. This means developing a specific vocabulary and set of narratives to facilitate understanding of your organizational business concepts. This webinar provides you with an understanding of what data governance functions are required and how they fit with other data management disciplines. Understanding these aspects is a necessary pre-requisite to eliminate the ambiguity that often surrounds initial discussions and implement effective data governance and stewardship programs that manage data in support of organizational strategy.
Find more of our Data-Ed webinars here: http://www.datablueprint.com/resource-center/webinar-schedule/
Data-Ed Webinar: Data Governance StrategiesDATAVERSITY
The data governance function exercises authority and control over the management of your mission critical assets and guides how all other data management functions are performed. When selling data governance to organizational management, it is useful to concentrate on the specifics that motivate the initiative. This means developing a specific vocabulary and set of narratives to facilitate understanding of your organizational business concepts. This webinar provides you with an understanding of what data governance functions are required and how they fit with other data management disciplines. Understanding these aspects is a necessary pre-requisite to eliminate the ambiguity that often surrounds initial discussions and implement effective data governance and stewardship programs that manage data in support of organizational strategy.
Takeaways:
Understanding why data governance can be tricky for most organizations
Steps for improving data governance within your organization
Guiding principles & lessons learned
Understanding foundational data governance concepts based on the DAMA DMBOK
A Comprehensive Approach to Application Portfolio RationalizationCognizant
A comprehensive approach to application portfolio rationalization will enable organizations to maximize the business value of their applications and focus on strategic opportunities.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Reference matter data management:
Two categories of structured data :
Master data: is data associated with core business entities such as customer, product, asset, etc.
Transaction data: is the recording of business transactions such as orders in manufacturing, loan and credit card payments in banking, and product sales in retail.
Reference data: is any kind of data that is used solely to categorize other data found in a database, or solely for relating data in a database to information beyond the boundaries of the enterprise .
DAMA Australia: How to Choose a Data Management ToolPrecisely
The explosion of data types, sources, and use cases makes it difficult to make the right decisions around the best data management tools for your organisation. Why do you need them? Who is going to use them? What is their value?
Watch this webinar on-demand to learn how to demystify the decision making process for the selection of Data Management Tools that support:
· Data governance
· Data quality
· Data modelling
· Master data management
· Database development
· And more
The Road to Modernization: From EBS to Oracle ERP CloudPerficient, Inc.
Midcoast Energy, LLC had antiquated and complex business processes that could not scale to meet its needs. Facing an expensive ERP implementation, the company decided a cloud-based platform would provide a strategic advantage.
Midcoast Energy, LLC implemented Oracle Cloud for Financials, Project Portfolio Management, and Procurement, and partnered with Perficient to deliver the implementation in a six-month timeframe.
During our webinar, Midcoast Energy, LLC’s Archana Shah, director enterprise systems, and Harish Gulati, manager of ERP systems, discussed the company’s migration to Oracle ERP Cloud, including lessons learned and how Oracle Cloud could benefit your organization as well.
Our webinar covered:
-Challenges with the legacy business processes
-Why Midcoast Energy, LLC chose Oracle Cloud
-Benefits realized
Enterprise Data World Webinars: Information Management PrinciplesDATAVERSITY
Information principles are the foundation of data governance and information management. Most shops start by copying a list from somewhere else. This is a good start, but rarely “closes the deal” when it comes to getting the principles accepted. This webinar will preview the upcoming talk at Enterprise Data World 2014 Conference & Expo.
We will cover an essential list of Generally Accepted Information Principles™ and review some simple steps towards creating your own principles.
DITA, Semantics, Content Management, Dynamic Documents, and Linked Data – A M...Paul Wlodarczyk
DITA was conceived as a model for improving reuse through topic-oriented modularization of content. Instead of creating new content or copying and pasting information which may or may not be current and authoritative, organizations manage a repository of content assets – or DITA topics – that can be centrally managed, maintained and reused across the enterprise. This helps to accelerate the creation and maintenance of documents and other deliverables and to ensure the quality and consistency of the content organizations publish. But the next frontier of DITA adoption is leveraging semantic technologies—taxonomies, ontologies and text analytics—to automate the delivery of targeted content. For example, a service incident from a customer is automatically matched with the appropriate response, which is authored and managed as a DITA topic. Learn how organizations can leverage DITA, semantics, content management, dynamic documents, and linked data to fully utilize the value of their information.
Introduction to Enterprise Architecture Leo Shuster
If you ever wanted to find out what Enterprise Architecture was, this is the presentation for you. It gives you a basic understanding of Enterprise Architecture, its goals, objectives, and benefits.
How to tackle the complex problem of merging two or more Salesforce.com instances. The challenges and benefits of a single org. Establishing the right project team. Systems review, data considerations, migration strategy, migration tools. When to use the data loader, metadata API. How to handle duplicate records. Post go-live clean up.
Financial Services - New Approach to Data Management in the Digital Eraaccenture
How current is your data management strategy? As technology—and the requirements and business drivers around it—changes, financial services firms will need to change their approach to data management. To guide your approach, see the three building blocks to Accenture’s data management framework covered in this presentation.
Gathering And Documenting Your Bi Business RequirementsWynyard Group
Business requirements are critical to any project. Recent studies show that 70% of organisations fail to gather business requirements well. What is worse is that poor requirements can lead a project to over spend its original budget by 95%.
Business Intelligence and Performance Management projects are no different. This session will provide a series of tips, techniques and ideas on how you can discover, analyse, understand and document your business requirements for your BI and PM projects. This session will also touch on specific issues, hurdles and obstacle that occur for a typical BI or PM project
• The importance of business requirements and a well defined business requirements process
• Understanding the difference between a “wish-list” or vision and business requirements
• The need and benefits of having a business traceability matrix
Start your BI projects on the right foot – understand your requirements
VILT - Archiving and Decommissioning with OpenText InfoArchiveVILT
OpenText InfoArchive is an application-agnostic solution, for managing information and archiving, supporting different enterprise needs of information ingestion, for all kinds of applications.
It allows for the application management cost reduction, an information governance enhancement while adding value to the business process through information re-utilization.
It provides four information ingestion methods, in order to cover the most demanding requirements on all concurrent projects, while optimizing the information source application.
With OpenText InfoArchive there is no need to go for a single approach for all archiving and decommissioning needs.
Difference Between TOGAF 9 and TOGAF 10Ashish Tandon
Dont't know the Difference Between TOGAF 9 and TOGAF 10? Dont't worry this Presentation tells you the Difference Between TOGAF 9 and TOGAF 10 by Mr. Ashish Tandon, it clarifies the difference between TOGAF 9 and TOGAF 10 in detail. To know more go through this PDF.
Do-It-Yourself (DIY) Data Governance FrameworkDATAVERSITY
A worthwhile Data Governance framework includes the core component of a successful program as viewed by the different levels of the organization. Each of the components is addressed at each of the levels, providing insight into key ideas and terminology used to attract participation across the organization. A framework plays a key role in setting up and sustaining a Data Governance program.
In this RWDG webinar, Bob Seiner will share two frameworks. The first is a basic cross-reference of components and levels, while the second can be used to compare and contrast different approaches to implementing Data Governance. When this webinar is finished, you will be able to customize the frameworks to outline the most appropriate manner for you to improve your likelihood of DG success.
In this webinar, Bob will discuss and share:
- Customizing a framework to match organizational requirements
- The core components and levels of an industry framework
- How to complete a Data Governance framework
- Using the framework to enable DG program success
- Measuring value through the DIY DG framework
Simplified application management framework created taking information from PMBOK, ITIL, COBIT5, CMMI, ASL and Microsoft compliance. This aims at putting the first steps in place to be able to understand and manage an applications life cycle.
The project was undertaken to try and identify how to reduce risk associated with the applications that the department create, implement and manage. It dovetailed into an audit of the applications that the department use and have implemented in the past 5 years.
The data governance function exercises authority and control over the management of your mission critical assets and guides how all other data management functions are performed. When selling data governance to organizational management, it is useful to concentrate on the specifics that motivate the initiative. This means developing a specific vocabulary and set of narratives to facilitate understanding of your organizational business concepts. This webinar provides you with an understanding of what data governance functions are required and how they fit with other data management disciplines. Understanding these aspects is a necessary pre-requisite to eliminate the ambiguity that often surrounds initial discussions and implement effective data governance and stewardship programs that manage data in support of organizational strategy.
Find more of our Data-Ed webinars here: http://www.datablueprint.com/resource-center/webinar-schedule/
Data-Ed Webinar: Data Governance StrategiesDATAVERSITY
The data governance function exercises authority and control over the management of your mission critical assets and guides how all other data management functions are performed. When selling data governance to organizational management, it is useful to concentrate on the specifics that motivate the initiative. This means developing a specific vocabulary and set of narratives to facilitate understanding of your organizational business concepts. This webinar provides you with an understanding of what data governance functions are required and how they fit with other data management disciplines. Understanding these aspects is a necessary pre-requisite to eliminate the ambiguity that often surrounds initial discussions and implement effective data governance and stewardship programs that manage data in support of organizational strategy.
Takeaways:
Understanding why data governance can be tricky for most organizations
Steps for improving data governance within your organization
Guiding principles & lessons learned
Understanding foundational data governance concepts based on the DAMA DMBOK
A Comprehensive Approach to Application Portfolio RationalizationCognizant
A comprehensive approach to application portfolio rationalization will enable organizations to maximize the business value of their applications and focus on strategic opportunities.
Introduction to Enterprise architecture and the steps to perform an Enterpris...Prashanth Panduranga
This presentation was used to introduce Enterprise Architecture, Introduction to how to perform an Enterprise Architecture Assessment followed by TechSharp introduction.
Deliverables in the presentation is not clear, the slides represent what was shown as part of the demo.
List of deliverables:
Application Rationalization framework
Portfolio Analysis framework
Road Map
Current state analysis
Target State establishing process
System Context
System Landscape
Reference matter data management:
Two categories of structured data :
Master data: is data associated with core business entities such as customer, product, asset, etc.
Transaction data: is the recording of business transactions such as orders in manufacturing, loan and credit card payments in banking, and product sales in retail.
Reference data: is any kind of data that is used solely to categorize other data found in a database, or solely for relating data in a database to information beyond the boundaries of the enterprise .
DAMA Australia: How to Choose a Data Management ToolPrecisely
The explosion of data types, sources, and use cases makes it difficult to make the right decisions around the best data management tools for your organisation. Why do you need them? Who is going to use them? What is their value?
Watch this webinar on-demand to learn how to demystify the decision making process for the selection of Data Management Tools that support:
· Data governance
· Data quality
· Data modelling
· Master data management
· Database development
· And more
The Road to Modernization: From EBS to Oracle ERP CloudPerficient, Inc.
Midcoast Energy, LLC had antiquated and complex business processes that could not scale to meet its needs. Facing an expensive ERP implementation, the company decided a cloud-based platform would provide a strategic advantage.
Midcoast Energy, LLC implemented Oracle Cloud for Financials, Project Portfolio Management, and Procurement, and partnered with Perficient to deliver the implementation in a six-month timeframe.
During our webinar, Midcoast Energy, LLC’s Archana Shah, director enterprise systems, and Harish Gulati, manager of ERP systems, discussed the company’s migration to Oracle ERP Cloud, including lessons learned and how Oracle Cloud could benefit your organization as well.
Our webinar covered:
-Challenges with the legacy business processes
-Why Midcoast Energy, LLC chose Oracle Cloud
-Benefits realized
Enterprise Data World Webinars: Information Management PrinciplesDATAVERSITY
Information principles are the foundation of data governance and information management. Most shops start by copying a list from somewhere else. This is a good start, but rarely “closes the deal” when it comes to getting the principles accepted. This webinar will preview the upcoming talk at Enterprise Data World 2014 Conference & Expo.
We will cover an essential list of Generally Accepted Information Principles™ and review some simple steps towards creating your own principles.
DITA, Semantics, Content Management, Dynamic Documents, and Linked Data – A M...Paul Wlodarczyk
DITA was conceived as a model for improving reuse through topic-oriented modularization of content. Instead of creating new content or copying and pasting information which may or may not be current and authoritative, organizations manage a repository of content assets – or DITA topics – that can be centrally managed, maintained and reused across the enterprise. This helps to accelerate the creation and maintenance of documents and other deliverables and to ensure the quality and consistency of the content organizations publish. But the next frontier of DITA adoption is leveraging semantic technologies—taxonomies, ontologies and text analytics—to automate the delivery of targeted content. For example, a service incident from a customer is automatically matched with the appropriate response, which is authored and managed as a DITA topic. Learn how organizations can leverage DITA, semantics, content management, dynamic documents, and linked data to fully utilize the value of their information.
Taxonomies are essential to making the web "go". Information architects and content strategists can use and promote taxonomy within their organizations to increase findability and usability of a website. Learn more about taxonomies and see some great examples.
An overview of the benefits of using both taxonomies and metadata to make your information easier to search. Presentation by Alice Redmond-Neal of Access Innovations, Inc.
SOA governance refers to the processes used to oversee and control the adoption and implementation of service-oriented architecture (SOA) in accordance with recognized practices, principles and government regulations.
04 Service Oriented Architecture Series - SOA ManagementPouria Ghatrenabi
Service Oriented Architecture (SOA) is the secret sauce of many software integration and internet technologies. The SOA Series includes five presentations based on IBM SOA Associate Certificate. It gives a very concise, practical overview of SOA concepts. The fourth presentation discusses the need for SOA governance, Quality of Service (QoS) issues, the need for a distributed security model, and the impact of changes to services in the SOA lifecycle.
Governance Framework to Protect Your Atlassian Ecosystem InvestmentCprime
Watch the associated Webinar on Demand: https://www.cprime.com/resource/webinars/governance-framework-to-protect-your-atlassian-ecosystem-investment/
Many companies spend considerable resources on initiative such as cybersecurity and disaster recovery, but fall short when it comes to protecting their Atlassian ecosystems’ framework and configurations.
In this session we explore what it takes to set up a strong Governance Framework and cover the basics to get you started on your Governance journey. We will share details on our recommended Governance Model, how to stand up your Governance Committee, the importance of a formal Change Management process, as well as additional best practices and recommendations.
Participants will gain better understanding of the importance of protecting their current Atlassian investments and how to get started laying the foundation for a solid governance framework.
SharePoint for Pharma - Computer System Life Cycle ManagementMontrium
SharePoint for Pharma - Computer System Life Cycle Management
Presented by Michael Zwetkow, VP Operations, Montrium Inc.
For more information on Montrium please visit:
- www.montrium.com
- www.twitter.com/Montrium
- www.youtube.com/Montrium
- gplus.to/Montrium
or email info@montrium.com
Requirements management is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. It is a continuous process throughout a project. A requirement is a capability to which a project outcome (product or service) should conform.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!