Transcript of a sponsored discussion on how security technology can lead to a better posture maturity and then ultimately to cultural transformation and many added business benefits.
The document discusses the history of automotive safety features like seatbelts and draws a parallel to the current state of cybersecurity. It notes that just as it took decades for seatbelts to become widely adopted, cybersecurity protections are still in their infancy. However, the document argues that trusted computing technologies can now provide "cybersecurity seatbelts" to help secure systems and networks from threats. It encourages organizations to proactively implement these trusted computing defenses to better protect their data and systems.
The document discusses marketing strategies used by American Express, including targeting higher income social classes and building an image of prestige. It also discusses factors that influence the adoption of hybrid vehicles like the Honda Insight, such as relative advantage, compatibility, complexity, observability, and trialability. Personal information sources will be more important than impersonal sources in a consumer's decision to purchase the Honda Insight.
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...InterCon
This document describes Kiasa International Pvt Ltd's flagship locking solution called Safe'o'Buddy for securing cargo during transportation to prevent theft. It is an IoT-enabled remotely controlled container locking system that allows containers to be locked and unlocked through online authorization. It provides real-time tracking of container location and operations. The solution has resulted in reductions in pilferage and theft of 15-40% for various clients in industries like e-commerce, logistics, FMCG and dairy. Testimonials from clients praise the solution's impact. Other benefits for users are discussed like improved goodwill, customer satisfaction, and logistics efficiency.
The SolarWinds hack, first detected in December 2020 and referred to as “the largest and most sophisticated attack the world has ever seen” by the president of Microsoft, was a watershed moment in cybersecurity. Hundreds of organizations, including Fortune 500 companies and government agencies, were affected, with sensitive data compromised. A year on, a major study conducted by Splunk has found that 78% of companies expect the same thing to happen again.
Privacy by Designer* is a talk about the importance of Privacy for UX, and what practical things we as designers can do that benefit user privacy and UX. From using metaphors to make PETs more understandable, to clearly summarising that too-long-to-read policy legal is urging you to throw at the users.
Presented at php.ghent (<->, which is an approach to embedding pro-active privacy protection into business and technical specifications.)
A good customer experience nowadays gets personal. When designing these personalised experiences, we are confronted with a growing challenge: balancing personalisation and privacy. As our data collection increases, so does the importance of compliance. This does not only apply to the current and upcoming privacy laws, but also to consumer’s privacy expectations.
In this session, we will identify best practices regarding privacy on how to comply to the legal framework and how to build user trust. We’ll show you that shaping a privacy experience that leads to consumer trust isn’t one department’s problem, but a company-wide opportunity.
-- ADM.be, September 2015
What Are The Latest Trends in Data Science?Bernard Marr
The benefits of a data-driven approach to business are well established but not set in stone. The relentless march of technological progress means the boundaries of what is possible are constantly being redrawn, spawning new behaviors, trends and buzzwords.
Personal Healthcare IOT on PCF using SpringJim Shingler
This document contains slides from a presentation by Jim Shingler on personal healthcare IoT using Spring. It discusses the growing aging population and issues with healthcare systems like non-adherence. It provides an overview of IoT, including definitions and common components. It then discusses using IoT for personal healthcare to help address these challenges through connected devices. The slides cover IoT communication models and components of an IoT solution that Spring and Pivotal Cloud Foundry can help enable, such as device management, security, analytics, and more.
The document discusses the history of automotive safety features like seatbelts and draws a parallel to the current state of cybersecurity. It notes that just as it took decades for seatbelts to become widely adopted, cybersecurity protections are still in their infancy. However, the document argues that trusted computing technologies can now provide "cybersecurity seatbelts" to help secure systems and networks from threats. It encourages organizations to proactively implement these trusted computing defenses to better protect their data and systems.
The document discusses marketing strategies used by American Express, including targeting higher income social classes and building an image of prestige. It also discusses factors that influence the adoption of hybrid vehicles like the Honda Insight, such as relative advantage, compatibility, complexity, observability, and trialability. Personal information sources will be more important than impersonal sources in a consumer's decision to purchase the Honda Insight.
Getting Started With IoT – Guidebook: Presented by Anu Taksali, CEO of Dhanuk...InterCon
This document describes Kiasa International Pvt Ltd's flagship locking solution called Safe'o'Buddy for securing cargo during transportation to prevent theft. It is an IoT-enabled remotely controlled container locking system that allows containers to be locked and unlocked through online authorization. It provides real-time tracking of container location and operations. The solution has resulted in reductions in pilferage and theft of 15-40% for various clients in industries like e-commerce, logistics, FMCG and dairy. Testimonials from clients praise the solution's impact. Other benefits for users are discussed like improved goodwill, customer satisfaction, and logistics efficiency.
The SolarWinds hack, first detected in December 2020 and referred to as “the largest and most sophisticated attack the world has ever seen” by the president of Microsoft, was a watershed moment in cybersecurity. Hundreds of organizations, including Fortune 500 companies and government agencies, were affected, with sensitive data compromised. A year on, a major study conducted by Splunk has found that 78% of companies expect the same thing to happen again.
Privacy by Designer* is a talk about the importance of Privacy for UX, and what practical things we as designers can do that benefit user privacy and UX. From using metaphors to make PETs more understandable, to clearly summarising that too-long-to-read policy legal is urging you to throw at the users.
Presented at php.ghent (<->, which is an approach to embedding pro-active privacy protection into business and technical specifications.)
A good customer experience nowadays gets personal. When designing these personalised experiences, we are confronted with a growing challenge: balancing personalisation and privacy. As our data collection increases, so does the importance of compliance. This does not only apply to the current and upcoming privacy laws, but also to consumer’s privacy expectations.
In this session, we will identify best practices regarding privacy on how to comply to the legal framework and how to build user trust. We’ll show you that shaping a privacy experience that leads to consumer trust isn’t one department’s problem, but a company-wide opportunity.
-- ADM.be, September 2015
What Are The Latest Trends in Data Science?Bernard Marr
The benefits of a data-driven approach to business are well established but not set in stone. The relentless march of technological progress means the boundaries of what is possible are constantly being redrawn, spawning new behaviors, trends and buzzwords.
Personal Healthcare IOT on PCF using SpringJim Shingler
This document contains slides from a presentation by Jim Shingler on personal healthcare IoT using Spring. It discusses the growing aging population and issues with healthcare systems like non-adherence. It provides an overview of IoT, including definitions and common components. It then discusses using IoT for personal healthcare to help address these challenges through connected devices. The slides cover IoT communication models and components of an IoT solution that Spring and Pivotal Cloud Foundry can help enable, such as device management, security, analytics, and more.
Infrastructure as Destiny — How Purdue Builds a Support Fabric for Big Data E...Dana Gardner
Transcript of a discussion on how Purdue University provides IT as a service, using big data and the IoT technologies, to support such worthy goals as student retention analysis.
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...Dana Gardner
Transcript of a discussion on how HudsonAlpha leverages modern IT infrastructure and big data analytics to power research projects as well as pioneering genomic medicine findings.
How Governments Gain Economic Benefits from Inter-Public-Cloud Interoperabili...Dana Gardner
- The panel discussed how governments can gain economic benefits from interoperability and standardization between public cloud providers. While the private sector has widely adopted cloud computing, public sector adoption is more complicated with some agencies lagging behind.
- Large government contracts represent significant opportunities for major cloud providers like Amazon, Google, and Microsoft to expand their government and federal business. However, they need to ensure adequate security, interoperability and customization to meet public sector needs.
- For governments, a lack of standardization makes it harder to show taxpayers they are getting the best value. While open source platforms can help enable interoperability, APIs will be more important for interoperability between cloud providers.
- Both Europe
Playtika Bets on Big Data Analytics to Deliver Captivating Social Gaming Expe...Dana Gardner
Transcript of a sponsored discussion on how Playtika is using data science going and an architectural approach to conquer some of these hurdles around volume, velocity, and variety of data.
Democratizing Advanced Analytics Propels Instant Analysis Results to the Ubiq...Dana Gardner
Transcript of a discussion on how HTI Labs in London provides the means and governance with their Schematiq tool to bring critical data to the interface that users want most.
How Big Data Deep Analysis and Agile SQL Querying Give 2016 Campaigners an Ed...Dana Gardner
Transcript of a discussion on how data analysis services startup BlueLabs in Washington, helps presidential campaigns better know and engage with potential voters.
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...Dana Gardner
Transcript of a discussion on how cybersecurity attacks are on the rise but new capabilities are being brought to the edge to provide for better data loss prevention.
Loyalty Management Innovator AIMIA's Transformation Journey to Modernized and...Dana Gardner
Loyalty management company Aimia is modernizing and consolidating its global IT infrastructure through a three-year project with HPE. This includes consolidating dozens of data centers into four standardized locations, modernizing applications, and adopting a virtual private cloud model. The goals are to improve security, simplify operations, lower costs over time, and enable a focus on analytics and new applications rather than infrastructure maintenance. Aimia sees this transformation enabling greater agility, innovation, and growth through leveraging cloud technologies and data in the future.
Meet George Jetson – Your New Chief Procurement OfficerDana Gardner
George Jetson is being introduced as the new Chief Procurement Officer. Rapid advances in AI and machine learning are poised to reshape procurement by enabling predictive and proactive processes. Procurement is well-suited to benefit from these technologies due to its transaction-intensive nature and need for real-time insights. AI can help with tasks like invoice matching and exception management, while bots can assist with decisions around supply continuity issues. Suppliers will need to provide more detailed data to buyers to remain competitive in this intelligent procurement environment.
Gaining Digital Business Strategic View Across More Data Gives AmeriPride Cul...Dana Gardner
Transcript of a discussion on how improved data allows for more types of work in an improved organization to become even more intelligent, and to find new efficiencies and benefits.
Este documento presenta un taller práctico sobre 10 claves para la implementación de tendencias y enfoques innovadores en educación. El taller busca que los docentes identifiquen los cambios necesarios para incorporar las TIC al aula y currículo. El taller se desarrolla de forma teórico-práctica y cubre temas como nuevas habilidades del siglo XXI, políticas de acceso a TIC e innovación educativa. Los docentes analizan tendencias pedagógicas actuales y cómo estas se reflejan en su práctica, con el
El futuro de la tecnología pasa por esta nueva concepción de ordenadores que nos acompaña a todas partes. Indudablemente la tecnología wearable ha llegado para quedarse entre nosotros.
es una relatoria que cautiva a sus lectores, porque trata de que para tener éxito debemos hacernos preguntas en nuestras vidas, una mente no cuestionada es una mente muerta intelectualmente.
1 p 14-0714 wearable technology part 2 blue paper4imprint
The document discusses the challenges that wearable technology poses for companies, particularly in the areas of data protection, privacy, and system security. As wearable usage increases, companies will need to upgrade security measures to protect corporate data and intellectual property, determine ownership of data collected via wearables, and ensure privacy and confidentiality are maintained. Companies will also need to evaluate their network capabilities to handle the increased bandwidth demands of multiple wearable devices per employee. The document advises companies to consider these implications and establish appropriate policies before widely adopting wearable technologies in the workplace.
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
Transcript of a discussion on how Bruce Auto Group gained deep insights into their systems, apps, and data to manage and reduce risks across their entire IT and services supply chain.
Infrastructure as Destiny — How Purdue Builds a Support Fabric for Big Data E...Dana Gardner
Transcript of a discussion on how Purdue University provides IT as a service, using big data and the IoT technologies, to support such worthy goals as student retention analysis.
How HudsonAlpha Innovates on IT for Research-Driven Education, Genomic Medici...Dana Gardner
Transcript of a discussion on how HudsonAlpha leverages modern IT infrastructure and big data analytics to power research projects as well as pioneering genomic medicine findings.
How Governments Gain Economic Benefits from Inter-Public-Cloud Interoperabili...Dana Gardner
- The panel discussed how governments can gain economic benefits from interoperability and standardization between public cloud providers. While the private sector has widely adopted cloud computing, public sector adoption is more complicated with some agencies lagging behind.
- Large government contracts represent significant opportunities for major cloud providers like Amazon, Google, and Microsoft to expand their government and federal business. However, they need to ensure adequate security, interoperability and customization to meet public sector needs.
- For governments, a lack of standardization makes it harder to show taxpayers they are getting the best value. While open source platforms can help enable interoperability, APIs will be more important for interoperability between cloud providers.
- Both Europe
Playtika Bets on Big Data Analytics to Deliver Captivating Social Gaming Expe...Dana Gardner
Transcript of a sponsored discussion on how Playtika is using data science going and an architectural approach to conquer some of these hurdles around volume, velocity, and variety of data.
Democratizing Advanced Analytics Propels Instant Analysis Results to the Ubiq...Dana Gardner
Transcript of a discussion on how HTI Labs in London provides the means and governance with their Schematiq tool to bring critical data to the interface that users want most.
How Big Data Deep Analysis and Agile SQL Querying Give 2016 Campaigners an Ed...Dana Gardner
Transcript of a discussion on how data analysis services startup BlueLabs in Washington, helps presidential campaigns better know and engage with potential voters.
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...Dana Gardner
Transcript of a discussion on how cybersecurity attacks are on the rise but new capabilities are being brought to the edge to provide for better data loss prevention.
Loyalty Management Innovator AIMIA's Transformation Journey to Modernized and...Dana Gardner
Loyalty management company Aimia is modernizing and consolidating its global IT infrastructure through a three-year project with HPE. This includes consolidating dozens of data centers into four standardized locations, modernizing applications, and adopting a virtual private cloud model. The goals are to improve security, simplify operations, lower costs over time, and enable a focus on analytics and new applications rather than infrastructure maintenance. Aimia sees this transformation enabling greater agility, innovation, and growth through leveraging cloud technologies and data in the future.
Meet George Jetson – Your New Chief Procurement OfficerDana Gardner
George Jetson is being introduced as the new Chief Procurement Officer. Rapid advances in AI and machine learning are poised to reshape procurement by enabling predictive and proactive processes. Procurement is well-suited to benefit from these technologies due to its transaction-intensive nature and need for real-time insights. AI can help with tasks like invoice matching and exception management, while bots can assist with decisions around supply continuity issues. Suppliers will need to provide more detailed data to buyers to remain competitive in this intelligent procurement environment.
Gaining Digital Business Strategic View Across More Data Gives AmeriPride Cul...Dana Gardner
Transcript of a discussion on how improved data allows for more types of work in an improved organization to become even more intelligent, and to find new efficiencies and benefits.
Este documento presenta un taller práctico sobre 10 claves para la implementación de tendencias y enfoques innovadores en educación. El taller busca que los docentes identifiquen los cambios necesarios para incorporar las TIC al aula y currículo. El taller se desarrolla de forma teórico-práctica y cubre temas como nuevas habilidades del siglo XXI, políticas de acceso a TIC e innovación educativa. Los docentes analizan tendencias pedagógicas actuales y cómo estas se reflejan en su práctica, con el
El futuro de la tecnología pasa por esta nueva concepción de ordenadores que nos acompaña a todas partes. Indudablemente la tecnología wearable ha llegado para quedarse entre nosotros.
es una relatoria que cautiva a sus lectores, porque trata de que para tener éxito debemos hacernos preguntas en nuestras vidas, una mente no cuestionada es una mente muerta intelectualmente.
1 p 14-0714 wearable technology part 2 blue paper4imprint
The document discusses the challenges that wearable technology poses for companies, particularly in the areas of data protection, privacy, and system security. As wearable usage increases, companies will need to upgrade security measures to protect corporate data and intellectual property, determine ownership of data collected via wearables, and ensure privacy and confidentiality are maintained. Companies will also need to evaluate their network capabilities to handle the increased bandwidth demands of multiple wearable devices per employee. The document advises companies to consider these implications and establish appropriate policies before widely adopting wearable technologies in the workplace.
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
Transcript of a discussion on how Bruce Auto Group gained deep insights into their systems, apps, and data to manage and reduce risks across their entire IT and services supply chain.
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
The document discusses cyber liability insurance cover (CLIC) and provides information about:
- What CLIC protects against, including privacy liability, regulatory fines, and cyber extortion
- Common causes of cyber risk like data theft, phishing emails, and denial of service attacks
- Cyber challenges specific to the maritime industry such as GPS spoofing and hackers interfering with ship operations
- Steps to mitigate risk like purchasing CLIC and implementing security controls
- Important considerations when buying a CLIC policy including coverage exclusions, security requirements, and support services provided
SambaSafety’s Mission to Reduce Risk Begins in its Own DatacenterDana Gardner
Transcript of a discussion on how a driver risk management software provider protects their business customers from risk by protecting their own IT assets and workers using Bitdefender.
As the world of cyber evolves, we need to drive innovation which moves past the conventional IT world and the wider world of mobile devices and apps, to consider where else we need to innovate to ensure we keep safe wherever and however we connect, says Gareth Niblett, Chair of the BCS Information Security Specialist Group.
How is the Age of Disruption and geospatial tech & data key to the digital transformation of insurers? How will it allow them to rapidly change their business models, their cultures and the way they use information to enhance the customer experience and remain relevant in the 21st century?
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
PrimoAir is seeking funding to launch an app-based passenger and delivery logistics network that offers the lowest prices and best guest experience using latest technologies. They aim to inspire passengers to "live in the moment" by saving them time and money on airfare. Key aspects of their offering include live updates on flights and events via the app, in-flight entertainment and amenities, subscription flight passes, and options to check luggage in advance. Their go-to-market strategy is to initially launch 10 domestic routes in North America and the Caribbean and eventually expand internationally.
Become a data-driven organization with the Internet of Things
Executive summary
Personal health monitors tracking your fitness, trashcans monitoring their fullness, watches telling you more
than just the time, and agricultural soil monitors saying it’s time to water. It seems a day doesn’t go by that
we don’t hear about the latest “offline” thing, device, or equipment becoming “online,” moving from isolation
to being connected to the Internet of Things (IoT). It’s clear that integrating sensors, electronics, and
network connectivity into devices can enable innovation, enhancing and extending the way we work and
interact with each other and the world around us.
Question 1The board of directors is considering updating the fle.docxmakdul
Question 1
The board of directors is considering updating the fleet of vehicles of the company which are used to ship goods to markets all around the United States. They will be leasing the vehicles as opposed to purchasing them outright. Please explain the advantages of leasing and which lease type would be more preferable?
Respond to this... The advantages of leasing include 100% financing at fixed rates and often require no money down from the lessee, protection against obsolescence to the lessee and passing the risk of residual value to the lessor, flexibility, less costly financing, tax advantages such as not having to report an asset or liability for a lease agreement, and off balance sheet financing. (Kieso, Weygandt, & Warfield, 2013).
I would say an operating lease is the more preferable lease options because if the company used a capital lease they would have an increase in the amount of reported debt (both short-term and long-term), have an increase in the amount of total assets (specifically long-lived assets). And they would have a lower income early in the life of the lease and, therefore, lower retained earnings.
“Many companies believe that capital leases negatively impact their financial position: Their debt to total equity ratio increases, and their rate of return on total assets decreases. As a result, the business community resists capitalizing leases. Whether this resistance is well founded is debatable. From a cash flow point of view, the company is in the same position whether accounting for the lease as an operating or a capital lease. Managers often argue against capitalization for several reasons. First, capitalization can more easily lead to violation of loan covenants. It also can affect the amount of compensation received by owners (for example, a stock compensation plan tied to earnings). Finally, capitalization can lower rates of return and increase debt to equity relationships, making the company less attractive to present and potential investors” (Kieso, Weygandt, & Warfield, 2013, pg. 1282).
References
Kieso, D. E., Weygandt, J. J., Warfield, T. D. (2013). Intermediate Accounting, 15th Edition. [VitalSource Bookshelf Online]. Retrieved from https://ambassadored.vitalsource.com/#/books/9781118722671/
Question 2
In some cases, one of the purposes of initiating a business combination is to control your value chain through vertical integration.
Consider the following two independent scenarios:
1. General Motors relies on an unrelated company for a key component
2. General Motors relies on a vertically integrated subsidiary for a key component
Discuss the pros and cons of both scenarios. Specifically address how a subsidiary that provides products only to the parent can be fairly evaluated on performance. What do you believe is the best option for General Motors? Explain.
Respond to this... The cons and pros could be pros and cons for the other.
1. General motors relies on an unrelated company for key compo ...
The State of Mobile Security and How Identity Advancement Plays an Essential ...Dana Gardner
Transcript of a BriefingsDirect podcast on establishing identity and authentication in the face of a growing reliance on mobile devices in the enterprise.
How a Minnesota Law Firm Brings Mission Critical Security To Myriad Mobile De...Dana Gardner
Transcript of a discussion on how a Minnesota law firm puts the power of diverse mobility to widespread use and keeps confidential and regulated data under strict control.
This document discusses how organizations can respond to digital disruption. It notes that rapid technological changes are enabling new business models and customer experiences. To avoid being disrupted, companies must adopt modern work practices like DevOps, automation, collaboration, iterative delivery, and cloud-first strategies. They should also cultivate an innovative culture with traits like empowerment, experimentation, diversity, and questioning assumptions. The document provides examples of disruption in various industries like insurance, transportation, and geospatial services to illustrate these points.
Today’s online world brings new challenges to businesses, making the security of your businesses’ internal information extremely critical. As we are all connected to the Internet,
we all can become a victim of cyber-attacks.
So, what can you do to better protect your business and secure your internal data?
The document discusses how focusing digital transformation efforts on improving business operations can provide significant benefits. It outlines three key areas of business operations that can be transformed: customer experience, products/services, and core operations. For each area, examples are given of how digital technologies like data analytics, IoT sensors, and predictive algorithms have helped leading companies improve processes, increase efficiency, offer new services, and gain a competitive advantage. The document advocates that enterprises identify opportunities within these three operational areas as a "sweet spot" to drive momentum in digital transformation efforts across the organization.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
How Allegiant Air Solved Their PCI Problem and Got a Whole Lot Better Security Culture, Too
1. How Allegiant Air Solved Their PCI Problem and Got a
Whole Lot Better Security Culture, Too
Transcript of a sponsored discussion on how security technology can lead to a better posture
maturity and then ultimately to cultural transformation and many added business benefits.
Listen to the podcast. Find it on iTunes. Get the mobile app. Sponsor: Hewlett
Packard Enterprise.
Dana Gardner: Hello, and welcome to the next edition to the Hewlett Packard Enterprise
(HPE) Voice of the Customer podcast series. I’m Dana Gardner, Principal Analyst at Interarbor
Solutions, your host and moderator for this ongoing discussion on IT
Innovation -- and how it's making an impact on people's lives.
Our next security innovation and transformation discussion explores how
airline Allegiant Air solved their payment card industry (PCI) problem, and
got a whole lot better security culture to boot.
When Allegiant needed to quickly manage their compliance around the
Payment Card Industry Data Security Standard, it embraced many
technologies, including tokenization, but they've also adopted an improved
position toward privacy methods in general.
Here to share how security technology can lead to posture maturity -- and then ultimately to
cultural transformation with many business benefits -- we're joined by Chris Gullett, Director of
Information Assurance at Allegiant Air in Las Vegas. Welcome, Chris.
Learn More About Safeguarding
Data Throughout Its Lifecycle
Read the full Report
Chris Gullett: Thank you, Dana. I’m looking forward to this discussion.
Gardner: Let's begin at a high level. What are the major trends that are driving a need for better
privacy and security, particularly when it comes to customer information, and not just for your
airline, but for the airline industry in general?
Gullett: The airline industry in general has quite a bit of personally identifiable information
(PII). When you think about what you have to go through to get on the plane these days,
everything from your whole name, your date of birth, your address, your phone number, your
flight itinerary, is all going in the record.
Page 1
Gardner
2. There is lot of information that you would rather not have in the public domain, and the airline
has to protect that. In fact, there have been a couple of data breaches involving major airlines
with things like frequent-flyer programs. So, we have to look carefully at how we
interact with our customers and make sure that data is incredibly
safe. We just don't want to take the brand hit that would occur if
data leaked out.
Gardner: At the same time, we’re enjoying much better benefits by
attaching more data to transactions, to process; we're able to cross
organizational boundaries. And so, the user-experience benefits of having more data are huge.
We don't want to back off from that, but we do want to be able to make sure that that data is
protected.
What are some of the major ways we can recognize the need for better data uses, but keep it
protected? Can they be balanced?
Technology fronts
Gullett: The airline industry is moving forward on a lot of technology fronts. Some airlines,
for example, are using mobile devices to welcome specific customers on board with a complete
history of how good a customer they are to that particular airline, so they can
provide additional services in the air.
Other airlines are using beaconing [location] technologies, which I think is
kind of cool. If you have a mobile app on your phone for the airline and you're
transiting through the airport, how cool is it to know where you are and how
long it's taking you to get through security. So, the airline might adapt at the
gate as to whether there are going to be problems or not in boarding that
particular plane.
There are a lot of different data points that are being collected and used now with different
airlines handling them in different ways. In any event, the need for privacy is important,
especially in the European Union (EU), which has incredibly tight data-privacy protection laws.
Gardner: We've talked about that on this podcast series. Now, the answer isn’t just the old
thinking around security, where we'll just wall it off, or we'll use as little data as possible.
Instead, we need to have more data in more places -- even down at that mobile edge.
So, as we think about ways to accommodate our need for more data in more places, even
everywhere, is there top-level thinking that goes along with being able to make the data private,
but also usable?
Gullett: That's the balancing point. Everybody wants their data everywhere. Before, a data
center protected data inside the tight little confined, hardened shell you used to have, a perimeter
Page 2
Gullett
3. with a firewall, and things like that. But we need data out to the edge where it's actually being
consumed; that’s what has to happen these days.
Some airlines are putting consumer PII right in hands of the flight attendant on the plane. At
Allegiant, for example, we're using mobile devices to accept credit cards on the plane. We're
experimenting with a number of different technologies that fall into a category of Internet of
Things (IoT), when you think about them. What they all have in common is that they're outside
any possible perimeter.
So, you have to find a way to make every device have its own individual perimeter, and harden
the data, harden the device, or some combination of the two.
Gardner: Let's hear more about your particular airline. Tell us about Allegiant Air and what
makes it unique in the airline industry.
Regular profitability
Gullett: At Allegiant, we're up to 54 consecutive quarters of profit, which is unheard of in the
airline industry. The famous phrase about the airline industry is, “How do you become a
millionaire? You start with a billion dollars and you buy an airline.”
The profitability of airlines has been much in the news over the last couple of decades, because
it's cyclical. Airlines fail, go into bankruptcy, or consolidate. There's been a lot of consolidation
in the United States, with United taking on Continental, and Delta taking on Northwest as
examples. Southwest taking on AirTran is another. Everybody has been in the game.
Allegiant is kind of off on its own. We've found an interesting niche that has very little direct
competition on the routes that we serve, and that is taking vacationers to their favorite vacation
destinations.
We connect small- and medium-sized markets -- markets like Kalispell, Montana or Indianapolis,
Indiana, a medium-sized city. We'll take them to Florida, Las Vegas, or Los Angeles. We have
about 19 vacation destinations now. We have about 115 cities overall. In fact, we serve more
cities than Southwest, if you want to get a comparison on the size of the route map. And we're
also taking the charter operators to three different countries in the Caribbean.
We have quite a different footprint. That adds up to about $1.3 billion in revenue a year, and
from a profitability standpoint, Allegiant is regularly recognized as one of the most profitable
airlines in the world.
Gardner: It sounds like most of your passengers, perhaps even all of them, are vacationers, not
business travelers. Does that change anything when it comes to user experience, privacy, and
data security?
Page 3
4. Gullett: It doesn't change anything as far as the need to protect the data, but it puts a greater risk
of brand problems concerning data breaches.
Consider the fact that our average customer flies with us once or twice a year. They are, in many
cases, flying Allegiant, rather than driving to their vacation destination. Or maybe they're taking
a vacation they wouldn't have otherwise because of Allegiant's low prices.
So what you have is “not-frequent travelers.” In fact, that would be kind of a name. If we were
going to have a frequent-flyer program it would be the “not-frequent-flyer program,” because
vacationing people just don't fly as frequently.
If I'm a business traveler, I am on so-and-so [airline], and they had a breach, I'm going to
continue to fly them because I have marvelous status with their frequent-flyer program. Allegiant
customers say, “Gee, I'm a little concerned about that and if they have a data breach, I think I'll
drive instead.”
So the brand damage from a breach, I believe, is higher for our airline than some of the other
airlines out there.
Everyone's responsibility
Gardner: Given how important it is to your business, to your brand, how do you rationalize
these approaches to security to the larger organization? I know that's probably not as prominent a
problem as it used to be, because we can see directly the business implications of security issues.
But how do you make security everybody's responsibility? Is that something that you have been
trying to do?
Gullett: First, we're very lucky at Allegiant to have incredibly broad support from the C-suite
level and the board of directors for our security program. That's not a benefit that every company
has, but we do, and it certainly makes life easier in developing the procedures and processes, and
the technologies, necessary to protect our customer data.
We came into the business at Allegiant with the idea that we have the typical triad of people,
process, and technology to deal with in the information security program -- the three legs on a
stool. If you miss one of those, you are going to be on your butt on the ground because the stool
isn't going to work very well.
We focused on technology and process early on, because those were the easy things. Those were
the low-hanging fruit. We've really moved into more of a stage of being people-focused now. In
fact, much of our budgetary spend is on security awareness for our people.
We really had to look at how we best introduce security awareness to the entire company, and to
make the company more culturally sensitive to information security. That extends from the
Page 4
5. customer service agent who's checking you in at the ticket counter all the way up to the board of
directors.
The [security leadership] has certainly chimed in and made our board more aware of problems
concerning information security. Recently U.S. Senator Edward Markey (D-Massachusetts) has
also introduced legislation that specifically targets cyber security in the United States domestic
airline industry.
That need to protect the data has to be recognized, and the most important part of protecting the
data is the people that are handling the data. Awareness is really a big part of our program now.
Gardner: How did PCI-compliance form a trigger for your organization? What did that change
mean for you, and maybe you could explain how you have gone about it at the process, people,
and technology levels?
Compliance requirements
Gullett: Well, god bless compliance, because I think I got my first information-security job
thanks to an auditor telling someone that they needed an information security guy because of
Sarbanes-Oxley. And I joined Allegiant because of PCI. These various compliance regulations
have certainly done wonders for the job market in information security. I can only imagine what
it’s like with the data security and the EU General Data Protection Regulation (GDPR).
But, in regards to our travel into the world of PCI, Allegiant is also a unique airline in that the
software that runs through the airline, the applications that run the airline, are proprietary. We
actually write that ourselves. We have a large development staff and every aspect of the
operation of the airline is run by custom software that we control and we write.
There are a lot of benefits to that because it allows us to be very agile and flexible if we want to
make changes, but there is a downside. Some of the code dates back to the green screen days of
the 1990s, and that code was going to be very difficult to bring into compliance from a PCI
standpoint. It was just not written with security in mind, and while it wasn’t directly handling
credit-card data, it was in the process scope.
Learn More About Safeguarding
Data Throughout Its Lifecycle
Read the full Report
A big concern was how we were going to ever bring a significantly non-compliant custom app
that would take a great number of application-developer hours to bring it up to snuff and still
meet a relatively tight schedule for becoming PCI-compliant. And so, at the time we looked at a
number of different products out there and we thought, well, we can't solve every problem right
now. So let’s bite off small chunks and we'll take care of that.
Page 5
6. The first thing that looked like it would be fairly easy to do, or at least straightforward from a
technology standpoint, was tokenization. And so, our search was, how can we tokenize the cards
that we are storing. And that led us to stateless tokenization. We compared a number of different
products, but we looked at HPE [Secure] Stateless Tokenization, and that was ultimately our
choice for tokenization.
Interestingly enough, while we were on our search for what the best tokenization product was, I
happened to read a press release on a website that talked about format-preserving encryption as a
new technology that was going to become available -- and that actually became HPE SecureData
Web. We found that by accident; it wasn’t even a product that was available at the time. It was
going to be targeted at card acquirers, and we actually had a hard time convincing the sales folks
to sell it to us as a different type of end-user.
That solved our application problem because it allowed us to encrypt the data that was passing
through those legacy apps. Between the tokenization and the format-preserving encryption (FPE)
SecureData Web product, we were able to dramatically reduce the overall scope of PCI data, and
that finally led us to become compliant.
Gardner: Now, this sounds like, with custom apps, it could take months, even quarters. How
much time did it take you, and how important was that to you?
Gullett: The time to implement any application that is outside of what we develop ourselves is
always a concern, because that takes our developers, who now have to serve as integrators, off of
projects that might lead to higher revenues for the airline or to solve a problem or offer a feature
that the airline would like to do. And we're very focused on improving the overall business.
We found that the overall implementation of the HPE products was very efficient. In fact, I think
we had one-and-a-half full-time equivalent (FTE) application developers on the project. It took
them about three months, and that was integrating with multiple payment-card interfaces. I think
we started at the end of October and we went live at the end January. So it was pretty lightweight
from the standpoint of integrating significant products into our ecosystem.
Stateless tokenization
Gardner: Secure stateless tokenization can often take organizations like yours out of the
business of storing credit card information at all. You're basically passing it through and using
various technologies to avoid being in a position where you could have a privacy problem. Was
that the case with you, and did you extend that to other types of data?
Gullett: That was one of the marvelous parts of bringing the system online as it did take us from
storing many, many millions of credit card numbers down to absolutely zero. We store no
payment card numbers at this time. Everything is tokenized. The card data comes into our
internal payment process and the system can send it off to the card acquirer to determine whether
Page 6
7. it should be approved or denied, and it’s immediately tokenized. So that has been a real win for
the company -- just much less to worry about from the card standpoint.
Now from the standpoint of how we can encrypt or protect other data, we're looking at a number
of possible scenarios now that we have gotten past the PCI hurdle. For example, while we don’t
fly internationally with scheduled service, we do handle the charters for other companies. At
some point, the company may well fly to international locations, and we will be collecting
passport numbers. That would be the kind of thing we would also look at, in effect using some
type of format preserving encryption, so that we're not storing the actual data.
We've gained a lot of experience with the product over the last three years and that’s going to be
a fairly easy implementation that will offer a great deal of protection. But we can also extend that
out to customer names, birth dates, and all kinds of different things and we are looking at that
now.
Gardner: The HPE SecureData Web and the Page-Integrated Encryption are being used by a lot
of folks for the webpage, of course, the browser-based apps, but that also can provide a secure
way to go to mobile. Many people are interested in the mobile web, not necessarily just native
apps. Is that something you have been able to use as well? The SecureData Web as a way to get
to the mobile edge securely?
Gullett: We do use SecureData Web in our mobile applications. We've been using it since we
initially integrated the product several years ago. In fact, that was one of the data points that we
had to protect from Day One. So we have the app going out to the Internet, grabbing the one-
time encryption key and encrypting that data in the application itself on the mobile device, on the
Android device, the Apple device, and then sending that encrypted data back to our payment-
processing system, passing through any systems in the middle as an encrypted form.
We also have a subsidiary that it is not directly airline-related that is also developing a payment-
processing app for the business space it works within. Because they're developing a true native
application for iOS, they're going to be developing with the SecureData Web SDK that’s been
released for mobile devices, which will certainly be much easier.
Gardner: Chris, we hear a lot of times that security is a cost center, that people don’t necessarily
see it as a way of bolstering business value or growing revenue streams. It sounds like when you
can employ some of these technologies, create a better posture, it frees you up, it makes you able
to innovate and transform. Has that been the case with you? Can you point to any ways in which
you've actually been able to increase revenue? I know that for airlines it’s a fairly tight margin on
the travel, but some of those ancillary services can be a make or break; is that the case here?
Unbundled travel
Gullett: Allegiant is a leader in what we call unbundled travel; we would rather sell you
exactly what you want. When an airline says that they offer free bags, for example, they're not
Page 7
8. offering you free bags. It does cost to put those bags in the hold, to put those bags in the
overhead and carry those bags on the plane with you. There is weight, and then that costs fuel.
So, there is an expense associated with every aspect of your travel on an airline today; that’s just
the way it is.
Allegiant’s unbundled services allow us to say to a traveler, “Well, sure, if you want to get on the
plane and you want to bring something and put it under the seat, we'll sell you a seat on the
plane. If you want to bring 40 pounds of baggage to put in the hold, we'll charge for that,”
because not everybody wants to bring a 40-pound bag to put in the hold.
The thing about Allegiant with its proprietary application that runs the airline is that if we see an
opportunity to offer a new service to the customer or a new ancillary service to the customer, we
don't have to go to a third-party and say, would you please add this so we can offer this feature to
the customer; we can just do it.
At the time, we were worrying about PCI compliance and how we were going to accomplish PCI
compliance, we also had a project to begin charging for carry-on bags, the bags that go up in the
overhead. We could either spend a lot of time retrofitting the legacy app for PCI or we could
spend time generating revenue by offering this new feature to the customer that they would be
charged for carry-on bags up in the overhead.
The seats on the plane, everything associated with the airline, have a very quick expiration date.
When the plane takes off, an empty seat has no value and it will have no value ever again. When
a seat takes off empty, we can’t sell that person a Coke, we can’t sell them a bag, we can’t sell
them a [rental] car, we can’t sell them a hotel room; that's gone forever. So, speed to market is
incredibly important for the airline industry and it may be more important for Allegiant.
In the case of our travails on PCI and how we were going to solve our PCI-compliance issue, we
wanted to be able to add this feature to charge for carry-on bags. So now you have a choice. Do
you spend a lot of time integrating and cleaning up legacy apps for PCI? Do you move ahead
with something that could bring in millions of dollars in revenue? The answer, of course is that
you have to be compliant with PCI. So, we have to do that first.
The fact that we were able to implement the necessary controls with the HPE products in about
three months, with about one-and-a-half FTEs, meant that other application developers could
spend time on that carry-on bag feature in our software, allowing us to go to market with that
sooner than we would have otherwise.
Now, if you look at the fact that we went to market three months earlier than we would have
normally, if we had spent three months of stopping everything to do nothing but PCI compliance.
Instead, we were able to use that time to develop carry-on bag charging services, that is millions
of dollars that would never have been captured in any other way, because it expires, it’s gone.
Once the plane leaves the ground, you can’t charge anymore.
Page 8
9. So there was a real delivery to the bottom line as far as a profitable feature was concerned by
being able to roll out that carry-on bags feature sooner. We had a much easier, quicker, and lower
resource-intensity standpoint ability to integrate, using the HPE Security products.
Where next?
Gardner: So going back to our opening sentiment around the fact that you can’t just wall off
data, meaning the more data, the better for your business and the more places that data can get to,
the better. You've demonstrated that that’s also core to business innovation, such as growing
revenue in new ways, and being agile and adaptive to very competitive markets. That’s a very
interesting example.
Before we sign off, Chris, where do you go next? How do you think your security steps so far
have enabled you to be more fleet, more agile, and perhaps find other business benefits?
Gullett: There is no substitute for delivering innovative solutions to problems that are well-
known throughout the business, and helping that to build your credibility with the executives and
the board of directors. Certainly, the solution to our PCI-compliance issues, which did get a lot of
exposure to the company’s executives and the board, by being able to solve that quickly and
without an impact to the operations of the airline, that brought information security awareness to
a level that we had not previously enjoyed at the airline.
Although, if you talk to our executives and our board, they're going to tell you information
security is very important, and I believe they believe that. The fact that you can demonstrate that
you can deliver solutions that don't break the bank and do what they say they do, means a lot.
Going back to that three-legged stool, technology and the HPE Security products that we
implemented for PCI are just one part. For example, if the folks aren't handling the credit cards
properly or if they're not adequately protecting the data that they have on their mobile devices
out in the field, our risk is just as great as a credit-card data breach would have been before we
had implemented the tokenization. These are all things we kind of worry about.
Learn More About Safeguarding
Data Throughout Its Lifecycle
Read the full Report
Gardner:. I'm afraid we'll have to leave it there. We've been discussing how airline Allegiant Air
solved their PCI problem and got a whole lot better security and business culture as well. And we
have seen how security technology can lead to a better posture maturity and then ultimately to
cultural transformation and many added business benefits.
So join me in thanking our guest, Chris Gullett, Director of Information Assurance at Allegiant
Air in Las Vegas. Thanks so much, Chris.
Page 9
10. Gullett: Thanks, Dana. I appreciate it, and enjoyed the time with you today.
Gardner: I would like to thank our audience as well for joining us for this Hewlett Packard
Enterprise Voice of the Customer security transformation discussion.
I’m Dana Gardner, Principal Analyst at Interarbor Solutions, your host and moderator for this
ongoing series of HPE-sponsored discussions. Thanks again for listening, and do come back next
time.
Listen to the podcast. Find it on iTunes. Get the mobile app. Sponsor: Hewlett
Packard Enterprise.
Transcript of a sponsored discussion on how security technology can lead to a better posture
maturity and then ultimately to cultural transformation and many added business benefits.
Copyright Interarbor Solutions, LLC, 2005-2016. All rights reserved.
You may also be interested in:
• Big data enables top user experiences and extreme personalization for Intuit TurboTax
• Feedback loops: The confluence of DevOps and big data
• Spirent leverages big data to keep user experience quality a winning factor for telcos
• Powerful reporting from YP's data warehouse helps SMBs deliver the best ad campaigns
• IoT brings on development demands that DevOps manages best, say experts
• Big data generates new insights into what’s happening in the world's tropical ecosystems
• DevOps and security, a match made in heaven
• How Sprint employs orchestration and automation to bring IT into DevOps readiness
• How fast analytics changes the game and expands the market for big data value
• How HTC centralizes storage management to gain visibility and IT disaster avoidance
• Big data, risk, and predictive analysis drive use of cloud-based ITSM, says panel
• Rolta AdvizeX experts on hastening big data analytics in healthcare and retail
• The future of business intelligence as a service with GoodData and HP Vertica
• Enterprises opting for converged infrastructure as stepping stone to hybrid cloud
Page 10