Transformation, Digital Transformation,... beyond using the buzz word, how do you ensure your teams buy-in your transformation project?
Find how Track&Change can help you.
Managing stakeholders as critical success factor in operational excellenceThe Jamilah H
Knowing stakeholders is the key thing in any transformational or continuous improvement initiatives, The presentation covers both high level and inter personal level of stake holders management techniques.
Among key contents are 7 Prevention Steps of Stakeholders misalignment and tools for Stakeholders Planning, Stakeholders Mapping, and Stakeholders Support Level.
Transformation, Digital Transformation,... beyond using the buzz word, how do you ensure your teams buy-in your transformation project?
Find how Track&Change can help you.
Managing stakeholders as critical success factor in operational excellenceThe Jamilah H
Knowing stakeholders is the key thing in any transformational or continuous improvement initiatives, The presentation covers both high level and inter personal level of stake holders management techniques.
Among key contents are 7 Prevention Steps of Stakeholders misalignment and tools for Stakeholders Planning, Stakeholders Mapping, and Stakeholders Support Level.
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
The law of unintended consequences strikes again. In an effort to address security risks in enterprise IT systems and the critical data in them, numerous security standards and requirement frameworks have emerged over the years. But most of these efforts have had the opposite effect — diverting organizations’ limited resources away from actual cyber defense toward reports and compliance.
Recognizing this serious problem, the U.S. National Security Agency (NSA) in 2008 launched Critical Security Controls (CSCs), a prioritized list of controls likely to have the greatest impact in protecting organizations from evolving real-world threats. This SANS Institute survey of nearly 700 IT professionals across a range of industries examines how well the CSCs are known in government and industry and how they are being used.
For the latest threat intelligence reports, visit https://www.fireeye.com/current-threats/threat-intelligence-reports.html.
170330 cognitive systems institute speaker series mark sherman - watson pr...diannepatricia
Dr. Mark Sherman, Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. , presention “Experiences Developing an IBM Watson Cognitive Processing Application to Support Q&A of Application Security Diagnostics” as part of the Cognitive Systems Institute Speaker Series.
Proactively Designing for Diversity, Equity, and InclusionVMware Tanzu
SpringOne 2021
Session Title: Proactively Designing for Diversity, Equity, and Inclusion
Speakers: Megan Peaslee, Lead UX Researcher at University of Washington - Masters Student; Meghna Nayak, Product Designer at N/A; Rachel Feltes, UX Designer at University of Washington; Sara Koeck, UX Researcher at University of Washington
By Leonard Oruko and Howard Elliott.
Presented at the ASTI-FARA conference Agricultural R&D: Investing in Africa's Future: Analyzing Trends, Challenges, and Opportunities - Accra, Ghana on December 5-7, 2011. http://www.asti.cgiar.org/2011conf
These are detailed notes from the visit at the Copenhagen's Danish Design Centre, which had on display a very informative exhibition on a model for a design-driven innovation, developed by the Danish Design Centre.
Design-driven Innovation (DIN) is a tool for developing better responses to complex challenges while ensuring implementation through a design-driven approach.
I was interested in the potential of this model for designing public communication.
The credit for all the information in this document goes to Danish Design Centre.
With malware attacks growing more sophisticated, swift, and dangerous by the day — and billions of dollars spent to combat them — surprisingly few organizations have a grip on the problem. Only 20 percent of security professionals surveyed by Information Security Media Group (ISMG) rated their incident response program “very effective.” Nearly two-thirds struggle to detect APTs, limiting their ability to defend today’s most pernicious threats. In addition, more than 60 percent struggle with the speed of detection, and more than 40 percent struggle with the accuracy of detection. Those shortcomings give attackers more time to steal data and embed their malware deeper into targeted systems. For the latest threat intelligence reports, visit https://www.fireeye.com/current-threats/threat-intelligence-reports.html.
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
Learn how cognitive security may be a powerful tool in addressing challenges security professionals face.
New capabilities for a
challenging era
Security leaders are working to address three gaps
in their current capabilities
—
in intelligence, speed
and accuracy. Some organizations are beginning to
explore the potential of cognitive security solutions
to address these gaps and get ahead of their risks
and threats. There are high expectations for this
technology. Fifty-seven percent of the security
leaders we surveyed believe that it can significantly
slow the ef forts of cybercriminals. The 22 percent of
respondents who we call “Primed” have started their
journey into the cognitive era of cybersecurity
—
they
believe they have the familiarity, the maturity and the
resources they need. To begin the journey, it is
important to explore your weaknesses, determine
how you want to augment your capabilities with
cognitive solutions and think about building education
and investment plans for your stakeholders.
It's been 30 years since Nielsen and Molich provided the first practical and widely applied framework to evaluate the usability of digital products.
How well has this venerable set of the 10 Commandments for UX stood the test of time as the technology and user expectations changed?
We'll discuss the original purpose of the heuristics, how to apply them to a structured UX evaluation, if they've stood the test of time, and whether they will apply as technology continues to evolve.
We’ll also explore whether new heuristics should be developed to account for other, recent aspects of the modern interaction and technology landscape. To illustrate this we will introduce a proposed new set of heuristics for a specific and important part of our digital interactions – social media.
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from HellLviv Startup Club
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from Hell
Global Online PMDay
Website - https://opmday.org
Youtube - https://www.youtube.com/startuplviv
FB - https://www.facebook.com/edunomicaone
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
The law of unintended consequences strikes again. In an effort to address security risks in enterprise IT systems and the critical data in them, numerous security standards and requirement frameworks have emerged over the years. But most of these efforts have had the opposite effect — diverting organizations’ limited resources away from actual cyber defense toward reports and compliance.
Recognizing this serious problem, the U.S. National Security Agency (NSA) in 2008 launched Critical Security Controls (CSCs), a prioritized list of controls likely to have the greatest impact in protecting organizations from evolving real-world threats. This SANS Institute survey of nearly 700 IT professionals across a range of industries examines how well the CSCs are known in government and industry and how they are being used.
For the latest threat intelligence reports, visit https://www.fireeye.com/current-threats/threat-intelligence-reports.html.
170330 cognitive systems institute speaker series mark sherman - watson pr...diannepatricia
Dr. Mark Sherman, Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. , presention “Experiences Developing an IBM Watson Cognitive Processing Application to Support Q&A of Application Security Diagnostics” as part of the Cognitive Systems Institute Speaker Series.
Proactively Designing for Diversity, Equity, and InclusionVMware Tanzu
SpringOne 2021
Session Title: Proactively Designing for Diversity, Equity, and Inclusion
Speakers: Megan Peaslee, Lead UX Researcher at University of Washington - Masters Student; Meghna Nayak, Product Designer at N/A; Rachel Feltes, UX Designer at University of Washington; Sara Koeck, UX Researcher at University of Washington
By Leonard Oruko and Howard Elliott.
Presented at the ASTI-FARA conference Agricultural R&D: Investing in Africa's Future: Analyzing Trends, Challenges, and Opportunities - Accra, Ghana on December 5-7, 2011. http://www.asti.cgiar.org/2011conf
These are detailed notes from the visit at the Copenhagen's Danish Design Centre, which had on display a very informative exhibition on a model for a design-driven innovation, developed by the Danish Design Centre.
Design-driven Innovation (DIN) is a tool for developing better responses to complex challenges while ensuring implementation through a design-driven approach.
I was interested in the potential of this model for designing public communication.
The credit for all the information in this document goes to Danish Design Centre.
With malware attacks growing more sophisticated, swift, and dangerous by the day — and billions of dollars spent to combat them — surprisingly few organizations have a grip on the problem. Only 20 percent of security professionals surveyed by Information Security Media Group (ISMG) rated their incident response program “very effective.” Nearly two-thirds struggle to detect APTs, limiting their ability to defend today’s most pernicious threats. In addition, more than 60 percent struggle with the speed of detection, and more than 40 percent struggle with the accuracy of detection. Those shortcomings give attackers more time to steal data and embed their malware deeper into targeted systems. For the latest threat intelligence reports, visit https://www.fireeye.com/current-threats/threat-intelligence-reports.html.
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
Learn how cognitive security may be a powerful tool in addressing challenges security professionals face.
New capabilities for a
challenging era
Security leaders are working to address three gaps
in their current capabilities
—
in intelligence, speed
and accuracy. Some organizations are beginning to
explore the potential of cognitive security solutions
to address these gaps and get ahead of their risks
and threats. There are high expectations for this
technology. Fifty-seven percent of the security
leaders we surveyed believe that it can significantly
slow the ef forts of cybercriminals. The 22 percent of
respondents who we call “Primed” have started their
journey into the cognitive era of cybersecurity
—
they
believe they have the familiarity, the maturity and the
resources they need. To begin the journey, it is
important to explore your weaknesses, determine
how you want to augment your capabilities with
cognitive solutions and think about building education
and investment plans for your stakeholders.
It's been 30 years since Nielsen and Molich provided the first practical and widely applied framework to evaluate the usability of digital products.
How well has this venerable set of the 10 Commandments for UX stood the test of time as the technology and user expectations changed?
We'll discuss the original purpose of the heuristics, how to apply them to a structured UX evaluation, if they've stood the test of time, and whether they will apply as technology continues to evolve.
We’ll also explore whether new heuristics should be developed to account for other, recent aspects of the modern interaction and technology landscape. To illustrate this we will introduce a proposed new set of heuristics for a specific and important part of our digital interactions – social media.
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from HellLviv Startup Club
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from Hell
Global Online PMDay
Website - https://opmday.org
Youtube - https://www.youtube.com/startuplviv
FB - https://www.facebook.com/edunomicaone
As delusions of effective risk management for application environments continue to spread, companies continue to bleed large amounts of security spending without truly knowing if the amount is warranted, effective, or even elevating security at all. In parallel, hybrid, thought-provoking security strategies are moving beyond conceptual ideas to practical applications within ripe environments. Application Threat Modeling is one of those areas that, beyond the hype, provides practical and sensible security strategy that leverages already existing security efforts for an improved threat model of what is lurking in the shadows.
Tony UcedaVelez, Managing Director
An experienced security management professional, Tony has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a term that describes the design and development of secure processes and controls working symbiotically to create a unique business workflow. Tony currently serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S. on the topic of application security and security process engineering.
“In the digital age, innovation is critical to corporate success. Missing out on a technology or innovative new startup can result in failed investments, missed opportunities and unexploited partnerships or M&A potential. Our Detecon web-based innovation Radar helps avoid that: it harnesses our global trend and startup knowledge to empower clients to innovate successfully and proactively.”
– Stefan Wilhelm, CEO Detecon, Inc.
Machine Learning/Artificial Intelligence Strategy: Developing a Trust-Focused...Leslie McFarlin
In order to create a vision for the development of machine learning and AI within CA Technologies' Design Organization, this presentation outlines a 3-part strategy for creating trust in ML/AI products the company develops.
Risk management plan
Executive Summary
The past few decades have seen technological evolutions on a rapid scale with the growth of the industry taking over the world by storm. Governments and companies alike are investing in further research and development of futuristic technologies in order to work towards a more efficient future in terms of productivity and task automation. The evolution of computers and powerful technologies being made available to the public with them having high processing power and some being small, powerful and portable has led to people having information in their hands, literally.
However, with the advantages of the recently introduced technologies, there still are threats brought about by the same since they have raised privacy and other security concerns as well as health concerns associated with a number of the devices. This paper is aimed at identification of strategies to handle risks which may arise from the continuous development of new technologies (Galati, 2015). Comment by Schneider, Paul: This is the only sentence in this summary which focuses on the paper, and it does a very poor job of previewing everything that the reader will see in this paper.
Project Summary
Scope Comment by Schneider, Paul: This section tells me nothing about the scope for your project. What are the task/activities needed to successfully complete your project?
This report is important in analysis of the importance of information technologies being managed and security implemented since with their introduction, most companies have taken them up therefore the need to prevent attacks via technologies implemented. Critical processes in business are reliant to information technologies therefore need for safeguarding them against hacking attacks among other similar threats relating to information technologies.
Milestones Comment by Schneider, Paul: This section tells me nothing about the milestones for your project. When does the project start? When does the project end? What are all of the milestones between the start & end?
All businesses especially in a technologically growing and depend world need to learn the vulnerabilities posed by the developments as well as methods which can be used to control or curb them. Most companies have successfully put in place firewalls and administrators of networks to monitor, analyze and notify of irregularities which may cause a breach to sensitive company information.
Cost Constraints Comment by Schneider, Paul: Very poor job.
In implementation of security within information technologies, there are costs involved, some being one off and others being recurrent however all serving the same purpose. Costs inclusive in implementation of security protocols are such as purchase as hardware and software offering security such as firewalls, antiviruses, antimalware programs and programs for detection of network intrusions. Costs can also arise from contracting an external organization to ...
COMIT / Fiatech Conference 2014, The Crystal, London
Efficiency Through Digital Projects
Harrison O’Hara from BIM4Mobility and Costain. Where are we in our use of mobile technologies? This session will look at the current position and in what direction the industry is heading based on a recent survey.
How can you leverage Cyber Security to provide value to your customers? What does your organization need to pay attention to when it comes to Cyber Security?
Introducing the Detecon Cyber Security Radar – your single source of truth for threats and opportunities in Cyber Security!
Sign up today for a free trial!
Top 5 secrets to successfully jumpstarting your cyber-risk programPriyanka Aash
Businesses like Autodesk understand that cyber-risk management is essential, but they often don’t know where to begin. Autodesk implemented a cyber-risk framework in six months by using Agile software development, risk modeling and risk quantification. This session will explore the company’s success secrets and offers advice on how security leaders can jumpstart their cyber-risk program.
(Source : RSA Conference USA 2017)
Maximising the opportunities offered by emerging technologies within the chan...Livingstone Advisory
The Australian University sector is heading down the path of seemingly inevitable and fundamental change in both its operating model and role within society. The forces at play are numerous and diverse, fueled in part by the capabilities of modern technologies. These include factors such as increasing global competition for tertiary students, the shift towards a self-funded corporate operating model whilst having to retain academic independence and rigor – all in an environment of the increasing commoditisation of knowledge and intellectual property through emerging vehicles such as MOOCs (Massive Online Open Courses).
In the midst of these structural changes, how well Australian Universities navigate through the current swathe of emerging and potentially disruptive technologies whilst mitigating the longer term systemic risks associated with their adoption is not necessarily a trivial exercise.
In this session, Rob Livingstone offered some practical insights into how CIOs of ‘the University of the future’ can play an active part in helping their institutions thrive in the new environment by maximising the upside potential of new and emerging technologies with known cost and risk, whilst simultaneously managing the multiple versions of reality that exist in the new IT environment.
Similar to TechEvent 2019: How and when to respond on trends and innovations?; Martin Luckow, Lukas Fuchs - Trivadis (20)
Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...Trivadis
During major irregularities, the service desks of airline companies are heavily overloaded for short periods of time. A chatbot could help out during these peak hours. In this session we show how SWISS International Airlines developed a chatbot for irregularity handling. We shed light on the challenges, such as sensitive customer data and a company starting its journey into the cloud.
Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...Trivadis
Trivadis Azure Foundation – Das Fundament für den erfolgreichen Einsatz der Azure Cloud
Die Azure Cloud steuert auf ihr 10-jähriges Jubiläum zu und ist in der Schweiz angekommen. Im Vergleich zum Betrieb von On-Premise Lösungen bietet die Cloud eine Vielzahl von Vorteilen. Viele Aufgaben aus der On-Premise Welt werden im Cloud Computing vom Anbieter übernommen.
Aber die Freiheiten, welche Cloud Computing bietet, sind sehr mächtig und das beste Rezept für Wildwuchs und Chaos. Viele unserer Kunden werden sich erst jetzt bewusst, um welche Aufgaben sie sich bereits vor 5 Jahren hätten kümmern sollen. Die Trivadis Azure Foundation ist unser in der Praxis erprobtes Vorgehen, um alle Vorteile der Cloud optimal Nutzen zu können, ohne die Kontrolle zu verlieren. In dieser Session bekommen Sie einen Einblick in unsere Azure Foundation Methodik, zusätzlich berichten wir von den Azure-Erfahrungen unserer Kunden.
Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)Trivadis
In dieser Session stellen wir ein Projekt vor, in welchem wir ein umfassendes BI-System mit Hilfe von Azure Blob Storage, Azure SQL, Azure Logic Apps und Azure Analysis Services für und in der Azure Cloud aufgebaut haben. Wir berichten über die Herausforderungen, wie wir diese gelöst haben und welche Learnings und Best Practices wir mitgenommen haben.
Azure Days 2019: Master the Move to Azure (Konrad Brunner)Trivadis
Die Azure Cloud hat sich in den letzten 10 Jahren etabliert und steht heute sowohl global, als auch lokal zur Verfügung,
der Schritt in die Cloud muss aber gut geplant werden. In diesem Talk teilen wir unsere Erfahrungen aus diversen Projekten mit Ihnen. Wir zeigen, worauf Sie besonders achten müssen, damit Ihr Wechsel in die Cloud ein Erfolg wird.
Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...Trivadis
Die Azure Cloud ist in der Schweiz angekommen. In dieser Session beleuchtet Primo Amrein, Cloud Lead bei Microsoft Schweiz, die Einführung der Azure Cloud in der Schweiz, berichtet über die Erfolgsgeschichten und die Lessons Learned. Die Session wird mit einem Ausblick auf die Roadmap abgerundet.
Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)Trivadis
«Moderne» Data Warehouse/Data Lake Architekturen strotzen oft nur von Layern und Services. Mit solchen Systemen lassen sich Petabytes von Daten verwalten und analysieren. Das Ganze hat aber auch seinen Preis (Komplexität, Latenzzeit, Stabilität) und nicht jedes Projekt wird mit diesem Ansatz glücklich.
Der Vortrag zeigt die Reise von einer technologieverliebten Lösung zu einer auf die Anwender Bedürfnisse abgestimmten Umgebung. Er zeigt die Sonnen- und Schattenseiten von massiv parallelen Systemen und soll die Sinne auf das Aufnehmen der realen Kundenanforderungen sensibilisieren.
Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...Trivadis
API-Management bietet eine integrierte Umgebung zur Erstellung, Ausführung, Verwaltung und Sicherung von Enterprise-APIs für moderne digitale Anwendungen. Die Firma Vinci Energies Schweiz setzt den Azure API-Management Dienst seit mehreren Jahren in unterschiedlichen Projekten erfolgreich ein. Ein Erfahrungsbericht, der die Möglichkeiten, aber auch die Grenzen von Azure API-Management aufzeigt.
Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...Trivadis
Heutzutage schreibt man nicht nur Applikationen mit Code. Dank der Cloud wird die Konfiguration von Infrastruktur wie virtuellen Maschinen oder Netzwerken in Code definiert und automatisiert ausgeliefert. Man spricht von Infrastructure as Code, kurz: IAC. Für Infrastructure as Code auf Azure gibt es viele tools wie Ansible, Puppet, Chef, etc. Zwei Lösungen stechen durch Ihren unterschiedlichen Ansatz heraus - Die Azure Resource Manager Templates (ARM) als Microsoft-native Lösung, immer auf dem neusten Stand, aber an Azure gebunden. Auf der anderen Seite Terraform von HashiCorp mit einer deskriptiven Sprache als Grundlage, dafür weniger Features im Security-Bereich. Für einen Grosskunden haben wir die beiden Technologien verglichen. Die Resultate zeigen wir in dieser Session mit Livedemos auf.
Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...Trivadis
Was waren die Learnings und Challenges um eine auf Azure basierende, moderne Data Analytics Plattform für einen großen Konzern als Service bereitzustellen und in das Enterprise zu integrieren? Ein Projekt mit vielen interessanten Aspekten über Azure BI Services wie HDInsight, die Integration in ein Enterprise in einem "as a Service" Model, Management der Kosten und Verrechnungen der Services, und noch viel mehr. Diese Session bietet Einblicke in eines unserer Projekte, die Ihnen in Ihrem nächsten Projekt behilflich sein werden.
Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...Trivadis
Die Helsana (https://www.helsana.ch), die Nummer 2 der grössten Krankenversicherungen der Schweiz, verfolgt eine moderne Cloud-First Strategie. Um komplexe Marketingkampagnen mit einem hohen Grad an Automatisierung ausführen zu können, wurden von Helsana diverse Produkte evaluiert. Leider fand sich keines, welches allen Anforderungen genügte. In enger Zusammenarbeit mit Microsoft wurde die zu 100% Azure-basierte Anwendung CRM-Analytics (CRMa) erstellt, welche Leads und Aufgaben aus dem Dynamics CRM gemäss komplexen Verteilregelwerken an die Regionen, Niederlassungen und Kundenbetreuer verteilt. Die Resultate und Performance der Kampagnen können über eine Data Analytics Strecke analysiert und in PowerBI visualisiert werden. Manuelle Prozesse zur Zielgruppenselektion wurden automatisiert und die Zeit von der Idee bis zur Selektion der Zielgruppe konnte von 10(!) Tagen auf einige Minuten reduziert werden. Mit der Einführung von CRMa hat die Helsana einen massgebenden Schritt in die Digitalisierung und zu einem ganzheitlichen Kampagnenmanagement geschafft.
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...Trivadis
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individuelles Angebot in 5 Sek formulierst; Martin Kortstiege, Ronny Bauer - Trivadis
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...Trivadis
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing PostgreSQL to Oracle, the best kept secrets; Konrad Häfeli, Jan Karremans - Trivadis
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...Trivadis
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 - von klassischen zu agilen Prozessen; Martin Moog, Esther Trapp, Norbert Ziebarth - Trivadis
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
TechEvent 2019: How and when to respond on trends and innovations?; Martin Luckow, Lukas Fuchs - Trivadis
1. How and when to respond on trends and
innovations?
Reliable decisions through qualified overview
and clear evaluation of trends and innovations
Dr. Martin Luckow
2. Martin Luckow
• Since 2011@Trivadis
• Transformation Architect
• Solution Development
• Trend Radar Responsible
https://www.linkedin.com/in/martin-luckow/
4. Inputs / Responses / Expectations
Ausblick in die
Zukunft
Was will der
Kunde (Kunde
von Kunde?)
übermorgen
Wo geht der
Trend hin
Überraschungen
vermeiden
Trends schneller
als der Kunde
identifizieren
Branchentrends
Schwache Signale
warnehmen
Massgeschneidert
für Kunden
Treiber und
Barrieren für
Business
Dead End Richtige Richtung
Was hilft der
Trendradar
meinen Kunden
Abhängigkeiten
Analytics
(Webcrawler
basiert)
-> Use Cases
Interdispiplinäres
Netzwerk
-> Ideation?
Querdenkeer
einbeziehen
-> Ideation?
Guidance in
What Technology
to Invest in the
Future
Trends, Impact
on Business /
Business Models
How are the
trends hitting and
affecting
business
6. Trend Radar
Trend
• Medium to short-term developments
• Local or global impact
• Fast trend change
• Influence on different areas of society
Megatrend
Trend
Quelle: Zukunftsinstitut GmbH
Megatrend
• Global impact
• Impact of each individual human being
• Impact on all levels of society
• Long-term developments
• Container for partial flows
Innovations
• Planned and controlled change
• Application of new ideas and techniques
• New business models for your products and services
7. Trend Radar-Workflow
Trend communication and processing
Ideation
Review
Labs/PoCs
Other
Trend
identification General use case
analysis and
preparation
Trend
presentation &
documentation
handover
Source analysis
Lab Apps
Web-Based E-Detailing
IoT-Enabled
Laboratory
Direct-to-Patient
Digital Marketing
Physician
Social Media
3D Printed Drugs
Signal Detection
…
Rating
9. Responding on a Trend or Innovation
Trend
Ignore
Mitigate impact
Leverage to rethink business model
Apply into business
Monitor
?
Specific
Use Case(s)
Refined
Key
Factors
?
?
Including
„General When“
„General Impact“
„General Use Cases“
10. Trend Ideation: Tasks & Results
Trend
Identified
Use Case(s)
1. Costs
2. Risk
3. Capability
4. Usability
5. Interoperability
6. Integration
7. Implementation
Activity
8. Regulation
9. Security, Ethics,
Privacy
10. Societal &
Cultural
Response
Ideation
DT
BMC
10 Key Factors per Use Case
Typically workshops
on connected trends.
Invest >3h per trend!
T1
T2
11. 10 Key Factors
Factor Definition Question
Cost Evaluation of the cost involved in implementing this trend What is the total estimated cost of implementing this
trend? How does cost compare with speed of
implementation?
Risk Evaluation of the risk involved in implementing this trend
(risk of new, unproven technology and its ability to solve a
problem or address a potential use case, such as financial
risk)
What are the risks associated with responding to a
trend, versus not responding to it?
Capability Assessment of the new capabilities this trend offers,
compared to what exists currently and in the past, and how
they can be applied to business challenges and
opportunities
What enhanced capabilities does the trend offer that
might outweigh the associated costs and risks?
Usability The degree to which the trend and its underlying
technologies are intuitive, user-friendly and easy to use
How user-friendly are these technologies
underpinning this trend?
Interoperability The degree to which the underlying technologies that
support this trend interoperate with existing technologies
and systems
What level of interoperability do these technologies
have?
12. 10 Key Factors
Factor Definition Question
Integration The ease of integrating this trend into existing systems How easily can the technologies relating to this trend
be integrated into the existing IT systems?
Implementation
Activity
The extent to which organizations have already run proofs
of concept involving this trend and begun to implement the
underlying technologies
How many organizations are currently implementing
or have implemented this trend?
Regulatory
Compliance
The existence or probable introduction of regulation and
compliance requirements that could slow down the
adoption of this trend
What regulation or compliance requirements
currently exist that affect this trend?
What regulatory issues could this trend trigger?
What regulation might be required in the future?
Security and Privacy The security and privacy risks associated with this trend What security and privacy concerns might arise from
this trend?
Social and Cultural
Response
The way in which society and different cultures respond to
this trend, in terms of whether it is seen as “fashionable” or
“desirable” and how it might affect cultural norms
How will different societies and cultures respond to
this trend and how will that help or hinder its
growth?
13. Weight of factors & trend maturity
Factor Emerging Growing Mature
Integration
Implementation Activity
Regulatory Compliance
Security and Privacy
Social and Cultural Response
Integration
Implementation Activity
Regulatory Compliance
Security and Privacy
Social and Cultural Response
High effect
Medium effect
Lower effect
Emerging • Commercialization by vendors
• Pilots and deployments by
industry leaders
Growing • Evolving technology
capabilities, methodologies,
and associated infrastructure
and ecosystems
• Adoption levels typically
between 5% and 20% of target
audience
Mature • Innovation is proven and value
is relatively predictable in
many, but not all,
environments
• Capabilities continue to evolve
• Adoption level typically ranges
from 20% to 50% of target
audience
14. 10 Key Factors
Factor Virtual Reality Rating
Cost The total cost of implementing VR is high due to the cost of devices and the cost of hiring a design
consultancy if the skills to develop VR apps are not present in-house.
6
Risk Implementation risks are medium since there are a growing number of design consultancies that can
help organizations implement VR. However, risks concern the quality of the VR experience and proving
the business value/ROI of VR investments. Risk of not implementing is that competitors will win over
customers with novel use of VR in marketing.
5
Capability VR offers an immersive, 3D experience that previous technologies have not provided. Hardware
capabilities (such as form factor, displays, haptics, eye tracking, other sensors, 3D audio integration and
communications) all need to improve to deliver this immersive experience.
3
Usability Usability is currently improving, depending on app design as well as HMD and gesture control. 2
Interoperability An issue: How to combine VR with virtual assistants, conversational platforms and existing applications
to produce an immersive experience in the future.
3
Integration At present, VR does not easily integrate with existing systems and will radically disrupt and
transform how we design the user interface and experience.
3
… … …
VR
16. •No Comment
Implement a Trend
Radar
•Think about using different kinds of ideation (DT, canvas, ...) ... Trends
and innovations must be examined from different perspectives
(strategic, operational).
Implement ideation
methods
•Plan how you should respond to the evolution and maturity of a
technology trend by considering the 10 factors. → Establish an
ideation process
Plan response process
•Determine the right time to respond to a trend by tracking how the 10
factors change as a trend evolves. Will help to assess when to respond
to a trend, to minimize the risk of early adoption and maximize the
chances of success for later adoption.
Priorize trends by time
•Perform a qualitative assessment of how each of the 10 factors
impacts a particular technology trend. This will help to identify upfront
the opportunities and challenges involved in responding to that trend.
Qualitative trend
assessment
17. Implementation: Scrums with Handshake
Raw
Trend
Backlog
Sprint
Backlog
4 weeks
time for
elaboration
7 Days
Review
Elaborated
Trend
Backlog
Sprint
Backlog
4 weeks
time for
ideation
7 Days
Review
1
2
3
4
5
6
Qualified
trend/use
case-pairs
Trend
identification General use case
analysis and
preparation
Trend
presentation &
documentation
handover
Source analysis
Lab Apps
Web-Based E-Detailing
IoT-Enabled Laboratory
Direct-to-Patient Digital Marketing
Physician Social Media
3D Printed Drugs
Signal Detection
…
Rat
ing
POC
Lab
…