This is a very useful presentation on how to save yourself or whoever you know when facing a heart attack right in front of your while waiting for the help to come.
El pasado 18 de mayo, en el marco del Claustro de Profesores del Máster en Dirección y Gestión de Recursos Humanos de la Universidad de Alicante, tuvo lugar la ponencia de Deloitte ¿Ha cambiado la crisis la gestión del talento?
Esta interesante intervención, llevada a cabo por Ricardo Díaz Sánchez, Socio de Human Capital de Deloitte y Amalia Gil, Senior Manager Human Capital en Deloitte, nos aportó datos sobre la Gestión del talento en las empresas en el momento actual que estamos viviendo, donde las reglas del juego han cambiado.
El pasado 18 de mayo, en el marco del Claustro de Profesores del Máster en Dirección y Gestión de Recursos Humanos de la Universidad de Alicante, tuvo lugar la ponencia de Deloitte ¿Ha cambiado la crisis la gestión del talento?
Esta interesante intervención, llevada a cabo por Ricardo Díaz Sánchez, Socio de Human Capital de Deloitte y Amalia Gil, Senior Manager Human Capital en Deloitte, nos aportó datos sobre la Gestión del talento en las empresas en el momento actual que estamos viviendo, donde las reglas del juego han cambiado.
[CB16] Who put the backdoor in my modem? by Ewerson GuimaraesCODE BLUE
For quite some time we have been seeing espionage cases reaching countries, governments and large companies.
A large number of backdoors were found on network devices, mobile phones and other related devices, having as main cases the ones that were reported by the media, such as: TP-Link, Dlink, Linksys, Samsung and other companies which are internationally renowned.
This talk will discuss a backdoor found on the modem / router rtn, equipment that has a big question mark on top of it, because there isn’t a vendor identification and no information about who’s its manufacturer and there are at least 7 companies linked to its production, sales and distribution in the market. Moreover, some of them never really existed.
Which lead us to question on the research title: “Who put the backdoor in my modem?”
--- Ewerson Guimaraes
Degree in Computer Science from Fumec University, Security Analyst and Researcher at Epam Systems. Certified by Offesinve Security(OSCP) and Elearn(WPT) as Pentester, Ewerson has published articles in the Brazilian Information Security/Computers magazines H4ck3r and GEEK, moreover, posted exploits and advisory on SecurityFocus found in big companies like: IBM, McAfee, Skype, Technicolor, Tufin, TrendMicro and others. Contrib to develop some modules to Metasploit Framework Project. Founder of BHack Conference and Area31, the first hackerpsace in Minas Gerais and is an active Kali Linux Community Contributor
This slideshare explains why nonprofit organizations should evaluate their programs. Beyond documenting program outcomes, it argues that program evaluation can and should be a key component of program improvement.
Sebastian talks analytics, specifically how indie game developers and small studios should look at analytics in different phases. For instance, when is it the right time to reach out to a publisher? Expect examples of retention rate from top indie game developers and explanations of the importance of the relationship with Apple and Google for small devs.
Kafka Streams is a new stream processing library natively integrated with Kafka. It has a very low barrier to entry, easy operationalization, and a natural DSL for writing stream processing applications. As such it is the most convenient yet scalable option to analyze, transform, or otherwise process data that is backed by Kafka. We will provide the audience with an overview of Kafka Streams including its design and API, typical use cases, code examples, and an outlook of its upcoming roadmap. We will also compare Kafka Streams' light-weight library approach with heavier, framework-based tools such as Spark Streaming or Storm, which require you to understand and operate a whole different infrastructure for processing real-time data in Kafka.
La solution Analytics pour vos espaces physiques. Analyser et comprendre le comportement de vos visiteurs.
http://bealder.com/analytics/
Contactez-nous : http://bealder.com/contact/
Highly Available And Distributed Containers - ContainerCon NA 2016{code}
This presentation was delivered at ContainerCon North America 2016 that was held in Toronto. This talk examines the history of Docker Swarm and libNetwork and Storage to see how the increased complexity in the container ecosystem is actually simplified over time.
Another awareness to be reminded to all of us out there to better use of the microwave and our foods so that no cancer and other illness from using it.
Discover the correct way that you should follow in order to have a better patent of eating fresh fruits and the consequences of eating the wrong ways. Enjoy the great benfits of eating the fresh fruits correctly.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
How To Save Yourself From Heart Attack When You Are ALONE ?!
1. Let's say it's 6.15pm and you're driving home (alone of course) after an unusually hard day on the job. You're really tired, and frustrated……
2. YOU ARE REALLY STRESSED AND UPSET …. Suddenly you start experiencing severe pain in your chest that starts to radiate out into your arm and up into your jaw. You are only five miles from the hospital nearest your home. Unfortunately you don't know if you'll be able to make it that far
3. WHAT TO DO ??? YOU HAVE BEEN TRAINED IN CPR, BUT THE GUY THAT CONDUCTED THE COURSE DID NOT TELL YOU HOW TO PERFORM IT ON YOURSELF !!!
4. HOW TO SURVIVE A HEART ATTACK WHEN ALONE ? SINCE MANY PEOPLE ARE ALONE WHEN THEY SUFFER A HEART ATTACK, WITHOUT HELP, THE PERSON WHOSE HEART IS BEATING IMPROPERLY AND WHO BEGINS TO FEEL FAINT, HAS ONLY ABOUT 10 SECONDS LEFT BEFORE LOSING CONSCIOUS WHAT TO DO ??
5. ANSWER: DO NOT PANIC, BUT START COUGHING REPEATEDLY AND VERY VIGOROUSLY. A DEEP BREATH SHOULD BE TAKEN BEFORE EACH COUGH, THE COUGH MUST BE DEEP AND PROLONGED, AS WHEN PRODUCING SPUTUM FROM DEEP INSIDE THE CHEST. A BREATH AND A COUGH MUST BE REPEATED ABOUT EVERY TWO SECONDS WITHOUT LET-UP UNTIL HELP ARRIVES, OR UNTIL THE HEART IS FELT TO BE BEATING NORMALLY AGAIN.
6. DEEP BREATHS GET OXYGEN INTO THE LUNGS AND COUGHING MOVEMENTS SQUEEZE THE HEART AND KEEP THE BLOOD CIRCULATING . THE SQUEEZING PRESSURE ON THE HEART ALSO HELPS IT REGAIN NORMAL RHYTHM. IN THIS WAY, HEART ATTACK VICTIMS CAN GET TO A HOSPITAL ARTICLE PUBLISHED ON N.º 240 OF JOURNAL OF GENERAL HOSPITAL ROCHESTER
7. TELL AS MANY OTHER PEOPLE AS POSSIBLE ABOUT THIS. IT COULD SAVE THEIR LIVES !!! DON'T EVER THINK THAT YOU ARE NOT PRONE TO HEART ATTACK AS YOUR AGE IS LESS THAN 25 OR 30. NOWADAYS DUE TO THE CHANGE IN THE LIFE STYLE, HEARTATTACK IS FOUND AMONG PEOPLE OF ALL AGE GROUPS. BE A FRIEND AND PLEASE SEND THIS ARTICLE TO AS MANY FRIENDS AS POSSIBLE