Mobile SSO: Give App Users a Break from Typing PasswordsCA API Management
Why do we use mobile devices? Simple – they’re easy to use and very convenient. So, why do we make it so hard for mobile consumers to do business with us by confronting them with multiple login screens and passwords? While security is essential to protecting mobile usage, convenience cannot be sacrificed.
With the release of the CA Layer 7 Mobile Access Gateway 2.0 and its Mobile SDK, organizations can now achieve faster mobile consumer engagement, end-to-end mobile app security and convenient mobile Single Sign-On (SSO). In this webinar, Tyson Whitten and Leif Bildoy of CA Technologies explore the why and how of mobile SSO and the Mobile Access Gateway.
You will learn
• The mobile app choices you need to make to enable better consumer engagement
• The connectivity and security implications of these choices
• The mobile security solutions that balance security and convenience
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
Take a fresh approach to IT security and management, designed specifically for mobile
Overview
Twenty years ago, laptops revolutionized how the enterprise conducted business. But with the laptop came a host of new security and manageability challenges that we are arguably still trying to work out. Now, mobile computing promises to be exponentially more disruptive.
It is a mistake to think you can apply yesterday’s laptop thinking to today’s mobile devices and still maintain a secure infrastructure. Mobile devices are radically different from laptops and they are evolving at a completely different pace, so they demand a fresh approach.
Beacons, by default, are open and static, and they communicate “in the clear”. That makes your infrastructure vulnerable, and with little effort someone can attack it, using your beacons in a manner which you didn’t intend. Learn how to protect your beacons!
Switching to PRIV™ is simple. With the BlackBerry® Content Transfer app, you can move contacts, calendar events and more from a BlackBerry 10 device, BlackBerry 7 device, Android™ device, or iPhone® to your PRIV. Here are three easy steps to help you move your content from your old smartphone to your PRIV.
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
Chief Architect Francois Lascelles gave this presentation at Gartner Catalyst 2013. The user experience associated with mobile applications is a critical determinant of the adoption of the APIs that powers them. Mobile platforms and their public app stores create challenges when it comes to securing APIs consumed by mobile applications in such a way that does not require constant user prompts. This presentation will describe the challenge of providing positive UX patterns such as single sign-on on mobile platforms and explore API provider-side architectures enabling them.
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
One of the toughest IT challenges has been figuring out how to allow users to bring their own devices to work while maintaining the security of internal apps. It becomes even more complicated when a good chunk of users are partners, contractors, and other third parties—those who present a disproportionately high security risk.
Mobile SSO: Give App Users a Break from Typing PasswordsCA API Management
Why do we use mobile devices? Simple – they’re easy to use and very convenient. So, why do we make it so hard for mobile consumers to do business with us by confronting them with multiple login screens and passwords? While security is essential to protecting mobile usage, convenience cannot be sacrificed.
With the release of the CA Layer 7 Mobile Access Gateway 2.0 and its Mobile SDK, organizations can now achieve faster mobile consumer engagement, end-to-end mobile app security and convenient mobile Single Sign-On (SSO). In this webinar, Tyson Whitten and Leif Bildoy of CA Technologies explore the why and how of mobile SSO and the Mobile Access Gateway.
You will learn
• The mobile app choices you need to make to enable better consumer engagement
• The connectivity and security implications of these choices
• The mobile security solutions that balance security and convenience
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
Take a fresh approach to IT security and management, designed specifically for mobile
Overview
Twenty years ago, laptops revolutionized how the enterprise conducted business. But with the laptop came a host of new security and manageability challenges that we are arguably still trying to work out. Now, mobile computing promises to be exponentially more disruptive.
It is a mistake to think you can apply yesterday’s laptop thinking to today’s mobile devices and still maintain a secure infrastructure. Mobile devices are radically different from laptops and they are evolving at a completely different pace, so they demand a fresh approach.
Beacons, by default, are open and static, and they communicate “in the clear”. That makes your infrastructure vulnerable, and with little effort someone can attack it, using your beacons in a manner which you didn’t intend. Learn how to protect your beacons!
Switching to PRIV™ is simple. With the BlackBerry® Content Transfer app, you can move contacts, calendar events and more from a BlackBerry 10 device, BlackBerry 7 device, Android™ device, or iPhone® to your PRIV. Here are three easy steps to help you move your content from your old smartphone to your PRIV.
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
Chief Architect Francois Lascelles gave this presentation at Gartner Catalyst 2013. The user experience associated with mobile applications is a critical determinant of the adoption of the APIs that powers them. Mobile platforms and their public app stores create challenges when it comes to securing APIs consumed by mobile applications in such a way that does not require constant user prompts. This presentation will describe the challenge of providing positive UX patterns such as single sign-on on mobile platforms and explore API provider-side architectures enabling them.
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
One of the toughest IT challenges has been figuring out how to allow users to bring their own devices to work while maintaining the security of internal apps. It becomes even more complicated when a good chunk of users are partners, contractors, and other third parties—those who present a disproportionately high security risk.
Schneider electric powers security transformation with one simple app copyZscaler
When Schneider Electric decided to undergo a digital transformation initiative, they knew their approach to security would also need to transform. As their apps moved to the cloud and their users left the network, the Schneider team needed a way to deliver consistent security controls across a globally dispersed workforce of 140,000 users.
WSO2Con EU 2016: Real-time Monitoring of API ArchitecturesWSO2
Do you know the status of your platform? Do you know which service are down and which are online? Are you aware of how well your services are performing in real-time? Can you receive this information rapidly through a smart interface? Profesia’s customer can answer yes to all these questions. They developed a monitoring application based on WSO2 Data Analytics Server (WSO2 DAS) and REST services so that users will know the current state of a service. Through this mobile application, users can understand which services are online and which are offline and can also retrieve certain service information such as the URL, machine and last response time. They used WSO2 DAS to define the key performance indicator (KPI), the event and the preparation of the real-time-data. This solution is a must-have for all people that have an API architecture so that they can easily monitor their entire service-oriented architecture (SOA) platform and reap the benefits of doing so.
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...CA API Management
Think SSO is just about reducing logins across servers? Think again. In the mobile world, the new twist is sharing sessions across mobile apps on a device. Learn how technologies like OAuth and OpenID Connect can be leveraged by native apps to achieve MSSO.
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...CA API Management
The bring-your-own-device (BYOD) trend is in full swing as the growth of mobile devices within the enterprise explodes. How do you enable secure data access for mobile applications? How do you deal with user authentication? How do you allow broader adoption of enterprise applications on user owned devices? CA and Layer 7 outline solutions to these issues, explore different approaches to mobile security, and use case studies to illustrate how others have solved these problems.
This workshop was all about:
• The latest mobile trends and opportunities
• Emerging mobile risks and how these can be addressed
• A reference architecture for secure enterprise mobility
Summarizes the problems users experience when managing too many passwords. It describes the various approaches available to organizations to reduce the password burden on users and to improve the security of their authentication systems.
Three ways-zero-trust-security-redefines-partner-access-chZscaler
One of the toughest IT challenges has been figuring out how to allow users to bring their own devices to work while maintaining the security of internal apps. It becomes even more complicated when a good chunk of users are partners, contractors, and other third parties—those who present a disproportionately high security risk.
IT teams have begun to leverage a zero trust security strategy that enables third parties and users on unmanaged devices to securely access internal apps. But can such access be accomplished without placing users on the network and without a mobile client?
Join us for this 40-minute webinar where we will do a recap of the announcements made during Cloudflare’s inaugural Speed Week. Cloudflare released several new products that are designed to improve the web experience for our customers. We’ll explore each of the announcements that include:
- How Cloudflare Argo is getting smarter and faster
- How HTTP/2 requests can be handled and prioritised more effectively
- Simplify image management, and reduce the number of image variants needed for mobile and other display types
- Improving the load times of progressive images with HTTP/2 prioritisation
- Optimising the delivery of live video stream content with reduced lag
- Supporting a lightweight, faster JavaScript framework
We have also specially invited Harshad Rotithor, Chief Architect of Carousell, to share on how the smartphone and web-based marketplace for buying and selling new and used goods, has successfully leveraged on Cloudflare's products and services to improve its APAC business performance.
If web performance matters to you, and you ever needed a reason to try Cloudflare, this webinar is especially for you. Learn how we’re different, and how we’re challenging the status quo, believing that fast is never fast enough.
Hotel WiFi software with PMS Integration helps you control guest WiFi access. Professional software for hotels, resorts, motels, hotels offers feature-rich control, social login, free trial with hi-speed paid access.
My presentation from Gartner IAM 2014.
"As connected devices dominate the enterprise thanks to cloud and mobile, legacy identity access management solutions are failing to keep up. Companies are realizing the benefits of next generation IAM to make authentication a seamless process for IT and end users alike. In this session, Patrick Harding, CTO of Ping Identity, will provide an overview of the six pillars of the next generation IAM and make a case for why it’s time to embrace a new era of IAM."
Many IT teams used an “M&M” approach to design network security: create a hard shell or perimeter around the soft interior. For remote users, traditional L3 VPNs extend that perimeter, placing remote users' endpoints directly onto the enterprise network. This puts the enterprise's network and data at risk from a range of threats - compromised credentials can lead to unintended exposure, as attackers move laterally throughout the network environment.
If you are in the growing app and SaaS market, you will know all too well about the critical issues surrounding user security and pricy.
Since 2005, Two Factor Authentication has had a growing increase in interest, usage and adoption by businesses and users, as privacy and safety of our online lives becomes more important. Just looking at Google Trends shows that Two Factor Authentication is here to stay, and the forecast shows promising growth.
Secure access to applications on Microsoft AzureZscaler
Today 34% of enterprises are running applications within Azure Cloud. That's up 14% from last year! The problem is that Enterprise Networking and Security teams still rely on the VPN to provide remote access to the network for their mobile users. The VPN, famous for giving users a poor user experience, breaks the cloud experience, exposes the network to employees while driving costs and complexity when migrating apps to Azure.
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Zscaler
Your applications are moving to the cloud, and your firewall is sure to follow. The concept of only protecting your network no longer makes sense. But, can a virtualized firewall adequately secure organizations as they become more and more distributed? What are your options to determine where your firewalls will reside? How can you evaluate which solution is best for your enterprise?
The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that when you do, you’re supremely secure. Knowing that your solution will be shaped according to your needs.
Knowing it’s a platform that uses leading patented technology across web, voice and SMS. Knowing that it’s already earned the trust of millions all over the world.
Schneider electric powers security transformation with one simple app copyZscaler
When Schneider Electric decided to undergo a digital transformation initiative, they knew their approach to security would also need to transform. As their apps moved to the cloud and their users left the network, the Schneider team needed a way to deliver consistent security controls across a globally dispersed workforce of 140,000 users.
WSO2Con EU 2016: Real-time Monitoring of API ArchitecturesWSO2
Do you know the status of your platform? Do you know which service are down and which are online? Are you aware of how well your services are performing in real-time? Can you receive this information rapidly through a smart interface? Profesia’s customer can answer yes to all these questions. They developed a monitoring application based on WSO2 Data Analytics Server (WSO2 DAS) and REST services so that users will know the current state of a service. Through this mobile application, users can understand which services are online and which are offline and can also retrieve certain service information such as the URL, machine and last response time. They used WSO2 DAS to define the key performance indicator (KPI), the event and the preparation of the real-time-data. This solution is a must-have for all people that have an API architecture so that they can easily monitor their entire service-oriented architecture (SOA) platform and reap the benefits of doing so.
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...CA API Management
Think SSO is just about reducing logins across servers? Think again. In the mobile world, the new twist is sharing sessions across mobile apps on a device. Learn how technologies like OAuth and OpenID Connect can be leveraged by native apps to achieve MSSO.
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...CA API Management
The bring-your-own-device (BYOD) trend is in full swing as the growth of mobile devices within the enterprise explodes. How do you enable secure data access for mobile applications? How do you deal with user authentication? How do you allow broader adoption of enterprise applications on user owned devices? CA and Layer 7 outline solutions to these issues, explore different approaches to mobile security, and use case studies to illustrate how others have solved these problems.
This workshop was all about:
• The latest mobile trends and opportunities
• Emerging mobile risks and how these can be addressed
• A reference architecture for secure enterprise mobility
Summarizes the problems users experience when managing too many passwords. It describes the various approaches available to organizations to reduce the password burden on users and to improve the security of their authentication systems.
Three ways-zero-trust-security-redefines-partner-access-chZscaler
One of the toughest IT challenges has been figuring out how to allow users to bring their own devices to work while maintaining the security of internal apps. It becomes even more complicated when a good chunk of users are partners, contractors, and other third parties—those who present a disproportionately high security risk.
IT teams have begun to leverage a zero trust security strategy that enables third parties and users on unmanaged devices to securely access internal apps. But can such access be accomplished without placing users on the network and without a mobile client?
Join us for this 40-minute webinar where we will do a recap of the announcements made during Cloudflare’s inaugural Speed Week. Cloudflare released several new products that are designed to improve the web experience for our customers. We’ll explore each of the announcements that include:
- How Cloudflare Argo is getting smarter and faster
- How HTTP/2 requests can be handled and prioritised more effectively
- Simplify image management, and reduce the number of image variants needed for mobile and other display types
- Improving the load times of progressive images with HTTP/2 prioritisation
- Optimising the delivery of live video stream content with reduced lag
- Supporting a lightweight, faster JavaScript framework
We have also specially invited Harshad Rotithor, Chief Architect of Carousell, to share on how the smartphone and web-based marketplace for buying and selling new and used goods, has successfully leveraged on Cloudflare's products and services to improve its APAC business performance.
If web performance matters to you, and you ever needed a reason to try Cloudflare, this webinar is especially for you. Learn how we’re different, and how we’re challenging the status quo, believing that fast is never fast enough.
Hotel WiFi software with PMS Integration helps you control guest WiFi access. Professional software for hotels, resorts, motels, hotels offers feature-rich control, social login, free trial with hi-speed paid access.
My presentation from Gartner IAM 2014.
"As connected devices dominate the enterprise thanks to cloud and mobile, legacy identity access management solutions are failing to keep up. Companies are realizing the benefits of next generation IAM to make authentication a seamless process for IT and end users alike. In this session, Patrick Harding, CTO of Ping Identity, will provide an overview of the six pillars of the next generation IAM and make a case for why it’s time to embrace a new era of IAM."
Many IT teams used an “M&M” approach to design network security: create a hard shell or perimeter around the soft interior. For remote users, traditional L3 VPNs extend that perimeter, placing remote users' endpoints directly onto the enterprise network. This puts the enterprise's network and data at risk from a range of threats - compromised credentials can lead to unintended exposure, as attackers move laterally throughout the network environment.
If you are in the growing app and SaaS market, you will know all too well about the critical issues surrounding user security and pricy.
Since 2005, Two Factor Authentication has had a growing increase in interest, usage and adoption by businesses and users, as privacy and safety of our online lives becomes more important. Just looking at Google Trends shows that Two Factor Authentication is here to stay, and the forecast shows promising growth.
Secure access to applications on Microsoft AzureZscaler
Today 34% of enterprises are running applications within Azure Cloud. That's up 14% from last year! The problem is that Enterprise Networking and Security teams still rely on the VPN to provide remote access to the network for their mobile users. The VPN, famous for giving users a poor user experience, breaks the cloud experience, exposes the network to employees while driving costs and complexity when migrating apps to Azure.
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Zscaler
Your applications are moving to the cloud, and your firewall is sure to follow. The concept of only protecting your network no longer makes sense. But, can a virtualized firewall adequately secure organizations as they become more and more distributed? What are your options to determine where your firewalls will reside? How can you evaluate which solution is best for your enterprise?
The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that when you do, you’re supremely secure. Knowing that your solution will be shaped according to your needs.
Knowing it’s a platform that uses leading patented technology across web, voice and SMS. Knowing that it’s already earned the trust of millions all over the world.
By 2020, there will be 7.6 billion connected people and 75 billion connected devices.
A key to proving your digital business with bold enablement and serious security is having the right authentication solution.
Read this resource to discover how to securely evolve into a digital and mobile enterprise by using key authentication strategies.
Case StudyAutomotive - SSLVPN case study DIGIPASS BY VAMaximaSheffield592
Case Study
Automotive - SSL/VPN case study
DIGIPASS BY VASCO
International player in automobile manufacturing secures VPN with VASCO’s Server
software Identikey and hardware DIGIPASS.
VASCO Data Security is a leading software security company specializing in authentication solutions. VASCO brings banking
level security to over 50 verticals, including the automotive sector. With VASCO’s DIGIPASS solutions, enterprises can
secure their SSL/ VPN to enable remote access.
Automotive
Case Study
INCreASeD mObILe PrODuCtIVIty WIth
VIrtuAL PrIVAte NetWOrkS
In recent years, many organizations have been
facing the growing need for remote network
access for their employees. As international
companies have different branches worldwide
and employees travel frequently, secured network
infrastructures became a necessity.
A big international player in the automobile
manufacturing industry decided to implement a
Virtual Private Network (VPN) to establish long
distance network connections. By implementing
a VPN, the company can provide access to its
internal private network to employees around the
world with access to the public Internet.
VPNs offer many advantages in terms of cost
savings and scalability. Where before companies
were obliged to install costly dedicated leased
lines to connect different locations; a VPN now
uses public lines and available network capability.
They eliminate administrative and financial
headaches associated with traditional dedicated
leased lines and connection speeds are much
faster allowing workers to be more productive.
Particularly for remote and international locations,
an Internet VPN solution offers superior reach and
quality of service.
A CLIeNtLeSS VPN SOLutION: SeCure
SOCket LAyer VPN
VPN technologies use tunnelling protocols to
create the connection between two endpoints.
Traffic within the VPN tunnel is encrypted so
that communication over the Internet cannot be
intercepted. Users can access a VPN server on the
company network and through it other computers
on the company’s local network.
There are several different types of VPN
connections, each with their own specifications
and advantages.
The company implemented a Secure Socket
Layer (SSL) VPN. SSL/ VPN is a clientless solution
that does not require client software as it uses
the Web browser as the client application.
Another advantage is that access to the network
can be restricted to specific applications using
SSL/ VPN, allowing more precise access control.
Access rights can be configured for different user
groups.
StAtIC PASSWOrDS: the WeAkeSt LINk
SSL/ VPN offers a lot of benefits. Security
however, has been a drawback for many
companies looking to implement VPN solutions.
Employees still need to logon in order to access
the organization’s network. Exactly that logon
procedure proves to be the weak link. Hackers
use many different tactics to compromise
username and password combinations and
ther ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
Due to the #covid19 pandemic, organizations were faced with an unprecedented, novel challenge of ensuring business continuity without endangering employee health and safety. Presenting our latest case study about how we enabled secure remote access to on-premise as well as SaaS applications for the employees of a Fortune 500 Oil and Gas firm subsidiary with minimal changes in their existing IT environment.
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Block Armour
Software Defined Perimeter (SDP) is a cutting-edge security framework that revolutionizes network security. By combining SDP with the power of blockchain technology, Block Armour’s Blockchain Defined Perimeter (BDP) solution delivers an unparalleled level of security and trust for any organization. BDP enables fine-grained access policies based on user + device digital identity, device posture, and other contextual factors. It enables the enforcement of least privilege access, granting users access only to the resources they need, enhancing security and minimizing risks.
Block Armour Blockchain Defined Perimeter BrochureBlock Armour
By combining SDP with the power of blockchain technology, Block Armour’s Blockchain Defined
Perimeter (BDP) solution delivers an unparalleled level of security and trust for any organization.
BDP enables fine-grained access policies based on user + device digital identity, device posture,
and other contextual factors. It enables the enforcement of least privilege access, granting users access only to the resources they need, enhancing security and minimizing risks.
In May 2021, Evernym's Product team hosted a webinar to share:
• An overview of Evernym’s products: Verity, Connect.Me, and the Mobile SDK
• Recent changes and improvements, including Aries Out-Of-Band support and new developer resources
• A first-look at Verity Flow, a new no-code solution for issuing and verifying credentials
• A discussion of our product roadmap, including BBS+ support and a new Connect.Me demo experience
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.