The training program for facilitators to host "User-Centric Innovation Process" workshop in Trend Micro's 2009 Engineering Camp, held at FARGLORY HOTEL, Hualien.
Technical Workshop: FrogOS - the journey beginsFrogEducation
For those wanting to learn how to use FrogOS. Our FrogOS champion schools will share their initial experience of using our latest product. Perfect for new users, or those thinking of switching to FrogOS, this workshop will teach you the tools and skills you need to get started.
What was this all about?
For those technically minded staff that can't wait to get under the skin of FrogOS. Led by our Head of Development, Adam Hepton, the workshop will give information on the future of the FrogOS Development Platform.
Technical Workshop: FrogOS - the journey beginsFrogEducation
For those wanting to learn how to use FrogOS. Our FrogOS champion schools will share their initial experience of using our latest product. Perfect for new users, or those thinking of switching to FrogOS, this workshop will teach you the tools and skills you need to get started.
What was this all about?
For those technically minded staff that can't wait to get under the skin of FrogOS. Led by our Head of Development, Adam Hepton, the workshop will give information on the future of the FrogOS Development Platform.
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...Chris Huang
Trend Micro collects lots of threat knowledge data for clients containing many different threat (web) entities. Most threat entities will be observed along with relations, such as malicious behaviors or interaction chains among them. So, we built a graph model on HBase to store all the known threat entities and their relationships, allowing clients to query threat relationships via any given threat entity. This presentation covers what problems we try to solve, what and how the design decisions we made, how we design such a graph model, and the graph computation tasks involved.
A Graph Service for Global Web Entities Traversal and Reputation Evaluation B...Chris Huang
Trend Micro collects lots of threat knowledge data for clients containing many different threat (web) entities. Most threat entities will be observed along with relations, such as malicious behaviors or interaction chains among them. So, we built a graph model on HBase to store all the known threat entities and their relationships, allowing clients to query threat relationships via any given threat entity. This presentation covers what problems we try to solve, what and how the design decisions we made, how we design such a graph model, and the graph computation tasks involved.