Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
Graphic recording artist Kelly Kingman depicts the interesting points and key takeaways from some of our in-booth presentation at Black Hat USA 2015.
Read more about what Black Hat USA has to offer here: http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/a-snapshot-of-black-hat-usa-2015/
Accelerate Incident Response with Orchestration & AutomationSplunk
Daily IT security operations processes have not changed significantly over the past decade, but that all stands to change now that a new technology has arrived—enabling security teams to work smarter, respond faster, and improve their defenses. With Security Orchestration, Automation and Response (SOAR) technology, mundane processes can be handled by computers, allowing the SOC team to focus on identifying and responding to the real threats and attacks. This session examines traditional SOC processes and what becomes possible with a SOAR platform like Splunk Phantom. Whether it's a two-person security operation or a full complement SOC, learn to identify the processes that computers can handle on your behalf, and how to go beyond simple use cases and leverage all of the available security tools in your arsenal to the max.
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
Graphic recording artist Kelly Kingman depicts the interesting points and key takeaways from some of our in-booth presentation at Black Hat USA 2015.
Read more about what Black Hat USA has to offer here: http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/a-snapshot-of-black-hat-usa-2015/
Accelerate Incident Response with Orchestration & AutomationSplunk
Daily IT security operations processes have not changed significantly over the past decade, but that all stands to change now that a new technology has arrived—enabling security teams to work smarter, respond faster, and improve their defenses. With Security Orchestration, Automation and Response (SOAR) technology, mundane processes can be handled by computers, allowing the SOC team to focus on identifying and responding to the real threats and attacks. This session examines traditional SOC processes and what becomes possible with a SOAR platform like Splunk Phantom. Whether it's a two-person security operation or a full complement SOC, learn to identify the processes that computers can handle on your behalf, and how to go beyond simple use cases and leverage all of the available security tools in your arsenal to the max.
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...Splunk
IT operations is only continuing to grow in complexity. There are too many alerts for human operators to process and little to no visibility into which alerts are business impacting. And it’s only getting worse with the addition of new devices and the growing list of services being employed by organisations — slowing detection and resolution times. Why is this a problem? Legacy IT solutions have left organisations in a complex and manual state. With too many siloed tools, productivity for IT remains low, and they’re often plagued in their inability to find the exact root cause.
Splunk Incident Response, Orchestrierung und AutomationSplunk
Tauchen Sie in die Welt von SOAR ein und entdecken Sie die Möglichkeiten von „Security Automation, Orchestration and Response”. Lernen Sie was Playbooks sind und wie Sie diese erstellen. Unser Beispiel Playbook untersucht alle Inhalte einer E-Mail, erstellt eine Risiko Bewertung und initiiert Aktionen wie z.B. sperren der URL, File Detonation etc.
SPEAKERS
Phil Royer, Research Engineer, Splunk
Rod Soto, Principal Security Research Engineer, Splunk
Obtaining data to develop defenses against threats is a constant challenge for security analysts. To that end, Splunk's Security Research team developed the Splunk SIEMulator, a framework modeled after Chris Long's DetectionLab that allows a...
Discussing advances in Magnetic Bead coating technologies - Page 9 & 10 - Article from Joshua Soldo from Australian listed Biotech company Anteo Diagnostics ASX:ADO
How to do successful gene expression analysis - Siena 20100625Biogazelle
Despite its conceptual and practical simplicity, qPCR based expression analysis involves multiple steps, all of which need to be perfect in order to obtain reliable results in the end. This presentation describes points of attention, potential pitfalls and suggestions for improvements on every step along the workflow. By implementing these guidelines in your experiments you increase the chance of doing successful gene expression analysis.
Summary table that compares the performance specifications of Illumina's new sequencers - HiSeq X and NextSeq with MiSeq and HiSeq 2500. Includes number of samples that can run on the different sequencers.
PCR Array Data Analysis Tutorial: qPCR Technology Webinar Series Part 3QIAGEN
Using actual PCR Array data, this slidedeck presents an easy-to-use and free web-based data analysis tool to calculate fold-differences in gene expression from your raw real-time PCR threshold cycles. Learn how you can look at your results in different formats, including heat map, scatter, volcano, clustergram and multigroup plot.
Advanced miRNA Expression Analysis: miRNA and its Role in Human Disease Webin...QIAGEN
miRNAs are small functional RNAs, which regulate gene expression post-transcriptionally. The miScript miRNA PCR Array System is a sensitive and reliable technology for detection of mature miRNAs in any laboratory. In this slideshow, the challenges of miRNA data analysis and solutions that the miScript miRNA PCR Arrays provide for researchers interested in identifying miRNA from cells, tissues and FFPE samples are described. You will also learn how to use our GeneGlobe Data Analysis Center to identify miRNAs that may be important in your favorite biological pathway or disease.
PCR - From Setup to Cleanup: A Beginner`s Guide with Useful Tips and Tricks -...QIAGEN
This End-Point PCR Beginner´s Guide will not only give you a comprehensive overview of tools and techniques to help you to get the most out of your samples, but also give you information on dedicated solutions and complete workflows on multiplex PCR and PCR fragment analysis.
This module is about 13 days training for Customer Service Representatives, and Communication Arts students. This is patterned to TESDA's 100 to 120 training hours.
This is a stylization of a slideshow originally created by Karl Fisch, examining globalization and America’s future in the 21st century. It is designed to stand alone, without having to be presented in person. Enjoy!
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...Splunk
IT operations is only continuing to grow in complexity. There are too many alerts for human operators to process and little to no visibility into which alerts are business impacting. And it’s only getting worse with the addition of new devices and the growing list of services being employed by organisations — slowing detection and resolution times. Why is this a problem? Legacy IT solutions have left organisations in a complex and manual state. With too many siloed tools, productivity for IT remains low, and they’re often plagued in their inability to find the exact root cause.
Splunk Incident Response, Orchestrierung und AutomationSplunk
Tauchen Sie in die Welt von SOAR ein und entdecken Sie die Möglichkeiten von „Security Automation, Orchestration and Response”. Lernen Sie was Playbooks sind und wie Sie diese erstellen. Unser Beispiel Playbook untersucht alle Inhalte einer E-Mail, erstellt eine Risiko Bewertung und initiiert Aktionen wie z.B. sperren der URL, File Detonation etc.
SPEAKERS
Phil Royer, Research Engineer, Splunk
Rod Soto, Principal Security Research Engineer, Splunk
Obtaining data to develop defenses against threats is a constant challenge for security analysts. To that end, Splunk's Security Research team developed the Splunk SIEMulator, a framework modeled after Chris Long's DetectionLab that allows a...
Discussing advances in Magnetic Bead coating technologies - Page 9 & 10 - Article from Joshua Soldo from Australian listed Biotech company Anteo Diagnostics ASX:ADO
How to do successful gene expression analysis - Siena 20100625Biogazelle
Despite its conceptual and practical simplicity, qPCR based expression analysis involves multiple steps, all of which need to be perfect in order to obtain reliable results in the end. This presentation describes points of attention, potential pitfalls and suggestions for improvements on every step along the workflow. By implementing these guidelines in your experiments you increase the chance of doing successful gene expression analysis.
Summary table that compares the performance specifications of Illumina's new sequencers - HiSeq X and NextSeq with MiSeq and HiSeq 2500. Includes number of samples that can run on the different sequencers.
PCR Array Data Analysis Tutorial: qPCR Technology Webinar Series Part 3QIAGEN
Using actual PCR Array data, this slidedeck presents an easy-to-use and free web-based data analysis tool to calculate fold-differences in gene expression from your raw real-time PCR threshold cycles. Learn how you can look at your results in different formats, including heat map, scatter, volcano, clustergram and multigroup plot.
Advanced miRNA Expression Analysis: miRNA and its Role in Human Disease Webin...QIAGEN
miRNAs are small functional RNAs, which regulate gene expression post-transcriptionally. The miScript miRNA PCR Array System is a sensitive and reliable technology for detection of mature miRNAs in any laboratory. In this slideshow, the challenges of miRNA data analysis and solutions that the miScript miRNA PCR Arrays provide for researchers interested in identifying miRNA from cells, tissues and FFPE samples are described. You will also learn how to use our GeneGlobe Data Analysis Center to identify miRNAs that may be important in your favorite biological pathway or disease.
PCR - From Setup to Cleanup: A Beginner`s Guide with Useful Tips and Tricks -...QIAGEN
This End-Point PCR Beginner´s Guide will not only give you a comprehensive overview of tools and techniques to help you to get the most out of your samples, but also give you information on dedicated solutions and complete workflows on multiplex PCR and PCR fragment analysis.
This module is about 13 days training for Customer Service Representatives, and Communication Arts students. This is patterned to TESDA's 100 to 120 training hours.
This is a stylization of a slideshow originally created by Karl Fisch, examining globalization and America’s future in the 21st century. It is designed to stand alone, without having to be presented in person. Enjoy!
Join us on our upcoming BYOP (Bring Your Own Pizza) "Application Security Meetup" to hear about the latest cyber security breaches, trends and technologies in modern application development.
Agenda:
17:00 - 17:10 - Opening words - by Lior Mazor (Organizer)
17:10 - 17:35 - 'Recent cyber security attacks in Israel' - by Lior Mazor (Organizer)
17:35 - 18:00 - ‘How to deliver a secure product’ - by Michael Furman (Tufin)
18:00 - 18:30 - 'Hacking serverless - Introduction to Serverless Application Security' - by Yossi Shenhav (Komodo)
18:30-19:00 - ‘Post Apocalypse: Exploiting web messaging implementations’ - by Chen Gour-Arie (enso security)
Splunk for Enterprise Security Featuring UBASplunk
This session will review Splunk’s two premium solutions for information security organizations: Splunk for Enterprise Security (ES) and Splunk User Behavior Analytics (UBA). Splunk ES is Splunk's award-winning security intelligence solution that brings immediate value for continuous monitoring across SOC and incident response environments – allowing you to quickly detect and respond to external and internal attacks, simplifying threat management while decreasing risk. Splunk UBA is a new technology that applies unsupervised machine learning and data science to solving one of the biggest problems in information security today: insider threat. You’ll learn how Splunk UBA works in tandem with ES, or third-party data sources, to bring significant automated analytical power to your SOC and Incident Response teams. We’ll discuss each solution and see them integrated and in action through detailed demos.
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
This session will review Splunk’s two premium solutions for information security organizations: Splunk for Enterprise Security (ES) and Splunk User Behavior Analytics (UBA). Splunk ES is Splunk's award-winning security intelligence solution that brings immediate value for continuous monitoring across SOC and incident response environments – allowing you to quickly detect and respond to external and internal attacks, simplifying threat management while decreasing risk. Splunk UBA is a new technology that applies unsupervised machine learning and data science to solving one of the biggest problems in information security today: insider threat. You’ll learn how Splunk UBA works in tandem with ES, or third-party data sources, to bring significant automated analytical power to your SOC and Incident Response teams. We’ll discuss each solution and see them integrated and in action through detailed demos.
Splunk for Enterprise Security and User Behavior AnalyticsSplunk
This session will review Splunk’s two premium solutions for information security organizations: Splunk for Enterprise Security (ES) and Splunk User Behavior Analytics (UBA). Splunk ES is Splunk's award-winning security intelligence solution that brings immediate value for continuous monitoring across SOC and incident response environments – allowing you to quickly detect and respond to external and internal attacks, simplifying threat management while decreasing risk. Splunk UBA is a new technology that applies unsupervised machine learning and data science to solving one of the biggest problems in information security today: insider threat. You’ll learn how Splunk UBA works in tandem with ES, or third-party data sources, to bring significant automated analytical power to your SOC and Incident Response teams. We’ll discuss each solution and see them integrated and in action through detailed demos.
Today’s cyber criminals are more sophisticated, more agile and more aggressive than traditional security measures can protect against. One simply needs to open a news source today to find a headline on a new breach - Office of Management Personal, Sony, Target are just a few examples of note. The increase in attacks and breaches can be attributed to a variety of factors, not the least of which include: a rise in asymmetric threats, commoditization of threats/attacks and incomplete security strategies. By incorporating cyber threat analysis in your security strategy, however, you can better counter and mitigate these threats.
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk
To successfully prevent infections from becoming a data breach, security analysts need the ability to continuously collect, analyse, correlate and investigate a diverse set of data.
Join this webinar to hear Matthias Maier, Splunk Security Product Marketing Manager and Filip Wijnholds, Splunk Senior Systems Engineer, discuss the specific data sources and capabilities required to determine the scope of an infection before it turns into a breach.
During this session, you'll learn:
- The capabilities required to distinguish an infection from a breach
- The specific analysis steps to understand the scope of an attack
- The data sources required to gain deep and broad visibility
- What to look for from network and endpoint data sources
We also demonstrate a live incident investigation using this approach, you can view the recording here:
https://splunkevents.webex.com/splunkevents/lsr.php?RCID=cab764b0457c615aa5f02ddfd351fe9f
Trending it security threats in the public sectorCore Security
State and local information security leaders continue to be challenged with the “new norm,” to do more with less, while remaining on top of technology trends driving the marketplace. Traditional information security approaches often have limited impact and require more attention and resources.
Please join Grayson Walters, Information Security Officer of Virginia Department of Taxation, and Eric Cowperthwaite, Vice President of Advanced Security and Strategy at Core Security as they discuss some of the top IT security trends and developments in the public sector, more specifically, within state and local governments.
Splunk for Enterprise Security featuring User Behavior Analytics Splunk
This session will review Splunk’s two premium solutions for information security organizations: Splunk for Enterprise Security (ES) and Splunk User Behavior Analytics (UBA). Splunk ES is Splunk's award-winning security intelligence solution that brings immediate value for continuous monitoring across SOC and incident response environments – allowing you to quickly detect and respond to external and internal attacks, simplifying threat management while decreasing risk. Splunk UBA is a new technology that applies unsupervised machine learning and data science to solving one of the biggest problems in information security today: insider threat. You’ll learn how Splunk UBA works in tandem with ES, or third-party data sources, to bring significant automated analytical power to your SOC and Incident Response teams. We’ll discuss each solution and see them integrated and in action through detailed demos.
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
You face an increasing number of cyber threats that are difficult to detect and defeat. Beating them might seem like Mission: Impossible. It's not.
Palo Alto Networks and Splunk with their next-generation, best-of-breed technologies have developed a joint solution to make defeating these threats Mission: Possible. Join us on Tuesday, June 30, in Santa Clara for a workshop providing hands-on exposure to both technologies. You'll walk away knowing how to:
Prevent known and unknown threats at both the network and endpoint through a wide range of integrated technologies including: firewall, application visibility and control, cloud-based malware analysis, advanced endpoint protection, mobile workforce security, and data loss prevention (Palo Alto Networks)
Harness all the raw log files and event data generated by any user, system, or application in your IT infrastructure (aka "big data") to quickly perform Security Information Event Management (SIEM)-like use cases including: advanced threat and anomaly detection, incident investigations and forensics, and security/compliance reporting and analytics (Splunk)
Automatically pass data on threats from Splunk to Palo Alto Networks to enable automated remediation
Are you a security or networking professional looking to get hands-on experience with these next-generation technologies? Don't let your network self-destruct.
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
When your cyber security is under attack, knowing who is behind your threats and what their motives are can help you ensure those threats don't become a reality. But cyber threat actors conduct their threats through a variety of means and for a variety of reasons. That's why it is critical to analyze a variety of data sources and proactively hunt those threats that are lying in wait. This webinar will illustrate how the IBM i2 QRadar Offense Investigator app enables analysts to push event data from QRadar directly into IBM i2 Analyst's Notebook, where users can apply a variety of visual analysis techniques across a disparate data sources, to build a more comprehensive understand of those threats and hunt them.
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
.conf Go 2023 presentation:
"Das passende Rezept für die digitale (Security) Revolution zur Telematik Infrastruktur 2.0 im Gesundheitswesen?"
Speaker: Stefan Stein -
Teamleiter CERT | gematik GmbH M.Eng. IT-Sicherheit & Forensik,
doctorate student at TH Brandenburg & Universität Dresden
.conf Go 2023 presentation:
De NOC a CSIRT
Speakers:
Daniel Reina - Country Head of Security Cellnex (España) & Global SOC Manager Cellnex
Samuel Noval - Global CSIRT Team Leader, Cellnex
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
BMW is defining the next level of mobility - digital interactions and technology are the backbone to continued success with its customers. Discover how an IT team is tackling the journey of business transformation at scale whilst maintaining (and showing the importance of) business and IT service availability. Learn how BMW introduced frameworks to connect business and IT, using real-time data to mitigate customer impact, as Michael and Mark share their experience in building operations for a resilient future.
Data foundations building success, at city scale – Imperial College LondonSplunk
Universities have more in common with modern cities than traditional places of learning. This mini city needs to empower its citizens to thrive and achieve their ambitions. Operationalising data is key to building critical services; from understanding complex IT estates for smarter decision-making to robust security and a more reliable, resilient student experience. Juan will share his experience in building data foundations for a resilient future whilst enabling digital transformation at Imperial College London.
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
Learn how Vodafone has provided end-to-end visibility across services by building an Operational Analytics Platform. In this session, you will hear how Stefan and his team manage legacy, on premise, hybrid and public cloud services, and how they are providing a platform for complex triage and debugging to tackle use cases across Vodafone’s extensive ecosystem.
.italo operates an Essential Service by connecting more than 100 million people annually across Italy with its super fast and secure railway. And CISO Enrico Maresca has been on a whirlwind journey of his own.
Formerly a Cyber Security Engineer, Enrico started at .italo as an IT Security Manager. One year later, he was promoted to CISO and tasked with building out – and significantly increasing the maturity level – of the SOC. The result was a huge step forward for .italo.
So how did he successfully achieve this ambitious ask? Join Enrico as he reveals the key insights and lessons learned in his SOC journey, including:
Top challenges faced in improving security posture
Key KPIs implemented in order to measure success
Strategies and approaches applied in the SOC
How MITRE ATT&CK and Splunk Enterprise Security were utilised
Next steps in their maturity journey ahead
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
2. 2
About
• ILMN: $2B-revenue, newly added to the S&P,
growing 15-25% annually, 4000 emp.
• Market leader in geneLc sequencing devices
• 90% of all DNA data produced in the world
was done with our equipment
“Smartest
company in
the world”
-MIT Tech
Review 2014.
3. 3
About Me
• Jason Callahan (@JasonPCallahan)
• MBA, CISSP (2001)
• >20 years InformaLon Security experience: 2
startups, 1 Fortune 500, several Finance/
Banking, US Air Force
• Brought in to Illumina to build the security
program & team
• Fun fact: I was once the only physical
security control for every F-117 Stealth ever
made