This is a task from my coursework in Vendor IT. (Unit 3 - p5)
In this task I had to take pictures of myself installing components into the system to configure them in a different task.
This is a presentation about installing Skype, AVG and OpenOffice. This is a easy guide to follow with easy instructions and clear screenshots.
Unit 3 (P6)
This is a presentation about testing pieces of software that has been previously installed testing for its functionality. The software that was tested was OpenOffice, Skype and AVG.
This is part of my IT coursework*
This is a documentation about software licences, legal requirements, processes involved, benefits of registering software, and implications of installing software.
This document is part of my IT coursework*
In this presentation, I used Virtual Desktop to take screenshots and explain how a computer system is build starting with the tower.
This presentation is part of my IT coursework*
This presentation is about how to install and configure wireless NIC software onto the computer system. It is a easy and simple guide to follow. This presentation is part of my IT coursework. (Unit 3 - P6).
This is a presentation about installing Skype, AVG and OpenOffice. This is a easy guide to follow with easy instructions and clear screenshots.
Unit 3 (P6)
This is a presentation about testing pieces of software that has been previously installed testing for its functionality. The software that was tested was OpenOffice, Skype and AVG.
This is part of my IT coursework*
This is a documentation about software licences, legal requirements, processes involved, benefits of registering software, and implications of installing software.
This document is part of my IT coursework*
In this presentation, I used Virtual Desktop to take screenshots and explain how a computer system is build starting with the tower.
This presentation is part of my IT coursework*
This presentation is about how to install and configure wireless NIC software onto the computer system. It is a easy and simple guide to follow. This presentation is part of my IT coursework. (Unit 3 - P6).
This is presentation about embedded devices and contains information about the Google Car and the Google Glass (Smart Glasses).
This presentation is part of my IT coursework.
Comparison between Windows 8 and Mavericks OS XAjay Jassi
This is a presentation about comparing two operating systems. The OS is chose were Windows 8 and Mac Mavericks OS X. I chose these as Microsoft and Apple are competitors.
This presentation is part of my coursework*
Reasons why Hardware is Installed and Potential Problems and the PrecautionsAjay Jassi
In this presentation it explains why hardware is installed and the problems that can happen, It also explains how it can be prevented.
This presentation is part of my IT coursework*
Health and safety requirements for computer maintenanceAjay Jassi
This is a presentation about how employer keeps their employees safe by following the law, and this also shows how files are backed up easily.
This presentation is part of my IT coursework*
Potential problems that occur during hardware installationAjay Jassi
This presentation is about the risk that my occur when installing hardware. It explains how it happens and how it can be prevented.
This is part of my IT coursework*
This is presentation about embedded devices and contains information about the Google Car and the Google Glass (Smart Glasses).
This presentation is part of my IT coursework.
Comparison between Windows 8 and Mavericks OS XAjay Jassi
This is a presentation about comparing two operating systems. The OS is chose were Windows 8 and Mac Mavericks OS X. I chose these as Microsoft and Apple are competitors.
This presentation is part of my coursework*
Reasons why Hardware is Installed and Potential Problems and the PrecautionsAjay Jassi
In this presentation it explains why hardware is installed and the problems that can happen, It also explains how it can be prevented.
This presentation is part of my IT coursework*
Health and safety requirements for computer maintenanceAjay Jassi
This is a presentation about how employer keeps their employees safe by following the law, and this also shows how files are backed up easily.
This presentation is part of my IT coursework*
Potential problems that occur during hardware installationAjay Jassi
This presentation is about the risk that my occur when installing hardware. It explains how it happens and how it can be prevented.
This is part of my IT coursework*
Hardware Documentation and Benefits of Hardware ProviderAjay Jassi
This documentation is about a piece of hardware that has been installed and how some providers can benefit the users.
This document is part of my IT coursework*
IT job role description for Technical Support EngineerAjay Jassi
This is a brief job description about a Technical Support Engineer in the IT Industry. This will be explaining the requirements, qualifications and experience that is needed for the role. It also shows the salary for this specific information, the responsibilities and the main roles that will be done on everyday basics.
This is part of my IT coursework*
This is a mind map created in Microsoft Word, which explains and tells the importances of characteristics that are required for IT employees whilst working in the IT industry.
This document is part of my IT coursework*
This is a presentation about what processes are required before installing and opening up a computer system.Images and annotations will be shown in, note this is a basic presentation.
This is partf my IT coursework*
This presentation is about installing a wireless NIC into a computer system and testing it for its functionality. It also explains how problems can be solved if any precautions happen.
This presentation is part of my IT coursewok*
This is a presentation about how Windows 7 is installed fresh, using a memory stick. This is a basic step-by-step with images.
This is part of my IT coursework*
Installation and configuration of Wireless NICAjay Jassi
This is a presentation showing how to install wireless NIC hardware and software. Images and annotations are used, to make it clear.
This is part of my IT coursework*
This is an invoice for a computer system that is part of another task in my IT coursework. This is to be given to the customer in the scenario and is used for return and exchange policy.
This document is part of my IT coursework*
This is a test table that was created when testing the wireless NIC. It can also be used as a guide, to show how to test a Wi-Fi connection. It includes a number different tests which include ping, ipconfig,and drivers.
This document is part of my IT coursework*
This is a spider diagram explaining how to remove different types of security risks off a computer.
This is diagram was created for part of my IT coursework*
This word document shows and explains how data is transferred and flowed around a computer system. This document is part of my Cisco coursework. (Unit 3 - P3)
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
2. Safety first
Firstly place an antistatic mat on a flat surface.
Place the computer carefully on the mat.
Put the antistatic wristband to your wrist and clip
the crocodile clip inside the tower on a metal part
to conduct the electricity.
3. Installing RAM
Firstly take the RAM out of the packaging.
Secondly allocate the RAM in the position.
Now apply a little pressure to get the RAM
placed into the slot.
Finally clip down the side clips to secure the
RAM and keep it in place.
4. Installing DVD drive
Firstly take out the DVD drive out of the
packaging.
Secondly put the bracket on the DVD drive
using the correct screws and screwdriver.
Now insert the IDE cable to the motherboard.
Finally place the DVD drive in position and
plug the IDE cable to it.
5. Installing HDD
Firstly take out the HDD from the packaging.
Then put the bracket on to the HDD using the
correct screws and screwdriver.
Now insert the ATA data cable to the
motherboard.
Position and place the HDD in place.
Finally plug the ATA data cable to the HDD.
6. Installing wireless NIC
Firstly take out the wireless NIC from the
packaging.
Secondly unclip the supporter lever for the
expansion slots.
Then allocate the wireless NIC and apply little
pressure to secure it in position.
Now push back down the supporter lever for
security.
Finally screw on the antenna to the wireless NIC
adapter.