- Bruno Borges is a Principal Cloud Developer Advocate at Microsoft who has been a Java developer since 2001 and focuses on developer relations.
- The document discusses support for Java applications on Microsoft Azure, including infrastructure options like virtual machines, containers, and serverless computing. It also outlines first-class support for Java technologies and frameworks on various Azure services.
Intro to Azure presentation for CS50X Miami Dade College students. Introduced core cloud concepts, Azure App Services and features for them to take advantage of in their application. This is a general overview.
Build a social network in 4 weeks with Serverless and GraphQLYan Cui
Serverless technologies drastically simplify the task of building modern, scalable APIs in the cloud, and GraphQL makes it easy for frontend teams to consume these APIs and to iterate quickly on your product idea. Together, they are a perfect combination for a product-focused, full-stack team to deliver customer values quickly.
In this talk, see how we built a new social network mobile app in under 4 weeks using Lambda, AppSync, DynamoDB and Algolia. How we approached CI/CD, testing, authentication and lessons we learnt along the way.
Recording: https://www.youtube.com/watch?v=evsz__BDprs
Real-world serverless podcast: https://realworldserverless.com
Learn Lambda best practices: https://lambdabestpractice.com
Blog: https://theburningmonk.com
Consulting services: https://theburningmonk.com/hire-me
Production-Ready Serverless workshop: https://productionreadyserverless.com
DevSecOps, or SecDevOps has the ambitious goal of integrating development, security and operations teams together, encouraging faster decision making and reducing issue resolution times. This session will cover the current state of DevOps, how DevSecOps can help, integration pathways between teams and how to reduce fear, uncertainty and doubt. We will look at how to move to security as code, and integrating security into our infrastructure and software deployment processes.
Join Ido Arad, project leader, to learn more on Force Sites. In this presentation we will present Force Sites technology and demonstrate functionality through several of the websites we have created.
Intro to Azure presentation for CS50X Miami Dade College students. Introduced core cloud concepts, Azure App Services and features for them to take advantage of in their application. This is a general overview.
Build a social network in 4 weeks with Serverless and GraphQLYan Cui
Serverless technologies drastically simplify the task of building modern, scalable APIs in the cloud, and GraphQL makes it easy for frontend teams to consume these APIs and to iterate quickly on your product idea. Together, they are a perfect combination for a product-focused, full-stack team to deliver customer values quickly.
In this talk, see how we built a new social network mobile app in under 4 weeks using Lambda, AppSync, DynamoDB and Algolia. How we approached CI/CD, testing, authentication and lessons we learnt along the way.
Recording: https://www.youtube.com/watch?v=evsz__BDprs
Real-world serverless podcast: https://realworldserverless.com
Learn Lambda best practices: https://lambdabestpractice.com
Blog: https://theburningmonk.com
Consulting services: https://theburningmonk.com/hire-me
Production-Ready Serverless workshop: https://productionreadyserverless.com
DevSecOps, or SecDevOps has the ambitious goal of integrating development, security and operations teams together, encouraging faster decision making and reducing issue resolution times. This session will cover the current state of DevOps, how DevSecOps can help, integration pathways between teams and how to reduce fear, uncertainty and doubt. We will look at how to move to security as code, and integrating security into our infrastructure and software deployment processes.
Join Ido Arad, project leader, to learn more on Force Sites. In this presentation we will present Force Sites technology and demonstrate functionality through several of the websites we have created.
Implementing Bullet-Proof HIPAA Solutions on AWS (SEC306) | AWS re:Invent 2013Amazon Web Services
Implementing a HIPAA solution presents challenges from day one. Not only are you saddled with seemingly insurmountable regulatory challenges, you also take on the stewardship of people's most deeply personal information. The AWS platform simplifies deployment of HIPAA applications by offering a rich set of dynamic scalability, developer services, high availability options, and strong security. Hosting a HIPAA application on the public cloud may seem pretty scary, but Ideomed solved some of this architecture's most vexing challenges by building a major health portal and deploying it on AWS. Come hear Ideomed CEO Keith Brophy and solution architect Gerry Miller talk first-hand about the challenges and solutions, including CloudHSM encryption, multi-AZ failover, dynamic scaling, and more!
Guy Podjarny breaks into a vulnerable serverless application and exploits multiple weaknesses, helping better understand some of the mistakes people make, their implications, and how to avoid them.
Video available on: https://www.infoq.com/presentations/serverless-security-2017
The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. In this session, we’ll provide a practical understanding of the assurance programs that AWS provides; such as HIPAA, FedRAMP(SM), PCI DSS Level 1, MPAA and many others. We’ll also address the types of business solutions that these certifications enable you to deploy on the AWS Cloud, the tools and services AWS makes available to customers to secure and manage their resources and best practices on how to use them.
This session is recommended for anyone with questions about how AWS can meet the compliance requirements of their applications.
360° Kubernetes Security: From Source Code to K8s Configuration SecurityDevOps.com
Kubernetes has become the default way for many organizations to scale and orchestrate their use of containers. However, organizations are starting to find themselves needing to take the necessary steps to protect their containers. Automating security checks throughout the development life cycle can help reduce risk and allow organizations to develop and deploy securely.
Join Shiri Ivstan, Senior Product Manager at WhiteSource and Yaniv Peleg Tsabari, Senior Director of Product Management at Alcide, as they explore the world of security in Kubernetes and discuss:
The security risks associated with open-source code and Kubernetes environments
Supply Chain: Continuous Security throughout the CI/CD pipeline
Security aspects throughout the development cycle, such as Image Scanning, Image Assurance, K8s Configuration hygiene and more.
How to automate policies with respect to the above techniques throughout the CI/CD pipeline in order to facilitate more secure application deployments.
Joe Onisick, Principal Engineer, Cisco discusses building the right network and understanding different overlay approaches at Cisco Connect Toronto 2015.
Best pratices reliability & scalability on AzureAlex Danvy
Software will have bugs, hardware will fail and humans will make mistakes but your application might have to run 24/7 and scale as needed. Let's dive into how Microsoft Azure can help you to build such app using a powerful modern cloud capabilities.
Winning in the Dark: Defending Serverless InfrastructurePuma Security, LLC
This technical session examines real world scenarios security professionals will encounter defending Cloud workloads running on Serverless Infrastructure. Attendees will see a series of hands-on attack techniques for extracting credentials from serverless functions, and how to leverage those credentials for data exfiltration.
The session starts with insecure secrets management in Serverless. Live demonstrations will show how a vulnerability in a function can allow attackers to exfiltrate secrets from a configuration file inside the function’s execution environment.
Attendees will then see how to extract credentials from a function’s execution environment, and use those credentials from a remote machine to gain unauthorized access to data.
Next, the session explores the ephemeral execution environment that is supposed to live for a few hundred milliseconds and then disappear. In practice, does that hold true?
Concluding the session, we discuss some defensive techniques for locking down serverless environments, controlling egress traffic, restricting credential access, and querying audit logs.
Attendees will leave with an understanding of the common attacks and practical security controls for defending their Serverless Infrastructure.
In this updated slideshare, Principal Security Engineer, Eric Johnson shows engineers, developers and application security professionals how to start conversations on implementing security into the DevOps workflow.
You’ll learn about:
1) Cloud and DevSecOps Practices
2) Pre-Commit: The Paved Road
3) Commit: CI / CD Security Controls
4) Acceptance: Supply Chain Security
5) Operations: Continuous Security Compliance
For questions, please contact our team at sales [at] pumascan [dot] com.
Thanks for taking time to further your understanding of DevSecOps!
Security in CI/CD Pipelines: Tips for DevOps EngineersDevOps.com
While DevOps is becoming a new norm for most of the companies, security is typically still behind. The new architectures create a number of new process considerations and technical issues. In this practical talk, we will present an overview of the practical issues that go into making security a part of DevOps processes. Will cover incorporating security into existing CI/CD pipelines and tools DevOps professionals need to know to implement the automation and adhere to secure coding practices.
Join Stepan Ilyin, Chief Product Officer at Wallarm for an engaging conversation where you’ll learn:
Methodologies and tooling for dynamic and static security testing
Composite and OSS license analysis benefits
Secrets and analysis and secrets management approaches in distributed applications
Security automation and integration in CI/CD
Apps, APIs and workloads protection in cloud-native K8s enabled environments
Securing Container-Based Applications at the Speed of DevOpsWhiteSource
Thanks to containerization and automation, applications are being developed and delivered faster than ever. With tools such as AWS ECR, developers are able to store, manage and deploy Docker container images without having to worry about operating their own container repositories or scaling the underlying infrastructure. With this, however, arise challenges around managing the security and compliance aspect of your container images. With tools such as WhiteSource, developers are able to manage the security of their containers and container images with no impact on agility and speed.
Join Shiri Ivtsan, Product Manager at WhiteSource and Carmen Puccio, Solutions Architect at AWS, as they discuss the following:
Effectively managing and deploying your container images
Gaining full visibility into your container images
Building and automating security into each layer of the container environment to ensure a continuous process throughout the SDLC
Demonstrating a live example using a vulnerable container image
Accelerate Digital Transformation with Pivotal Cloud Foundry on AzureVMware Tanzu
Enterprises are looking to leverage the flexibility and elasticity of Azure Cloud to support their business critical applications.
Join us to understand how Pivotal Cloud Foundry running on Azure Cloud can dramatically improve developer productivity, accelerate time-to-market, provide feedback loops, and streamline Day 2 operations for improved efficiency and heightened platform security.
Presenters : Martin McVay, Platform Architect EMEA, Pivotal & Ruediger Schickhaus, Global Black Belt, Microsoft
Implementing Bullet-Proof HIPAA Solutions on AWS (SEC306) | AWS re:Invent 2013Amazon Web Services
Implementing a HIPAA solution presents challenges from day one. Not only are you saddled with seemingly insurmountable regulatory challenges, you also take on the stewardship of people's most deeply personal information. The AWS platform simplifies deployment of HIPAA applications by offering a rich set of dynamic scalability, developer services, high availability options, and strong security. Hosting a HIPAA application on the public cloud may seem pretty scary, but Ideomed solved some of this architecture's most vexing challenges by building a major health portal and deploying it on AWS. Come hear Ideomed CEO Keith Brophy and solution architect Gerry Miller talk first-hand about the challenges and solutions, including CloudHSM encryption, multi-AZ failover, dynamic scaling, and more!
Guy Podjarny breaks into a vulnerable serverless application and exploits multiple weaknesses, helping better understand some of the mistakes people make, their implications, and how to avoid them.
Video available on: https://www.infoq.com/presentations/serverless-security-2017
The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. In this session, we’ll provide a practical understanding of the assurance programs that AWS provides; such as HIPAA, FedRAMP(SM), PCI DSS Level 1, MPAA and many others. We’ll also address the types of business solutions that these certifications enable you to deploy on the AWS Cloud, the tools and services AWS makes available to customers to secure and manage their resources and best practices on how to use them.
This session is recommended for anyone with questions about how AWS can meet the compliance requirements of their applications.
360° Kubernetes Security: From Source Code to K8s Configuration SecurityDevOps.com
Kubernetes has become the default way for many organizations to scale and orchestrate their use of containers. However, organizations are starting to find themselves needing to take the necessary steps to protect their containers. Automating security checks throughout the development life cycle can help reduce risk and allow organizations to develop and deploy securely.
Join Shiri Ivstan, Senior Product Manager at WhiteSource and Yaniv Peleg Tsabari, Senior Director of Product Management at Alcide, as they explore the world of security in Kubernetes and discuss:
The security risks associated with open-source code and Kubernetes environments
Supply Chain: Continuous Security throughout the CI/CD pipeline
Security aspects throughout the development cycle, such as Image Scanning, Image Assurance, K8s Configuration hygiene and more.
How to automate policies with respect to the above techniques throughout the CI/CD pipeline in order to facilitate more secure application deployments.
Joe Onisick, Principal Engineer, Cisco discusses building the right network and understanding different overlay approaches at Cisco Connect Toronto 2015.
Best pratices reliability & scalability on AzureAlex Danvy
Software will have bugs, hardware will fail and humans will make mistakes but your application might have to run 24/7 and scale as needed. Let's dive into how Microsoft Azure can help you to build such app using a powerful modern cloud capabilities.
Winning in the Dark: Defending Serverless InfrastructurePuma Security, LLC
This technical session examines real world scenarios security professionals will encounter defending Cloud workloads running on Serverless Infrastructure. Attendees will see a series of hands-on attack techniques for extracting credentials from serverless functions, and how to leverage those credentials for data exfiltration.
The session starts with insecure secrets management in Serverless. Live demonstrations will show how a vulnerability in a function can allow attackers to exfiltrate secrets from a configuration file inside the function’s execution environment.
Attendees will then see how to extract credentials from a function’s execution environment, and use those credentials from a remote machine to gain unauthorized access to data.
Next, the session explores the ephemeral execution environment that is supposed to live for a few hundred milliseconds and then disappear. In practice, does that hold true?
Concluding the session, we discuss some defensive techniques for locking down serverless environments, controlling egress traffic, restricting credential access, and querying audit logs.
Attendees will leave with an understanding of the common attacks and practical security controls for defending their Serverless Infrastructure.
In this updated slideshare, Principal Security Engineer, Eric Johnson shows engineers, developers and application security professionals how to start conversations on implementing security into the DevOps workflow.
You’ll learn about:
1) Cloud and DevSecOps Practices
2) Pre-Commit: The Paved Road
3) Commit: CI / CD Security Controls
4) Acceptance: Supply Chain Security
5) Operations: Continuous Security Compliance
For questions, please contact our team at sales [at] pumascan [dot] com.
Thanks for taking time to further your understanding of DevSecOps!
Security in CI/CD Pipelines: Tips for DevOps EngineersDevOps.com
While DevOps is becoming a new norm for most of the companies, security is typically still behind. The new architectures create a number of new process considerations and technical issues. In this practical talk, we will present an overview of the practical issues that go into making security a part of DevOps processes. Will cover incorporating security into existing CI/CD pipelines and tools DevOps professionals need to know to implement the automation and adhere to secure coding practices.
Join Stepan Ilyin, Chief Product Officer at Wallarm for an engaging conversation where you’ll learn:
Methodologies and tooling for dynamic and static security testing
Composite and OSS license analysis benefits
Secrets and analysis and secrets management approaches in distributed applications
Security automation and integration in CI/CD
Apps, APIs and workloads protection in cloud-native K8s enabled environments
Securing Container-Based Applications at the Speed of DevOpsWhiteSource
Thanks to containerization and automation, applications are being developed and delivered faster than ever. With tools such as AWS ECR, developers are able to store, manage and deploy Docker container images without having to worry about operating their own container repositories or scaling the underlying infrastructure. With this, however, arise challenges around managing the security and compliance aspect of your container images. With tools such as WhiteSource, developers are able to manage the security of their containers and container images with no impact on agility and speed.
Join Shiri Ivtsan, Product Manager at WhiteSource and Carmen Puccio, Solutions Architect at AWS, as they discuss the following:
Effectively managing and deploying your container images
Gaining full visibility into your container images
Building and automating security into each layer of the container environment to ensure a continuous process throughout the SDLC
Demonstrating a live example using a vulnerable container image
Accelerate Digital Transformation with Pivotal Cloud Foundry on AzureVMware Tanzu
Enterprises are looking to leverage the flexibility and elasticity of Azure Cloud to support their business critical applications.
Join us to understand how Pivotal Cloud Foundry running on Azure Cloud can dramatically improve developer productivity, accelerate time-to-market, provide feedback loops, and streamline Day 2 operations for improved efficiency and heightened platform security.
Presenters : Martin McVay, Platform Architect EMEA, Pivotal & Ruediger Schickhaus, Global Black Belt, Microsoft
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Jeremy Gray
This is a presentation given at DogFoodCon 2018 on running regulated financial workloads in the cloud. There were over 100 people in attendance and all were amazed at the skill of the presenter and the power of Azure, also Albert Einstein showed up for a cameo.
AWS는 다양한 서비스 빌딩 블록을 이용하여, 고객의 요구에 따른 다양한 사물 인터넷(IoT) 서비스를 구축할 수 있습니다. 본 온라인 세미나에서는 AWS IoT 서비스의 주요 개념과 함께 일반적인 인터넷 기기 및 스마트 홈을 위한 IoT 서비스 구현 패턴을 알아봅니다. 이를 위해 데이터 상태 관리, 데이터 분석 및 자원 관리 등의 패턴을 통해 비용 효율적이고 확장 가능한 아키텍처를 살펴봅니다.
AWS Lambda, API Gateway, DynamoDB 등 서버리스 빌딩 블록과 AWS IoT를 연계한 iRobot의 아카텍처 사례를 함께 살펴봄으로서 IoT 기반 서비스 구현 및 이전에 통찰력을 얻으실 수 있습니다.
Slides from the May 20th workshop at the Seattle Node.js Meetup presented by Shubhra Kar titled: "Develop, Deploy, Monitor and Hyper-scale REST APIs Built in Node.js"
Architecting IoT solutions with Microsoft AzureAlon Fliess
A lecture about Azure IoT solutions that I gave in the CodeValue Architecture Next 2018 conference.
The lecture provides information about SaaS and PaaS IoT solutions as well as the smart Edge,
Presented at CTTDNUG in Ontario, Canada:
In this session, we’ll take a guided tour through the end-to-end DevOps capabilities of VSTS and Azure. But it won’t just be from the point of view of .NET devs, but also developers and IT Pros working with any language and any platform.
See how no matter what operating system or dev stack you use, VSTS can provide value. If you already have investments in other DevOps tools, no problem! VSTS is fantastic at integrating with nearly any toolchain you can think of.
The Java ecosystem is very broad, with different technologies including Java SE, Java EE/Jakarta EE, Spring, numerous application servers, and other frameworks. Wherever you are in Java, Azure supports your workload and process with an abundance of choice – from IaaS to fully managed services. You can run any application architecture, from monoliths, to containerized monoliths, all the way to completely microservices based apps.
We see three broad patterns for running Java applications in the cloud, depending on how much control or productivity you need.
The first is lift and shift with Virtual Machines:
Virtual machines provide the most flexibility, control and visibility while moving to the cloud, especially for initial lift and shift of Java workloads. Azure provides a variety of Java focused VM images and solutions templates in the Azure Marketplace to get you up and running quickly.
The second is modernization using containers:
Containers provide portability, flexibility, scalability, manageability, repeatability, and predictability.
Azure provides best of breed support for Docker and Kubernetes, especially through the Azure Kubernetes Service (AKS) and Azure Red Hat OpenShift.
Finally, Azure has the most managed hosting options for Java applications of any major cloud platform with fully managed PaaS for Spring, Tomcat, and JBoss EAP:
Managed services offer ease-of-use, ease-of-management, productivity, and lower total cost of ownership.
You can focus on building your applications, not managing infrastructure.
All of this is supported by managed databases and DevOps tooling:
Use fully managed SQL and NoSQL databases, including PostgreSQL, MySQL, Cosmos DB, and SQL.
Keep using the tools you love, with plugins for IntelliJ and Eclipse, integrations with a variety of DevOps tools like Maven, Gradle, Jenkins, and GitHub.
Du 7 au 9 mai aura lieu la conférence Microsoft //Build, LA conférence des développeurs Microsoft.
A peine le temps de digérer les nombreuses sessions proposées par Microsoft que nos MVP vous présentent une synthèse des principales annonces.
Enterprise DevOps is different then DevOps in startups and smaller companies. This session how AWS/CSC address this. How AWS IaaS level automation via CloudFormation, UserData, Console, APIS and some PaaS OpsWorks/Beanstalk is complimented by CSC Agility Platform. CSC Agility adds application compliance and security to the AWS infrastructure compliance and security. CSC Agility allows for the creation of architecture blueprints for predefined application offerings.
The presentation was given on 11/12/2018 on CloudExpo NY. The presentation talks about software portability approaches and technologies on Kubernetes, microservices, service mesh, and serverless platforms
AWS is architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. When using AWS, not only are infrastructure headaches removed, but so are many of the security issues that come with them.
FIWARE Global Summit - Keyrock: Protecting MicroservicesFIWARE
Presentation by Álvaro Alonso González, PhD (Professor, Universidad Politécnica de Madrid) and Alejandro Pozo Huertas (Researcher and PhD student, Universidad Politecnica de Madrid)
FIWARE Global Summit
23-24 October 2019 - Berlin, Germany
Visual Studio and Xamarin enable developers to create native Android and iOS apps with world-class tools in a fast, familiar, and flexible way. Join this tour of how you can use your existing C# and .NET skills to create fully native apps on every platform.
Best practices with Microsoft Graph: Making your applications more performant...Microsoft Tech Community
Learn how to take advantage of APIs, platform capabilities and intelligence from Microsoft Graph to make your app more performant, more resilient and more reliable
Build interactive emails for Outlook with Actionable Messages using Adaptive Cards. In this session, you will learn how to code a simple and great looking Actionable Message end-to-end.
As organizations deploy additional security controls to combat today’s evolving threats, integration challenges often limit the return of investment. The new security API in the Microsoft Graph makes it easier for enterprise developers and ISVs to unlock insights from these solutions by unifying and standardizing alerts for easier integration and correlation, bringing together contextual data to inform investigations, and enabling automation for greater SecOps efficiency. We will walk through real world examples of applications that leverage the security API to help customers realize the full value of their security investments.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
5. Azure: The Trusted Cloud
More certifications than any other cloud provider.
HIPAA /
HITECH Act
FERPA
GxP
21 CFR Part 11
ISO 27001 SOC 1 Type 2ISO 27018 CSA STAR
Self-Assessment
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSA
Shared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1 MARS-E FFIEC
China
TRUCS
SOC 2 Type 2 SOC 3
Canada
Privacy Laws
MPAA
Privacy
Shield
ISO 22301
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
CSA STAR
Certification
CSA STAR
Attestation
HITRUST IG Toolkit UK
China
DJCP
ITAR
Section 508
VPAT
SP 800-171 FIPS 140-2
High
JAB P-ATO
CJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4
IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLOBALUSGOVINDUSTRYREGIONAL
ISO 27017
7. Deployment Choices
Lift & Shift
Kubernetes &
Containers
Cloud Native
Platforms
Serverless
Definition Traditional VM workloads.
Tomcat/Spring web apps.
Java EE applications.
Relational databases.
Container-based
deployments. Use of
Netlix OSS and other
related tools for
service orchestration.
CloudFoundry and
OpenShift.
NoSQL databases.
Event-triggered
ephemeral functions
with micro billing.
Partners Red Hat, Oracle, IBM, Azul
Systems, Terraform, CloudBees
Docker, CloudBees,
Azul Systems, Red Hat
Pivotal, Red Hat CloudBees, Pivotal
Commonly
Applied
Azure
Services
Azure Migrate Service, Azure
VMs, Azure AD, Azure Site
Recovery, Azure Database
Migration Service, Azure
DevTest Labs
Azure Container
Service (AKS), Azure
Container Instances,
Azure Container
Registry
Azure VMs, Azure
Container Service
(AKS), Azure
Storage, Azure AD,
Azure CosmosDB
Azure Functions,
Azure Logic Apps,
Azure AppInsights,
Azure CosmosDB
Customer
Cases
Stanley Healthcare, RCS Italy,
Daimler
JB Hunt Ford, Manulife, Merrill,
Mastercard
Large restaurant
company
8. Modern Java Technology Support
•
•
•
•
IaaS – Linux Distributions
Multi-Cloud Platforms Tools DevOps
Cloud Automation Kubernetes & Containers
OSS Foundations
On Azure, more than 40% of workloads are Linux-based.
JVMs, Frameworks, Runtimes
11. 1st Class Support for Java on Azure Services
Azure Functions
• Java SE 8, based on Azul’s Zulu
• Java SDK
• Plugins for Maven, Eclipse, and IntelliJ
• VS Code Extension (manage; local/remote
debug)
Azure App Service
• Java SE 8, based on Azul’s Zulu
• Tomcat 8.5, 9.0
• Maven Plugin
• Eclipse & IntelliJ Plugins
• VS Code Extension (Manage)
Azure SDKs for Java
• Management APIs (CRUD Azure services)
• REST-to-Java APIs (idiomatic low-level REST
• Fluent APIs (idiomatic service features)
• Over 50+ services covered
• Open Source SDKs
Azure Application Insights
• Java SDK for user-defined instrumentation
• Java Agents for auto instrumentation
• Eclipse Plugin
• Open Source SDKs
Azure Cosmos DB
• Java SDK for synchronous connections
• Java SDK for asynchronous (reactive) style
• Support for MongoDB/Cassandra APIs
• Open Source SDKs
Azure Service Fabric
• Java API
• Java SDK
• Maven Dependencies and Plugins
• Eclipse Plugins and VS Code Extensions
13. SQL DBs Support for Java Apps on Azure
9 of 10DBs supported/managed on Azure
300+On Azure Marketplace
SQL Operations Studio – Lightweight open source tool based on VS Code engine for
developing and managing Azure SQL services – others on the roadmap.
14.
15.
16. Visual Studio Code – Extensions
By Microsoft
• Debugger for Java
• Remote Function Debug
• Java Extension Pack
• Apache Maven
• Test Runner (JUnit)
• Spring Initializr
• Azure Terraform
By Partners
• Red Hat: Java Language Support
• Pivotal: Spring, CloudFoundry, Bosh
Visual Studio Team Services Extensions
By Microsoft
• Jenkins Integration
• GitHub Integration
• Apache Tomcat
• Ansible
• Apache Maven
• Docker
By Partners and 3rd party
• CloudBees: Jenkins Platform
• JFrog: Artifactory