Java technology allows programs to run on a variety of hardware platforms, including the mainframe computing platform epitomized by z Systems. The z Systems zOS operating system has a set of unique capabilities, and IBM SDK for Java provides a set of high performance Java APIs complemented by z/OS specific APIs for applications that require deep integration. This talk shows how IBM makes use of the z/OS platform to deliver world-class runtimes on the world leading mainframe.
Originally presented at the z/OS bootcamp in Hursley, 2015
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowdCasey Ellis
This deck goes through what Log4j is from ground-level concepts up, explains how Log4j works, how it is vulnerable, how the Log4shell exploit works, how to mitigate the risk and defend against exploitation, and some current observations through the Bugcrowd platform and predictions about what happens next.
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
On December 9th, researchers uncovered a zero-day critical vulnerability in the Apache Log4j library used by millions of Java applications. CVE-2021-44228 or “Log4Shell” is a RCE vulnerability that allows attackers to execute arbitrary code and potentially take full control over an infected system. The vulnerability has been ranked a 10/10 on the CVSSv3 severity scale.
While the Apache Foundation has already released a patch for this CVE, it can take weeks or months for vendors to update their software, and there are already widespread scans being conducted by malicious attackers to exploit Log4Shell.
What should companies or organizations do?
Join Marco Preuss, Head of Europe’s Global Research and Analysis (GReAT) team, Marc Rivero and Dan Demeter, Senior Security Researchers with GReAT, for an in-depth discussion on Log4Shell and a live Q&A session.
To see the full webinar, please visit: https://securelist.com/webinars/log4shell-vulnerability-how-to-stay-secure/?utm_source=Slideshare&utm_medium=partner&utm_campaign=gl_jespo_je0066&utm_content=link&utm_term=gl_Slideshare_organic_s966w1tou5a0snh
This presentation covers the working model about Process, Thread, system call, Memory operations, Binder IPC, and interactions with Android frameworks.
LOG4j allows the developer to control which log statements are output with arbitrary granularity. It is fully configurable at runtime using external configuration files.
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowdCasey Ellis
This deck goes through what Log4j is from ground-level concepts up, explains how Log4j works, how it is vulnerable, how the Log4shell exploit works, how to mitigate the risk and defend against exploitation, and some current observations through the Bugcrowd platform and predictions about what happens next.
The Log4Shell Vulnerability – explained: how to stay secureKaspersky
On December 9th, researchers uncovered a zero-day critical vulnerability in the Apache Log4j library used by millions of Java applications. CVE-2021-44228 or “Log4Shell” is a RCE vulnerability that allows attackers to execute arbitrary code and potentially take full control over an infected system. The vulnerability has been ranked a 10/10 on the CVSSv3 severity scale.
While the Apache Foundation has already released a patch for this CVE, it can take weeks or months for vendors to update their software, and there are already widespread scans being conducted by malicious attackers to exploit Log4Shell.
What should companies or organizations do?
Join Marco Preuss, Head of Europe’s Global Research and Analysis (GReAT) team, Marc Rivero and Dan Demeter, Senior Security Researchers with GReAT, for an in-depth discussion on Log4Shell and a live Q&A session.
To see the full webinar, please visit: https://securelist.com/webinars/log4shell-vulnerability-how-to-stay-secure/?utm_source=Slideshare&utm_medium=partner&utm_campaign=gl_jespo_je0066&utm_content=link&utm_term=gl_Slideshare_organic_s966w1tou5a0snh
This presentation covers the working model about Process, Thread, system call, Memory operations, Binder IPC, and interactions with Android frameworks.
LOG4j allows the developer to control which log statements are output with arbitrary granularity. It is fully configurable at runtime using external configuration files.
Top 50 Performance Testing Interview Questions | EdurekaEdureka!
YouTube Link: https://youtu.be/BOTUQfgIEec
(*** Selenium Certification Training : https://www.edureka.co/testing-with-selenium-webdriver ***)
This edureka PPT on "Performance Testing Interview Questions" will help you prepare for interviews related to Performance Testing. It also provides the most commonly asked questions about JMeter tool.
Selenium playlist: https://goo.gl/NmuzXE
Selenium Blog playlist: http://bit.ly/2B7C3QR
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
These are the slides I used to introduce students in my Testing Project course (http://adam.goucher.ca/?page_id=306) to Performance Testing and the JMeter (http://jakarta.apache.org) tool. Of course I cannot upload the hour long walkthrough of the tool as we created a Test Plan for the project but the slides are better than nothing.
Van Wilson
Senior Consultant with Cardinal Solutions
Find more by Van Wilson: https://speakerdeck.com/vjwilson
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Multi-Cloud Global Server Load Balancing (GSLB)Avi Networks
Watch on-demand https://info.avinetworks.com/webinars/global-server-load-balancing
GSLB has been traditionally deployed across multi-site data centers for disaster recovery and faster app response time. Increasingly, GSLB is applied across on-prem data centers and public clouds to better serve geo-distributed users. However cloud load balancing is lacking in terms of enterprise-class GSLB support. With distributed containerized applications and microservices deployed in Kubernetes clusters, visibility and health monitoring becomes ever more critical.
In this webinar, learn how Avi Vantage:
- Support DR scenarios for both Active / Standby and Active / Active applications
- Provision centrally with automated discovery of applications across sites
- Perform non-disruptive migration / expansion / consolidation of data centers
- Address use cases: multi-cloud deployments, cloud bursting, and site failure handling / recovery
These slides were presented at GDG MeetUp in Bangalore which was held on 21st September 2013. Uploading the slides to help the people who wanted the slide Deck
Controlling Access to IBM i Systems and DataPrecisely
Security best practice and regulations such as SOX, HIPAA, GDPR and others require you to restrict access to your critical IBM i systems and their data, but this is easier said than done. Legacy, proprietary access protocols now co-exist with new, open-source protocols to create access control headaches.
View this webcast on-demand for an in-depth discussion of IBM i access points that must be secured and how exit points can be leveraged to accomplish the task. We’ll cover:
• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution
API Security - Everything You Need to Know To Protect Your APIsAaronLieberman5
With more APIs in circulation than ever before, there has been a direct correlation to the number of API abuses reported across industries. This is because APIs are such a valuable asset to bad actors, but many organizations have not yet woken up to the realities of the need to protect their APIs from abuse. If you couple that with the fact that attacks on APIs have become more sophisticated, with some attackers even using AI themselves, then you can see why even some of the more security-conscious organizations can have trouble properly securing their APIs.
A robust API Security posture can be broken down into several areas including:
Proper design and coding during the development process
API governance and compliance through visibility of all your APIs (shadow too!) and a mapping of how they connect to each other.
General application and API protection from tools such as API gateways, WAFs, NG-WAF, and RASPS
An always-updating understanding of your user behaviors regarding your APIs.
You won’t have comprehensive API security without solutions in each of these areas.
We will also discuss:
The roles of API developers, infosec, support, and enterprise architects as it relates to API security
Microservices role in making it difficult to secure your APIs
The importance of inventorying your APIs
How technologies like Traceable can help protect your APIs against advanced attacks
Key takeaways:
Why your API's are a key attack surface for modern bad actors
Why APi's are so much harder to secure than traditional web traffic
What's necessary to secure your APIs
Why yesterday's solutions can't solve today's new API security challenges
This presentation was given by Seema Kumar, Websphere Product Management and Surya V Duggirala, Websphere Performance Architect at IBM Impact 2012 at Mumbai on the 1st of June. It talks about Innovative Applications and Interactive Experiences
Top 50 Performance Testing Interview Questions | EdurekaEdureka!
YouTube Link: https://youtu.be/BOTUQfgIEec
(*** Selenium Certification Training : https://www.edureka.co/testing-with-selenium-webdriver ***)
This edureka PPT on "Performance Testing Interview Questions" will help you prepare for interviews related to Performance Testing. It also provides the most commonly asked questions about JMeter tool.
Selenium playlist: https://goo.gl/NmuzXE
Selenium Blog playlist: http://bit.ly/2B7C3QR
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
These are the slides I used to introduce students in my Testing Project course (http://adam.goucher.ca/?page_id=306) to Performance Testing and the JMeter (http://jakarta.apache.org) tool. Of course I cannot upload the hour long walkthrough of the tool as we created a Test Plan for the project but the slides are better than nothing.
Van Wilson
Senior Consultant with Cardinal Solutions
Find more by Van Wilson: https://speakerdeck.com/vjwilson
All Things Open
October 26-27, 2016
Raleigh, North Carolina
Multi-Cloud Global Server Load Balancing (GSLB)Avi Networks
Watch on-demand https://info.avinetworks.com/webinars/global-server-load-balancing
GSLB has been traditionally deployed across multi-site data centers for disaster recovery and faster app response time. Increasingly, GSLB is applied across on-prem data centers and public clouds to better serve geo-distributed users. However cloud load balancing is lacking in terms of enterprise-class GSLB support. With distributed containerized applications and microservices deployed in Kubernetes clusters, visibility and health monitoring becomes ever more critical.
In this webinar, learn how Avi Vantage:
- Support DR scenarios for both Active / Standby and Active / Active applications
- Provision centrally with automated discovery of applications across sites
- Perform non-disruptive migration / expansion / consolidation of data centers
- Address use cases: multi-cloud deployments, cloud bursting, and site failure handling / recovery
These slides were presented at GDG MeetUp in Bangalore which was held on 21st September 2013. Uploading the slides to help the people who wanted the slide Deck
Controlling Access to IBM i Systems and DataPrecisely
Security best practice and regulations such as SOX, HIPAA, GDPR and others require you to restrict access to your critical IBM i systems and their data, but this is easier said than done. Legacy, proprietary access protocols now co-exist with new, open-source protocols to create access control headaches.
View this webcast on-demand for an in-depth discussion of IBM i access points that must be secured and how exit points can be leveraged to accomplish the task. We’ll cover:
• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution
API Security - Everything You Need to Know To Protect Your APIsAaronLieberman5
With more APIs in circulation than ever before, there has been a direct correlation to the number of API abuses reported across industries. This is because APIs are such a valuable asset to bad actors, but many organizations have not yet woken up to the realities of the need to protect their APIs from abuse. If you couple that with the fact that attacks on APIs have become more sophisticated, with some attackers even using AI themselves, then you can see why even some of the more security-conscious organizations can have trouble properly securing their APIs.
A robust API Security posture can be broken down into several areas including:
Proper design and coding during the development process
API governance and compliance through visibility of all your APIs (shadow too!) and a mapping of how they connect to each other.
General application and API protection from tools such as API gateways, WAFs, NG-WAF, and RASPS
An always-updating understanding of your user behaviors regarding your APIs.
You won’t have comprehensive API security without solutions in each of these areas.
We will also discuss:
The roles of API developers, infosec, support, and enterprise architects as it relates to API security
Microservices role in making it difficult to secure your APIs
The importance of inventorying your APIs
How technologies like Traceable can help protect your APIs against advanced attacks
Key takeaways:
Why your API's are a key attack surface for modern bad actors
Why APi's are so much harder to secure than traditional web traffic
What's necessary to secure your APIs
Why yesterday's solutions can't solve today's new API security challenges
This presentation was given by Seema Kumar, Websphere Product Management and Surya V Duggirala, Websphere Performance Architect at IBM Impact 2012 at Mumbai on the 1st of June. It talks about Innovative Applications and Interactive Experiences
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
The ICAP Integrated Development Environment (IDE) provides a number of standard development tools to ease the design of modern applications.
Mobile (Worklight)
Includes IBM's industry leading mobile development platform
Java (WebSphere Liberty Profile)
Rapidly build next-generation, engaging applications for the WebSphere Application Server Liberty Profile.
JavaScript (Node.js)
Easily build applications with the most popular JavaScript runtime for event-driven server side development .
Cloud Explorer
Quickly discover shared services to enhance applications. Develop custom services to share with others.
In this talk I give an overview of IBM's efforts to create a VM-agnostic toolkit of runtime components from the mature J9 Java Virtual Machine (JVM). I provide a summary of the motivations behind this project, talk about some important proof points with CPython and Ruby MRI, describe the motivations behind an open community for this technology, and discuss the many challenges with creating a runtime agnostic Just In Time compiler from the Testarossa Java JIT.
Java SE 8 is the latest eagerly anticipated release of the Java platform that powers much of IBM's software and provides functionality for you to get your work done. This presentation describes the new features available in the virtual machine and associated libraries and tooling. Learn how to be more productive as a developer, use new techniques for exploiting modern hardware to process large volumes of data in parallel with GPUs, move data efficiently across the network, and exploit the virtualization potential of your data center. The talk outlines a road map for IBM's technology and valuable tips directly from IBM's Java engineers.
Presentation I held @Codemotion Roundtable on Continuous Delivery & PaaS.
How can you bring value at speed in an ever changing context?
You have to concentrate on what is really valuable, remove waste from your processes and eliminate all your Technical Debt.
Main principles you have to follow are:
- Dev & test in production like environment
- Deliver continuously, experiment continuously
- Validate quality continuously
- Collaborate and be open to feedback
How can you do this without adopting a PaaS approach? Not impossibile but very hard.
At the heart of traditional Continuous Delivery is the deployment pipeline. A build is generated, promoted through several testing environments and if it passes tests and is aligns with business needs is deployed to Production. This model struggles to account for complex systems where releases involve numerous inter-related builds and/or components that don't fit neatly into the model of "builds" such as incremental content migrations, configuration changes, database schema updates, or report / ETL migrations. This presentation examines the limitations of the build promotion model, architectural approaches for adapting applications to that model, and deployment approaches that realign the release pipeline around the migration of value, rather than the migration of builds.
Watch the Webinar
http://www.urbancode.com/html/resources/webinars/Adapting_Deployment_Pipelines_to_Complex_Applications.html/
2019 ibm io t exchange - meeting safety-related software auditsM Kevin McHugh
This presentation describes how to use IBM's ELM tool suite with Rhapsody and Rational Publishing Engine to accomplish functional safety traceability across the whole V model
Helping Organizations Realize the Value of DevOps with Continuous Software De...IBM UrbanCode Products
The IBM UrbanCode solution enables continuous release and application deployment allowing organizations to deliver applications rapidly and improve overall time to market.
Continuous Application Delivery to WebSphere - Featuring IBM UrbanCodeIBM UrbanCode Products
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere – which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere – which allows for management of WAS configurations.
See how, when combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Impact2014 session # 1523 performance optimization using ibm java on z and w...Elena Nanos
IMPACT 2014 ACU-1523: Performance Optimization Using IBM Java on z/OS & IBM WebSphere Application Server on z/OS V8.5.5
I was a guest speaker at IBM IMPACT 2014 conference. This session outlines how to optimize the performance of IBM WebSphere Application Server on z/OS applications, reduce CPU utilization, and take advantage of the latest zEC12 enhancements. IBM continues its efforts and investments in its Java Virtual Machine on IBM System z. zEC12 hardware packs an awesome performance punch with second-generation, out-of-order pipeline design, large caches, and 5.5 GHz hex-core processor. With the exploitation of new features, IBM Java Runtime Environment continues a long history of aggressive vertical integration on IBM System z. Come hear how HCSC is taking advantage of the latest IBM WebSphere Application Server and Java releases and enhancements. This presentation covers installation of Java V6.1, V7.0, and V7.1 with IBM WebSphere Application Server on z/OS V8.5.5 and exploitation of 1 Meg large pages with zEC12 Flash Express and IBM zEnterprise Data Compression with z/OS V2.1. Benchmark performance data is presented
Infrastructure Fitness and Design Simplicity for IBM Mobile ConnectBill Malchisky Jr.
Given at IBM Connect 2013, 31 January 2013
Most companies are unaware of IBM Mobile Connect - the hidden authentication jewel in the IBM Collaboration portfolio. No matter if you want to start with it or if you've learned in last year's conference how to setup IBM Mobile Connect - it's now time for optimization and tuning. This session will provide you a deep dive on different installation considerations and deployment design. Join to get real-world information about topics like how to install IMC on Linux 64bit, specific problems of different operating systems and how to setup IMC in High Availability. Last but not least we'll introduce to you the new capabilities of IMC 6.1.5 which enable it to be used with Sametime Mobile, Connections Mobile and Traveler High Availability.
The Extraordinary World of Quantum ComputingTim Ellison
Originally presented at QCon London - 6 March-2018.
The classical computer on your lap or housed in your data centre manipulates data represented with a binary encoding -- quantum computers are different. They use atomic level mechanics to represent multiple data states simultaneously, leading to a phenomenal exponential increase in the representable state of data, and new solutions to problems that are infeasible using today's classical computers. This session assumes no prior knowledge of quantum technology and presents a introduction to the field of quantum computing, including an introduction to the quantum bit, the types of problem suited to quantum computing, a demo of running algorithms on IBM's quantum machines, and a peek into the future of quantum computers.
Apache Spark has rocked the big data landscape, becoming the largest open source big data community with over 750 contributors from more than 200 organizations. Spark's core tenants of speed, ease of use, and its unified programming model fit neatly with the high performance, scalable, and manageable characteristics of modern Java runtimes. In this talk Tim Ellison, a JVM developer at IBM, shows some of the unique Java 8 capabilities in the JIT compiler, fast networking, serialization techniques, and GPU off-loading that deliver the ultimate big data platform for solving business problems. Tim will demonstrate how solutions, previously infeasible with regular Java programming, become possible with this high performance Spark core runtime, enabling you to solve problems smarter and faster.
A Java Implementer's Guide to Better Apache Spark PerformanceTim Ellison
Apache Spark has rocked the big data landscape, becoming the largest open source big data community with over 750 contributors from more than 200 organizations. Spark's core tenants of speed, ease of use, and its unified programming model fit neatly with the high performance, scalable, and manageable characteristics of modern Java runtimes. In this talk we introduce the Spark programming model, and describe some of our unique Java 8 capabilities in the JIT, fast networking, serialization techniques, and GPU off-loading that deliver the ultimate big data platform for solving business problems. We will demonstrate how solutions, previously infeasible with regular Java programming, become possible with our high performance Spark core runtime, enabling you to solve problems smarter and faster.
Presented at Jfokus Feb 2016
This presentation outlines a number of the new features in Java 7, and some specific technologies delivered as part of IBM SDK for Java version 7.
Originally presented in Bangalore, India 2011
Ever wonder how Java achieves such success in the “write once, run anywhere” (WORA) promise? In this talk, a senior member of the IBM Java team speaks candidly about the many difficulties Java faces behind the scenes around compatibility, and the various perspectives to consider. We describe areas such as bugs, bug fixes, algorithmic implementation assumptions, optimizations, multiple JVM implementations, and language changes. Hear how IBM is making Java better by championing compatibility and by contributing directly to OpenJDK. By the end of the session you will have clear insights on the complexity of the issue and how it’s addressed in the OpenJDK ecosystem.
Originally presented at JavaOne 2012 San Francisco
Developing programs that are inherently immune to attack requires sound software engineering practices. This session looks at the overall software engineering lifecycle and the critical points at which software security is a specific consideration. From the requirements for third-party suppliers to in-house development, your process must offer a level of confidence that the software functions as intended and is free of vulnerabilities. The presentation shows how using threat models, code pattern analysis tooling, targeted reviews, and more enhances Java security.
Originally presented at JavaOne 2013 San Francisco
Java has a security model targeted at running applets and untrusted code, so you don’t need to worry about running your own code on your own servers, right? In fact, there are several vulnerability patterns that can affect server-side Java applications, and this presentation outlines some of the steps you should take to ensure that your server room is not compromised. It looks at the established techniques for enhancing your security and shows new technology from IBM that addresses several attack vectors.
Modules all the way down: OSGi and the Java Platform Module SystemTim Ellison
A talk about the Java Platform Module System defined in JSR 376, and OSGi modularity. Originally delivered at the OSGi Community Event held in conjunction with the EclipseCon Europe 2015 conference in Ludwigsburg, Germany.
Five cool ways the JVM can run Apache Spark fasterTim Ellison
The IBM JVM runs Apache Spark fast! This talk explains some of the findings and optimizations from our experience of running Spark workloads.
The talk was originally presented at the SparkEU Summit 2015 in Amsterdam.
The IBM Java implementation is now virtualization aware! In modern data centres, highly virtualized systems produce a challenge for traditional Java implementations and applications designed for static systems. The IBM JVM exposes Virtualization and OS related information through a set of MXBeans. This session talks about the newly added APIs and the use cases to better optimize the JVM in the cloud.
This talk presents a number of opportunities to tune the JVM (virtualization info in javacore, JIT idle tuning etc) and also for a way to tune the middleware virtualized environments.
Learn about the Virtualization aware JVM and explore the ways to exploit this information to optimize your application for the cloud.
Using GPUs to Handle Big Data with JavaTim Ellison
A copy of the slides presented at JavaOne conference 2014.
Learn how Java can exploit the power of graphics processing units (GPUs) to optimize high-performance enterprise and technical computing applications such as big data and analytics workloads. This presentation covers principles and considerations for GPU programming from Java and looks at the software stack and developer tools available. It also presents a demo showing GPU acceleration and discusses what is coming in the future.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
11. 2
IBM Java 8 – (available March 6th, 2015**)
IBM SDK for z/OS, Java Tech. Edition, Version 8
New Java8 Language Features
• Lambdas, virtual extension methods
IBM z13 exploitation
• Vector exploitation and other new instructions
• Instruction scheduling
General throughput improvements
• Up-to 17% better application throughput
• Significant improvements to ORB
Improved crypto performance for IBMJCE
• Block ciphering, secure hashing and public key
• Up-to 4x improvement to Public Key using ECC
• CPACF instructions: AES, 3DES, SHA1, SHA2, etc
Significantly improved application ramp-up
• Up-to 50% less CPU to ramp-up to steady-state
• Improved perf of ahead-of-time compiled code
Improved Monitoring
• JMX beans for precise CPU-time monitoring
Enhancements to JZOS Toolkit for Java batch
ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems
** www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=ca&infotype=an&supplier=897&letternum=ENUS215-004#
15. IBM z13: SMT – Simultaneous Multi -Threading
SMT permits multiple independent threads to execute on a single core concurrently
• Achieve more effectively utilization of processor resources
z13 SMT allows 2 threads-per-core to deliver better overall throughput for multiple
concurrent workloads
• Increases effective zIIP/IFL capacity
• Doubles number of eligible threads
Threads share resources – may impact single thread perf
• Pipeline (eg. physical registers, fxu, fpu, lsu etc)
• Cache
Throughput improvement is workload dependent
Two zIIP lanes handle more traffic overall
4ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems
16. IBM z13: Vector Processing
SIMD – Single Instruction Multiple Data
Operate on multiple data-elements (vectors) simultaneously
• Can offer dramatic speed-up to data-parallel operations (matrix ops,
string processing, etc)
5ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems
Vector registers are 128-bits wide and can be used
to operate concurrently on:
• Two 64-bit floating point values
• Four 32-bit floating point values
• Sixteen 8-bit characters
• Two 64-bit integer values
• etc
17. 6
Acceleration using SIMD with
IBM Java 8 and z13
IBM z13 running Java 8 on z/OS
Single Instruction Multiple Data (SIMD) vector engine exploitation
java.lang.String exploitation
- compareTo
- compareToIgnoreCase
- contains
- contentEquals
- equals
- indexOf
- lastIndexOf
- regionMatches
- toLowerCase
- toUpperCase
- getBytes
java.util.Arrays
- equals (primitive types)
String encoding converters
For ISO8859-1, ASCII, UTF8, and UTF16
- encode (char2byte)
- decode (byte2har)
Auto-SIMD
- Simple loops
(eg. Matrix multiplication)
Primitive operations are between 1.6x and 60x faster with IBM Java8
(Controlled measurement environment, results may vary)
ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems
23. 7
z/OS WAS 8.5.5.5 – SSL-Enabled DayTrader 3.0
2.6x improvement in throughput with IBM Java 8 and IBM z13
(Controlled measurement environment, results may vary)
ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems
24. 88
Mobile on z – z/OS Connect on IBM Java 8 and zEC12
(Controlled measurement environment, results may vary)
5 - 16.4% throughput improvement from IBM Java 8 and IBM zEC12
ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems
25. 9
IBM Business Rules Processing with
IBM Java 8 and z13
Aggregate 2.1x improvement from IBM Java 8 and IBM z13
(Controlled measurement environment, results may vary)
ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems
26. 10
Java Store, Inventory and Point-of-Sale App
with IBM Java 8 and z13
1.9x improvement in throughput with IBM Java 8 and IBM z13
(Controlled measurement environment, results may vary)
ASZ-2026 : Reasons to Love IBM Java and WebSphere Application Server on z Systems