Sun Storage F5100 Flash Array, Redefining Storage Performance and Efficiency-...Agora Group
The document discusses Sun Storage F5100 Flash Array, a flash storage solution that provides unprecedented performance and efficiency. It achieves over 1 million IOPS in a single rack unit while using a fraction of the power and space of traditional HDD storage. The F5100 is well-suited for accelerating databases and I/O-intensive applications. Sun also offers other flash products like the Flash Accelerator F20 PCIe card and flash modules that can boost server performance. Customers have reported significant improvements in response times, throughput, and reductions in power costs when using Sun's flash solutions.
This document promotes online video publishing services from Zitec, highlighting their websites at videopublishing.com and zitec.com as well as their Twitter accounts. It suggests that video publishing can help people share their stories and experiences while facing various challenges in life.
Noile soluţii Intel pentru afaceri eficiente-23apr2010Agora Group
This document discusses Intel technologies for efficient IT infrastructures and provides the following key points:
1. Intel has fabrication facilities around the world producing microchips on advanced technology nodes.
2. Intel's Core processor family delivers scalable performance across devices from netbooks to servers through Intel architecture.
3. Intel's new 2010 Core processors feature technologies like Turbo Boost for intelligent performance and integrated graphics.
The document discusses addressing password management challenges with single sign-on using IBM's Tivoli Access Manager for Enterprise Single Sign-On solution. It notes that typical users have multiple passwords for different applications that are hard to remember. The solution allows users to access multiple applications with a single password without modifying existing applications or directories. It also discusses benefits like reduced help desk costs, strengthened security, improved compliance and user productivity.
Sun Storage F5100 Flash Array, Redefining Storage Performance and Efficiency-...Agora Group
The document discusses Sun Storage F5100 Flash Array, a flash storage solution that provides unprecedented performance and efficiency. It achieves over 1 million IOPS in a single rack unit while using a fraction of the power and space of traditional HDD storage. The F5100 is well-suited for accelerating databases and I/O-intensive applications. Sun also offers other flash products like the Flash Accelerator F20 PCIe card and flash modules that can boost server performance. Customers have reported significant improvements in response times, throughput, and reductions in power costs when using Sun's flash solutions.
This document promotes online video publishing services from Zitec, highlighting their websites at videopublishing.com and zitec.com as well as their Twitter accounts. It suggests that video publishing can help people share their stories and experiences while facing various challenges in life.
Noile soluţii Intel pentru afaceri eficiente-23apr2010Agora Group
This document discusses Intel technologies for efficient IT infrastructures and provides the following key points:
1. Intel has fabrication facilities around the world producing microchips on advanced technology nodes.
2. Intel's Core processor family delivers scalable performance across devices from netbooks to servers through Intel architecture.
3. Intel's new 2010 Core processors feature technologies like Turbo Boost for intelligent performance and integrated graphics.
The document discusses addressing password management challenges with single sign-on using IBM's Tivoli Access Manager for Enterprise Single Sign-On solution. It notes that typical users have multiple passwords for different applications that are hard to remember. The solution allows users to access multiple applications with a single password without modifying existing applications or directories. It also discusses benefits like reduced help desk costs, strengthened security, improved compliance and user productivity.
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
This document describes a digital platform that allows for personalized application design and automation. It can be integrated with existing ERP and CRM systems. The platform has over 3.5 million users worldwide across 40 countries and Fortune 500 companies. It offers a no-code approach and fast implementation. The document then goes on to describe the various functionalities and modules of the platform, including connectivity, processes, data management, intranet/extranet, and document management.
The document discusses the role of business process management (BPM) in enabling organizational paradigm shifts from reactive to proactive, inward to outward, and low-value to high-value. It provides case studies on using BPM to automate supplier invoice processing, improve sales and distribution workflows using IoT, and leverage robotic process automation to reduce costs. The presentation covers key BPM concepts like data capturing, parameterization, process triggers, and how technologies like artificial intelligence can optimize process rules based on analytics.
This 3-sentence summary provides an overview of the key points about a classroom course on conducting internet research:
The course is divided into two parts, with the first being a theoretical introduction that covers the history, actors, and definitions involved in internet intelligence and the second being a hands-on portion where students will use various software tools and online sources to perform sample research on individuals, companies, investigations, and productions. Successful completion of the course exercises and a final research report are required to attain the learning objectives of understanding professional search strategies, tricks, and connecting information on individuals, businesses, and events.
The next generation of Companies management: state of the art in BPMAgora Group
AuraPortal International is a company created in 2002 that is financially strong with 25 million euros in initial equity capital. It has over 100 employees at its headquarters and over 500 consultants worldwide. AuraPortal provides an enterprise solution that helps organizations achieve productivity and efficiency by creating and automating processes without programming code, and applies advanced technologies to intelligence business management with a good user experience.
The document discusses capabilities of an ETL tool for processing large amounts of data. It can load and transform large XML files and flat files in memory, perform data validation and profiling, and write transformation logic within the tool. It also describes features for processing large XML files, scaling to terabytes of memory storage, monitoring processes, and batch loading/inserting large datasets. Performance metrics are provided for various data processing tasks.
The document discusses the Association of Business Process Management Professionals Romania Chapter. It provides information on ABPMP International, the founding and mission of the Romania chapter, and the chapter's vision and strategic objectives. The chapter's objectives include enrolling over 100 members by the end of 2015, certifying 10 members, organizing monthly workshops, and partnering with BPM training/certification and solutions providers. It also aims to translate BPM materials to Romanian and define BPM professional standards and a knowledge management system.
IBM’s Smarter Process Reinvent BusinessAgora Group
This document summarizes Don Seymour's presentation on IBM's Smarter Process portfolio to the BPM Eastern Europe National Conference. The presentation discusses IBM's history beginning in 1911, strategy of using data to transform industries, and Smarter Process products including Business Process Manager, Blueworks Live, Business Monitor, and Operational Decision Manager. Examples are provided of how these products help optimize processes, drive efficiency, and improve decision making.
This document discusses lessons that can be learned from international healthcare systems to develop a sustainable healthcare system. It provides 3 key lessons:
1. Prioritize health in policymaking by demonstrating how health impacts productivity, education, employment and economic growth.
2. Increase investment in healthcare through dedicated funding and by legislating specific access entitlements.
3. Engage patients by making services patient-centered, ensuring quality communication of information, and driving continuous quality improvement.
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
This document discusses national and international perspectives on healthcare informatics and standards. It covers HL7 Romania and its role in developing electronic health standards and certification. It also discusses new healthcare paradigms focused on quality, personalized care, and patient empowerment. Key trends include longitudinal electronic patient records, semantic and organizational interoperability, and interconnected national and regional health systems. Standardization bodies like HL7 play an important role in developing standards, methodologies, and specifications to support digital health ecosystems.
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
This document describes a digital platform that allows for personalized application design and automation. It can be integrated with existing ERP and CRM systems. The platform has over 3.5 million users worldwide across 40 countries and Fortune 500 companies. It offers a no-code approach and fast implementation. The document then goes on to describe the various functionalities and modules of the platform, including connectivity, processes, data management, intranet/extranet, and document management.
The document discusses the role of business process management (BPM) in enabling organizational paradigm shifts from reactive to proactive, inward to outward, and low-value to high-value. It provides case studies on using BPM to automate supplier invoice processing, improve sales and distribution workflows using IoT, and leverage robotic process automation to reduce costs. The presentation covers key BPM concepts like data capturing, parameterization, process triggers, and how technologies like artificial intelligence can optimize process rules based on analytics.
This 3-sentence summary provides an overview of the key points about a classroom course on conducting internet research:
The course is divided into two parts, with the first being a theoretical introduction that covers the history, actors, and definitions involved in internet intelligence and the second being a hands-on portion where students will use various software tools and online sources to perform sample research on individuals, companies, investigations, and productions. Successful completion of the course exercises and a final research report are required to attain the learning objectives of understanding professional search strategies, tricks, and connecting information on individuals, businesses, and events.
The next generation of Companies management: state of the art in BPMAgora Group
AuraPortal International is a company created in 2002 that is financially strong with 25 million euros in initial equity capital. It has over 100 employees at its headquarters and over 500 consultants worldwide. AuraPortal provides an enterprise solution that helps organizations achieve productivity and efficiency by creating and automating processes without programming code, and applies advanced technologies to intelligence business management with a good user experience.
The document discusses capabilities of an ETL tool for processing large amounts of data. It can load and transform large XML files and flat files in memory, perform data validation and profiling, and write transformation logic within the tool. It also describes features for processing large XML files, scaling to terabytes of memory storage, monitoring processes, and batch loading/inserting large datasets. Performance metrics are provided for various data processing tasks.
The document discusses the Association of Business Process Management Professionals Romania Chapter. It provides information on ABPMP International, the founding and mission of the Romania chapter, and the chapter's vision and strategic objectives. The chapter's objectives include enrolling over 100 members by the end of 2015, certifying 10 members, organizing monthly workshops, and partnering with BPM training/certification and solutions providers. It also aims to translate BPM materials to Romanian and define BPM professional standards and a knowledge management system.
IBM’s Smarter Process Reinvent BusinessAgora Group
This document summarizes Don Seymour's presentation on IBM's Smarter Process portfolio to the BPM Eastern Europe National Conference. The presentation discusses IBM's history beginning in 1911, strategy of using data to transform industries, and Smarter Process products including Business Process Manager, Blueworks Live, Business Monitor, and Operational Decision Manager. Examples are provided of how these products help optimize processes, drive efficiency, and improve decision making.
This document discusses lessons that can be learned from international healthcare systems to develop a sustainable healthcare system. It provides 3 key lessons:
1. Prioritize health in policymaking by demonstrating how health impacts productivity, education, employment and economic growth.
2. Increase investment in healthcare through dedicated funding and by legislating specific access entitlements.
3. Engage patients by making services patient-centered, ensuring quality communication of information, and driving continuous quality improvement.
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
This document discusses national and international perspectives on healthcare informatics and standards. It covers HL7 Romania and its role in developing electronic health standards and certification. It also discusses new healthcare paradigms focused on quality, personalized care, and patient empowerment. Key trends include longitudinal electronic patient records, semantic and organizational interoperability, and interconnected national and regional health systems. Standardization bodies like HL7 play an important role in developing standards, methodologies, and specifications to support digital health ecosystems.
The document discusses security as a continuous concern for CIOs. It summarizes best practices for security including risk assessment, network protection, device protection and monitoring. It also discusses the importance of business impact analysis and having executive awareness of cyber security. The document notes that security threats are becoming more sophisticated and targets specific targets. It lists mobile devices, cloud computing, phishing and malware as ongoing security concerns. The document advocates for strong security policies, regular security updates, and employee education as part of an effective security program.
The document discusses various security threats that can occur in a LAN network and methods to mitigate them. It covers threats like information stealing, denial of service attacks, rogue DHCP servers and spanning tree attacks. It then introduces 802.1x authentication as a standard to authenticate devices connecting to the LAN or WLAN. It describes the protocols involved like EAPoL and RADIUS. Additional methods discussed are dynamic VLAN assignment, DHCP snooping, port security, BPDU guard, root guard and ingress filtering to enhance network security.
1. Stefan Tanase, Senior Security Researcher, Kaspersky Lab
stefant@kaspersky.ro | twitter.com/stefant | pgp_keyid: 0xdd749e1b
Cu ochii în patru
Incidentele de securitate ce au marcat anul 2010
2. Despre Kaspersky Lab
Fondată în 1997
• Cea mai mare companie de securitate IT încă de inută de fondatoriț
• Întotdeauna profitabilă, cre tere organică, concentrare pe R&Dș
+2000 de angaja iț - i tot căutăm!ș
• Aproape 1000 de angaja i doar în R&Dț
27 de birouri locale
• Statele Unite, Rusia, Tucia, UK, Germania, Fran a, România, Dubai, Africa deț
Sud, Japonia, China etc.
• Parteneri în mai mult de 100 de ăriț
Global Research and Analysis Team
• Echipă globală de exper i în securitate informaticăț
+40.000 noi programe malware iș 3.500 de noi semnături în fiecare zi
Protejăm mai mult de 300 de milioane de utilizatori
Luptăm pe toate fronturile împotriva criminalită ii informaticeț
4. Prima poveste
Implica ii majoreț : percep ia amenin ărilor către companiiț ț
Prima poveste aduce implica ii majore modului în care percepem i tratămț ș
amenin ările electronice la adresa companiilorț
Atacul Aurora
5. A doua poveste
Întreaga imagine este devastatoare
Consecin e majoreț felului în care privim securitatea informatică în zilele noastre
Stuxnet botnet
6. A treia poveste
O amenin are în buzunarulț fiecăruia...
…în doar câ iva aniț
7. A patra poveste
Va afecta modul în care procesăm informa ia i luăm deciziiț ș
Este veche i a început să ia avânt foarte încetș
6464 bits computing64 bits computing
11. 64 bi iț
Când securitatea este ca o sabie cu două tăi uri.ș
12. Cele patru incidente ce au marcat anul 2010
Reflectă trecutul, prezentul i viitorulș
amenin ărilor la securitatea informaticăț
Reflectă trecutul, prezentul i viitorulș
amenin ărilor la securitatea informaticăț
14. Thank You
Stefan Tanase, Senior Security Researcher, Kaspersky Lab
stefant@kaspersky.ro | twitter.com/stefant | pgp_keyid: 0xdd749e1b
Vă mul umesc!ț
Întrebări?
Editor's Notes
Today, I will tell you four stories.
They all have happened in 2010 and have major implications towards the way we do security software and protect our clients
These are not success stories – instead, they are warnings to us
What is the picture showing us?
An Aurora Borealis – it’s about the Aurora attack
Stuxnet – cyber espionage, supermalware
Star trek?
It is becoming popular faster than we anticipated
I have one, how many of you have one already?
Eugene Kaspersky said Apple behaves like Novell and Google Behaves like Microsoft. Will the iPhone die?
Probably not, but Android will probably become the new Windows.
This old issue is NOT Chess.
How many squares are on a chess board? 64
64 bit operating systems and malware
The Aurora attack – happened last year
But was reported this year
It was not just Google – evidence seems to indicate over 30 Fortune 500 companies were hit
During the US presidential campaign, Obama’ staff discovered something similar.
The supermalware
Yes, it exists.
Stuxnet is one such example. How many of you know that KL has an NDA with Microsoft about it?
The things we discovered in Stuxnet were so terrible that Microsoft asked us to withhold the public information.
Between the most hit countries – Iran. What is Iran mostly about? Oil and nuclear research. Both are managed via SCADA.
Who would like to get more information about Iran’s nuclear weapon program?
The first real Trojan for Android discovered by KL at the beginning of August
Reports such as the Smobile Systems report indicate tens of thousands of potentially dangerous Android Apps
Unlike the iPhone, Android apps have a higher level of access to the system
Exploits which obtain ‘root’ access (rooting) on Android are already available
It’s easier than Jailbreaking the iPHONE – it is “recommended” on the Internet to boost performance, etc
5 years ago, I predicted 64 bit malware. That didn’t happen!
At the end of August, something bad happened.
Microsoft disclosed that 46% of Windows 7 installations than 64 bit vs 11% in Vista, vs less than 1% XP
32 bit malware is rather ineffective on 64 bit.
At the end of August, TDSS got a 64 bit version. This is the beginning of an era.
Ladies and gentlmen, these are the big four stories that changed and shaped the year
There is no doubt other things will hit the news in 2011. I'd predict we'll see an immediate drop in exploits against PDF Reader once the sandbox is released. We'll only see targeted attacks against older versions and it'll force a lot of these big (Aurora-type) targets to move quickly to upgrade. Other things to keep an eye for and that we’ve been mentioning for a while are probably P2P threats, wireless security, ATM hacks and why not, infrastructure attacks. A lot of reasons to worry, some might say. Yet, we have managed to fight back and protect the customers, which is why I believe the battle goes on. We need bigger guns, better ammunition. We need better laws, and the Dutch police for instance has been doing a great job dismantling botnets. Some hope for better laws, that could allow the police to take a more active role in fighting cybercrime. In essence, we need more soldiers and of course, we need to be prepared.