The document discusses a multi-account strategy for AWS that includes isolating accounts by purpose (e.g. sandbox, security, development, production), centralizing user management and logging, and using AWS Organizations and IAM roles to control access across accounts. It provides an example account layout and steps for migrating to a multi-account structure, including enabling required AWS services and configuring permissions.
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, they designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, we discuss how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and Pagerduty to create logs, notify developers and account owners of changes, and track trends in remediation.
Using automation to drive continuous-compliance best practices - SEC208 - New...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, the teams designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, learn how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and PagerDuty to create logs, notify developers and account owners of changes, and track trends in remediation.
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
Building a well-managed and secure AWS account access management for enterprise customers and AWS partners is essential for managing a large number of AWS accounts. In this session, we review new features, best practices, and the risks involved when architecting organizational units. We also cover how to build dynamic access structures.
Five New Security Automations Using AWS Security Services & Open Source (SEC4...Amazon Web Services
In this session, we dive deep into the actual code behind various security automation and remediation functions. We demonstrate each script, describe the use cases, and perform a code review explaining the various challenges and solutions. All use cases are based on customer and C-level feedback and challenges. We look at things like IAM policy scope reduction, alert and ticket integration for security events, forensics and research on AWS resources, secure pipelines, and more. Please join us for a speaker meet-and-greet following this session at the Speaker Lounge (ARIA East, Level 1, Willow Lounge). The meet-and-greet starts 15 minutes after the session and runs for half an hour.
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Amazon Web Services
In this workshop, create guardrails to ensure governance is applied and identify when people stray. This session will deep dive into AWS Landing Zone, AWS Organizations, AWS Config, and Identity and Access Management. We will focus on the Operational Excellence and Security pillar best practices, of the AWS Well-Architected Framework, using a multi-account strategy. We address the architectural and operational decisions you need to make. In the cloud, you can start at the core and create defense in depth at the individual resource level. This session is designed for security and compliance practitioners interested in estate management, auditing of infrastructure, advanced IAM techniques, and overall governance management.
Architecting security & governance across your AWS environmentAmazon Web Services
Many AWS customers use multiple accounts to meet their requirements for billing, infrastructure isolation, and separation of duties. In this session, we discuss the latest updates around establishing and building a multi-account security and governance strategy. We will also take a look at data protection strategies for ensuring data integrityand availability using the AWS native services.
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, they designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, we discuss how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and Pagerduty to create logs, notify developers and account owners of changes, and track trends in remediation.
Using automation to drive continuous-compliance best practices - SEC208 - New...Amazon Web Services
Northwestern Mutual’s technology teams maintain a complex compliance environment for a diverse set of developers working within more than 100 AWS accounts. To drive best practices and ensure continuous compliance, the teams designed an AWS-based architecture using services such as AWS Lambda, Amazon DynamoDB, Amazon Simple Queue Service (Amazon SQS), and Amazon CloudWatch to auto-remediate misconfigurations. In this session, learn how these services help Northwestern Mutual swiftly correct configurations and integrate with tools like Slack and PagerDuty to create logs, notify developers and account owners of changes, and track trends in remediation.
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
Building a well-managed and secure AWS account access management for enterprise customers and AWS partners is essential for managing a large number of AWS accounts. In this session, we review new features, best practices, and the risks involved when architecting organizational units. We also cover how to build dynamic access structures.
Five New Security Automations Using AWS Security Services & Open Source (SEC4...Amazon Web Services
In this session, we dive deep into the actual code behind various security automation and remediation functions. We demonstrate each script, describe the use cases, and perform a code review explaining the various challenges and solutions. All use cases are based on customer and C-level feedback and challenges. We look at things like IAM policy scope reduction, alert and ticket integration for security events, forensics and research on AWS resources, secure pipelines, and more. Please join us for a speaker meet-and-greet following this session at the Speaker Lounge (ARIA East, Level 1, Willow Lounge). The meet-and-greet starts 15 minutes after the session and runs for half an hour.
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Amazon Web Services
In this workshop, create guardrails to ensure governance is applied and identify when people stray. This session will deep dive into AWS Landing Zone, AWS Organizations, AWS Config, and Identity and Access Management. We will focus on the Operational Excellence and Security pillar best practices, of the AWS Well-Architected Framework, using a multi-account strategy. We address the architectural and operational decisions you need to make. In the cloud, you can start at the core and create defense in depth at the individual resource level. This session is designed for security and compliance practitioners interested in estate management, auditing of infrastructure, advanced IAM techniques, and overall governance management.
Architecting security & governance across your AWS environmentAmazon Web Services
Many AWS customers use multiple accounts to meet their requirements for billing, infrastructure isolation, and separation of duties. In this session, we discuss the latest updates around establishing and building a multi-account security and governance strategy. We will also take a look at data protection strategies for ensuring data integrityand availability using the AWS native services.
Unify security, compliance, and finance teams with governance at scale - GRC2...Amazon Web Services
Cloud users typically feel that security, compliance, and finance teams throttle speed and innovation. However, the concerns of security misconfigurations and cloud budget overruns are real threats to the enterprise as adoption scales. Organizations struggle with finding the right balance to empower these teams while giving end-users the autonomy required. The governance at scale framework provides visibility, control, autonomy, and confidence to move enterprises to the cloud. It was built on a decade of lessons learned from the largest customers, including AWS itself. This session shares stories of customer successes using this framework and the impacts to their cloud journeys.
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Amazon Web Services
McGraw-Hill discusses how to effectively manage cloud operations for over 80 different agile DevOps teams by leveraging automated guardrails. In this talk, you learn about the challenges of running cloud operations at scale. Join us to learn what guardrails are, how you implement them at scale, and how they work across the entire cloud stack: networking, security, IAM, service whitelisting, OS hardening, and patching.
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
Zero trust security is quickly rising as a preferred alternative to traditional security approaches. The key enabling technology underlying the zero trust security approach is next-gen access which combines the critical capabilities of such technologies as identity as a service (IDaaS), enterprise mobility management (EMM), and privileged access management (PAM). In this session, we highlight AWS security best practices in a zero trust security model. Specifically, we explore securing the AWS root account, controlling access to the AWS Management Console, and the AWS Command Line Interface, and managing developer access to Amazon EC2 instances and containerized applications that run on them.
Breaking the Ice: How Broadridge is Helping Customers Transform Cold Archiva...Amazon Web Services
Broadridge has a long history of providing solutions for regulatory content archival data on behalf of its clients. Many archival solutions rely on legacy technology, requiring regular refresh and overhaul. With the advent of cloud technology, Broadridge has been able to reimagine archival solutions as intelligent information management solutions. Broadridge's solution harnesses a wide array of AWS services, such as Amazon Glacier, Amazon S3, AWS Lambda, Amazon EC2, Amazon Aurora, Amazon EBS, AWS CloudTrail, Amazon SQS, AWS Direct Connect, Amazon Lex, and Amazon API Gateway. In this session, we explore the architecture behind Broadridge's solution, and attendees gain an understanding of how archival content can become a valuable repository of information that can drive client services, data analytics, and business growth.
Generational Shifts and customer expectations has greatly changed the way insurance works, affecting insurer's channel, product and brand strategies. New players ike virtual insurers are getting ahead in the game. In this session, Bowtie, the first virtual insurer in Hong Kong will dive deep into how they leverage the AWS cloud technologies to build a new operations model, accelerate their business and minimize capital investment.
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Amazon Web Services
Are you interested in becoming a IAM policy master and learning about powerful techniques for controlling access to AWS resources? If your answer is “yes,” this session is for you. Join us as we cover the different types of policies and describe how they work together to control access to resources in your account and across your AWS organization. We walk through use cases that help you delegate permission management to developers by demonstrating IAM permission boundaries. We take an in-depth look at controlling access to specific AWS regions using condition keys. Finally, we explain how to use tags to scale permissions management in your account. This session requires you to know the basics of IAM policies.
Governance @ scale (G@S) is an increasingly important concept for customers as they adopt AWS across the enterprise today. G@S is based on segmenting workloads into separate accounts and applying security in a fashion that is tailored to the nature of the respective workloads. This session will cover how to deploy AWS using 10s or even hundreds of accounts to create deep isolation between those workloads. AWS Organizations and Stratus Solutions Goverance@Scale will be highlighted. Patterns for deployment will be covered as well as cost control considerations.
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Amazon Web Services
Most workloads on AWS resemble a finely crafted cake, with delight at every layer. In this session, we help you master identity at each layer of deliciousness: from platform, to infrastructure, to applications, using services like AWS Identity and Access Management (IAM), AWS Directory Service, Amazon Cognito, and many more. Leave with a firm mental model for how identity works both harmoniously and independently throughout these layers, and with ready-to-use reference architectures and sample code. We keep things fun and lively along the way with lots of demos, which will hopefully make up for our decided lack of anything resembling the sweet confections we'll be talking so much about!
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...Amazon Web Services
In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. Learn about each service, the high-level capabilities they provide, and how the services fit and work together to provide you a robust identity foundation. Learn how to better advance your own journey with confidence and speed. Finally, we take a deeper look at several identity-based use cases where the cloud’s power and programmability are radically simplifying implementation and strengthening security.
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Amazon Web Services
by Jeff Levine, Security Specialist, Solutions Architect, AWS
In AWS, identity comes first. Before you can provision buckets, instances, VPCs, or any other infrastructure, you have to have an identity to authenticate and authorize those API calls. In this session, we'll rapidly immerse you in the fundamental primitives, mental models, and implementation patterns of the core AWS identity services such as AWS Identity & Access Management and AWS Organizations. With this knowledge in hand you'll be able to confidently construct a solid identity foundation for your workloads to sit atop.
Landing Zones - Creating a Foundation for Your AWS MigrationsAmazon Web Services
Dean Samuels, Head of Solutions Architecture, Hong Kong & Taiwan, AWS
When migrating lots of applications to the cloud, it's important to architect cloud environments that are efficient, secure and compliant. AWS Landing Zones are a prescriptive set of instructions for deploying an AWS-recommended foundation of interrelated AWS accounts, networks, and core services for your initial AWS application environments. This session will review the benefits and best practices.
AWS Control Tower is a new AWS service for cloud administrators to set up and govern their secure, compliant, multi-account environments on AWS.
In this session, University of York will discuss their implementation of AWS Landing Zone. We’ll also explain how AWS Control Tower automates AWS Landing Zone creation with best-practice blueprints.
How Millennium Management achieves provable security with AWS Zelkova - FSV30...Amazon Web Services
Data exfiltration is a key concern for financial institutions, which often store personally identifiable information, payment card information, and proprietary methods or algorithms. Balancing security and agility in identity and access management (IAM) policies is critical. To achieve this balance, Millennium Management developed a security framework that integrates into CI/CD pipelines. This framework utilizes semantic reasoning, proprietary security evaluations, and AWS Zelkova to achieve provably secure IAM policies pre-deployment in a distributed, multi-account environment. Learn how Millennium combined Zelkova with services such as AWS Step Functions, AWS Lambda, and AWS CodePipeline—for rapid development while mitigating data exfiltration risk.
AWS Identity and Access Management (IAM) is the foundation that all AWS services require to function and perform any action. Mastering IAM is the skill set you need in your arsenal so that you can provide best-in-breed services through your application or services to your customers. This session shows you best practices for IAM, the latest service additions, and advanced automation techniques to become a certified IAM ninja.
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Amazon Web Services
One of the first questions that customers ask during their cloud journeys is how to establish and build AWS environments or landing zones. In this session, we discuss best practices for establishing a scalable approach and necessary landing zone framework. We present an overview of the approach and solutions to help you implement a landing zone. We also introduce the AWS Landing Zone, which is an automated solution for setting up a robust, flexible AWS environment, and we discuss how it reduces the time needed to get started. Finally, we provide a high level overview of AWS Control Tower and how it fits into the overall approach.
Bonus-Session-Interledger-DvP-Settlement-on-Amazon-Managed-BlockchainAmazon Web Services
Project Ubin is a collaborative project first launched in 2016 by the Monetary Authority of Singapore (MAS) and the Association of Banks in Singapore (ABS). In August 2018, MAS and SGX announced partnership with Anquan, Deloitte and Nasdaq to harness blockchain technology for settlement of tokenised assets. In order to explore the possible DvP settlement models, six blockchains of varied capabilities and features were used in prototypes. In this session, Peter from SGX will offer deeper insights into a DvP prototype developed with Deloitte that was hosted on Amazon Managed Blockchain, and will also discuss potential future applications of DLT (Distributed Ledger Technology) for capital markets, while Michael from AWS will discuss some of the common patterns seen in blockchain networks as well as features that control the privacy of data on shared blockchain networks.
Unify security, compliance, and finance teams with governance at scale - GRC2...Amazon Web Services
Cloud users typically feel that security, compliance, and finance teams throttle speed and innovation. However, the concerns of security misconfigurations and cloud budget overruns are real threats to the enterprise as adoption scales. Organizations struggle with finding the right balance to empower these teams while giving end-users the autonomy required. The governance at scale framework provides visibility, control, autonomy, and confidence to move enterprises to the cloud. It was built on a decade of lessons learned from the largest customers, including AWS itself. This session shares stories of customer successes using this framework and the impacts to their cloud journeys.
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Amazon Web Services
McGraw-Hill discusses how to effectively manage cloud operations for over 80 different agile DevOps teams by leveraging automated guardrails. In this talk, you learn about the challenges of running cloud operations at scale. Join us to learn what guardrails are, how you implement them at scale, and how they work across the entire cloud stack: networking, security, IAM, service whitelisting, OS hardening, and patching.
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
Zero trust security is quickly rising as a preferred alternative to traditional security approaches. The key enabling technology underlying the zero trust security approach is next-gen access which combines the critical capabilities of such technologies as identity as a service (IDaaS), enterprise mobility management (EMM), and privileged access management (PAM). In this session, we highlight AWS security best practices in a zero trust security model. Specifically, we explore securing the AWS root account, controlling access to the AWS Management Console, and the AWS Command Line Interface, and managing developer access to Amazon EC2 instances and containerized applications that run on them.
Breaking the Ice: How Broadridge is Helping Customers Transform Cold Archiva...Amazon Web Services
Broadridge has a long history of providing solutions for regulatory content archival data on behalf of its clients. Many archival solutions rely on legacy technology, requiring regular refresh and overhaul. With the advent of cloud technology, Broadridge has been able to reimagine archival solutions as intelligent information management solutions. Broadridge's solution harnesses a wide array of AWS services, such as Amazon Glacier, Amazon S3, AWS Lambda, Amazon EC2, Amazon Aurora, Amazon EBS, AWS CloudTrail, Amazon SQS, AWS Direct Connect, Amazon Lex, and Amazon API Gateway. In this session, we explore the architecture behind Broadridge's solution, and attendees gain an understanding of how archival content can become a valuable repository of information that can drive client services, data analytics, and business growth.
Generational Shifts and customer expectations has greatly changed the way insurance works, affecting insurer's channel, product and brand strategies. New players ike virtual insurers are getting ahead in the game. In this session, Bowtie, the first virtual insurer in Hong Kong will dive deep into how they leverage the AWS cloud technologies to build a new operations model, accelerate their business and minimize capital investment.
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Amazon Web Services
Are you interested in becoming a IAM policy master and learning about powerful techniques for controlling access to AWS resources? If your answer is “yes,” this session is for you. Join us as we cover the different types of policies and describe how they work together to control access to resources in your account and across your AWS organization. We walk through use cases that help you delegate permission management to developers by demonstrating IAM permission boundaries. We take an in-depth look at controlling access to specific AWS regions using condition keys. Finally, we explain how to use tags to scale permissions management in your account. This session requires you to know the basics of IAM policies.
Governance @ scale (G@S) is an increasingly important concept for customers as they adopt AWS across the enterprise today. G@S is based on segmenting workloads into separate accounts and applying security in a fashion that is tailored to the nature of the respective workloads. This session will cover how to deploy AWS using 10s or even hundreds of accounts to create deep isolation between those workloads. AWS Organizations and Stratus Solutions Goverance@Scale will be highlighted. Patterns for deployment will be covered as well as cost control considerations.
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Amazon Web Services
Most workloads on AWS resemble a finely crafted cake, with delight at every layer. In this session, we help you master identity at each layer of deliciousness: from platform, to infrastructure, to applications, using services like AWS Identity and Access Management (IAM), AWS Directory Service, Amazon Cognito, and many more. Leave with a firm mental model for how identity works both harmoniously and independently throughout these layers, and with ready-to-use reference architectures and sample code. We keep things fun and lively along the way with lots of demos, which will hopefully make up for our decided lack of anything resembling the sweet confections we'll be talking so much about!
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ne...Amazon Web Services
In this session, we provide an overview of AWS identity services within the context of a typical cloud journey. Learn about each service, the high-level capabilities they provide, and how the services fit and work together to provide you a robust identity foundation. Learn how to better advance your own journey with confidence and speed. Finally, we take a deeper look at several identity-based use cases where the cloud’s power and programmability are radically simplifying implementation and strengthening security.
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Amazon Web Services
by Jeff Levine, Security Specialist, Solutions Architect, AWS
In AWS, identity comes first. Before you can provision buckets, instances, VPCs, or any other infrastructure, you have to have an identity to authenticate and authorize those API calls. In this session, we'll rapidly immerse you in the fundamental primitives, mental models, and implementation patterns of the core AWS identity services such as AWS Identity & Access Management and AWS Organizations. With this knowledge in hand you'll be able to confidently construct a solid identity foundation for your workloads to sit atop.
Landing Zones - Creating a Foundation for Your AWS MigrationsAmazon Web Services
Dean Samuels, Head of Solutions Architecture, Hong Kong & Taiwan, AWS
When migrating lots of applications to the cloud, it's important to architect cloud environments that are efficient, secure and compliant. AWS Landing Zones are a prescriptive set of instructions for deploying an AWS-recommended foundation of interrelated AWS accounts, networks, and core services for your initial AWS application environments. This session will review the benefits and best practices.
AWS Control Tower is a new AWS service for cloud administrators to set up and govern their secure, compliant, multi-account environments on AWS.
In this session, University of York will discuss their implementation of AWS Landing Zone. We’ll also explain how AWS Control Tower automates AWS Landing Zone creation with best-practice blueprints.
How Millennium Management achieves provable security with AWS Zelkova - FSV30...Amazon Web Services
Data exfiltration is a key concern for financial institutions, which often store personally identifiable information, payment card information, and proprietary methods or algorithms. Balancing security and agility in identity and access management (IAM) policies is critical. To achieve this balance, Millennium Management developed a security framework that integrates into CI/CD pipelines. This framework utilizes semantic reasoning, proprietary security evaluations, and AWS Zelkova to achieve provably secure IAM policies pre-deployment in a distributed, multi-account environment. Learn how Millennium combined Zelkova with services such as AWS Step Functions, AWS Lambda, and AWS CodePipeline—for rapid development while mitigating data exfiltration risk.
AWS Identity and Access Management (IAM) is the foundation that all AWS services require to function and perform any action. Mastering IAM is the skill set you need in your arsenal so that you can provide best-in-breed services through your application or services to your customers. This session shows you best practices for IAM, the latest service additions, and advanced automation techniques to become a certified IAM ninja.
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Amazon Web Services
One of the first questions that customers ask during their cloud journeys is how to establish and build AWS environments or landing zones. In this session, we discuss best practices for establishing a scalable approach and necessary landing zone framework. We present an overview of the approach and solutions to help you implement a landing zone. We also introduce the AWS Landing Zone, which is an automated solution for setting up a robust, flexible AWS environment, and we discuss how it reduces the time needed to get started. Finally, we provide a high level overview of AWS Control Tower and how it fits into the overall approach.
Bonus-Session-Interledger-DvP-Settlement-on-Amazon-Managed-BlockchainAmazon Web Services
Project Ubin is a collaborative project first launched in 2016 by the Monetary Authority of Singapore (MAS) and the Association of Banks in Singapore (ABS). In August 2018, MAS and SGX announced partnership with Anquan, Deloitte and Nasdaq to harness blockchain technology for settlement of tokenised assets. In order to explore the possible DvP settlement models, six blockchains of varied capabilities and features were used in prototypes. In this session, Peter from SGX will offer deeper insights into a DvP prototype developed with Deloitte that was hosted on Amazon Managed Blockchain, and will also discuss potential future applications of DLT (Distributed Ledger Technology) for capital markets, while Michael from AWS will discuss some of the common patterns seen in blockchain networks as well as features that control the privacy of data on shared blockchain networks.
Similar to Multi accountstrategy | david lewthwaite (20)
Developers like to run services locally to support the development process. With cloud based services that is a challenge. In this talk I will show you a good option to run a number of core AWS services locally.
See the talk here:
https://youtu.be/CeAK9hoRvhk
Serverless for Visual Journalism at the BBC | Doug WinterAWSCOMSUM
IDT is an application for delivering interactive visualisations on web and mobile for the BBC.
We designed and built this to deploy to AWS using Serverless techniques and it is now in production. Delivering serverless for a large enterprise had some interesting challenges.
See the talk here:
https://youtu.be/Jy9iehFB1kw
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.