Ég fann glærur frá fyrirlestri sem ég hélt fyrir OWASP á Íslandi í apríl 2014 og ákvað að skella þeim hérna á slideshare.
Glærurnar er einnig hægt að nálgast af vefsíðu OWASP: https://www.owasp.org/images/6/64/OWASP_april_2014.pdf
EU data protection laws and impacts on healthcare applications and health dataSpeck&Tech
ABSTRACT: Digital health applications and assistance are disrupting the healthcare sector, however such applications are collecting an increasing quantity of health data to profile patients and provide targeted care and assistance. Health data is considered sensitive by EU data protection laws such as GDPR, which defines special security and data processing rules, and huge fines for non-compliance. For companies building health applications, such data protection laws represent a challenge due to the risks, costs, and complexity in ensuring compliance. This talk will provide an overview of these laws, how health application developers are coping with the compliance and how they typically process health data, together with some scandals and fines issued by EU data protection authorities to digital health companies.
BIO: Jovan Stevovic, PhD, is the co-founder and CEO of Chino.io, a platform that makes health applications GDPR and HIPAA compliant “out of the box”. Jovan has over a decade of experience in the health IT industry. He completed his PhD at the University of Trento in 2014. His research explored technologies and protocols to allow health data to be shared in a legally-compliant and secure manner. This work directly led to setting up Chino.io. Currently Chino.io helps companies in most EU states and the US to innovate in digital health.
Watchu Security is a leading New Zealand security systems integrator that delivers end-to-end security solutions including system design, installation, and nationwide support. It has offices in Auckland and Waikato and works with a nationwide network of qualified security partners. Watchu Security has experience with projects for many major New Zealand companies covering CCTV, access control, intruder alarms, automation, and integration solutions.
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...Hugo van Hoogstraten
The document discusses challenges around data quality and governance for big data. It notes that data governance policies are important for effective big data use. Various types of structured, unstructured and sensor data are discussed. The importance of master data management is also highlighted as big data relies on clean master data. Ensuring high quality data through governance is important for accurate big data analysis and effective decision making. Metrics and maturity levels are important considerations for data management and governance.
Astral Infotech Vietnam LTD is a leading IT systems integrator and solutions provider established in 1999 that is part of the large Thakral Group conglomerate. Astral provides a wide range of IT services including hardware, software, networking, security, infrastructure management, and technical support to direct clients and other IT companies across Southeast Asia and other global locations. The company's vision is to be a trusted provider of innovative IT solutions and services known for high customer satisfaction, quality, and value.
The document discusses scientific research and experimental development (SR&ED) tax credits and other government incentives available in Canada. It summarizes recent changes in the 2012-2013 federal budgets that reduced SR&ED benefits by 26% through lowering credit rates and restricting eligible expenditures. It also outlines other provincial tax credits for research and development as well as interactive digital media credits available across Canada.
This document lists various government job exams and resources available at http://www.recruitmentadmit.in, including SSC, IBPS, and UPSC exams. It also lists teaching, technical, and engineering jobs as well as study materials, previous papers, cut off marks, admit cards, and results. Visitors are directed to the given URL to access these exam preparation and result resources.
Hér eru glærur frá námskeiði sem ég hélt fyrir innanríkisráðuneytið í nóvember 2014 á UT deginum. Á námskeiðinu var farið yfir upplýsingaöryggi og opinbera vefi.
This document discusses drugs used to treat cardiovascular disease. It first defines several types of cardiovascular diseases including coronary heart disease, cerebrovascular disease, and peripheral arterial disease. It then lists common causes as obesity, lack of exercise, and smoking. The document goes on to describe several drugs commonly used to treat cardiovascular disease: Altenolol is a beta blocker used to treat high blood pressure and prevent strokes and heart attacks. Simvastatin is a statin drug used to lower cholesterol and prevent strokes and heart attacks. Glyceryl Trinitrate relaxes blood vessels to relieve symptoms of heart failure. Ginkgo biloba is a supplement that may help with anxiety and blood circulation, but can increase bleeding risk.
EU data protection laws and impacts on healthcare applications and health dataSpeck&Tech
ABSTRACT: Digital health applications and assistance are disrupting the healthcare sector, however such applications are collecting an increasing quantity of health data to profile patients and provide targeted care and assistance. Health data is considered sensitive by EU data protection laws such as GDPR, which defines special security and data processing rules, and huge fines for non-compliance. For companies building health applications, such data protection laws represent a challenge due to the risks, costs, and complexity in ensuring compliance. This talk will provide an overview of these laws, how health application developers are coping with the compliance and how they typically process health data, together with some scandals and fines issued by EU data protection authorities to digital health companies.
BIO: Jovan Stevovic, PhD, is the co-founder and CEO of Chino.io, a platform that makes health applications GDPR and HIPAA compliant “out of the box”. Jovan has over a decade of experience in the health IT industry. He completed his PhD at the University of Trento in 2014. His research explored technologies and protocols to allow health data to be shared in a legally-compliant and secure manner. This work directly led to setting up Chino.io. Currently Chino.io helps companies in most EU states and the US to innovate in digital health.
Watchu Security is a leading New Zealand security systems integrator that delivers end-to-end security solutions including system design, installation, and nationwide support. It has offices in Auckland and Waikato and works with a nationwide network of qualified security partners. Watchu Security has experience with projects for many major New Zealand companies covering CCTV, access control, intruder alarms, automation, and integration solutions.
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...Hugo van Hoogstraten
The document discusses challenges around data quality and governance for big data. It notes that data governance policies are important for effective big data use. Various types of structured, unstructured and sensor data are discussed. The importance of master data management is also highlighted as big data relies on clean master data. Ensuring high quality data through governance is important for accurate big data analysis and effective decision making. Metrics and maturity levels are important considerations for data management and governance.
Astral Infotech Vietnam LTD is a leading IT systems integrator and solutions provider established in 1999 that is part of the large Thakral Group conglomerate. Astral provides a wide range of IT services including hardware, software, networking, security, infrastructure management, and technical support to direct clients and other IT companies across Southeast Asia and other global locations. The company's vision is to be a trusted provider of innovative IT solutions and services known for high customer satisfaction, quality, and value.
The document discusses scientific research and experimental development (SR&ED) tax credits and other government incentives available in Canada. It summarizes recent changes in the 2012-2013 federal budgets that reduced SR&ED benefits by 26% through lowering credit rates and restricting eligible expenditures. It also outlines other provincial tax credits for research and development as well as interactive digital media credits available across Canada.
This document lists various government job exams and resources available at http://www.recruitmentadmit.in, including SSC, IBPS, and UPSC exams. It also lists teaching, technical, and engineering jobs as well as study materials, previous papers, cut off marks, admit cards, and results. Visitors are directed to the given URL to access these exam preparation and result resources.
Hér eru glærur frá námskeiði sem ég hélt fyrir innanríkisráðuneytið í nóvember 2014 á UT deginum. Á námskeiðinu var farið yfir upplýsingaöryggi og opinbera vefi.
This document discusses drugs used to treat cardiovascular disease. It first defines several types of cardiovascular diseases including coronary heart disease, cerebrovascular disease, and peripheral arterial disease. It then lists common causes as obesity, lack of exercise, and smoking. The document goes on to describe several drugs commonly used to treat cardiovascular disease: Altenolol is a beta blocker used to treat high blood pressure and prevent strokes and heart attacks. Simvastatin is a statin drug used to lower cholesterol and prevent strokes and heart attacks. Glyceryl Trinitrate relaxes blood vessels to relieve symptoms of heart failure. Ginkgo biloba is a supplement that may help with anxiety and blood circulation, but can increase bleeding risk.
Engaging Citizens in a Digital World: What Citizens Really Want from Digital ...Andrea Frazier
The document summarizes the results of a survey conducted by CivicPlus of over 1,200 citizens in the United States and Canada about what functionality they want to see on local government websites. The survey found that most citizens look for information or complete transactions on government websites and want the ability to submit requests, pay bills, register for events, and apply for licenses online. It concludes by encouraging governments to use the results to provide citizens with the digital services and engagement they want.
The survey of over 1,200 citizens in the US and Canada found that most want basic information and services from their local government websites. Specifically, 82% had used such sites in the last year most commonly to access newsletters, calendars or meeting minutes. Citizens expressed interest in submitting forms (81.5%), paying fees (71.6%) like permits and utilities, and following via social media like Facebook (57.5%). The survey aimed to understand citizen needs to help governments better engage digitally.
Spektrofotometri adalah cabang dari spektroskopiFadhly M S
Spektrofotometri adalah pengukuran kuantitatif intensitas radiasi elektromagnetik pada satu atau lebih panjang gelombang dengan transduser. Pengukuran zat dengan spektrofotometri melibatkan analat, blanko, dan standar untuk mengetahui serapan zat yang bukan analat dan menentukan konsentrasi sampel. Persamaan regresi yang didapat menunjukkan semakin besar absorbansi suatu sampel, semakin besar pula konsentrasinya.
West Las Vegas Middle School Yearbook title pageveronicamorris
This document provides instructions for designing a title page for a middle school yearbook. It lists the required elements for the title page, including the school name, address, phone number, website, and year. Optional elements that could be included are the principal's name, student and staff populations, and school colors. The document then lists several websites that can be used to create custom text or edit images for the title page. Students are instructed to save any text or images they use from these sites and upload them to the Title Page folder at Walsworth.
DEEPWATER is a business ethics simulation inspired by the April, 2010 BP Gulf oil spill. The purpose of the simulation is to provide business students with an experiential learning exercise to better understand the real-world ethical challenges faced by companies and managers in making important business decisions. As do managers in the real world, students are forced to make trade-offs between short-term and long-term profits on the one hand, and worker safety, environmental impacts and social needs on the other.
Corporate sustainability reporting has become mainstream, but still has room for improvement. While most large global companies issue sustainability reports, 33% have restated data due to issues like errors or updated methodologies. There is a need to improve report effectiveness so stakeholders have timely, useful information. 2013 was a milestone year for sustainability reporting frameworks, with initiatives like the IIRC's integrated reporting framework and SASB standards that aim to advance reporting practices.
This document discusses the need for organizations to transform how they develop and distribute content in the digital world. It notes that in today's environment, content must be delivered to the right user, in the right format and at the right time across multiple channels. The document advocates adopting a "Content 2.0" approach where content is developed specifically for digital consumption using techniques like snackable pieces, data visualization, video and responsive design. It argues that having a digital content strategy that incorporates Content 2.0 best practices will help organizations engage audiences more effectively and remain relevant in today's digital landscape.
Prathan Phongthiproek, a manager at KPMG Thailand, gave a presentation on mobile application attacks at the Cyber Defense Initiative Conference (CDIC) 2016. The presentation covered various attack vectors for both Android and iOS applications, including user input attacks, abusing application components, insecure data storage, manipulating binary and storage files, bypassing root/jailbreak detection, and intercepting network traffic. For each attack vector, the presentation estimated the potential damage level and threat level. The goal was to help organizations better understand mobile application security risks and implement proper countermeasures.
The document outlines the audit process from start to finish. It begins with setting up the engagement and assessing risks. This involves understanding the client, processes, controls and identifying significant accounts and risks. Testing then occurs to test controls and substantive matters. Issues are tracked. Finally, materiality and risks are reassessed and an opinion is formed for reporting. The overall process involves risk assessment, testing, tracking issues and completing procedures to form an opinion.
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
The document provides guidance for effectively preparing for and participating in an IT audit. It advises understanding the purpose and phases of the audit. During the audit, be aware of attitudes and perspectives, and understand what maturity levels the auditor expects. Scope is determined based on risks, and compliance is evaluated through fact-finding and issue tracking. Controls are selected based on risks and sensitivity levels. The IT auditor can help improve the IT environment regarding people, processes, and technology.
There's less than one-year until EU MDR, where is the industry at today and how can you be compliant by May 26, 2021? Learn about the state of the industry from a management consultant's perspective and what action plan you can put in place to be an EU MDR leader.
This session took place live at the Greenlight Guru True Quality Virtual Summit, a three-day event for medical device professionals to learn to get their devices to market faster, stay ahead of regulatory changes, and use quality as their multiplier to grow their device business.
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...Knowledge Group
The document discusses technology risk management in the banking industry. It identifies several drivers requiring banks to enhance their technology risk management, including increased online banking, rising cyber threats, and tightening regulations. The Monetary Authority of Singapore (MAS) has issued new guidelines and regulations to improve banks' technology risk management frameworks, system resiliency, incident response, and oversight by boards and management. The document provides recommendations for banks to meet the new MAS requirements.
ProIndústria 2017 - A09a - Inovação nos modelos de negócios para novos valore...CADWARE-TECHNOLOGY
Painel III - Inovação nos modelos de negócios para novos valores de competitividade
Convidados: (1) EY (Ernst & Young) - Luis Marini, Audit Partner & Office Managing Partner Campinas; (2) KPMG - Oliver Cunningham, Sócio-diretor (FS Industry Lead - Management Consulting); (3) SPI (Integradora) - Élcio Brito - Diretor de Operações para Projetos de Automação. PhD Elétrica/Escola Politécnica-USP. Mediador: Marcelo Pinto - Diretor de Marketing e Alianças para a PPI-Multitask e Líder do Grupo de Trabalho MESA no Brasil - Manufacturing Enterprise Solutions Association.
Engaging Citizens in a Digital World: What Citizens Really Want from Digital ...Andrea Frazier
The document summarizes the results of a survey conducted by CivicPlus of over 1,200 citizens in the United States and Canada about what functionality they want to see on local government websites. The survey found that most citizens look for information or complete transactions on government websites and want the ability to submit requests, pay bills, register for events, and apply for licenses online. It concludes by encouraging governments to use the results to provide citizens with the digital services and engagement they want.
The survey of over 1,200 citizens in the US and Canada found that most want basic information and services from their local government websites. Specifically, 82% had used such sites in the last year most commonly to access newsletters, calendars or meeting minutes. Citizens expressed interest in submitting forms (81.5%), paying fees (71.6%) like permits and utilities, and following via social media like Facebook (57.5%). The survey aimed to understand citizen needs to help governments better engage digitally.
Spektrofotometri adalah cabang dari spektroskopiFadhly M S
Spektrofotometri adalah pengukuran kuantitatif intensitas radiasi elektromagnetik pada satu atau lebih panjang gelombang dengan transduser. Pengukuran zat dengan spektrofotometri melibatkan analat, blanko, dan standar untuk mengetahui serapan zat yang bukan analat dan menentukan konsentrasi sampel. Persamaan regresi yang didapat menunjukkan semakin besar absorbansi suatu sampel, semakin besar pula konsentrasinya.
West Las Vegas Middle School Yearbook title pageveronicamorris
This document provides instructions for designing a title page for a middle school yearbook. It lists the required elements for the title page, including the school name, address, phone number, website, and year. Optional elements that could be included are the principal's name, student and staff populations, and school colors. The document then lists several websites that can be used to create custom text or edit images for the title page. Students are instructed to save any text or images they use from these sites and upload them to the Title Page folder at Walsworth.
DEEPWATER is a business ethics simulation inspired by the April, 2010 BP Gulf oil spill. The purpose of the simulation is to provide business students with an experiential learning exercise to better understand the real-world ethical challenges faced by companies and managers in making important business decisions. As do managers in the real world, students are forced to make trade-offs between short-term and long-term profits on the one hand, and worker safety, environmental impacts and social needs on the other.
Corporate sustainability reporting has become mainstream, but still has room for improvement. While most large global companies issue sustainability reports, 33% have restated data due to issues like errors or updated methodologies. There is a need to improve report effectiveness so stakeholders have timely, useful information. 2013 was a milestone year for sustainability reporting frameworks, with initiatives like the IIRC's integrated reporting framework and SASB standards that aim to advance reporting practices.
This document discusses the need for organizations to transform how they develop and distribute content in the digital world. It notes that in today's environment, content must be delivered to the right user, in the right format and at the right time across multiple channels. The document advocates adopting a "Content 2.0" approach where content is developed specifically for digital consumption using techniques like snackable pieces, data visualization, video and responsive design. It argues that having a digital content strategy that incorporates Content 2.0 best practices will help organizations engage audiences more effectively and remain relevant in today's digital landscape.
Prathan Phongthiproek, a manager at KPMG Thailand, gave a presentation on mobile application attacks at the Cyber Defense Initiative Conference (CDIC) 2016. The presentation covered various attack vectors for both Android and iOS applications, including user input attacks, abusing application components, insecure data storage, manipulating binary and storage files, bypassing root/jailbreak detection, and intercepting network traffic. For each attack vector, the presentation estimated the potential damage level and threat level. The goal was to help organizations better understand mobile application security risks and implement proper countermeasures.
The document outlines the audit process from start to finish. It begins with setting up the engagement and assessing risks. This involves understanding the client, processes, controls and identifying significant accounts and risks. Testing then occurs to test controls and substantive matters. Issues are tracked. Finally, materiality and risks are reassessed and an opinion is formed for reporting. The overall process involves risk assessment, testing, tracking issues and completing procedures to form an opinion.
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
The document provides guidance for effectively preparing for and participating in an IT audit. It advises understanding the purpose and phases of the audit. During the audit, be aware of attitudes and perspectives, and understand what maturity levels the auditor expects. Scope is determined based on risks, and compliance is evaluated through fact-finding and issue tracking. Controls are selected based on risks and sensitivity levels. The IT auditor can help improve the IT environment regarding people, processes, and technology.
There's less than one-year until EU MDR, where is the industry at today and how can you be compliant by May 26, 2021? Learn about the state of the industry from a management consultant's perspective and what action plan you can put in place to be an EU MDR leader.
This session took place live at the Greenlight Guru True Quality Virtual Summit, a three-day event for medical device professionals to learn to get their devices to market faster, stay ahead of regulatory changes, and use quality as their multiplier to grow their device business.
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...Knowledge Group
The document discusses technology risk management in the banking industry. It identifies several drivers requiring banks to enhance their technology risk management, including increased online banking, rising cyber threats, and tightening regulations. The Monetary Authority of Singapore (MAS) has issued new guidelines and regulations to improve banks' technology risk management frameworks, system resiliency, incident response, and oversight by boards and management. The document provides recommendations for banks to meet the new MAS requirements.
ProIndústria 2017 - A09a - Inovação nos modelos de negócios para novos valore...CADWARE-TECHNOLOGY
Painel III - Inovação nos modelos de negócios para novos valores de competitividade
Convidados: (1) EY (Ernst & Young) - Luis Marini, Audit Partner & Office Managing Partner Campinas; (2) KPMG - Oliver Cunningham, Sócio-diretor (FS Industry Lead - Management Consulting); (3) SPI (Integradora) - Élcio Brito - Diretor de Operações para Projetos de Automação. PhD Elétrica/Escola Politécnica-USP. Mediador: Marcelo Pinto - Diretor de Marketing e Alianças para a PPI-Multitask e Líder do Grupo de Trabalho MESA no Brasil - Manufacturing Enterprise Solutions Association.
The document provides information on Ironwood Legal Solutions, a legal process outsourcing (LPO) firm based in Sri Lanka. It discusses Ironwood's team of qualified attorneys, processes, systems and infrastructure, key products and services which include legal research, litigation support, document review, and contract management. It also includes a case study section describing sample projects Ironwood has completed for clients related to legal research, contract management, document review, and litigation support.
The document discusses global fintech venture funding trends in 2015. Some key points:
- Global fintech funding more than doubled in 2015 to reach an all-time high of $13.8 billion across 653 deals.
- Mega-rounds (deals over $50 million) drove much of the funding growth, with over 60 mega-rounds in 2015 compared to under 15 from 2011-2013.
- While deal activity declined in the second half of 2015, large deals continued to push overall funding higher, led by regions like Asia, North America, and the UK.
The document discusses KPMG's taxonomy and methods for improving content discoverability through tagging content with taxonomy terms. It explains that KPMG has a polyhierarchical taxonomy that allows content to be tagged along different paths in the term hierarchy. The goal is to enrich the taxonomy management tool by establishing relationships between terms, rather than building a long list of terms or over-tagging content.
Sys value corporate presentation - security audits 2013Filipe Rolo
SysValue is a Portuguese information security company that has been in business since 2003. They specialize in security auditing and penetration testing services. The document describes SysValue's team of over 30 employees, which includes security experts with certifications like CISSP, CISA, and GPEN. It also outlines their experience conducting projects for clients in sectors like finance, telecommunications, and government in Portugal and other European countries. SysValue provides services including security audits, penetration tests, risk analysis, and security consulting to assess clients' systems and identify vulnerabilities.
How to determine a proper scope selection based on ISO 27001?PECB
Meeting Clause 4 - Context of the Organization "generic" requirements of ISO 27001 in order to determine a proper Documented Scope statement that meets business requirements and gives value to products and/or services.
Main points that have been covered are:
• Interested Parties
• Interfaces & Dependencies
• Legal / Regulatory & Contractual Obligations (Risk of Non-Compliance)
• Documented Scope Statement (including locations within Scope)
Presenter:
Mr. David Anders has worked more than 20+ years in the risk management field managing a broad spectrum of consulting services and product solutions. David has worked in the consulting field for 16 years and is the founder / CEO of SecuraStar, LLC, a niche ISO 27001 consulting firm in the United States and founder / CEO of ISMS Manager Software, LLC.
Link of the recorded session published on YouTube: https://youtu.be/hSaAvKgAC2c
This document outlines an agenda for a briefing on building a digital supply chain for enabling growth. The briefing objectives are to provide pragmatic advice on building a digital supply chain journey, demonstrate how digital solutions can help customer experience and operational excellence, and discuss leading practices. The agenda includes introductions, steps for building a digital supply chain roadmap, digital supply chain solutions, a panel discussion, and Q&A. It also provides details on the presenters and their roles.
Tax authorities are increasingly demanding real-time reporting of compensation data to improve tax collection. KPMG's global compensation collection services can help transform a business's processes to ensure compliance with real-time reporting obligations. KPMG offers an integrated solution handling all aspects of compensation data management from initial collection through applying tax positions to producing home and host country payroll instructions on a monthly, quarterly, or annual basis. This centralized approach reduces risks and improves consistency, allowing businesses to focus on strategic priorities.
Secure Software Development – COBIT5 PerspectiveSPIN Chennai
This presentation elucidates Secure Software Development based on COBIT 5, an IT governance framework and supporting tool set which emphasizes regulatory compliance, helps organizations to increase the value attained from IT, enables alignment and simplifies implementation of the COBIT framework.
(1) The document summarizes information from the OpenSphere cybersecurity conference on September 27th 2016, including speakers and details about OpenSphere as a cybersecurity group.
(2) OpenSphere was created in 2005 in Reunion and has since expanded to other locations, offering services like security consultancy, risk management, and security management.
(3) It provides an overview of OpenSphere's core values, milestones, figures including a regular annual turnover of 1.5M Euros and 20 qualified engineers serving over 50 clients annually across various industries.
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
The digital transformation journey supported by SAP enables our customers to increase business agility, pursue innovation, and demonstrate growth. Cybersecurity is essential to a successful digital transformation and continues to be even more critical as our integrated suite of SAP Ariba solutions drives technologies to promote connected commerce. Join us in this engrossing session as we outline critical steps to securing your organization’s digital transformation.
Similar to OWASP Iceland - Hvert er þroskastig netöryggismála á Íslandi? - April 2014 (20)
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.