Short intro to benefits of blockchain technology over current internet protocols, and improvements in security, privacy, anonymity and censorship resistance. Presented at Descon 2016.
How I built CTX - https://getctx.io
The principles and tricks of bootstrapping a tech-heavy business as a solo founder. DevOps, choosing hosting, and how to get maximum leverage from the tools you use.
https://getctx.io/blog/devops-for-a-dummy/
Cloudoc Supermicro Mini Server Appliance from NetID.
Basic Functions
- Document management & Document collaboration
- SW installation files management
- Community function
- Windows Explorer UI support
Mobile Support
- Provide iOS, Android, Smart phone UI
- Device registration, location tracking, remote deletion
- Viewing Personal / Department / Public Documents
- Internal connection via external Proxy server
Disk Lock
- Ransomware blocking function
- Prohibit local saving
- Application-specific management
- Export procedure
Disk Lock Plus
- Prohibit screen capture
- Prohibit print
- Prohibit print log info
- Prohibit Clipboard Copy
- Print watermark
BREAKING NEWS! EMPOWERED PRESENTATIONS OFFERS STAND-OUT ADVICE TO BECOMING A GREAT PRESENTER! STAY TUNED! 10 Tips on how to present like a newscaster! @empowredpres #CNN #ABC #NBC #BBS #FOXNEWS #PBS #TODAYSHOW #BREAKINGNEWS #NEWS
Short intro to benefits of blockchain technology over current internet protocols, and improvements in security, privacy, anonymity and censorship resistance. Presented at Descon 2016.
How I built CTX - https://getctx.io
The principles and tricks of bootstrapping a tech-heavy business as a solo founder. DevOps, choosing hosting, and how to get maximum leverage from the tools you use.
https://getctx.io/blog/devops-for-a-dummy/
Cloudoc Supermicro Mini Server Appliance from NetID.
Basic Functions
- Document management & Document collaboration
- SW installation files management
- Community function
- Windows Explorer UI support
Mobile Support
- Provide iOS, Android, Smart phone UI
- Device registration, location tracking, remote deletion
- Viewing Personal / Department / Public Documents
- Internal connection via external Proxy server
Disk Lock
- Ransomware blocking function
- Prohibit local saving
- Application-specific management
- Export procedure
Disk Lock Plus
- Prohibit screen capture
- Prohibit print
- Prohibit print log info
- Prohibit Clipboard Copy
- Print watermark
BREAKING NEWS! EMPOWERED PRESENTATIONS OFFERS STAND-OUT ADVICE TO BECOMING A GREAT PRESENTER! STAY TUNED! 10 Tips on how to present like a newscaster! @empowredpres #CNN #ABC #NBC #BBS #FOXNEWS #PBS #TODAYSHOW #BREAKINGNEWS #NEWS
Why the cloud is more secure than your existing systemsErnest Mueller
Talk presented by Ernest Mueller at LASCON 2010 on cloud computing security and why it's likely that the cloud is more secure than what you're doing right now.
Cloud Breach - Forensics Audit Planning
The goal of this presentation is to assist IT Risk and Security professionals with adding Cloud computing forensics to their Incident Response team.
It should assist them with understanding the technical ways of capturing forensic data from cloud service providers using security controls that incorporate and integrate logging, chain of evidence, virtualization and cloud security architecture
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWSAmazon Web Services
What if you were told that within three months, you had to scale your existing platform from 1,000 req/sec (requests per second) to handle 300,000 req/sec with an average latency of 25 milliseconds? And that you had to accomplish this with a tight budget, expand globally, and keep the project confidential until officially announced by well-known global mobile device manufacturers? That’s what exactly happened to us. This session explains how The Weather Company partnered with AWS to scale our data distribution platform to prepare for unpredictable global demand. We cover the many challenges that we faced as we worked on architecture design, technology and tools selection, load testing, deployment and monitoring, and how we solved these challenges using AWS.
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...RootedCON
Los procedimientos relacionados con Respuesta a Incidentes y Análisis Forense son diferentes en la nube respecto a cuando se realizan en entornos tradicionales, locales. Veremos las diferencias entre el análisis forense digital tradicional y el relacionado con sistemas en la nube de AWS, Azure o Google Compute Platform. Cuando se trata de la nube y nos movemos en un entorno totalmente virtual nos enfrentamos a desafíos que son diferentes al mundo tradicional. Lo que antes era hardware, ahora es software. Con los proveedores de infraestructura en la nube trabajamos con APIs, creamos, eliminamos o modificamos cualquier recurso con una llamada a su API. Disponemos de balanceadores, servidores, routers, firewalls, bases de datos, WAFs, sistemas de cifrado y muchos recursos más a sin abrir una caja y sin tocar un cable. A golpe de comando. Es lo que conocemos como Infraestructura como código. Si lo puedes programar, lo puedes automatizar. ¿Como podemos aprovecharnos de ello desde el punto de vista de la respuesta a incidentes, análisis forense o incluso hardening automatizado?
Security in IaaS, attacks, hardening, incident response, forensics and all about its automation. Despite I will talk about general concept related to AWS, Azure and GCP, I will show specific demos and threats in AWS and I will go in detail with some caveats and hazards in AWS.
Control the Creep: Streamline Security and Compliance by Sharing the Workloadaregnerus
IT professionals are struggling to adapt to the ever-changing data security landscape. Bolt-on technologies, the lack of required skill-sets and shifting compliance requirements make it nearly impossible for many organizations to secure their technical assets. Learn how new approaches in IT security services can ensure you have all your bases covered through the adoption of a proven, comprehensive security apparatus.
Docker is an open platform for developers and system administrators to build, ship and run distributed applications. Using Docker, companies in Jordan have been able to build powerful system architectures that allow speeding up delivery, easing deployment processes and at the same time cutting major hosting costs.
Osama Jaber shares his experience at ArabiaWeather in how they moved away from AWS to a highly-redundant, high-performance and low-cost solution using docker and other open-source technologies.
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago
All slides from the January 7th 2015 CloudCamp Chicago
Theme: "the guts of the cloud"
What happens when the cloud meets the ground? Where does your data live, and who can touch your servers? We'll look at the "guts" of the cloud, from datacenters to fiber and from servers to switches in real life.
Lightning Talks:
"Cloud Computing: A look under the hood of the next-gen cloud" - Bill Kleyman, Director of Strategy and Innovation at MTM Technologies @QuadStack
"Cloudy with a 100% chance of GigaWatts" - Russell Pease, Business Development Manager at CyrusOne Data Centers
"The Importance of the Network Enabled Cloud" - Ron Zirkin, Enterprise Account Manager at XO Communications @ronzirkin
"The Red Hat OS1 Cloud: You want guts?" - Dan Yocum, Principal Systems Engineer at Red Hat @yocum137
Usage Based Metering in the Cloud (Subscribed13)Zuora, Inc.
CloudPassage - Rand Wacker, VP Products
Link Bermuda - Winston Morton, VP Technology
Want to move to a usage-based pricing model but afraid of how to accurately measure and bill your customers? Come and learn about the processes and technology used to manage this advanced pricing model from two leading cloud service providers.
Provides an overview of how LWM2M and DNS-SD/DNS-SEC can be used together to provide for secure communications, remote management and provisioning of constrained devices in the Internet of Things using open source software components leshan and Tiaki created in the eclipse IoT community.
OpenNebula Conf 2014 | From private cloud to laaS public services for Catalan...NETWAYS
Nowadays, Catalan Academic and research institutions can enjoy self-service cloud infrastructure in order to meet their application needs in a flexible pay per use mode. An self-service platform is available for managing servers, networks and assigned storage from the Universities Consortium Data Centers, allowing users access to a customizable infrastructure with an orientation towards the so-call virtual DC.
Cloud Computing and Security - by KLC Consultingkylelai
Here is the presentation about the cloud computing fundamentals, what it is, what it take to go to cloud computing environment, what questions to ask before you jump into cloud computing, what risk and security measures you should understand. Afterviewing this presentation you should have basic understanding about cloud computing and cloud security. This presentation also provides cloud computing and security resources and links for more informations on cloud computing security.
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...OpenStack Korea Community
OpenStack Day in Korea 2015 - Keynote 2
Leveraging OpenStack to Realize the SKT Software-Defined Data Center
Jinsung Choi, Ph.D - CTO, Corporate R&D Center, SK Telecom
Cloud Spotting 2017: An overview of cloud computingPatrice Kerremans
An overview of cloud computing I taught to students. With a strong bias towards Amazon Web Services (AWS). Some examples are included as well as an overview of the most important AWS services.
Why the cloud is more secure than your existing systemsErnest Mueller
Talk presented by Ernest Mueller at LASCON 2010 on cloud computing security and why it's likely that the cloud is more secure than what you're doing right now.
Cloud Breach - Forensics Audit Planning
The goal of this presentation is to assist IT Risk and Security professionals with adding Cloud computing forensics to their Incident Response team.
It should assist them with understanding the technical ways of capturing forensic data from cloud service providers using security controls that incorporate and integrate logging, chain of evidence, virtualization and cloud security architecture
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWSAmazon Web Services
What if you were told that within three months, you had to scale your existing platform from 1,000 req/sec (requests per second) to handle 300,000 req/sec with an average latency of 25 milliseconds? And that you had to accomplish this with a tight budget, expand globally, and keep the project confidential until officially announced by well-known global mobile device manufacturers? That’s what exactly happened to us. This session explains how The Weather Company partnered with AWS to scale our data distribution platform to prepare for unpredictable global demand. We cover the many challenges that we faced as we worked on architecture design, technology and tools selection, load testing, deployment and monitoring, and how we solved these challenges using AWS.
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...RootedCON
Los procedimientos relacionados con Respuesta a Incidentes y Análisis Forense son diferentes en la nube respecto a cuando se realizan en entornos tradicionales, locales. Veremos las diferencias entre el análisis forense digital tradicional y el relacionado con sistemas en la nube de AWS, Azure o Google Compute Platform. Cuando se trata de la nube y nos movemos en un entorno totalmente virtual nos enfrentamos a desafíos que son diferentes al mundo tradicional. Lo que antes era hardware, ahora es software. Con los proveedores de infraestructura en la nube trabajamos con APIs, creamos, eliminamos o modificamos cualquier recurso con una llamada a su API. Disponemos de balanceadores, servidores, routers, firewalls, bases de datos, WAFs, sistemas de cifrado y muchos recursos más a sin abrir una caja y sin tocar un cable. A golpe de comando. Es lo que conocemos como Infraestructura como código. Si lo puedes programar, lo puedes automatizar. ¿Como podemos aprovecharnos de ello desde el punto de vista de la respuesta a incidentes, análisis forense o incluso hardening automatizado?
Security in IaaS, attacks, hardening, incident response, forensics and all about its automation. Despite I will talk about general concept related to AWS, Azure and GCP, I will show specific demos and threats in AWS and I will go in detail with some caveats and hazards in AWS.
Control the Creep: Streamline Security and Compliance by Sharing the Workloadaregnerus
IT professionals are struggling to adapt to the ever-changing data security landscape. Bolt-on technologies, the lack of required skill-sets and shifting compliance requirements make it nearly impossible for many organizations to secure their technical assets. Learn how new approaches in IT security services can ensure you have all your bases covered through the adoption of a proven, comprehensive security apparatus.
Docker is an open platform for developers and system administrators to build, ship and run distributed applications. Using Docker, companies in Jordan have been able to build powerful system architectures that allow speeding up delivery, easing deployment processes and at the same time cutting major hosting costs.
Osama Jaber shares his experience at ArabiaWeather in how they moved away from AWS to a highly-redundant, high-performance and low-cost solution using docker and other open-source technologies.
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago
All slides from the January 7th 2015 CloudCamp Chicago
Theme: "the guts of the cloud"
What happens when the cloud meets the ground? Where does your data live, and who can touch your servers? We'll look at the "guts" of the cloud, from datacenters to fiber and from servers to switches in real life.
Lightning Talks:
"Cloud Computing: A look under the hood of the next-gen cloud" - Bill Kleyman, Director of Strategy and Innovation at MTM Technologies @QuadStack
"Cloudy with a 100% chance of GigaWatts" - Russell Pease, Business Development Manager at CyrusOne Data Centers
"The Importance of the Network Enabled Cloud" - Ron Zirkin, Enterprise Account Manager at XO Communications @ronzirkin
"The Red Hat OS1 Cloud: You want guts?" - Dan Yocum, Principal Systems Engineer at Red Hat @yocum137
Usage Based Metering in the Cloud (Subscribed13)Zuora, Inc.
CloudPassage - Rand Wacker, VP Products
Link Bermuda - Winston Morton, VP Technology
Want to move to a usage-based pricing model but afraid of how to accurately measure and bill your customers? Come and learn about the processes and technology used to manage this advanced pricing model from two leading cloud service providers.
Provides an overview of how LWM2M and DNS-SD/DNS-SEC can be used together to provide for secure communications, remote management and provisioning of constrained devices in the Internet of Things using open source software components leshan and Tiaki created in the eclipse IoT community.
OpenNebula Conf 2014 | From private cloud to laaS public services for Catalan...NETWAYS
Nowadays, Catalan Academic and research institutions can enjoy self-service cloud infrastructure in order to meet their application needs in a flexible pay per use mode. An self-service platform is available for managing servers, networks and assigned storage from the Universities Consortium Data Centers, allowing users access to a customizable infrastructure with an orientation towards the so-call virtual DC.
Cloud Computing and Security - by KLC Consultingkylelai
Here is the presentation about the cloud computing fundamentals, what it is, what it take to go to cloud computing environment, what questions to ask before you jump into cloud computing, what risk and security measures you should understand. Afterviewing this presentation you should have basic understanding about cloud computing and cloud security. This presentation also provides cloud computing and security resources and links for more informations on cloud computing security.
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...OpenStack Korea Community
OpenStack Day in Korea 2015 - Keynote 2
Leveraging OpenStack to Realize the SKT Software-Defined Data Center
Jinsung Choi, Ph.D - CTO, Corporate R&D Center, SK Telecom
Cloud Spotting 2017: An overview of cloud computingPatrice Kerremans
An overview of cloud computing I taught to students. With a strong bias towards Amazon Web Services (AWS). Some examples are included as well as an overview of the most important AWS services.
Similar to Portuguese Cloud Computing Architects - 2nd Meeting (20)
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
16. Cloud Computing is ? - Network as a “cloud” - Network is the computer (SUN moto) - TCP/IP abstraction (1 st cloud) - www data abstraction (2 nd cloud) - Virtualization (3 rd cloud) Bottom line: - Virtualization done right, with webservices
17. Cloud Computing is ! - on-demand self-service - ubiquitous network access - location independent resource pooling - rapid elasticity and capacity - measured service - pay as you go - abstract resources
18.
19. CCaaS - Software as a Service - SalesForce - Platform as a Service - Google App Engine - Microsoft Azure - Infrastructure as a Service - Rackspace Mosso - Amazon Web Services
24. Only the paranoid survive! - Key issues trust, trust, multi-tenancy, trust, encryption, compliance - Massive complex systems running on functional units - Certification & Audit - Loss of physical control - Interoperability - Accountability
25. please, keep in mind that - Shared hell: - Hardware - Memory - Disks - NIC's (Virtual) - Cache Snooping - Hypervisor Attacks - Persistent Root Kits - Password Cracking - Broken or stolen key rings / authorization federation - Never ending logs
26.
27. Great things do come - Provisioning and fault tolerance - Rapid reconstitution of services - Storage fragmented - Security layers (auth, firewall, logging, …) - Network and Security perimeters - Virtual Zoning - Think it all over again
28.
29. Challenges - Data dispersal and international privacy laws - Isolation management & Multi-Tenancy - Certification (SAS 70 Type II audits and ISO 27001) - Data ownership - QoS & SLA's garantees - Secure Hypervisors - Credentials
30.
31.
32. Challenges - Massive outages - Service bottle necks; DNS as your best friend - Encryption needs cloud resources, applications, storage, services - Disaster recovery and contingency plans - If you have it on Auto mode, you won't see it coming - Honey for hackers
33.
34.
35.
36.
37. ToDo - Network with VPN and VLAN's - SLA's; read the fine prints - Backup and recover often; Risk assessment - Log (out of there) as if the world ended tomorrow - Plan for failure - YOU secure!!! Encrypt data before transmission!!! - Sandbox, Sandbox, Sandbox
38. You're not alone - Security Groups IBM; SUN Oracle ; Amazon; PCCA; ICCV - Cloud Security Alliance (awesome guide!!) - OpenCloud Manifesto & Amazon Security Paper - Cloud Computing ML at Google Groups - Legal Cloud's - Vivek Kundra - USA CTO, did it, so as Facebook, New York Times and Nasdaq (on AWS)
39.
40. Wrap up - Plan - Encrypt - Backup - Secure - Audit - Sandbox (check my sapo codebits talk) - http://codebits.sapo.pt/files/aws_23.pdf - Trust