How One to One Sharing Enforces Secure Collaboration - xonomLaurent Henocque
Slides presented at Connect Security World Marseille 2015-08-06-lh-xonom
KeeeX lets users define per recipient sharing means (over weblinks, dropbox, google drive, even nfs or webdav) and encryption settings.
Then sharing targets can be selected in a single click: no groups, no access rights, extreme simplicity.
KeeeX is unique no infrastructure, #nosaas solution.
Nextcloud als On-Premises Lösung für hochsicheren Datenaustausch (Frank Karli...data://disrupted®
Dieser Vortrag ist ein Praxisbericht wie Nextcloud im öffentlichen Sektor als sicherere und DSGVO-konforme Datenaustauschplatform eingesetzt wird. Mittlerweile setzt die deutsche Bundesregierung sowie weitere europäische und aussereuropäische Regierungen auf Nextcloud. Auch deutsche Landesverwaltungen, sowie Schul- und Forschungeinrichtungen betreiben inzwischen eigene Nextcloud-Instanzen. Dieser Vortrag gibt einen Überblick aus der Praxis, warum on-premises Cloud File Sync und Share immer wichtiger wird, und was die Erfolgsfaktoren sind.
Auch die eingesetzten unterschiedlichen Architekturen mit den entsprechenden Vor- und Nachteilen werden beleuchtet. Zusätzlich stellt der Vortrag bestehende und zukünftige Funktionalitäten vor die für den sicheren und skalierbaren Betrieb von on-premises Cloud Services wichtig sind.
The Nextcloud Roadmap for Secure Team CollaborationUnivention GmbH
At the 2018 Univention Summit, Frank Karlitschek presented the Nextcloud vision for secure team collaboration. This year, Frank will present the progress that has been made, as well as new features, and prospects for 2019.
- We need to regain control over our digital life
- Free, decentralized & open are key values
- Connect people and make it easy to find them
- Nextcloud tried to do this together with strong partners to avoid vendor lock-in
From the Feb 19 2014 NISO Virtual Conference: NISO Virtual Conference: The Semantic Web Coming of Age: Technologies and Implementations
Henry Story, Chief Technical Officer & Co-founder at Stample -- Growing the Secure Social Web: The Friend of a Friend (FOAF) Project
Privacy and security on the internet are under attack by hackers and international espionage programs. If we want to use the internet as a free and secure medium again then we have to fix the internet to provide the security and privacy that people deserve.
The Nextcloud community is building an open source and fully federated and distributed network for files and communication. Everyone can run a Nextcloud server at home or somewhere on the internet and collaborate and share with everyone else. Nextcloud can be used to provide file access, syncing, sharing, calendar, contacts and more in a distributed way.
This talk will cover the current challenges around security and how user, companies and institutions can protect themselves. It will also discuss the big new features around End to End encryption and self hosted video/voice communication. It also presents a new architecture to bring the scalability of on premise file sync and share solutions to the next level.
How One to One Sharing Enforces Secure Collaboration - xonomLaurent Henocque
Slides presented at Connect Security World Marseille 2015-08-06-lh-xonom
KeeeX lets users define per recipient sharing means (over weblinks, dropbox, google drive, even nfs or webdav) and encryption settings.
Then sharing targets can be selected in a single click: no groups, no access rights, extreme simplicity.
KeeeX is unique no infrastructure, #nosaas solution.
Nextcloud als On-Premises Lösung für hochsicheren Datenaustausch (Frank Karli...data://disrupted®
Dieser Vortrag ist ein Praxisbericht wie Nextcloud im öffentlichen Sektor als sicherere und DSGVO-konforme Datenaustauschplatform eingesetzt wird. Mittlerweile setzt die deutsche Bundesregierung sowie weitere europäische und aussereuropäische Regierungen auf Nextcloud. Auch deutsche Landesverwaltungen, sowie Schul- und Forschungeinrichtungen betreiben inzwischen eigene Nextcloud-Instanzen. Dieser Vortrag gibt einen Überblick aus der Praxis, warum on-premises Cloud File Sync und Share immer wichtiger wird, und was die Erfolgsfaktoren sind.
Auch die eingesetzten unterschiedlichen Architekturen mit den entsprechenden Vor- und Nachteilen werden beleuchtet. Zusätzlich stellt der Vortrag bestehende und zukünftige Funktionalitäten vor die für den sicheren und skalierbaren Betrieb von on-premises Cloud Services wichtig sind.
The Nextcloud Roadmap for Secure Team CollaborationUnivention GmbH
At the 2018 Univention Summit, Frank Karlitschek presented the Nextcloud vision for secure team collaboration. This year, Frank will present the progress that has been made, as well as new features, and prospects for 2019.
- We need to regain control over our digital life
- Free, decentralized & open are key values
- Connect people and make it easy to find them
- Nextcloud tried to do this together with strong partners to avoid vendor lock-in
From the Feb 19 2014 NISO Virtual Conference: NISO Virtual Conference: The Semantic Web Coming of Age: Technologies and Implementations
Henry Story, Chief Technical Officer & Co-founder at Stample -- Growing the Secure Social Web: The Friend of a Friend (FOAF) Project
Privacy and security on the internet are under attack by hackers and international espionage programs. If we want to use the internet as a free and secure medium again then we have to fix the internet to provide the security and privacy that people deserve.
The Nextcloud community is building an open source and fully federated and distributed network for files and communication. Everyone can run a Nextcloud server at home or somewhere on the internet and collaborate and share with everyone else. Nextcloud can be used to provide file access, syncing, sharing, calendar, contacts and more in a distributed way.
This talk will cover the current challenges around security and how user, companies and institutions can protect themselves. It will also discuss the big new features around End to End encryption and self hosted video/voice communication. It also presents a new architecture to bring the scalability of on premise file sync and share solutions to the next level.
White paper - Full SSL automation with OneClickSSLGlobalSign
SSL Automation from application to installation
GlobalSign has designed, developed and patented OneClickSSL™, a revolutionary technology that simplifies the process from SSL application to installation with levels of automation previously considered impossible – eliminating support fees and minimizing time spent supporting customers.
Learn how the OneClickSSL technology works, the deployment options and use cases and how to generate new revenues with OneClickSSL.
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionJAYAPRAKASH JPINFOTECH
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
To buy this project in ONLINE, Contact:
Email: jpinfotechprojects@gmail.com,
Website: https://www.jpinfotech.org
Wir werden zukünftig in einer Welt leben, in der die Dateien der meisten Benutzer von vier großen Unternehmen gehostet werden. Dies gilt für die meisten Heimanwender, Unternehmen, aber auch für Bildungs- und Forschungseinrichtungen. Wenn wir unsere Souveränität über unsere Daten behalten, unsere Privatsphäre schützen und die Abhängigkeit von einem Anbieter verhindern wollen, brauchen wir Open Source und selbst gehostete und föderierte Alternativen.
Das Internet und das Web verwenden eine verteilte und föderierte Architektur. Jetzt müssen wir sicherstellen, dass Cloud-Dienste demselben Modell folgen. Eine neue Herausforderung ist die zunehmende Kombination von Anwendungshosting und -Speicher, wie sie in Office 365 und Google Suite zu finden ist. Dies birgt die Gefahr, zu einer sehr starken Vendor Lock-in zu führen.
In diesem Vortrag werden die laufenden Trends in diesen Bereichen und mögliche Lösungen diskutiert. Außerdem erhalten Sie einen Überblick darüber, wie Nextcloud und Univention UCS zusammenarbeiten und welche neusten Nextcloud-Funktionen es gibt.
Shared on 5th Dec at SGInnovate with Swirlds Mance Harmon, Jordan Fried and Edgar Seah.
Hashgraph consensus, demo apps in Swirlds Java SDK, babble (unofficial golang implementation of Hashgraph) and their implications for distributed ledger technology.
Lights, Camera, Action - Windows Azure Media Services on the Loose - the Azug...Mike Martin
You just cannot imagine the Web without audio and video services. Up until now, if you want to include streaming media content in your websites or applications, you need to rely on third party services or massive computing capacity for media transcoding, and streaming to a range of client devices. With the release of Windows Azure Media Services and the Media Services SDK, these capabilities are becoming easily available for you to incorporate in your websites and applications. In this session we'll give an overview of Windows Azure Media Services, and you'll learn from a series of demos how you can take advantage of the platform to add media content to your development. We'll also see what the competition has in store and what's missing.
Nirvanix's mission is to ease the burden of storage management for organizations while enabling secure and reliable access to data worldwide. Nirvanix provides the Nirvanix Storage Delivery Network (SDN), a fully-managed, secure cloud storage service developed for today's enterprises. The SDN intelligently stores, delivers and processes storage requests in the best network location, providing the optimal user experience. The SDN is comprised of standards-based access to integrated services, powered by Nirvanix's patent-pending proprietary technology and infrastructure.
BigchainDB: Blockchains for Artificial Intelligence by Trent McConaghyBigchainDB
How can blockchains help AI?
-Decentralized model exchange
-Model audit trail
-AI DAOs
-more
A blockchain caveat or two
Completely new code bases
Reinventing consensus
No sharding = no scaling
No querying // single-node querying
Let’s fix this...
A presentation of KeeeX, the onty totally private, sustainable, blockchain and future ready collaboration solution.
This document supersedes and replaces the previous teaser xukih-mazav
White paper - Full SSL automation with OneClickSSLGlobalSign
SSL Automation from application to installation
GlobalSign has designed, developed and patented OneClickSSL™, a revolutionary technology that simplifies the process from SSL application to installation with levels of automation previously considered impossible – eliminating support fees and minimizing time spent supporting customers.
Learn how the OneClickSSL technology works, the deployment options and use cases and how to generate new revenues with OneClickSSL.
KeyD: Secure Key-Deduplication with Identity-Based Broadcast EncryptionJAYAPRAKASH JPINFOTECH
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
To buy this project in ONLINE, Contact:
Email: jpinfotechprojects@gmail.com,
Website: https://www.jpinfotech.org
Wir werden zukünftig in einer Welt leben, in der die Dateien der meisten Benutzer von vier großen Unternehmen gehostet werden. Dies gilt für die meisten Heimanwender, Unternehmen, aber auch für Bildungs- und Forschungseinrichtungen. Wenn wir unsere Souveränität über unsere Daten behalten, unsere Privatsphäre schützen und die Abhängigkeit von einem Anbieter verhindern wollen, brauchen wir Open Source und selbst gehostete und föderierte Alternativen.
Das Internet und das Web verwenden eine verteilte und föderierte Architektur. Jetzt müssen wir sicherstellen, dass Cloud-Dienste demselben Modell folgen. Eine neue Herausforderung ist die zunehmende Kombination von Anwendungshosting und -Speicher, wie sie in Office 365 und Google Suite zu finden ist. Dies birgt die Gefahr, zu einer sehr starken Vendor Lock-in zu führen.
In diesem Vortrag werden die laufenden Trends in diesen Bereichen und mögliche Lösungen diskutiert. Außerdem erhalten Sie einen Überblick darüber, wie Nextcloud und Univention UCS zusammenarbeiten und welche neusten Nextcloud-Funktionen es gibt.
Shared on 5th Dec at SGInnovate with Swirlds Mance Harmon, Jordan Fried and Edgar Seah.
Hashgraph consensus, demo apps in Swirlds Java SDK, babble (unofficial golang implementation of Hashgraph) and their implications for distributed ledger technology.
Lights, Camera, Action - Windows Azure Media Services on the Loose - the Azug...Mike Martin
You just cannot imagine the Web without audio and video services. Up until now, if you want to include streaming media content in your websites or applications, you need to rely on third party services or massive computing capacity for media transcoding, and streaming to a range of client devices. With the release of Windows Azure Media Services and the Media Services SDK, these capabilities are becoming easily available for you to incorporate in your websites and applications. In this session we'll give an overview of Windows Azure Media Services, and you'll learn from a series of demos how you can take advantage of the platform to add media content to your development. We'll also see what the competition has in store and what's missing.
Nirvanix's mission is to ease the burden of storage management for organizations while enabling secure and reliable access to data worldwide. Nirvanix provides the Nirvanix Storage Delivery Network (SDN), a fully-managed, secure cloud storage service developed for today's enterprises. The SDN intelligently stores, delivers and processes storage requests in the best network location, providing the optimal user experience. The SDN is comprised of standards-based access to integrated services, powered by Nirvanix's patent-pending proprietary technology and infrastructure.
BigchainDB: Blockchains for Artificial Intelligence by Trent McConaghyBigchainDB
How can blockchains help AI?
-Decentralized model exchange
-Model audit trail
-AI DAOs
-more
A blockchain caveat or two
Completely new code bases
Reinventing consensus
No sharding = no scaling
No querying // single-node querying
Let’s fix this...
A presentation of KeeeX, the onty totally private, sustainable, blockchain and future ready collaboration solution.
This document supersedes and replaces the previous teaser xukih-mazav
Docker helped to bring container technologies to the masses. Already, giants joined the movement, either claiming long time usage (like Google) or trying to catch up momentum (like Microsoft). This talk was about discovering docker and its ecosystem, from a devops and practical point of view. My slides presented at Anchor Coworking on December 27th, 2014.
The Rise of DataOps: Making Big Data Bite Size with DataOpsDelphix
Kellyn Pot'Vin Gorman presented this talk on May 23, 2018 at Data Summit 2018. Database Trends & Applications covered her talk in the following article https://t.co/J6dk30iPkc
AMIMOTO WordPress + Amazon Web Services for ALL Tech Levels Kel
AMIMOTO is a high performance WordPress Cloud Host built for WordPress running on AWS environment.
AMIMOTO is the combination of AWS + Nginx + WordPress + Proxy Cache
The result? Super fast websites (100 times faster than normal install, AMIMOTO is for performance tuning) that can handle 100MILLION+ Page Views and functions at ninja speed.
Building specialized container-based systems with Moby: a few use cases
This talk will explain how you can leverage the Moby project to assemble your own specialized container-based system, whether for IoT, cloud or bare metal scenarios. We will cover Moby itself, the framework, and tooling around the project, as well as many of it’s components: LinuxKit, InfraKit, containerd, SwarmKit, Notary. Then we will present a few use cases and demos of how different companies have leveraged Moby and some of the Moby components to create their own container-based systems.
This presentation was provided by Tim Devenport of Nature Publishing Group, Jerry Ward of ProQuest, and William Hoffmann of Swets Information Services, during the NISO event,"ONIX for Serials: Case Studies of Use," held on December 11, 2008.
There's More to Docker than the Container: The Docker Platform - Kendrick Col...{code} by Dell EMC
{code} by Dell EMC has a rich history of building storage plaugins with Docker. The Docker engine is only one piece of the puzzle when it comes to solving a container-based infrastructure. The projects from Docker aim to democratize development tools, build better applications, and simplify operations. Learn about all of the different Docker projects along with {code} by Dell EMC integrations to run containers at every stage from development to production.
Bauen und Verteilen von Multi-Arch Docker Images für Linux und WindowsStefan Scherer
Windows Server 2016 hat Docker und Container eingebaut. Damit ergeben sich neue Möglichkeiten, Windows-Anwendungen zu verteilen. Sie werden lernen, die Verteilung für Windows und Linux mit Containern zu vereinheitlichen.
Mit dem neuen "docker manifest" Kommando bzw. dem manifest-tool können solche Multi-Arch Docker Images selbst erzeugt werden.
https://www.x-celerate.de/programm
MiniFi and Apache NiFi : IoT in Berlin Germany 2018Timothy Spann
Future of Data : Berlin
Apache NiFi and MiniFi with Apache MXNet and Tensorfor for IoT from edge devices like Raspberry Pis. Including Python and other tools.
Similar to KeeeX as a Survival Kit in the Digital Jungle 20141229-LH-KX-xulig-nimyr-buder (20)
Projet MeRS restitution finale kx-lh-2019-12-02-xuheh-gofigLaurent Henocque
Le projet MeRS a permis la mise en oeuvre d'une solution blockchain pour la dématérialisation du flux documentaire export multimodal entre Lyon et Marseille Fos. Le document en décrit les enjeux et témoigne des choix techniques effectués et des perspectives.
Une présentation de KeeeX, l'unique solution de collaboration à la fois totalement confidentielle, pérenne et compatible avec le futur des données, les blockchain.
Ce document subsume et remplace le précédent xoloh-lypin-cemem.
Présentation Trophées Euro Cloud (KeeeX version xunab)Laurent Henocque
Présentation réalisée aux Trophées du Cloud, organisé par Eurocloud France, le vendredi 10 Juillet 2015 au grand auditorium du Palais Brongniart à Paris, pour la dernière journée de la Cloud Week 2015 Paris
KeeeX - Kit de Survie dans la Jungle Numérique - xuros-zebom-vesihLaurent Henocque
Ce diaporama est une présentation non technique de KeeeX. En deux parties. Il est destiné à illustrer les difficultés auxquelles KeeeX (http://keeex.io) permet de répondre.
This document aims at listing key issues in Data Governance and study the value offered by KeeeX (http://keeex.io)
• KeeeX is non intrusive, since documents retain normal functionality, and there is no infrastructure
• Hence KeeeX needs not solve the whole technical data governance problem, but may operate as a complement to existing frameworks and infrastructures
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
4. Do you use multiple sharing means?
ready to
send
•published on the internet
•synchronized by a cloud
•by email
•by a weblink
•shared, mobile disk
•usb drive
•...
5. Share in a click whatever the means
of exchange
KeeeX
ready to
send
•published on the internet
•synchronized by a cloud
•by email
•by a weblink
•shared, mobile disk
•usb drive
•...
6. Do you place dates in file names?
pres LH 141217.ppt
2014 dec 17 - pres.ppt
pres - LH - 20141217 - v2.ppt
pres - LH - 20141217 - v3 - b4 modif post
meeting 3rd notes of Carl final final final
plus mega final.ppt
...
pres.ppt
7. KeeeX automates file and version
naming
note-keeex-2014-12-10-xofub-masac-temim.doc
•Laurent mass publishes and wants to
find on internet
note aoshi 141210 rubiz.doc
•Aoshi shares within the
organisation
note.doc
8. Do you convert to pdf by‘security’?
note.doc
Data implying
a responsibility
-
modifiable note.pdf
Data implying
a responsibility
-
almost
unmodifiable
9. KeeeX secures even an editable
document
note.doc
KeeeXData implying
a responsibility
-
modifiable
note-keeex-topaz.doc
Unmodifiable !!!
10. Even your digital signature
note.doc
KeeeX
Scanned
signature
note-keeex-rubiz.doc
17. With KeeeX, a document embeds its
trust, and organization:
‣ its classification, links, versions
‣ unforgeable authenticity, authorship
‣ a universe scale unique search key,
indexed by search engines
‣ a human friendly name, easy to
memorize
17
18. KeeeX operates:
‣ without infrastructure, central
server, SAAS, network
‣ at no risk - files are unaltered
‣ without imposing tools to
collaborators
‣ without divulging your data
‣ whichever the document format is.
18
19. Can you travel without a
passport?
‣ However, you are not clonable, infinitely
modifiable as a file!
‣ So why don’t you keeex your files?
Because you ignore that it is possible?
20. When Data or Work becomes a file,
keeex it!
KeeeX
21. KeeeX is an universal protection in
the digital no man's land
KX
22. 22
KeeeX is the unique patented solution that places
trust and organization inside documents.
Founded by Laurent Henocque, the startup is
located in Marseille, helped by par Incubateur Belle
de Mai, SATT SE, and business angels.
Laureate BPIFrance 2013 (Emergence), and elected
most innovative SME 2014 by the Pole SCS
23. 23
Thanks! now go to
http://keeex.io
and try!
Laurent Henocque
laurent@keeex.net
+33 683 88 20 01
Ok, so you
want more?
24. KX
Search / Find
'topaz !'
'topaz ?'
Download / Read
KX
No possible corrup<onLocally verified
Ensure if needed that what you find
is genuine, even from the internet
25. Preserve a binding trace of all the
steps of a contract/document
Problem
with rubix !
What happened?
28. Share a provably identical
document across multiple channels
KeeeX
prêt
à
envoyer
•published on the internet
•synchronized by a cloud
•by email
•by a weblink
•shared, mobile disk
•usb drive
•...
29. Use one to one syncs 1-1to prevent
unwanted sharing
(for instance by adding a new member to a group having an ancient work history)
/laurent
/vers-laurent
/nicolas
/aoshi
/nicolas
/laurent/aoshi
32. Obtain a certified timestamp
...xizek-morun.jpg
xizek-morun-zezos-
pazoc-zopeh-tuguc-conit-
ryful-hymum-racif-zibok-
gozun-nadyr-baniz-tenil-
byvod-lixyx
Publish this KeeeX id via un trusted RFC 3161 certified tier - on
or a blockchain)
33. Be instantly notified
‣ when a file is verified by a collaborator
‣ when a new version is started
‣ when a new version is created (even if not
already on your machine)
‣ when it is shared with you (even before receipt)
or someone else
‣ when it is approved
33
34. Control the space used for archival
and useless versions
OK to
Trim?
Useless versions can be securely deleted, while obeying a
formal (and recorded) approval process
35. Use exact keywords for
unambiguous classification
CAR?
english for
french for
french for
BECAUSE
TOPAZ !
XOFUP !
RUBIZ !
40. KeeeX
Protect against the execution of
unknown scripts (roadmap)
KeeeX
rubiz.html
KeeeX
topaz.js
white list
•rubiz
•topaz
xifoz.js
browser + KeeeX plugin
un script.js
socially
certified
addition
47. KX
Easily aggregate data from
multiple sources
KX
KX
Internet
Dossier
BD - GED
KX
Cloud
xikoz-ducav ?
48. Here is what a certificate issuer
asks you
Applicant agrees to indemnify XXX and its directors, officers,
agents, employees, contractors, parents, affiliates, or
subsidiaries (collectively, the 'Indemnified Parties') and hold the
Indemnified Parties harmless from and against any losses,
costs, damages, and fees (including reasonable attorney's fees)
incurred by the Indemnified Parties in connection with: (a) Any
breach by Applicant of any obligation under this letter or the
XXX Certificate Policy (collectively, the 'Indemnity Conditions').
Upon appropriate notice, Applicant shall defend, at its
expense, any claim brought against one or more of the
Indemnified Parties based on or arising out of one or more of
the Indemnity Conditions
48
49. KeeeX invents the social certificate
‣ Each user chooses his public key from a
passphrase.
‣ Anyone receiving a file signed with this key
for the first time validates the author by
another means (telephone, email, social
network...)
‣ This validation can be signed, and shared, to
contribute a social certificat (from the
number and reputation of the signers)
49
50. 50
Thanks for reading that far!
Now, go to http://keeex.io
and try!
Laurent Henocque
laurent@keeex.net
+33 683 88 20 01
The END
Sure,
but only for now