Presentation prepared by Predictable Network Solutions. Overview on their network cost and performance transformations services for communication service providers.
This presentation shares some of the latest advances in network performance science. What are the problems with how people today measure, model and manage performance? What are the state of the art approaches? A case study from Kent Public Service Network will illustrate the scope for improvements in all network operators.
Network performance optimisation using high-fidelity measuresMartin Geddes
Communications service providers are seeking to increase their profitability and return on assets Predictable Network Solutions Ltd has the capability to support optimisation beyond traditional approaches to network data analytics. This capability is built around a robust scientific method. CSPs can benefit greatly from enhancing the fidelity of their measurements of critical aspects of network performance. Standard techniques fail to capture enough resolution. We have the missing leading-edge measurement capabilities that all CSPs need.
Broadband is a relatively new technology, and its underlying science is still being developed. We have long understood the 'right' units in other engineering disciplines: mass, length, hardness, etc. What is the 'right' unit for supply and demand for broadband?
This presentation discusses the need for having the right metric. This means solving two problems: the 'abstraction' gap, and the 'inference' gap. ∆Q is the ideal metric because it fills both gaps.
Essential science for broadband regulationMartin Geddes
Is 'net neutrality' an objectively measurable thing? The scientific report recently commissioned by Ofcom (the UK telecoms regulator) on Traffic Management Detection says 'no'. Furthermore, 'neutrality' isn't even what we want! This presentation is an annotated version from a webinar that summarises the report and suggests a way out of the 'neutrality' quagmire.
Introduction to ΔQ and Network Performance Science (extracts)Martin Geddes
Introduction and summary sections from long slide deck (165 slides) on network performance science as the associated mathematical breakthrough that makes it possible.
This presentation shares some of the latest advances in network performance science. What are the problems with how people today measure, model and manage performance? What are the state of the art approaches? A case study from Kent Public Service Network will illustrate the scope for improvements in all network operators.
Network performance optimisation using high-fidelity measuresMartin Geddes
Communications service providers are seeking to increase their profitability and return on assets Predictable Network Solutions Ltd has the capability to support optimisation beyond traditional approaches to network data analytics. This capability is built around a robust scientific method. CSPs can benefit greatly from enhancing the fidelity of their measurements of critical aspects of network performance. Standard techniques fail to capture enough resolution. We have the missing leading-edge measurement capabilities that all CSPs need.
Broadband is a relatively new technology, and its underlying science is still being developed. We have long understood the 'right' units in other engineering disciplines: mass, length, hardness, etc. What is the 'right' unit for supply and demand for broadband?
This presentation discusses the need for having the right metric. This means solving two problems: the 'abstraction' gap, and the 'inference' gap. ∆Q is the ideal metric because it fills both gaps.
Essential science for broadband regulationMartin Geddes
Is 'net neutrality' an objectively measurable thing? The scientific report recently commissioned by Ofcom (the UK telecoms regulator) on Traffic Management Detection says 'no'. Furthermore, 'neutrality' isn't even what we want! This presentation is an annotated version from a webinar that summarises the report and suggests a way out of the 'neutrality' quagmire.
Introduction to ΔQ and Network Performance Science (extracts)Martin Geddes
Introduction and summary sections from long slide deck (165 slides) on network performance science as the associated mathematical breakthrough that makes it possible.
The Properties and Mathematics of Data Transport QualityMartin Geddes
A Brief Introduction to ’Quality’ in Data Networks; its Interaction with End User Experience, its Conservation, Propagation, and how it can be Traded, Costed and Managed.
The goal of this presentation is to share exemplars of important broadband Internet access performance phenomena. In particular, we highlight the critical role of stationarity.
When they have non-stationarity, networks are useless for most applications. We show real-world examples of both stationarity and non-stationarity, and discuss the implications for broadband stakeholders.
These phenomena are only visible when using state-of-the-art high-fidelity metrics and measures that capture instantaneous flow.
Network performance - skilled craft to hard scienceMartin Geddes
This document describes the technical and business journey for network operators wanting to turn network performance from a skilled craft into hard science.
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
Service providers are facing more and more pressure as customers demand immediacy. Learn how adopting a carrier-grade, open network platform closes the innovation gap to create value for your network. http://juni.pr/1JQZYOl
Geographic Analytics - How HP Visualises its Supply ChainNUS-ISS
This is an article by Dr Jozo Acksteiner and Ms Claudia Trautmann on Geographical Analytics. Dr Acksteiner was a speaker at ISS Seminar: Supply Chain Analytics on 20 Nov 2013
Advanced techno-economic modelling of distribution network investment require...Power System Operation
In an increasingly dynamic and changing electricity sector
with rising distributed energy resources, new network investment models are needed that enable consideration
of flexibility, uncertainty and risk. Existing modelling frameworks include “top down” models that offer a comparison of investment and investment strategies between
scenarios and “bottom up” models that consider detailed
technical impacts on real networks. These frameworks are broadly appropriate for analysing investment, with
the requirements of the business, stakeholders and
regulator influencing the specific model design and
implementation. There are a number of dimensions across network engineering, investment, customers and energy markets to be captured and represented in the modelling
at some level. This paper presents a number of advanced modelling techniques which can be applied to both topdown
and bottom up modelling frameworks, enabling
better consideration of customer variability, network risk and optioneering of solutions.
Drawing on Bayesian statistics, customer load has been represented using a sophisticated statistical model that
reflects both variability and uncertainty in demand on LV networks. This can help to explicitly quantify network risk due to existing loads, new loads and customer flexibility. A network ‘emulator’ model provides significantly faster run-
times for analysis of large solution sets by parameterising the variables of a power flow model against the inputs.
This has been applied and tested with LV, HV and EHV networks with results closely matching equivalent power
flow models. Implemented in combination with the
Bayesian customer load model enables probabilistic,
risk- based modelling. A constrained cost optimisation algorithm has also been developed to find the lowest cost
Methodology and strategies for building successful telecom managed servicesParcus Group
Presentation to Juniper Networks Carrier Partners Summit in Bangkok on methodologies and strategies for building successful telecom managed services products.
I-ESA'14 ICT Services and Interoperability for Manufacturing - FLEXINET Intor...FLEXINET-PROJECT
Conference Workshop Presentation at the Seventh International Conference on "Interoperability for Enterprise Systems and Applications 24" as a summary introduction to the FLEXINET EU FP7 Project "Intelligent Systems Configuration Services for Flexible Dynamic Global Production Networks", authors R.I.M. Young (Loughborough University), K. Popplewell (Coventry University), F-W. Jaekel (Fraunhofer IPK), B. Otto (Technical University of Dortmund), G. Bhullar (Control 2K Ltd.)
The Mine Central Control Room: From Concept to Reality Schneider Electric
Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). The main concept of a central control room is the ability to gather and automatically transform information from different sources and mines into business decisions, centralizing and monitoring them from a single location. This central control room also acts as a complete repository of all business operations including mine planning, metrics, asset management, quality and process control, surveillance, sustainability data, emissions, energy efficiency projects, weather and more.
The Properties and Mathematics of Data Transport QualityMartin Geddes
A Brief Introduction to ’Quality’ in Data Networks; its Interaction with End User Experience, its Conservation, Propagation, and how it can be Traded, Costed and Managed.
The goal of this presentation is to share exemplars of important broadband Internet access performance phenomena. In particular, we highlight the critical role of stationarity.
When they have non-stationarity, networks are useless for most applications. We show real-world examples of both stationarity and non-stationarity, and discuss the implications for broadband stakeholders.
These phenomena are only visible when using state-of-the-art high-fidelity metrics and measures that capture instantaneous flow.
Network performance - skilled craft to hard scienceMartin Geddes
This document describes the technical and business journey for network operators wanting to turn network performance from a skilled craft into hard science.
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
Service providers are facing more and more pressure as customers demand immediacy. Learn how adopting a carrier-grade, open network platform closes the innovation gap to create value for your network. http://juni.pr/1JQZYOl
Geographic Analytics - How HP Visualises its Supply ChainNUS-ISS
This is an article by Dr Jozo Acksteiner and Ms Claudia Trautmann on Geographical Analytics. Dr Acksteiner was a speaker at ISS Seminar: Supply Chain Analytics on 20 Nov 2013
Advanced techno-economic modelling of distribution network investment require...Power System Operation
In an increasingly dynamic and changing electricity sector
with rising distributed energy resources, new network investment models are needed that enable consideration
of flexibility, uncertainty and risk. Existing modelling frameworks include “top down” models that offer a comparison of investment and investment strategies between
scenarios and “bottom up” models that consider detailed
technical impacts on real networks. These frameworks are broadly appropriate for analysing investment, with
the requirements of the business, stakeholders and
regulator influencing the specific model design and
implementation. There are a number of dimensions across network engineering, investment, customers and energy markets to be captured and represented in the modelling
at some level. This paper presents a number of advanced modelling techniques which can be applied to both topdown
and bottom up modelling frameworks, enabling
better consideration of customer variability, network risk and optioneering of solutions.
Drawing on Bayesian statistics, customer load has been represented using a sophisticated statistical model that
reflects both variability and uncertainty in demand on LV networks. This can help to explicitly quantify network risk due to existing loads, new loads and customer flexibility. A network ‘emulator’ model provides significantly faster run-
times for analysis of large solution sets by parameterising the variables of a power flow model against the inputs.
This has been applied and tested with LV, HV and EHV networks with results closely matching equivalent power
flow models. Implemented in combination with the
Bayesian customer load model enables probabilistic,
risk- based modelling. A constrained cost optimisation algorithm has also been developed to find the lowest cost
Methodology and strategies for building successful telecom managed servicesParcus Group
Presentation to Juniper Networks Carrier Partners Summit in Bangkok on methodologies and strategies for building successful telecom managed services products.
I-ESA'14 ICT Services and Interoperability for Manufacturing - FLEXINET Intor...FLEXINET-PROJECT
Conference Workshop Presentation at the Seventh International Conference on "Interoperability for Enterprise Systems and Applications 24" as a summary introduction to the FLEXINET EU FP7 Project "Intelligent Systems Configuration Services for Flexible Dynamic Global Production Networks", authors R.I.M. Young (Loughborough University), K. Popplewell (Coventry University), F-W. Jaekel (Fraunhofer IPK), B. Otto (Technical University of Dortmund), G. Bhullar (Control 2K Ltd.)
The Mine Central Control Room: From Concept to Reality Schneider Electric
Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). The main concept of a central control room is the ability to gather and automatically transform information from different sources and mines into business decisions, centralizing and monitoring them from a single location. This central control room also acts as a complete repository of all business operations including mine planning, metrics, asset management, quality and process control, surveillance, sustainability data, emissions, energy efficiency projects, weather and more.
To achieve their business
objectives, increase competitiveness, and improve end user QoE, Communication Service Providers need to achieve a level of operational excellence — a philosophy of leadership, teamwork and problem solving resulting in continuous improvement throughout the organization — in all functional areas. This requires effective integration of network transformation programs
with efforts to consolidate the previous separate worlds of IT, network operations and customer care.
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...Cisco Service Provider
Service providers’ businesses and operations are undergoing major changes. New initiatives, like IP convergence, cloud, software-defined networks and network virtualization, are driving new business models. These initiatives are also creating opportunities for new revenue streams and greater efficiencies. Speed, agility and flexibility are required for fast access to IT and new applications. Now is the time to invest effort and resources in figuring out how to make this opportunity work for you. You have a chance to disrupt rather than being disrupted.
Cloud Navigator is our tried and trusted way of helping you navigate quickly and effectively through the cloud. We offer incorporated cloud computing into your strategy, assessment of cloud computing scenarios & options, security & compliance check, sourcing & transformation advice, as well as adaptation of governance & operation.
Transformation Through Innovation: A Strategy For Service Provider SuccessCisco Service Provider
Service providers can capitalize on $1.7 trillion in incremental value over the next 10 years through the Internet of Everything (IoE). The opportunity for service providers is to create value for consumers and enterprises. However, operational complexity can stifle the service provider’s ability to reduce costs and become more agile when bringing new capabilities to market. Today most new applications take months to roll out. Upgrades and migrations often take just as long. Service providers seek technology partners that can transform their businesses, helping them to move faster, with more security, greater flexibility, and less risk.
Cisco offers a comprehensive strategy that creates an environment for services providers to advance innovation while enhancing profitability. Cisco helps to make service provider transformation possible in three ways:
● Transform the experience: We deliver capabilities that help service providers develop new experiences for consumers and businesses, as people, things, processes, and data are connected in the IoE. For example:
◦ Fraud protection applications connected to locations through mobile phones
◦ Sensors connecting a basketball with a IP television services
◦ Healthcare applications tracking vital signs from wearables
◦ Public safety services that synchronize ambulances with traffic lights
● Transform the business: We engage with service providers to create new business models and new revenue streams, estimated to be $1.7 trillion over the next decade. Cisco delivers solutions that provide the agility to bring services to market faster.
● Transform the architecture: With the Cisco® Evolved Programmable Network (EPN) and Evolved Services Platform (ESP), we use both physical and virtual technology that offers open, flexible programmability. The network becomes the services platform using the latest automation, orchestration, and virtualization capabilities. Cisco allows many solutions to work together as one open architecture to create a platform of possibilities.
A presentation describing the global network services offered by Aviat Networks (previously Harris Stratex Networks).
Aviat Networks is the wireless expert in advanced IP network migration, building the foundation for the 4G/LTE broadband future and enabling wireless transformation around the world.
Helping Industrial OEMs improve asset uptime and service profitability through end-to-end M2M design and deployment support, remote monitoring, data management, prognostics and in depth analytics
Make 5G smarter through the whole lifecycle | Brochure | InfovistaInfovista
Technologies like 5G present you with a seemingly unsolvable conundrum: how to focus on deploying and
investing in the future, while continually improving operations for the networks that your customers rely on today.
Against a backdrop of record high networks traffic loads, more complex and dynamic cloud environments and the introduction of new SLA-backed enterprise services how can you focus on deploying and investing in the 5G future?
In this brochure we explain how Infovista’s portfolio can help you automate the workflows and operations
between and within the various phases of the end-to-end lifecycle – and automate manual tasks associated with daily 3G and 4G operations – so you can focus on deploying your 5G future, faster.
By simplifying the whole lifecycle from planning, testing, operations and monetization, you can focus on deploying the future, faster.
Download this brochure to understand how Infovista’s solutions can support your 5G journey, including:
🔷5G network planning: optimize CAPEX, so you can act in hours not weeks
🔷5G testing: reduce OPEX by 40% in 3 years through automation
🔷Automated Assurance and Operations: Eliminate 70% of manual processes for a clearer focus on new 5G services
🔷Monetize 5G faster with dedicated use cases so you can End-to-end SLA automation, Streamlining network inventory and configuration, Automated RAN diagnosis and optimization
❓ ANY QUESTIONS? CONTACT US https://bit.ly/3p28yMA
📌 LET'S CONNECT📌
🔹 Official Site: https://www.infovista.com/
🔹 Our Blog: https://www.infovista.com/blog
🔹 LinkedIn: https://www.linkedin.com/company/infovista
🔹 Facebook: https://www.facebook.com/infovista
🔹 Twitter: https://twitter.com/Infovista
Transformation through Innovation: A Strategy for Service Provider SuccessCisco Service Provider
Service providers seek technology partners that can transform their businesses, helping them to move faster, with more security, greater flexibility, and less risk. Cisco offers a comprehensive strategy that creates an environment for services providers to advance innovation while enhancing profitability.
IT Ops Mgmt in the New Virtualized, Software-defined WorldEMC
During this recorded webcast, you will hear from EMC and Enterprise Management Associates Inc. discuss leading approaches to manage your virtualized, software-defined environment. Learn how the EMC Service Assurance Suite for Virtual Data Center and Software-Defined environments, can help you deliver new services quickly and reliably, identify and resolve problems before service impact, and improve operational efficiency.
Similar to Network Cost and Performance Transformation Services (20)
When we get water, electricity, or gas delivered to our home or place of work we expect it to have predictable quality. Why isn't this also true of broadband? The answer is we don't (yet) have the "glue" to integrate performance in digital supply chains.
Digital supply chain quality managementMartin Geddes
We've figured out how to send physical goods around the world: aggregate them into containers. We're still struggling how to do digital good, which we disaggregate into packets. Here's the answer.
Superfast or superfit? The case for UK broadband policy reformMartin Geddes
This is a critical moment for UK digital infrastructure policy. The context is one of rapid political, market and technological change. As a nation, we face important decisions over topics like post-Brexit regulation, universal service delivery, Openreach independence, TETRA replacement and 5G readiness. The imperative is to reflect on whether our historic approaches will meet our future needs. Where we anticipate a shortfall, we must act to protect our long-term national interest.
This paper aims to educate policymakers about one specific shortfall: the growing ‘capability gap’ between broadband demand and supply.
It makes two recommendations.
This unwanted situation is avoidable by two readily attainable changes in our policy approach.
Firstly, our policy metrics need to reflect the readiness of broadband infrastructure to support both present and future demand.
Secondly, the money needs to move to incentivise the right market behaviours to create a correspondingly fit-for-purpose supply.
When these reforms are enacted together, this will help to position the UK with a world-class infrastructure ready to attract capital and talent on a global scale.
Broadband service quality - rationing or markets?Martin Geddes
"Net neutrality" is implicitly framed as a debate over how to deliver an equitable ration of quality to each broadband user and application. This is the wrong debate to have, since it is both technically impossible and economically unfair. We should instead be discussing how to create a transparent market for quality that is both achievable and fair.
Introduction to network quality arbitrageMartin Geddes
Many large operators have expressed a desire to undertake disruptive change, and we have often proposed an agenda for such change. What typically happens is that, after several rounds of engagement, we observe that there is little mainstream organisational appetite to engage in disruption. Why so?
The main reason is a perception gap between the current state of the art (which any leading operator delivers) and our understanding of the state of the possible (which most operators are very far from). This gap exaggerates the risks of engaging in disruption, and underestimates the potential rewards.
Another reason is that our industry as a whole implicitly believes that network service quality is a matter of detecting and rectifying ‘faults’. This framing inhibits the consideration of the alternative paradigm of networks as resource trading spaces. As a result, the significant ‘quality arbitrage’ that exists in all IP networks is not visible.
Operators face the risk that others will exploit the arbitrage opportunity, to their serious commercial disadvantage. This has happened before, e.g. with TDM and the rise of ISPs, and is happening now with SD-WAN. We propose that a larger multinational operators need to proactively initiate the disruption via a new business unit.
The End of Information Technology: Introducing Hypersense & Human TechnologyMartin Geddes
If we were to climb into a time machine and set the dial for ten years into the future, what might personal communications look like? Might you inhabit a soothing virtual reality where your conference call takes place in a simulated lakeside villa? Might you consult with a virtual doctor? Employ a “Guardian Avatar” to act autonomously on your behalf eliminating online drudgery and security concerns? Although no particular future is certain, the seeds of what is to come can always be found within the present reality, albeit often only in retrospect.
Sample proposal summary for quality arbitrage business unitMartin Geddes
The telecoms industry is getting to grips with quality and performance. The current system has a weak control over quality, and many pricing mismatches. As a result, there are arbitrage opportunities everywhere. This presentation for a global telco proposed a new business unit to take advantage of them.
The future of computing is a symbiosis of machines and people. To achieve this we need an "operating system" upgrade for digital technology. We all need a Guardian Avatar to help us to navigate the "metaverse", and to care for us and protect us.
Evaluating the internet end-user experience in the Russian FederationMartin Geddes
This presentation examines the underlying structure of the quality loss over the Internet between Russia and points in Europe. It uses extremely high-fidelity measurements and uncovers a unique data set as a result.
FCC Open Internet Transparency - a review by Martin GeddesMartin Geddes
How technically sound and effective are the Federal Communications Commission's proposed rules on broadband measurement? This short informal report evaluates them and finds a concerning shortfall.
The human race is on a journey from beasts to superheroes to gods. This short presentation frames our progression, and the key challenge that we need to face to get there.
Beyond 'neutrality' - how to reconnect regulation to reality?Martin Geddes
How can we anchor broadband policy in technical reality? The key is to understand that there is a critical missing element missing from the current literature: the stochastic nature of broadband. This has significant and serious implications for all regulators, ISPs and consumer advocates.
The issue of quality in networks has been long being troublesome, resulting in endless deferral. It was a hard issue for the pioneers to deal with ‘quality’ and ‘QoS’ as the underlying mathematics was insufficient to support their ambitions. We have now filled in a significant part of the missing mathematical foundations. The culmination of that work is the ∆Q framework.
As a by-product of this framework, a new approach to sharing quality has become possible: a polyservice network. We believe that this is a significant conceptual and practical advance. However, we have (until now) lacked industry standard terminology to describe it.
This short presentation introduces the idea of a polyservice network, and contrasts it with pre-existing approaches to ‘priority QoS’.
The ISP industry has been selling the public and government on the benefits of 'superfast' broadband. This presentation argues that the goal should instead be 'superfit' broadband.
The perception gap: the barrier to disruptive innovation in telecomsMartin Geddes
The 'state of the possible' in telecoms is a long way ahead the 'state of the art'. The new science of network performance enables a large leap in customer experience and cost. However, the perception among operators is that only relatively small, incremental improvements are possible.
This presentation explores the reasons for this 'perception gap' between what is seen to be possible, and what actually is. It draws on our work at senior levels for tier 1 operators, as well as examples from outside the telecoms industry.
Overcoming this gap opens the possibility to disruptive innovation. Who will seize the opportunity? Incumbents, challengers or new entrants?
This paper is a bibliography of articles on the key technology trends of today: Mass personalisation, Inclusive and accessible design, Data-driven decision making, Generational change, Portfolio careers, Virtual workplace solution, Privacy, Resurgence in voice, On-the-go communications, Future of email, Virtual reality, Gaming and gamification, Sensor revolution, Sensual interfaces, Soundscaping, Wearables, Social robotics, Sentiment analysis, Anticipatory computing, Virtual assistants, Wireless and mobility, Distributed trust systems, Batteries and power, ‘Glomad’ workers, Home teleworking, Data destruction, Cybermeetings, Security as a service, Human productivity, Simplified security
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.