Policy Implementation and Experience Report from ARIN 32
Full meeting report from ARIN 32 available at: https://www.arin.net/participate/meetings/reports/ARIN_32/index.html
Update on RIPE NCC Inter-RIR Transfer proposal, by Adam Gosling [APNIC 38 / P...APNIC
This document summarizes the history of IPv4 address transfer policies at APNIC and other Regional Internet Registries (RIRs), and provides an overview of the RIPE NCC's proposed policy for inter-RIR transfers. The proposal would allow transfers between RIRs as long as the recipient RIR's policies are compatible and the recipient fulfills any requirements defined by the sending RIR. It discusses whether ARIN may consider the RIPE NCC's policies to be sufficiently reciprocal and needs-based to allow such transfers. The presenter seeks community input on any issues or questions that should be raised at upcoming RIR meetings regarding inter-RIR transfer policies.
This document summarizes APNIC's policy update from May 2014. It discusses how APNIC policies are developed through an open and transparent bottom-up consensus process. The policy development process ensures fair distribution of internet number resources. Recently implemented policies include allowing autonomous system number transfers and allocating research IP blocks. Proposed policies under discussion include expanding the IPv6 allocation size and designating an anycast block for DNS infrastructure.
The Policy SIG Report from the APNIC Annual General Meeting summarized the following:
1) Sumon Ahmed Sabir was re-elected as Chair for the next two years with no other candidates.
2) Proposal prop-118 on removing need policy was abandoned after no further discussion or support.
3) An update on prop-125 for validating abuse mailbox emails stated implementation would be completed in phases by June and December 2019.
4) Informational presentations were provided on modifying transfer policies and unadvertised addresses.
The document provides an update from ARIN on their focus areas and activities. Key points include:
- Increased focus on customer service based on feedback and improving web functionality.
- Continued efforts on IPv4 to IPv6 transition awareness and participation in Internet governance.
- Many new customers are using the minimum /24 IPv4 policy and more transfers are occurring.
- Operational improvements including a customer satisfaction survey and integrating transfers within the ARIN Online system.
- Current IPv4 inventory levels and policy proposals under discussion.
APNIC Senior Internet Resource Analyst, Elly Tawhai, gives an update on APNIC's services and activities at PacNOG 21 in Nuku'alofa, Tonga from 4 to 8 December 2017.
ARIN Policy Experience Report as presented by Leslie Nobile at ARIN's Public Policy and Members Meeting in April 2014. All ARIN 33 presentations are posted online at: https://www.arin.net/ARIN33_materials
Update on RIPE NCC Inter-RIR Transfer proposal, by Adam Gosling [APNIC 38 / P...APNIC
This document summarizes the history of IPv4 address transfer policies at APNIC and other Regional Internet Registries (RIRs), and provides an overview of the RIPE NCC's proposed policy for inter-RIR transfers. The proposal would allow transfers between RIRs as long as the recipient RIR's policies are compatible and the recipient fulfills any requirements defined by the sending RIR. It discusses whether ARIN may consider the RIPE NCC's policies to be sufficiently reciprocal and needs-based to allow such transfers. The presenter seeks community input on any issues or questions that should be raised at upcoming RIR meetings regarding inter-RIR transfer policies.
This document summarizes APNIC's policy update from May 2014. It discusses how APNIC policies are developed through an open and transparent bottom-up consensus process. The policy development process ensures fair distribution of internet number resources. Recently implemented policies include allowing autonomous system number transfers and allocating research IP blocks. Proposed policies under discussion include expanding the IPv6 allocation size and designating an anycast block for DNS infrastructure.
The Policy SIG Report from the APNIC Annual General Meeting summarized the following:
1) Sumon Ahmed Sabir was re-elected as Chair for the next two years with no other candidates.
2) Proposal prop-118 on removing need policy was abandoned after no further discussion or support.
3) An update on prop-125 for validating abuse mailbox emails stated implementation would be completed in phases by June and December 2019.
4) Informational presentations were provided on modifying transfer policies and unadvertised addresses.
The document provides an update from ARIN on their focus areas and activities. Key points include:
- Increased focus on customer service based on feedback and improving web functionality.
- Continued efforts on IPv4 to IPv6 transition awareness and participation in Internet governance.
- Many new customers are using the minimum /24 IPv4 policy and more transfers are occurring.
- Operational improvements including a customer satisfaction survey and integrating transfers within the ARIN Online system.
- Current IPv4 inventory levels and policy proposals under discussion.
APNIC Senior Internet Resource Analyst, Elly Tawhai, gives an update on APNIC's services and activities at PacNOG 21 in Nuku'alofa, Tonga from 4 to 8 December 2017.
ARIN Policy Experience Report as presented by Leslie Nobile at ARIN's Public Policy and Members Meeting in April 2014. All ARIN 33 presentations are posted online at: https://www.arin.net/ARIN33_materials
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
The memorandum outlines policies for internet and technology use in the workplace. It states that company equipment and internet access are for work purposes only, and personal use is prohibited. Any non-approved removal of equipment or installation of unauthorized software will result in disciplinary action. All internet activity and files on company devices are subject to monitoring to ensure policy compliance. Violations such as fraud, offensive content, or hacking will result in termination.
Current trend in internet access and utilization using mobile devices among p...Alexander Decker
This document summarizes a study that assessed the current trends in accessing the internet using mobile devices and utilization patterns among pharmacy lecturers in South-South universities in Nigeria. It found that 3G modems and laptops were the most commonly used mobile devices for internet access. The study also found that lecturers most frequently accessed the internet at home on a daily basis for research activities like accessing electronic journals and databases using search engines like Google. In general, the trend was for lecturers to access the internet using 3G modems connected to laptops.
This document discusses managing internet misuse in the workplace. It notes that over 25% of employers have fired employees for misuse of email and internet and over 50% have disciplined employees for violating email policies. It recommends that employers implement and publish internet and email use policies, monitor usage, and respond consistently to violations. The policies should restrict use to business communications, prohibit inappropriate content, and inform employees that there is no expectation of privacy on the company's systems.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
ARIN 35 Tutorial: Life after IPv4 depletion by Leslie Nobile. Leslie talks about the various options for obtaining IP address space as we near full IPv4 address depletion: check the available ARIN inventory; go on the waiting list, explore transfers, request IPv6. Video archives at: https://www.arin.net/participate/meetings/reports/ARIN_35/premeeting.html
Find out how to get resources from ARIN, including Autonomous System Numbers (ASNs), Internet Protocol version 4 (IPv4), and Internet Protocol version 6 (IPv6).
Policy SIG report by Masato Yamanishi [APRICOT 2015]APNIC
- Masato Yamanishi was re-elected as Chair of the Policy SIG. The Co-Chair position is still vacant.
- Four policy proposals were considered but none reached consensus. They covered expanding IPv6 allocation sizes, modifying IPv4 eligibility criteria, modifying ASN eligibility criteria, and registering more detailed assignment information in the WHOIS database.
- Three informational presentations were given on reporting network abuse, addressing and routing in 2014, and APNIC's IPv6 pools and delegation practices.
The ARIN update document discusses ARIN's focus areas for 2015, including increased customer service, IPv4 to IPv6 transition awareness, and participation in Internet governance forums. It provides statistics on IPv4 and IPv6 usage trends, including an increase in market-based IPv4 transfers. The document also outlines recent policy proposals and adoptions by ARIN.
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
APNIC Director of Information Management Sanjaya gives the keynote presentation on the Internet Number Registry System at the IDNIC OPM 2023, held in Bandung, Indonesia from 5 to 7 December 2023.
The Policy SIG AMM Report summarizes discussions from the APNIC Policy Special Interest Group meeting on September 14, 2017. The meeting addressed several proposals regarding IPv4 and IPv6 allocation policies. Proposals around prohibiting transfers of addresses in the final /8 block, updating initial and subsequent IPv6 allocation policies reached consensus. Proposals on no need policy transfers, temporary transfers and final /8 pool exhaustion did not reach consensus and were returned for further discussion.
Get Internet Number Resources from ARIN (IPv4, IPv6, ASNs)ARIN
Getting Internet Number Resources from the American Registry for Internet Numbers (ARIN) Find out how to get resources from ARIN, including Autonomous System Numbers (ASNs), Internet Protocol version 4 (IPv4), and Internet Protocol version 6 (IPv6). PPTX version available at: https://www.arin.net/knowledge/general.html
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
The memorandum outlines policies for internet and technology use in the workplace. It states that company equipment and internet access are for work purposes only, and personal use is prohibited. Any non-approved removal of equipment or installation of unauthorized software will result in disciplinary action. All internet activity and files on company devices are subject to monitoring to ensure policy compliance. Violations such as fraud, offensive content, or hacking will result in termination.
Current trend in internet access and utilization using mobile devices among p...Alexander Decker
This document summarizes a study that assessed the current trends in accessing the internet using mobile devices and utilization patterns among pharmacy lecturers in South-South universities in Nigeria. It found that 3G modems and laptops were the most commonly used mobile devices for internet access. The study also found that lecturers most frequently accessed the internet at home on a daily basis for research activities like accessing electronic journals and databases using search engines like Google. In general, the trend was for lecturers to access the internet using 3G modems connected to laptops.
This document discusses managing internet misuse in the workplace. It notes that over 25% of employers have fired employees for misuse of email and internet and over 50% have disciplined employees for violating email policies. It recommends that employers implement and publish internet and email use policies, monitor usage, and respond consistently to violations. The policies should restrict use to business communications, prohibit inappropriate content, and inform employees that there is no expectation of privacy on the company's systems.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
ARIN 35 Tutorial: Life after IPv4 depletion by Leslie Nobile. Leslie talks about the various options for obtaining IP address space as we near full IPv4 address depletion: check the available ARIN inventory; go on the waiting list, explore transfers, request IPv6. Video archives at: https://www.arin.net/participate/meetings/reports/ARIN_35/premeeting.html
Find out how to get resources from ARIN, including Autonomous System Numbers (ASNs), Internet Protocol version 4 (IPv4), and Internet Protocol version 6 (IPv6).
Policy SIG report by Masato Yamanishi [APRICOT 2015]APNIC
- Masato Yamanishi was re-elected as Chair of the Policy SIG. The Co-Chair position is still vacant.
- Four policy proposals were considered but none reached consensus. They covered expanding IPv6 allocation sizes, modifying IPv4 eligibility criteria, modifying ASN eligibility criteria, and registering more detailed assignment information in the WHOIS database.
- Three informational presentations were given on reporting network abuse, addressing and routing in 2014, and APNIC's IPv6 pools and delegation practices.
The ARIN update document discusses ARIN's focus areas for 2015, including increased customer service, IPv4 to IPv6 transition awareness, and participation in Internet governance forums. It provides statistics on IPv4 and IPv6 usage trends, including an increase in market-based IPv4 transfers. The document also outlines recent policy proposals and adoptions by ARIN.
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
APNIC Director of Information Management Sanjaya gives the keynote presentation on the Internet Number Registry System at the IDNIC OPM 2023, held in Bandung, Indonesia from 5 to 7 December 2023.
The Policy SIG AMM Report summarizes discussions from the APNIC Policy Special Interest Group meeting on September 14, 2017. The meeting addressed several proposals regarding IPv4 and IPv6 allocation policies. Proposals around prohibiting transfers of addresses in the final /8 block, updating initial and subsequent IPv6 allocation policies reached consensus. Proposals on no need policy transfers, temporary transfers and final /8 pool exhaustion did not reach consensus and were returned for further discussion.
Get Internet Number Resources from ARIN (IPv4, IPv6, ASNs)ARIN
Getting Internet Number Resources from the American Registry for Internet Numbers (ARIN) Find out how to get resources from ARIN, including Autonomous System Numbers (ASNs), Internet Protocol version 4 (IPv4), and Internet Protocol version 6 (IPv6). PPTX version available at: https://www.arin.net/knowledge/general.html
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
Internet Resource Management (IRM) & Internet Routing Registry (IRR)APNIC
This document provides a summary of the APNIC Internet Resource Management (IRM) Tutorial presentation. The presentation covers:
1. The APNIC policy development process, which is open, transparent, and bottom-up, allowing anyone in the Internet community to participate.
2. An overview of APNIC's Internet registry policies for requesting IP addresses and autonomous system numbers, including allocation and assignment policies.
3. Information on the WHOIS database, using the MyAPNIC system, reverse DNS, and resource certification (RPKI).
APNIC Services Team Lead (East Asia) George Odagi gives a policy implementation update at the 3rd ICANN APAC-TWNIC Engagement Forum and 37th TWNIC OPM, held in Taipei from 12 to 13 May 2022.
Marco Schmidt from the RIPE NCC gave a talk at AFRINIC 22 summarizing recent policy developments in the RIPE NCC service region. He discussed current proposals regarding IPv6 deployment, internet resource transfers, and out-of-region use. Several proposals aim to update IPv6 allocation policies and allow transfers of IPv4, IPv6, and ASNs within the RIPE NCC region and with other RIRs. Implementation of some proposals is expected in the coming months.
A proposal for Modify 103 IPv4 transfer policyAPNIC
This document proposes modifying APNIC's IPv4 transfer policy for the final /8 block (103/8) to allow transfers of addresses delegated before September 14, 2017. The current 5-year restriction does not apply to addresses delegated prior to the policy change. Allowing these transfers would keep APNIC's WHOIS data correct as some addresses were already transferred or planned to be transferred. The proposal has no disadvantages and would keep APNIC's data accurate by registering previous 103/8 transfers.
See how the Internet has grown and how several major companies are leading us into a brighter IPv6-enabled future. For more info visit: http://teamarin.net/2016/02/17/growing-the-internet-with-ipv6/
CES 2016 Panel: Your Customers Are on the New Internet – Are you?ARIN
Slides from CES 2016 Panel: Your Customers Are on the New Internet – Are you? The new Internet, built on IPv6, is the only way to reach the 30 billion new IoT devices and the next 1 billion people that will be connected. Learn how this shift will positively impact your business and your customers.
Moderator:
Brian Markwalter, Sr. VP, Research & Standards, Consumer Technology Association
Panelists:
Samir Vaidya, Director, Device Technology, Verizon Wireless
John Curran, President and CEO, ARIN
Paul Saab, Software Engineer, Facebook
John Jason Brzozowski, Fellow and Chief IPv6 Architect, Comcast Cable
Limor Schafman, Chair Emeritus and Director of Content Development, IPv6 Forum Israel, TIA
The document provides guidance on transitioning to IPv6 by outlining several key steps:
1. Verify equipment and software supports IPv6, and ensure new purchases are compatible with both IPv4 and IPv6.
2. Educate yourself on how IPv6 works and check if your internet and hosting providers support IPv6.
3. Create an IPv6 addressing plan and obtain IPv6 addresses and connectivity from your internet provider.
4. Experiment with IPv6 in a test environment before full deployment.
The document discusses the need for campus IT networks to transition to IPv6 due to the depletion of IPv4 addresses. It provides a checklist for campus IT which includes: getting IPv6 address space from ARIN, setting up IPv6 connectivity, configuring systems and tools for IPv6, upgrading hardware, training staff, and enabling IPv6 on websites. Making this transition now will allow networks to continue connecting new devices and customers to the internet as IPv4 addresses run out and IPv6 becomes the standard.
The document summarizes a presentation from ARIN on security overlays for core internet protocols. It discusses how DNSSEC attaches digital signatures to DNS responses to validate responses and prevent spoofing. It also covers how ARIN has implemented changes like permitting delegated management and signing in-addr.arpa and ip6.arpa zones to enable DNSSEC for reverse lookups of IP addresses issued by ARIN.
The document provides an overview of Internet Protocol (IP) addressing and the role of the American Registry for Internet Numbers (ARIN) and other Regional Internet Registries (RIRs). It discusses IP addresses and autonomous system numbers, the domain name system, IP address allocation and management, and the purpose of WHOIS directories. ARIN is responsible for managing IP address space and ASNs in its service region, which includes Canada, the US, and many Caribbean islands.
The document discusses the history and role of ARIN, one of the five Regional Internet Registries (RIRs) that oversees the allocation and management of IP address blocks. It describes how ARIN was established in 1997 as the RIR for Canada and the US in response to the growing commercialization of the internet. The document also outlines ARIN's policies for conserving and efficiently allocating the remaining IPv4 addresses and transitioning to IPv6 to meet future internet growth.
IETF IPv6 Activities Report by Cathy Aronson at ARIN 36. Presentation and webcast archive available at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
- Engineering at ARIN has grown significantly in 2015 with 13.5 new FTEs added across operations, development, UX and other teams. Hiring has been ongoing but slow.
- Positions are now full across operations, development, software integration and project management, with just two openings remaining for systems administration and security engineering.
- Accomplishments in the last year include deploying RDAP, completing automation projects, improving fault tolerance, and increasing OT&E (operational testing and evaluation) capabilities.
- Usage and transactions of services like ARIN Online, Reg-RWS and Whois continue increasing steadily with migration to IPv6 and other new features underway.
This document provides an overview of Registration Services Department (RSD) at ARIN, which handles functions related to IPv4 and IPv6 requests, database record maintenance, customer support, and policy development. It discusses trends in IPv4 depletion, the changing dynamics of requests, and increasing workload. Key metrics and statistics are presented on IPv4 and IPv6 allocations/assignments over time, completed inter-RIR transfers, specified recipient transfers, and the telephone helpdesk volume.
ARIN 36 Advisory Council Report by Dan Alexander. Presentation and video archives at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
The ARIN Board of Trustees report covered their activities since the previous ARIN meeting. They adopted changes to clarify election procedures, seated committees for nominations, elections, and fellowships. They accepted the financial audit, discussed diversity and facility needs. The board reviewed and adopted the strategic plan, considered services working groups. They adopted policy changes recommended by the ARIN Advisory Council. Finally, they discussed IANA transition planning and appointed an interim representative to the Number Resource Organization Number Council.
NRO Activities Report by Axel Pawlik at ARIN 36. Presentation and video archives at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
The document provides an update on activities of the Number Resource Organization (NRO). It summarizes that the NRO supports coordination between the Regional Internet Registries (RIRs), engages globally on internet governance issues, and fulfills the role of ICANN's Address Supporting Organization (ASO). Key areas of focus for the NRO include supporting RIR coordination, global collaboration, and monitoring internet governance discussions. It provides details on NRO leadership, finances, activities like participating in the Internet Governance Forum, and improvements to accountability and operations.
ARIN 35: Internet Number Resource Status ReportARIN
ARIN 35: Internet Number Resource Status Report by Leslie Nobile. Video archives at: https://www.arin.net/participate/meetings/reports/ARIN_35/ppm.html
ARIN 35: CRISP Panel by Michael Abejuela, John Sweeting, and Bill Woodcock. Video archives available at: https://www.arin.net/participate/meetings/reports/ARIN_35/ppm.html
ARIN 35 Tutorial: How to certify your ARIN resources with RPKIARIN
ARIN 35 Tutorial: How to certify your ARIN resources with RPKI by Andy Newton. Presentation at: https://www.arin.net/participate/meetings/reports/ARIN_35/premeeting.html
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
2. Recently Implemented Policies
• ARIN-2012-2 IPv6 Subsequent Allocations Utilization
Requirement (NRPM 6.5.3)
– ISPs can qualify for an additional IPv6 allocation
when they’ve assigned 90% of their space to
serving sites
– Assignments to serving sites must meet same
requirements as are used to determine initial
allocation size
– No requests reviewed under this policy yet
• Policy Proposal 186: Section 8.2 Reorganizations
– Put the term "reorganizations" back into 8.2 Mergers and
Acquisitions
2
3. Purpose of Policy Experience
Report
• Review existing policies
– Ambiguous text/Inconsistencies/Gaps/Effectiveness
• Identify areas where new or modified policy
may be needed
– Operational experience
– Customer feedback
• Provide feedback to community and make
recommendations when appropriate
3
4. Policies Reviewed
• 4.5 Multiple Discrete Networks
• 10.3 IANA Policy for Allocation of ASN
Blocks to RIRs
4
5. 4.5. Multiple Discrete Networks
“When applying for additional internet
address registrations from ARIN, the
organization must demonstrate utilization
greater than 50% of both the last block
allocated and the aggregate sum of all
blocks allocated from ARIN to that
organization.”
5
6. Issues
There are missing criteria in this policy:
• Policy only provides criteria for an
organization to qualify for additional
addresses for its existing sites
• No criteria defined for the new sites of an
existing MDN customer
– How does a new site qualify?
– What size block should be issued?
6
7. Current Practice to Qualify New
Sites
• Apply the general principles of the
Immediate Need policy (NRPM 4.2.1.6)
– Verify ISP has connectivity at each new site by
requesting recent bill/invoice for service OR
– Signed connectivity agreement
– Issue /22 minimum allocation unless more can be
justified based on 30 day need as supported by:
•
•
•
•
7
Signed customer contracts
Complete customer justification data
Deployment schedule
Equipment purchase invoices
8. Question for the Community
• Should specific criteria be added for the
new sites of an existing MDN customer?
• Should staff continue their current
practice of using the immediate need
criteria?
8
9. NRPM 10.3 “IANA Policy for
Allocation of ASN Blocks to RIRs”
“After Dec 31, 2010, IANA and the RIRs
make no distinction between 2-byte
and 4-byte ASNs and will operate
from an undifferentiated 32-bit pool”
9
10. Issues
• IANA has now issued its last full block of
1024 2-byte ASNs (issued to APNIC on
9/11/13)
– There are only 495 remaining 2-byte ASNs in
IANA’s free pool
• ARIN will likely not qualify for additional
2-bytes and must rely on existing supply
– Reclaimed ASNs are not a steady supply
10
11. Statistics
• ARIN issues ~1400 ASNs per year
– Only 73 4-byte ASNs issued since policy inception
in 2007
• 32 since May 2013 when we changed practice; 0 have
been returned
• Current inventory
– 677 2-byte ASNs
– 959 4-byte ASNs
• Recovered 2-byte ASNs
– Anywhere from ~300 to ~1500 2-byte ASNs
recovered per year over the past 6 year (not
consistent number)
11
12. Current Practice
• Issue 2-byte ASNs by default but first notify
requestors of 2-byte depletion and ask to
consider 4-byte ASN
– Implemented May 2013
– Prior to that, issued from lowest to highest
since virtually all 4 byte ASNs were being
returned because “Upstream said their
router wouldn’t support 4-byte ASN”
12
13. Question for the Community
• Should ARIN change its current practice
to issuing 4-byte ASNs by default and 2byte only when technical justification
shows a 4-byte won’t work?
– 4-byte ASNs appear to be usable now
– Facilitates a smooth transition rather than
“hitting a brick wall” when 2-bytes run out
– Aligns us with other RIRs
• APNIC, RIPE, and LACNIC issue 4-byte by default
13
14. Suggestions
• Expand the waiting list policy to include
2-byte ASNs
– Would go into effect when ARIN has
depleted its supply of 2-byte ASN
– Organizations unable to use 4-byte ASN
could be placed on the waiting list until a 2byte ASN becomes available
14