Presentation by Luc Steinberg at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
The document discusses cybersecurity from a management science and innovation perspective. It focuses on forensic accounting approaches to evaluating the effectiveness of cyber defenses. It notes that cybersecurity is an issue of both costs from losses and value to cybercriminals. The document advocates increasing security through additional authentication steps, keeping systems updated, limiting administrator access, and monitoring networks. Overall it promotes robust open security standards and disruptive innovation to improve cyber defenses and herd immunity across populations.
This presentation explains the mechanisms of Heartbleed security flaw, which had place worldwide in 2014. It also contains explanations on the reasons of Buffer Overflow, one of the simplest, but also one of the most common vulnerabilities. The presentation will help avoid these problems and guarantee online security.
Presentation by Nazar Mota (Developer, GlobalLogic, Lviv), EmbeddedTechTalk, Lviv, 2014.
More details -
http://www.globallogic.com.ua/press-releases/embedded-lviv-techtalk-2-coverage
Presented by Fernando Gont at CISO Platform Annual Summit, 2013. Fernando specializes in the field of communications protocols security, working for private and governmental organisations both in Argentina and overseas.
The document discusses testing the security of Internet of Things (IoT) devices and networks. It outlines that IoT security involves more than just testing individual devices, and identifies 16 distinct attack surfaces for IoT systems based on the OWASP IoT project. Capturing network traffic from IoT devices using a network tap and analyzing it with tools like Caparser can help identify security issues and sensitive data being sent to unknown IP addresses. Thorough IoT security testing requires considering the entire local network ecosystem and interaction between connected devices.
Secure code development is important to protect a company's most valuable asset - its source code. Key principles like input validation, access control, and error handling should be followed to develop code securely. Analyzing code for vulnerabilities helps ensure it is developed according to secure principles.
WiFiSlax es una distribución GNU/Linux diseñada y estructurada para la auditoría de seguridad, especializada en evaluaciones de seguridad inalámbrica.
Contiene una amplia lista de herramientas de seguridad y auditoría donde se incluyen escáneres de puertos, de servicios y de vulnerabilidades, herramientas para creación y diseño de exploits, ‘sniffers’, herramientas de análisis forense y herramientas para la evaluación de la seguridad de dispositivos wíreless.
En esta presentación oficial de la versión 4.0 se mostrarán una serie de importantes cambios estructurales que han permitido al grupo de desarrolladores continuar innovando en cuanto al soporte hardware tal y como han hecho en sus anteriores versiones anticipándose al resto de distribuciones. Estos cambios les han permitido mantenerse en la vanguardia en las tecnologías inalámbricas.
Presentation by Luc Steinberg at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
The document discusses cybersecurity from a management science and innovation perspective. It focuses on forensic accounting approaches to evaluating the effectiveness of cyber defenses. It notes that cybersecurity is an issue of both costs from losses and value to cybercriminals. The document advocates increasing security through additional authentication steps, keeping systems updated, limiting administrator access, and monitoring networks. Overall it promotes robust open security standards and disruptive innovation to improve cyber defenses and herd immunity across populations.
This presentation explains the mechanisms of Heartbleed security flaw, which had place worldwide in 2014. It also contains explanations on the reasons of Buffer Overflow, one of the simplest, but also one of the most common vulnerabilities. The presentation will help avoid these problems and guarantee online security.
Presentation by Nazar Mota (Developer, GlobalLogic, Lviv), EmbeddedTechTalk, Lviv, 2014.
More details -
http://www.globallogic.com.ua/press-releases/embedded-lviv-techtalk-2-coverage
Presented by Fernando Gont at CISO Platform Annual Summit, 2013. Fernando specializes in the field of communications protocols security, working for private and governmental organisations both in Argentina and overseas.
The document discusses testing the security of Internet of Things (IoT) devices and networks. It outlines that IoT security involves more than just testing individual devices, and identifies 16 distinct attack surfaces for IoT systems based on the OWASP IoT project. Capturing network traffic from IoT devices using a network tap and analyzing it with tools like Caparser can help identify security issues and sensitive data being sent to unknown IP addresses. Thorough IoT security testing requires considering the entire local network ecosystem and interaction between connected devices.
Secure code development is important to protect a company's most valuable asset - its source code. Key principles like input validation, access control, and error handling should be followed to develop code securely. Analyzing code for vulnerabilities helps ensure it is developed according to secure principles.
WiFiSlax es una distribución GNU/Linux diseñada y estructurada para la auditoría de seguridad, especializada en evaluaciones de seguridad inalámbrica.
Contiene una amplia lista de herramientas de seguridad y auditoría donde se incluyen escáneres de puertos, de servicios y de vulnerabilidades, herramientas para creación y diseño de exploits, ‘sniffers’, herramientas de análisis forense y herramientas para la evaluación de la seguridad de dispositivos wíreless.
En esta presentación oficial de la versión 4.0 se mostrarán una serie de importantes cambios estructurales que han permitido al grupo de desarrolladores continuar innovando en cuanto al soporte hardware tal y como han hecho en sus anteriores versiones anticipándose al resto de distribuciones. Estos cambios les han permitido mantenerse en la vanguardia en las tecnologías inalámbricas.
This document summarizes PGP for Windows. It discusses that PGP is a security tool that uses cryptography to protect data like email, instant messages, and hard drive files. It supports Windows 7 and has redesigned interfaces for PGP keys and messaging. PGP allows encryption of full hard drives and sharing of encrypted files over networks. There are managed and unmanaged users, where managed users have settings controlled by a PGP administrator. When licenses expire, encrypted hard drives will decrypt after 90 days, PGP shared folders remain accessible but new ones cannot be created, and virtual disks remain readable only.
Barack Obama hosted the first Nuclear Security Summit in 2010 to address nuclear terrorism. The 2014 summit in The Hague brought together 58 world leaders to discuss progress and remaining goals. Cisco helped design and implement a secure wired and wireless network for the event to support over 1500 delegates on portable devices without any security breaches or downtime. The network performed well under pressure as concerns were raised on social media during the summit.
Rethinking Application Security for cloud-native eraPriyanka Aash
Cloud native applications are API driven and are based on distributed microservices. APIs are the gateway to your business and expose a lot of the business logic to the outside world. Legacy solutions to understand your applications security posture are not applicable to these modern continuously changing environments
Lockpicking and Lockpsort - Bsides Ljubljana (2019)Jovan Šikanja
Lock picking is the art of unlocking a lock without a key by manipulating the lock's components. It can be done by locksmiths, criminals, or as a hobby known as locksport. Locksport is important for information security because physical security is needed to protect digital information, as firewall rules cannot prevent breaking and entering. Lock picking is a nondestructive way to defeat a locking mechanism. Locksport enthusiasts often come from information security backgrounds. The techniques of lock picking include raking, single pin picking, bumping, and shimming. Locksport should only be practiced on locks owned by the picker or with permission, and in a respectful manner that preserves security.
FIDO Enablement Workshop: How to FIDO-enable web applications using FIDO prot...FIDO Alliance
Tutorial on how to FIDO-enable web applications using U2F. Backed by FIDO members who have implemented FIDO specifications and/or FIDO-enabled web-applications.
From FIDO Alliance Seminar in Washington, D.C., October, 2015.
y3dips - Who Own Your Sensitive Information?Ammar WK
This document discusses who owns sensitive information, how it is taken, and how to protect it. It notes that hackers, cyber mafia, cyber terrorists, movies, cyber armies, and Wikileaks can own sensitive information. Information is often taken through password theft, insecure infrastructure, insecure data protection, lack of security policies/procedures, intrusion/hacking, and social engineering. The document provides examples of how Bradley Manning leaked classified US airstrike videos and diplomatic cables to Wikileaks by copying them to a Lady Gaga CD. It recommends upgrading security awareness, following security manuals, using strong authentication/encryption, antivirus software, and realizing that no system is completely secure and security requires human diligence
This document provides information about a blockchain hackathon being organized by Luxoft, including:
- The hackathon will focus on applying blockchain to newer industries like education, healthcare, and smart mobility.
- It will include challenges in each of these areas and provide development networks for Ethereum and Hyperledger Fabric for participants to build solutions.
- Support materials include skeleton applications, network configurations, and a support channel for participants to get help during the hackathon.
The document summarizes a presentation on security testing for quality analysts. It discusses the top 10 security risks according to OWASP, including cross-site scripting, injection flaws, sensitive data exposure, and insecure deserialization. It provides examples of these risks using a vulnerable testing application called Mutillidae II. The presentation emphasizes how quality analysts can help implement security thinking and identify vulnerabilities during testing. Hands-on exercises are also included to demonstrate different security issues.
Presentation on how public key encryption works.
FYI: There are a lot of animations and transitions so I highly recommend opening with the Microsoft Powerpoint. Also, there is not much description only animation so this presentation is most effective when you know the basics of public-key encryption and you want to teach others. I made this for my class presentation.
Hope you liked it!
Blue Coat announced three acquisitions - Solera Networks, Netronome, and Crossbeam Systems. The Solera DeepSee platform will add security analytics and forensic capabilities. Netronome provides an SSL visibility appliance to intercept SSL traffic independently of application protocol. Crossbeam offers an X-Series solution for consolidating and scaling infrastructure. Blue Coat also discussed key initiatives around BYOD, mobility, and web threat protection as well as its unified security, policy, reporting, and video and cloud optimization solutions.
Mobile security is a growing issue, with the increased uptake of smartphones and tablets. Learn what risks exist and how you can protect your devices from malware and data loss.
A look at what devices are online in the Channel Islands Cyberspace provided by the Telco's. There was a large array of devices both secure and insecure ranging from SCADA , Seismographs, Webcams, DVR's to OWA installations.
The document discusses the F-Interop project, which aims to develop online remote interoperability and performance testing tools for emerging IoT technologies. It notes that a lack of interoperability currently hinders 60% of IoT value. The project seeks to support SMEs and researchers by integrating European testbeds and developing online testing, certification, and labeling mechanisms. It outlines the testing lifecycle and roles within the platform, lists currently supported protocols, and provides details on an open call for new testing tools, test designs, and plugtest events.
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
IDC estimates that there will be 41.6 billion connected IoT devices by 2025, opening up opportunities for increased efficiencies and innovation across industries. Yet, lack of IoT security standards and typical processes such as shipping with default password credentials and manual onboarding leave devices, and the networks they operate on, open to large-scale attack.
Last summer, the FIDO Alliance announced a new standards initiative to tackle these security issues in IoT. The Alliance’s IoT Technical Working Group aims to provide a comprehensive authentication framework for IoT devices in keeping with the fundamental mission of the Alliance – passwordless authentication. These webinar slides provide an update on this new work area, including:
--How FIDO Authentication and existing specifications fit into the IoT ecosystem today
--The charter and goals of the IoT TWG, including development of specifications for IoT device attestation/authentication profiles to enable interoperability between service providers and IoT devices; automated onboarding, and binding of applications and/or users to IoT devices; and IoT device authentication and provisioning via smart routers and IoT hubs
--The progress of the working group to date, including the use case and target architectures the IoT TWG is looking at as a foundation for its specifications and certification program
Standardized Service Layering for IoT in oneM2MNicolas Damour
The document discusses oneM2M, a partnership project between 14 partners created in 2012 to specify and promote a standard for an Internet of Things (IoT) and machine-to-machine (M2M) common service layer. It provides an overview of oneM2M's organization, work program, and technical specifications. The key points are:
- oneM2M has over 200 member organizations and aims to standardize an IoT/M2M common service layer to reduce costs and enable interoperability.
- It has published Release 1 with 10 technical specifications and is working on Release 2 targeted for mid-2016, with a focus on areas like industrial domain enablement, security, and inter
[2024 SXSW] Build Your Own Open Source 5g NodeW Watson
[Mentioned in Forbes Ultimate SXSW Guide: https://www.forbes.com/sites/martineparis/2024/02/26/the-ultimate-sxsw-2024-guide-hottest-panels-parties-and-popups/] Can you build your own 5G node (tower) with all open-source software and non-proprietary hardware? The answer is a resounding yes! In the workshop, we will walk you through each component of a working open-source 5G node and show you how to connect it to a phone. Bring your laptops so that you can follow along. We will have a faraday cage and the rest of the radio equipment so that you can safely see what it's like to set up a 5G node that connects to a commercial off-the-shelf phone. We will also give a review of what 5G is, why it is important in the internet of things, and more!
This document introduces VPN technology and its uses. It defines VPN as a technology that creates a direct link between remote computers in a private network over a public one using various protocols. It discusses how VPNs provide secure remote access and communications, enhancing productivity and flexibility by allowing access from anywhere. VPNs allow sharing of files and access to information securely from remote locations. They also circumvent censorship and geolocation blocks by making restricted data and contacts available. The document demonstrates VPN technologies like PPTP, L2TP, IPsec and SSL that provide secure data transfer over the internet.
This document introduces VPN technology and its uses. It defines VPN as a technology that creates a direct link between remote computers in a private network over a public one using various protocols. It discusses how VPNs provide secure remote access and communications, enhancing productivity and flexibility by allowing access from anywhere. VPNs allow sharing of files and access to information securely from remote locations. They also circumvent censorship and geolocation blocks by making restricted data and contacts available. The document demonstrates VPN technologies like PPTP, L2TP, IPsec and SSL that provide secure data transfer over the internet.
Collaboration Webinar topic: OpeVPN on Mikrotik
Presenter: Supono
Moderator : Achmad Mardiansyah
In this collab webinar series, We are discussing OpeVPN on Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
The recording is available On :
https://youtu.be/4crJPuRTB1s
Summit 16: Cengn Experience in Opnfv ProjectsOPNFV
CENGN, the first associate member of OPNFV is beginning to contribute to OPNFV projects by way of creating a Pharos Community lab and participating in JOID and Yardstick projects with OPNFV interns. This session will cover our learnings on the design and deployment of the Pharos lab, our experience with student interns contributing to the OPNFV projects and partnerships with innovative companies like Kontron
The document summarizes the Open Networking Foundation (ONF), an organization dedicated to promoting SDN. The ONF is not like a traditional standards body, but rather aims to drive SDN commercialization for users through standardizing key elements like OpenFlow and promoting experimentation. It lists the ONF's initiatives and over 80 members as of 2013 who are collaborating to build and advance the OpenFlow substrate.
This document summarizes PGP for Windows. It discusses that PGP is a security tool that uses cryptography to protect data like email, instant messages, and hard drive files. It supports Windows 7 and has redesigned interfaces for PGP keys and messaging. PGP allows encryption of full hard drives and sharing of encrypted files over networks. There are managed and unmanaged users, where managed users have settings controlled by a PGP administrator. When licenses expire, encrypted hard drives will decrypt after 90 days, PGP shared folders remain accessible but new ones cannot be created, and virtual disks remain readable only.
Barack Obama hosted the first Nuclear Security Summit in 2010 to address nuclear terrorism. The 2014 summit in The Hague brought together 58 world leaders to discuss progress and remaining goals. Cisco helped design and implement a secure wired and wireless network for the event to support over 1500 delegates on portable devices without any security breaches or downtime. The network performed well under pressure as concerns were raised on social media during the summit.
Rethinking Application Security for cloud-native eraPriyanka Aash
Cloud native applications are API driven and are based on distributed microservices. APIs are the gateway to your business and expose a lot of the business logic to the outside world. Legacy solutions to understand your applications security posture are not applicable to these modern continuously changing environments
Lockpicking and Lockpsort - Bsides Ljubljana (2019)Jovan Šikanja
Lock picking is the art of unlocking a lock without a key by manipulating the lock's components. It can be done by locksmiths, criminals, or as a hobby known as locksport. Locksport is important for information security because physical security is needed to protect digital information, as firewall rules cannot prevent breaking and entering. Lock picking is a nondestructive way to defeat a locking mechanism. Locksport enthusiasts often come from information security backgrounds. The techniques of lock picking include raking, single pin picking, bumping, and shimming. Locksport should only be practiced on locks owned by the picker or with permission, and in a respectful manner that preserves security.
FIDO Enablement Workshop: How to FIDO-enable web applications using FIDO prot...FIDO Alliance
Tutorial on how to FIDO-enable web applications using U2F. Backed by FIDO members who have implemented FIDO specifications and/or FIDO-enabled web-applications.
From FIDO Alliance Seminar in Washington, D.C., October, 2015.
y3dips - Who Own Your Sensitive Information?Ammar WK
This document discusses who owns sensitive information, how it is taken, and how to protect it. It notes that hackers, cyber mafia, cyber terrorists, movies, cyber armies, and Wikileaks can own sensitive information. Information is often taken through password theft, insecure infrastructure, insecure data protection, lack of security policies/procedures, intrusion/hacking, and social engineering. The document provides examples of how Bradley Manning leaked classified US airstrike videos and diplomatic cables to Wikileaks by copying them to a Lady Gaga CD. It recommends upgrading security awareness, following security manuals, using strong authentication/encryption, antivirus software, and realizing that no system is completely secure and security requires human diligence
This document provides information about a blockchain hackathon being organized by Luxoft, including:
- The hackathon will focus on applying blockchain to newer industries like education, healthcare, and smart mobility.
- It will include challenges in each of these areas and provide development networks for Ethereum and Hyperledger Fabric for participants to build solutions.
- Support materials include skeleton applications, network configurations, and a support channel for participants to get help during the hackathon.
The document summarizes a presentation on security testing for quality analysts. It discusses the top 10 security risks according to OWASP, including cross-site scripting, injection flaws, sensitive data exposure, and insecure deserialization. It provides examples of these risks using a vulnerable testing application called Mutillidae II. The presentation emphasizes how quality analysts can help implement security thinking and identify vulnerabilities during testing. Hands-on exercises are also included to demonstrate different security issues.
Presentation on how public key encryption works.
FYI: There are a lot of animations and transitions so I highly recommend opening with the Microsoft Powerpoint. Also, there is not much description only animation so this presentation is most effective when you know the basics of public-key encryption and you want to teach others. I made this for my class presentation.
Hope you liked it!
Blue Coat announced three acquisitions - Solera Networks, Netronome, and Crossbeam Systems. The Solera DeepSee platform will add security analytics and forensic capabilities. Netronome provides an SSL visibility appliance to intercept SSL traffic independently of application protocol. Crossbeam offers an X-Series solution for consolidating and scaling infrastructure. Blue Coat also discussed key initiatives around BYOD, mobility, and web threat protection as well as its unified security, policy, reporting, and video and cloud optimization solutions.
Mobile security is a growing issue, with the increased uptake of smartphones and tablets. Learn what risks exist and how you can protect your devices from malware and data loss.
A look at what devices are online in the Channel Islands Cyberspace provided by the Telco's. There was a large array of devices both secure and insecure ranging from SCADA , Seismographs, Webcams, DVR's to OWA installations.
The document discusses the F-Interop project, which aims to develop online remote interoperability and performance testing tools for emerging IoT technologies. It notes that a lack of interoperability currently hinders 60% of IoT value. The project seeks to support SMEs and researchers by integrating European testbeds and developing online testing, certification, and labeling mechanisms. It outlines the testing lifecycle and roles within the platform, lists currently supported protocols, and provides details on an open call for new testing tools, test designs, and plugtest events.
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
IDC estimates that there will be 41.6 billion connected IoT devices by 2025, opening up opportunities for increased efficiencies and innovation across industries. Yet, lack of IoT security standards and typical processes such as shipping with default password credentials and manual onboarding leave devices, and the networks they operate on, open to large-scale attack.
Last summer, the FIDO Alliance announced a new standards initiative to tackle these security issues in IoT. The Alliance’s IoT Technical Working Group aims to provide a comprehensive authentication framework for IoT devices in keeping with the fundamental mission of the Alliance – passwordless authentication. These webinar slides provide an update on this new work area, including:
--How FIDO Authentication and existing specifications fit into the IoT ecosystem today
--The charter and goals of the IoT TWG, including development of specifications for IoT device attestation/authentication profiles to enable interoperability between service providers and IoT devices; automated onboarding, and binding of applications and/or users to IoT devices; and IoT device authentication and provisioning via smart routers and IoT hubs
--The progress of the working group to date, including the use case and target architectures the IoT TWG is looking at as a foundation for its specifications and certification program
Standardized Service Layering for IoT in oneM2MNicolas Damour
The document discusses oneM2M, a partnership project between 14 partners created in 2012 to specify and promote a standard for an Internet of Things (IoT) and machine-to-machine (M2M) common service layer. It provides an overview of oneM2M's organization, work program, and technical specifications. The key points are:
- oneM2M has over 200 member organizations and aims to standardize an IoT/M2M common service layer to reduce costs and enable interoperability.
- It has published Release 1 with 10 technical specifications and is working on Release 2 targeted for mid-2016, with a focus on areas like industrial domain enablement, security, and inter
[2024 SXSW] Build Your Own Open Source 5g NodeW Watson
[Mentioned in Forbes Ultimate SXSW Guide: https://www.forbes.com/sites/martineparis/2024/02/26/the-ultimate-sxsw-2024-guide-hottest-panels-parties-and-popups/] Can you build your own 5G node (tower) with all open-source software and non-proprietary hardware? The answer is a resounding yes! In the workshop, we will walk you through each component of a working open-source 5G node and show you how to connect it to a phone. Bring your laptops so that you can follow along. We will have a faraday cage and the rest of the radio equipment so that you can safely see what it's like to set up a 5G node that connects to a commercial off-the-shelf phone. We will also give a review of what 5G is, why it is important in the internet of things, and more!
This document introduces VPN technology and its uses. It defines VPN as a technology that creates a direct link between remote computers in a private network over a public one using various protocols. It discusses how VPNs provide secure remote access and communications, enhancing productivity and flexibility by allowing access from anywhere. VPNs allow sharing of files and access to information securely from remote locations. They also circumvent censorship and geolocation blocks by making restricted data and contacts available. The document demonstrates VPN technologies like PPTP, L2TP, IPsec and SSL that provide secure data transfer over the internet.
This document introduces VPN technology and its uses. It defines VPN as a technology that creates a direct link between remote computers in a private network over a public one using various protocols. It discusses how VPNs provide secure remote access and communications, enhancing productivity and flexibility by allowing access from anywhere. VPNs allow sharing of files and access to information securely from remote locations. They also circumvent censorship and geolocation blocks by making restricted data and contacts available. The document demonstrates VPN technologies like PPTP, L2TP, IPsec and SSL that provide secure data transfer over the internet.
Collaboration Webinar topic: OpeVPN on Mikrotik
Presenter: Supono
Moderator : Achmad Mardiansyah
In this collab webinar series, We are discussing OpeVPN on Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
The recording is available On :
https://youtu.be/4crJPuRTB1s
Summit 16: Cengn Experience in Opnfv ProjectsOPNFV
CENGN, the first associate member of OPNFV is beginning to contribute to OPNFV projects by way of creating a Pharos Community lab and participating in JOID and Yardstick projects with OPNFV interns. This session will cover our learnings on the design and deployment of the Pharos lab, our experience with student interns contributing to the OPNFV projects and partnerships with innovative companies like Kontron
The document summarizes the Open Networking Foundation (ONF), an organization dedicated to promoting SDN. The ONF is not like a traditional standards body, but rather aims to drive SDN commercialization for users through standardizing key elements like OpenFlow and promoting experimentation. It lists the ONF's initiatives and over 80 members as of 2013 who are collaborating to build and advance the OpenFlow substrate.
This document summarizes a presentation on internet and cyber security trends given in Copenhagen in 2014. It discusses how security risks have evolved from focusing on personal computers to broader issues around cloud computing and the growing "Internet of Things." The presentation notes that while cloud services may be more professionally managed, they also give users less control over their data. It predicts the IT security industry will change significantly with the rise of internet-connected devices and a possible backlash against cloud computing. Open source software will be important to solutions, and new legislation may be needed to address security issues from devices in areas like healthcare, transportation and disclosure of breaches.
Introduce IPv6 related activities in ITU-T especially focused on SG13 and near future expectation of using IPv6 jointly with Ubiquitous Networking concept.
The document summarizes discussions from a workshop on defining future 5G networks and opportunities for small and medium enterprises (SMEs). Presenters discussed potential 5G technologies like software-defined networking (SDN), network functions virtualization (NFV), and a proposed "Network Operating System". They also explored how SMEs could collaborate with researchers to develop new connected media applications and better utilize 5G networks. Key questions focused on how SMEs, users, and other stakeholders could work together to exploit 5G's potential and what components would need to be opened up, such as hardware and wireless spectrum access, to enable SME-driven 5G innovation.
The document discusses an IoT workshop presentation about Zetta, an open source API-first platform for building IoT applications. Zetta addresses common issues with IoT like different protocols, security, and managing large numbers of devices. It uses HTTP to communicate between devices and generates APIs from Node.js code. Zetta also makes it easy to coordinate devices globally, broadcast data via websockets, and develop tools for IoT applications. The architecture involves lightweight Zetta processes running on edge network devices and servers that communicate securely to manage devices and proxy HTTP requests.
Connected home - market evolution & protocol warsBorys Tomala
What did we even start developing smart homes? Is it really a future? What technologies will be leading this revolution?
During Hardgroup #4 Borys Tomala from CloudThing.io answers this questions and compares WiFi, Z-wave, Zigbee, Bluetooth Smart and Thread.
The Considerations for Internet of Things @ 2017Jian-Hong Pan
物聯網是一門透過通訊,將端點蒐集到的資料,集中關聯分析,並將分析結果用以決策並回饋的工程藝術。
本次的分享將從物聯網的目的當作進入點,接著分享可能的佈署架構。並概述目前各個常用的通訊標準、協定,以及其所屬的角色。
除此之外,也會分享去年到柏林參加Linux Foundation舉辦的Open IoT Summit Europe 2016的心得。
在此,帶回一些國外對於物聯網節點的佈署、更新或維護的看法、作法。
另外,也會分享一些物聯網可能需要考量的資訊安全議題。
IoT is a kind of engineering art, which analyzes the collected data from
the device nodes through the communication and has the result for the
decision making and feedback.
This sharing goes for the purpose of IoT and it's deployment structure.
Then, the slide introduces the most used communication standards or
protocols in IoT and their roles.
Besides, also shares what I have got from the Open IoT Summit Europe 2016
which was held by Linux Foundation in Berlin last year.
It introduces how will the device nodes be deployed, updated and maintained.
Finally, the slide provides some security issues that should be considered
in IoT.
Brian Knopf is the director of application security at Belkin International and has over 20 years of experience in IT, QA, development and security. The presentation discusses the basics of IoT including what it is, why it's important, common components and protocols. It covers examples of IoT devices and potential attacks, and emphasizes the importance of secure design, secure defaults, secure deployment and defense in depth when implementing IoT solutions. The presentation concludes by discussing industry collaboration to improve IoT security and some challenges for enterprises adopting IoT.
Building Next Generation Transport NetworksInfinera
This document discusses Infinera's vision for building next generation transport networks through radical innovation. It summarizes Infinera's technology, including its pioneering work with Photonic Integrated Circuits, and how this allows it to deliver instant bandwidth and scale networks efficiently. The document also outlines some of the challenges service providers face in scaling their networks cost-effectively and how Infinera's approach helps address these challenges through simplified architectures enabled by its intelligent transport solutions.
A presentation I designed for my course Data Communication and Network on VPN (Virtual Private Network) what is it, how it works, which technologies are being used, and what are characteristics of a good vpn.
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
The document provides an update on the Secure Home Gateway Project by CIRA Labs. It discusses the evolution of the project from addressing the need for home network security post MIRAI attacks. It outlines goals of protecting the internet and IoT devices from attacks. The current prototype implements an open-source framework using OpenWRT on a Turris Omnia gateway. It leverages several IETF draft specifications and standards for features like MUD, access controls, and DNS/DNSSEC provisioning to provide a simple and secure home network solution.
Similar to Portable Private Wifi (Final Presentation) (20)
This document discusses 4 satellite TV providers in Thailand: GMM Z, True Visions, CTH, and Dreambox. It provides background information on the owners and previous names of each provider. It also includes outlines of ads from True Visions and GMM Z, prices of GMM Z and True Visions, and GMM Z's strategy to offer special content through CTH and provide HD channels, online viewing, and discounts on fees and service points. User comments on hacking True Visions using Dreambox to access expensive packages for cheaper are also mentioned.
This document lists top-level domain names (TLDs) and their meanings. There are generic TLDs like .com, .org, .net as well as country code TLDs (ccTLDs) that indicate a country or territory like .uk, .ca, .jp. Some TLDs are for specific types of organizations like .edu, .gov, .mil while others are for special purposes like .biz, .info, .museum. The document provides a comprehensive listing of all TLDs.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
3. 3
Project OverviewProject Overview
● Portable router
● Simple version of User Interface
● Connect to VPN, and Tor
● Internet sharing for guess network
5. 5
Privacy on Internet UserPrivacy on Internet User
● Censorship
● Content that we have a right to
know
● Dailymail.co.uk was blocked
● Content encryption; eg Edward
Snowden, Journalist.