Idea and presentation by Thibault Weintraub at while42 Singapore (11/7/17).
Compendium of diverse insightful or surprising Tech quotes.
Expect your geeky audience to react, comment troll and share their related experiences :)
There is a phase change approaching is the way human society is organized, flipping from centralized hierarchical organizations chiefly represented by the nation states, towards more efficient, flexible, and resilient forms of decentralized, peer-to-peer structures, the Network Society. What traditionally we thought were functions that could only be organized centrally, from energy production and distribution, manufacturing and food production, finance, education, health are now being radically rethought as the guiding principles behind the technological evolution of innovations such as the Internet are now pervading everything.
Not only a novel interpretation of ongoing changes, but also a guiding set of principles to evaluate the degree at which new ideas are well aligned with the these unstoppable developments, the lessons of the Network Society can inform the decisions of individuals, corporations and policymakers to design future-aware action plans navigating times of turbulent change.
How do we communicate with trillions of machines? We don’t. It is up to them to find ways to aggregate the information they collect and present it in ways that humans can use. It is the duty of the localization industry to lead the development of guidelines for these interfaces that implement best practices for clarity, cross-cultural understanding, accessibility and usefulness worldwide. In this session we will present examples of how this can be achieved while preserving and enhancing the value of the localization industry and its participants.
Talk delivered at Localization World on April 15, 2015 in Shanghai, China.
Check out some of the thought-provoking presentations delivered at the 2017 BSidesSF conference. For more on BSidesSF, visit: https://www.tripwire.com/state-of-security/security-awareness/events/heres-missed-bsidessf-2017/
We have recently completed a Market reports which is comprised of 3 different articles based on;
• IoT of Supply Chain
• The emergence of the Cisco coined term “DevNet”
• Interviews with Senior Figures in the Big Data/Data Science market.
We have had various senior figures across our industry provide quotes and add their thoughts to the articles.
If interested in any of the topics written about here, please do not hesitate to get in contact!
There is a phase change approaching is the way human society is organized, flipping from centralized hierarchical organizations chiefly represented by the nation states, towards more efficient, flexible, and resilient forms of decentralized, peer-to-peer structures, the Network Society. What traditionally we thought were functions that could only be organized centrally, from energy production and distribution, manufacturing and food production, finance, education, health are now being radically rethought as the guiding principles behind the technological evolution of innovations such as the Internet are now pervading everything.
Not only a novel interpretation of ongoing changes, but also a guiding set of principles to evaluate the degree at which new ideas are well aligned with the these unstoppable developments, the lessons of the Network Society can inform the decisions of individuals, corporations and policymakers to design future-aware action plans navigating times of turbulent change.
How do we communicate with trillions of machines? We don’t. It is up to them to find ways to aggregate the information they collect and present it in ways that humans can use. It is the duty of the localization industry to lead the development of guidelines for these interfaces that implement best practices for clarity, cross-cultural understanding, accessibility and usefulness worldwide. In this session we will present examples of how this can be achieved while preserving and enhancing the value of the localization industry and its participants.
Talk delivered at Localization World on April 15, 2015 in Shanghai, China.
Check out some of the thought-provoking presentations delivered at the 2017 BSidesSF conference. For more on BSidesSF, visit: https://www.tripwire.com/state-of-security/security-awareness/events/heres-missed-bsidessf-2017/
We have recently completed a Market reports which is comprised of 3 different articles based on;
• IoT of Supply Chain
• The emergence of the Cisco coined term “DevNet”
• Interviews with Senior Figures in the Big Data/Data Science market.
We have had various senior figures across our industry provide quotes and add their thoughts to the articles.
If interested in any of the topics written about here, please do not hesitate to get in contact!
Since the new year, we at Glocomms have observed a few related trends in our respected verticals.
From the emergence of connective and programmable networking being used in IoT to the power of Big Data which could not be more topical in the age of surveillance capitalism.
Presentation at Osaka Institute of Technology Technofrontia on Electronics.
Introduction on the latest trends in ICT space. Thoughts about the role of technology and the importance of innovation for Japan economy. Introduction of the the idea of Global Democracy as a product of Information Revolution.
DISCLAIMER: For an improve rendering please check the original source on our drive : https://docs.google.com/presentation/d/1akI0F7CYqff7xJuPklrQiYE4xymv6bU1FHHjvP9lBLY/edit#slide=id.g12c452509f1_2_41
Also more details provided on our github page: https://github.com/crowdsecurity/fundraising-decks
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
Organizations increasingly require real-time, highly scalable computing platforms in industries such as financial services, telecommunications, retail, SaaS, and IoT. This has spurred rapid advancements in chips, servers, storage and software for in-memory computing. We will review the state of in-memory computing today and offer some thoughts on where it is headed tomorrow as companies strive to create real-time, massively scalable Fast Data solutions.
My presentation at HackCon 7 Oslo, exploring where the world of information security is headed. Crude vs. stealthy exploit techinques, the underground digital economy, failure of anti-virus, the future of web application security and the (de)evolution of browsers and HTTP.
Elastically scalable architectures with microservices. The end of the monolith?Javier Arias Losada
In the last years the microservices architecture style has been gaining traction with some companies such as Netflix, Yelp, Gilt, PayPal. Many of that companies abandoned their previous monolithic architecture and moved to a microservices approach.
Does that mean that monolithic architectures are a thing of the past?
In this talk we will review some key microservices concepts (and misconceptions), search for the essence of microservices architectures and discuss about different approaches to implement them from the industry.
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...Shawn Wells
Was asked by In-Q-Tel leadership to present on how Open Source competes with larger technology companies (e.g. VMWare) and how household cloud providers (SalesForce, Amazon...) are embedding open source for competitive advantages. Step through Navy CANES program as example of DoD usage. Covers IBM and DreamWorks commercial references. Illustrates DISA Anti-Drug Network (ADNET) and U.S. Intelligence Community Persons of Interest programs. Talk about Open Source initiatives at NGA lead by Bert Beaulieu (Director, Innovision, NGA) and Michael Cline (R&D Technologist, NGA).
Secure protocol design for decentralized worldHacken
Kristof de Spiegeleer (Founder of Threefold) shared important security insights about the field where his company operates and the products it develops.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
Since the new year, we at Glocomms have observed a few related trends in our respected verticals.
From the emergence of connective and programmable networking being used in IoT to the power of Big Data which could not be more topical in the age of surveillance capitalism.
Presentation at Osaka Institute of Technology Technofrontia on Electronics.
Introduction on the latest trends in ICT space. Thoughts about the role of technology and the importance of innovation for Japan economy. Introduction of the the idea of Global Democracy as a product of Information Revolution.
DISCLAIMER: For an improve rendering please check the original source on our drive : https://docs.google.com/presentation/d/1akI0F7CYqff7xJuPklrQiYE4xymv6bU1FHHjvP9lBLY/edit#slide=id.g12c452509f1_2_41
Also more details provided on our github page: https://github.com/crowdsecurity/fundraising-decks
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
Organizations increasingly require real-time, highly scalable computing platforms in industries such as financial services, telecommunications, retail, SaaS, and IoT. This has spurred rapid advancements in chips, servers, storage and software for in-memory computing. We will review the state of in-memory computing today and offer some thoughts on where it is headed tomorrow as companies strive to create real-time, massively scalable Fast Data solutions.
My presentation at HackCon 7 Oslo, exploring where the world of information security is headed. Crude vs. stealthy exploit techinques, the underground digital economy, failure of anti-virus, the future of web application security and the (de)evolution of browsers and HTTP.
Elastically scalable architectures with microservices. The end of the monolith?Javier Arias Losada
In the last years the microservices architecture style has been gaining traction with some companies such as Netflix, Yelp, Gilt, PayPal. Many of that companies abandoned their previous monolithic architecture and moved to a microservices approach.
Does that mean that monolithic architectures are a thing of the past?
In this talk we will review some key microservices concepts (and misconceptions), search for the essence of microservices architectures and discuss about different approaches to implement them from the industry.
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...Shawn Wells
Was asked by In-Q-Tel leadership to present on how Open Source competes with larger technology companies (e.g. VMWare) and how household cloud providers (SalesForce, Amazon...) are embedding open source for competitive advantages. Step through Navy CANES program as example of DoD usage. Covers IBM and DreamWorks commercial references. Illustrates DISA Anti-Drug Network (ADNET) and U.S. Intelligence Community Persons of Interest programs. Talk about Open Source initiatives at NGA lead by Bert Beaulieu (Director, Innovision, NGA) and Michael Cline (R&D Technologist, NGA).
Secure protocol design for decentralized worldHacken
Kristof de Spiegeleer (Founder of Threefold) shared important security insights about the field where his company operates and the products it develops.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
9. Our DNA sequencers produce more than
20 Terabytes of genomic data per day
and they run 365 days a year
10. 50 billion
of your cells replaced each day
2 million
new red blood cells per second
11. First you learn the value of abstraction
Then you learn the cost of abstraction
Then you are ready to engineer
12. Don't explain code quality to execs
Explain high cost of change
Explain slowing down of innovation
Explain longer cycle times
13. The point of Amazon isn't to offer a
consumer the lowest price possible
It's to offer the lowest price possible given
the convenience that Amazon offers
14. Async is not about
performance
It is about scalability
15. There is no such thing as
a stateless architecture
It's just someone else's problem
16. Hours of video served per day
Facebook: 100 million
Netflix: 116 million
YouTube: 1 billion
17. Everybody wants to write reusable code
Nobody wants to reuse
anyone else's code
19. SpaceX, $12 billion valuation
Launches 70m rockets into space and
lands them safely
Snapchat, $20 billion valuation
Rainbow Filters
20. 1997: Let’s make a website!
fires up vi
2007: Let’s make a website!
downloads jQuery, fires up vi
2017: Let’s make a website!
[very long list of tech]
22. CAP theorem
It's impossible for a distributed computer system to
simultaneously provide more than 2 out of 3 of the
following guarantees
Consistency. Availability. Partition tolerance
23. There are only 2 hard problems in
distributed systems
1. Guaranteed order of messages
2. Exactly-once delivery
24. If you can’t build a well-
structured monolith,
what makes you think
microservices is the answer?