An ingite talk given at DataGotham 2012 about how we extract security related events and alerts from our logs. I repeated the same talk at DevOpsDays NYC 2013.
HTML5.tx 2013: Embedded JavaScript, HTML5 and the Internet of ThingsJesse Cravens
JavaScript is everywhere, but one of the most fascinating areas is in the crossroads of distributed, real time applications and microcontrollers. Take a look into the world of Node.js, HTML5 Connectivity APIs, and Embedded Linux, and how this world is changing the traditional client and server relationship. Explore the impact these trends are having on the HTML5 user interface, see demos of JavaScript powered microcontrollers (Arduino, XBee, Beaglebone, and the Raspberry Pi), learn asynchronous coding patterns, and discover some of the newer APIs that are helping JavaScript developers step out of the web browser and into the world of physical computing, robotics, and hardware.
The document discusses differences between development and production environments and challenges related to managing environments and data across stages. It emphasizes the importance of optimizing for consistency across environments and changability. Tools and automation are recommended to help manage shared configurations, virtual machine templates, and subsets of production data in development without compromising the live system.
The document provides information about Assespro's bid to host the World Congress on Information Technology (WCIT) 2016 in Brasilia, Brazil. Key details include:
- Assespro, the Association of Brazilian Information Technology Companies, is bidding to host WCIT 2016 in Brasilia from May 15-18, 2016.
- Brazil has a rapidly growing economy and technology sector, and Brasilia has the highest income and education levels in the country as well as infrastructure to host major events.
- The estimated budget for WCIT 2016 in Brasilia is $6 million, and Assespro and Brasilia are committed to WITSA licensing fees and payment schedules.
- The event dates coincide with other
The document is a 4-page agenda for a City Council meeting held on April 17, 2012 in San Angelo, Texas. The agenda includes items such as: approving meeting minutes and contracts, adopting resolutions for tax deeds and continuing a deferred compensation plan, public hearings on ordinances regarding zoning and special events on city property, and discussions on issues like violations for tall grass/weeds, purchasing ball field netting, and potential water fee rebates. Executive sessions were also scheduled to discuss real estate, legal matters, and economic development negotiations. The meeting was to take place at the McNease Convention Center and be broadcast on local government access television.
This document summarizes an article about Memcached and caching in Rails applications. It describes Memcached as an in-memory key-value store used to cache objects and speed up access. It recommends starting with caching simple objects and page fragments before caching entire pages. The document also demonstrates a sample Rails app that caches article listing data to avoid repeated database queries.
Gerenciamento de Backups PostgreSQL com pgbarmanJuliano Atanazio
O documento descreve o uso da ferramenta pgbarman para gerenciamento de backups do PostgreSQL. O pgbarman permite fazer backups remotos de múltiplos servidores PostgreSQL, auxiliando DBAs na recuperação de dados. É apresentada a instalação, configuração e uso básico do pgbarman, incluindo a criação de servidores, listagem de configurações e backups.
Various hints & tips aroundSolution Selling (January 2014)Eric Van 't Hoff
The document provides an overview of the sales process for selling solutions. It describes 6 phases for taking a potential client through: qualification, needs assessment, solution design, solution scoping, proposal, and finalizing the contract. It also discusses analyzing the business potential of prospects by creating and updating an account plan. An effective account plan would contain information about the client's business and infrastructure profiles, objectives, the company's position, and a sales plan. The activities in each sales phase should aim to answer 4 key questions to progress the client to the next stage. Different approaches are needed to obtain answers to these questions. The document also provides templates and examples to help define solutions that address client pains and shifting buyer concerns throughout the sales process.
HTML5.tx 2013: Embedded JavaScript, HTML5 and the Internet of ThingsJesse Cravens
JavaScript is everywhere, but one of the most fascinating areas is in the crossroads of distributed, real time applications and microcontrollers. Take a look into the world of Node.js, HTML5 Connectivity APIs, and Embedded Linux, and how this world is changing the traditional client and server relationship. Explore the impact these trends are having on the HTML5 user interface, see demos of JavaScript powered microcontrollers (Arduino, XBee, Beaglebone, and the Raspberry Pi), learn asynchronous coding patterns, and discover some of the newer APIs that are helping JavaScript developers step out of the web browser and into the world of physical computing, robotics, and hardware.
The document discusses differences between development and production environments and challenges related to managing environments and data across stages. It emphasizes the importance of optimizing for consistency across environments and changability. Tools and automation are recommended to help manage shared configurations, virtual machine templates, and subsets of production data in development without compromising the live system.
The document provides information about Assespro's bid to host the World Congress on Information Technology (WCIT) 2016 in Brasilia, Brazil. Key details include:
- Assespro, the Association of Brazilian Information Technology Companies, is bidding to host WCIT 2016 in Brasilia from May 15-18, 2016.
- Brazil has a rapidly growing economy and technology sector, and Brasilia has the highest income and education levels in the country as well as infrastructure to host major events.
- The estimated budget for WCIT 2016 in Brasilia is $6 million, and Assespro and Brasilia are committed to WITSA licensing fees and payment schedules.
- The event dates coincide with other
The document is a 4-page agenda for a City Council meeting held on April 17, 2012 in San Angelo, Texas. The agenda includes items such as: approving meeting minutes and contracts, adopting resolutions for tax deeds and continuing a deferred compensation plan, public hearings on ordinances regarding zoning and special events on city property, and discussions on issues like violations for tall grass/weeds, purchasing ball field netting, and potential water fee rebates. Executive sessions were also scheduled to discuss real estate, legal matters, and economic development negotiations. The meeting was to take place at the McNease Convention Center and be broadcast on local government access television.
This document summarizes an article about Memcached and caching in Rails applications. It describes Memcached as an in-memory key-value store used to cache objects and speed up access. It recommends starting with caching simple objects and page fragments before caching entire pages. The document also demonstrates a sample Rails app that caches article listing data to avoid repeated database queries.
Gerenciamento de Backups PostgreSQL com pgbarmanJuliano Atanazio
O documento descreve o uso da ferramenta pgbarman para gerenciamento de backups do PostgreSQL. O pgbarman permite fazer backups remotos de múltiplos servidores PostgreSQL, auxiliando DBAs na recuperação de dados. É apresentada a instalação, configuração e uso básico do pgbarman, incluindo a criação de servidores, listagem de configurações e backups.
Various hints & tips aroundSolution Selling (January 2014)Eric Van 't Hoff
The document provides an overview of the sales process for selling solutions. It describes 6 phases for taking a potential client through: qualification, needs assessment, solution design, solution scoping, proposal, and finalizing the contract. It also discusses analyzing the business potential of prospects by creating and updating an account plan. An effective account plan would contain information about the client's business and infrastructure profiles, objectives, the company's position, and a sales plan. The activities in each sales phase should aim to answer 4 key questions to progress the client to the next stage. Different approaches are needed to obtain answers to these questions. The document also provides templates and examples to help define solutions that address client pains and shifting buyer concerns throughout the sales process.
The document discusses PGP (Pretty Good Privacy) and how it can be used to securely communicate and store secrets. It explains that PGP uses public-key cryptography to provide confidentiality, integrity, and authenticity. It also discusses how to generate a PGP key pair, and the importance of revoking keys if they are compromised or the user no longer needs them.
This document summarizes the IPv6 implementation at XS4ALL, a Dutch internet service provider. It discusses XS4ALL's history with IPv6 including their early 6bone allocation. It describes their technical setup for IPv6 including PPPoE dual-stack deployment and DHCPv6 prefix delegation. It also covers experiences such as CPE compatibility issues and the challenges of supporting IPv6 in services and load balancers. The document encourages other organizations to start IPv6 deployment and cooperate with the IPv6 community.
This document discusses analyzing log data from Etsy to monitor page generation times and trends over time. A graph is shown displaying typical page generation times between 0-600ms with most times falling between 150-450ms. Monitoring this metric helps ensure site performance remains high.
The document discusses scaling a web application called Wanelo that is built on PostgreSQL. It describes 12 steps for incrementally scaling the application as traffic increases. The first steps involve adding more caching, optimizing SQL queries, and upgrading hardware. Further steps include replicating reads to additional PostgreSQL servers, using alternative data stores like Redis where appropriate, moving write-heavy tables out of PostgreSQL, and tuning PostgreSQL and the underlying filesystem. The goal is to scale the application while maintaining PostgreSQL as the primary database.
This document is a collection of URLs from various websites discussing topics related to radio controlled models, toys, aircrafts and vehicles. The URLs link to forum discussions, product pages, dealer directories and videos about RC hobbies.
The document discusses scaling Postgres databases. It covers vertical and horizontal scaling techniques. Vertical scaling involves upgrading hardware resources like CPU, RAM and storage, while horizontal scaling involves adding multiple servers. The document provides tips for optimizing Postgres configuration, monitoring performance, and tuning queries.
1. The document outlines the national authorities, Computer Emergency Response Teams (CERTs), industry organizations, academic organizations, and other bodies involved in network and information security in the Netherlands. It describes their roles and responsibilities.
2. The key national authorities include several ministries and agencies responsible for areas such as economic affairs, interior, justice, law enforcement, and telecommunications. CERTs provide security incident response for different sectors.
3. Industry organizations represent private companies and coordinate on security issues. Academic groups promote research collaboration. Other organizations focus on awareness, standards, and specific domains like banking. The document provides websites for further information on each organization.
Scaling Etsy: What Went Wrong, What Went RightRoss Snyder
This document discusses Etsy's architecture and scaling challenges from 2007-2009. It describes how Etsy initially had all business logic in Postgres stored procedures with a large central database. To scale, Etsy developed "Sprouter", a middleware that routed calls to stored procedures. However, Sprouter created development barriers and extra work for operations without significantly improving reliability. After key proponents of Sprouter departed, attitudes changed towards more developer autonomy and frequent production deployments through a "DevOps" approach. The new approach focused on stabilizing the site and improving metrics.
4000 auto approve wordpress blogs backlink list (pr8-pr1)Djuwarsjah Linnus
This document provides a list of over 4,000 WordPress blog URLs. It notes that blasting the list to these blogs multiple times may be needed to achieve a 95-100% success rate of backlinks, as some blogs may not accept the first attempt. The list itself consists of URLs to blogs in various languages and topics.
The Evolution Of The Music Industry The Effect Of Technology And Law On Stra...Ben Kilmer
This document provides an overview of the music industry and discusses key changes it has undergone in recent decades due to technological innovations. It begins with an introduction to the current state of the industry and outlines five competitive forces: new entrants have low barriers; buyers have high bargaining power; substitute products are a major threat; suppliers have relatively low power; and rivalry is high. The document then examines incremental innovations from within the industry, disruptive innovations from outside, and industry resistance to changes. It explores the adoption of new technologies by consumers and the industry. The future of the music industry and case studies on Apple and Grooveshark are also summarized.
Here are some suggestions for what he should do based on the information provided:
1. Talk to his son and try to understand why he started smoking. Express concern for his health and set clear expectations that he needs to stop. Offer support to help him quit.
2. Seek medical advice from their doctor. Getting a full medical checkup is important to understand any health impacts and get recommendations on the best way to quit smoking.
3. Develop a plan and strategy to quit. This could include gradually reducing cigarette intake, using nicotine replacements under doctor's guidance, changing routines associated with smoking, and finding alternative activities to keep himself busy.
4. Ask friends and family for encouragement and accountability. Having a strong
From Obvious to Ingenius: Incrementally Scaling Web Apps on PostgreSQLKonstantin Gredeskoul
In this exciting and informative talk, presented at PgConf Sillicon Valley 2015, Konstantin cut through the theory to deliver a clear set of practical solutions for scaling applications atop PostgreSQL, eventually supporting millions of active users, tens of thousands concurrently, and with the application stack that responds to requests with a 100ms average. He will share how his team solved one of the biggest challenges they faced: effectively storing and retrieving over 3B rows of "saves" (a Wanelo equivalent of Instagram's "like" or Pinterest's "pin"), all in PostgreSQL, with highly concurrent random access.
Over the last three years, the team at Wanelo optimized the hell out of their application and database stacks. Using PostgreSQL version 9 as their primary data store, Joyent Public Cloud as a hosting environment, the team re-architected their backend for rapid expansion several times over, as the unrelenting traffic kept climbing up. This ultimately resulted in a highly efficient, horizontally scalable, fault tolerant application infrastructure. Unimpressed? Now try getting there without the OPS or DBA teams, all while deploying seven times per day to production, with an application measuring 99.999% uptime over the last 6 months.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The Razors Edge - Cutting your TLS BaggageJan Schaumann
A talk on effecting change across a large organization, given at O'Reilly Security 2017.
Write-up will be posted at https://www.netmeister.org/blog/razors-edge.html
A Choose Your Own Adventure for Devs, Ops, and other Humans
Given at ConFoo Vancouver 2016.
Write-up will be posted at https://www.netmeister.org/blog/opsec101.html
Crazy Like A Fox - #Infosec Ideas That Just Might WorkJan Schaumann
Slides from an Ignite Talk given at O'Reilly Security NYC, 2016-10-31. Talk details will be posted at https://www.netmeister.org/blog/crazy-like-a-fox.html
The document discusses PGP (Pretty Good Privacy) and how it can be used to securely communicate and store secrets. It explains that PGP uses public-key cryptography to provide confidentiality, integrity, and authenticity. It also discusses how to generate a PGP key pair, and the importance of revoking keys if they are compromised or the user no longer needs them.
This document summarizes the IPv6 implementation at XS4ALL, a Dutch internet service provider. It discusses XS4ALL's history with IPv6 including their early 6bone allocation. It describes their technical setup for IPv6 including PPPoE dual-stack deployment and DHCPv6 prefix delegation. It also covers experiences such as CPE compatibility issues and the challenges of supporting IPv6 in services and load balancers. The document encourages other organizations to start IPv6 deployment and cooperate with the IPv6 community.
This document discusses analyzing log data from Etsy to monitor page generation times and trends over time. A graph is shown displaying typical page generation times between 0-600ms with most times falling between 150-450ms. Monitoring this metric helps ensure site performance remains high.
The document discusses scaling a web application called Wanelo that is built on PostgreSQL. It describes 12 steps for incrementally scaling the application as traffic increases. The first steps involve adding more caching, optimizing SQL queries, and upgrading hardware. Further steps include replicating reads to additional PostgreSQL servers, using alternative data stores like Redis where appropriate, moving write-heavy tables out of PostgreSQL, and tuning PostgreSQL and the underlying filesystem. The goal is to scale the application while maintaining PostgreSQL as the primary database.
This document is a collection of URLs from various websites discussing topics related to radio controlled models, toys, aircrafts and vehicles. The URLs link to forum discussions, product pages, dealer directories and videos about RC hobbies.
The document discusses scaling Postgres databases. It covers vertical and horizontal scaling techniques. Vertical scaling involves upgrading hardware resources like CPU, RAM and storage, while horizontal scaling involves adding multiple servers. The document provides tips for optimizing Postgres configuration, monitoring performance, and tuning queries.
1. The document outlines the national authorities, Computer Emergency Response Teams (CERTs), industry organizations, academic organizations, and other bodies involved in network and information security in the Netherlands. It describes their roles and responsibilities.
2. The key national authorities include several ministries and agencies responsible for areas such as economic affairs, interior, justice, law enforcement, and telecommunications. CERTs provide security incident response for different sectors.
3. Industry organizations represent private companies and coordinate on security issues. Academic groups promote research collaboration. Other organizations focus on awareness, standards, and specific domains like banking. The document provides websites for further information on each organization.
Scaling Etsy: What Went Wrong, What Went RightRoss Snyder
This document discusses Etsy's architecture and scaling challenges from 2007-2009. It describes how Etsy initially had all business logic in Postgres stored procedures with a large central database. To scale, Etsy developed "Sprouter", a middleware that routed calls to stored procedures. However, Sprouter created development barriers and extra work for operations without significantly improving reliability. After key proponents of Sprouter departed, attitudes changed towards more developer autonomy and frequent production deployments through a "DevOps" approach. The new approach focused on stabilizing the site and improving metrics.
4000 auto approve wordpress blogs backlink list (pr8-pr1)Djuwarsjah Linnus
This document provides a list of over 4,000 WordPress blog URLs. It notes that blasting the list to these blogs multiple times may be needed to achieve a 95-100% success rate of backlinks, as some blogs may not accept the first attempt. The list itself consists of URLs to blogs in various languages and topics.
The Evolution Of The Music Industry The Effect Of Technology And Law On Stra...Ben Kilmer
This document provides an overview of the music industry and discusses key changes it has undergone in recent decades due to technological innovations. It begins with an introduction to the current state of the industry and outlines five competitive forces: new entrants have low barriers; buyers have high bargaining power; substitute products are a major threat; suppliers have relatively low power; and rivalry is high. The document then examines incremental innovations from within the industry, disruptive innovations from outside, and industry resistance to changes. It explores the adoption of new technologies by consumers and the industry. The future of the music industry and case studies on Apple and Grooveshark are also summarized.
Here are some suggestions for what he should do based on the information provided:
1. Talk to his son and try to understand why he started smoking. Express concern for his health and set clear expectations that he needs to stop. Offer support to help him quit.
2. Seek medical advice from their doctor. Getting a full medical checkup is important to understand any health impacts and get recommendations on the best way to quit smoking.
3. Develop a plan and strategy to quit. This could include gradually reducing cigarette intake, using nicotine replacements under doctor's guidance, changing routines associated with smoking, and finding alternative activities to keep himself busy.
4. Ask friends and family for encouragement and accountability. Having a strong
From Obvious to Ingenius: Incrementally Scaling Web Apps on PostgreSQLKonstantin Gredeskoul
In this exciting and informative talk, presented at PgConf Sillicon Valley 2015, Konstantin cut through the theory to deliver a clear set of practical solutions for scaling applications atop PostgreSQL, eventually supporting millions of active users, tens of thousands concurrently, and with the application stack that responds to requests with a 100ms average. He will share how his team solved one of the biggest challenges they faced: effectively storing and retrieving over 3B rows of "saves" (a Wanelo equivalent of Instagram's "like" or Pinterest's "pin"), all in PostgreSQL, with highly concurrent random access.
Over the last three years, the team at Wanelo optimized the hell out of their application and database stacks. Using PostgreSQL version 9 as their primary data store, Joyent Public Cloud as a hosting environment, the team re-architected their backend for rapid expansion several times over, as the unrelenting traffic kept climbing up. This ultimately resulted in a highly efficient, horizontally scalable, fault tolerant application infrastructure. Unimpressed? Now try getting there without the OPS or DBA teams, all while deploying seven times per day to production, with an application measuring 99.999% uptime over the last 6 months.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The Razors Edge - Cutting your TLS BaggageJan Schaumann
A talk on effecting change across a large organization, given at O'Reilly Security 2017.
Write-up will be posted at https://www.netmeister.org/blog/razors-edge.html
A Choose Your Own Adventure for Devs, Ops, and other Humans
Given at ConFoo Vancouver 2016.
Write-up will be posted at https://www.netmeister.org/blog/opsec101.html
Crazy Like A Fox - #Infosec Ideas That Just Might WorkJan Schaumann
Slides from an Ignite Talk given at O'Reilly Security NYC, 2016-10-31. Talk details will be posted at https://www.netmeister.org/blog/crazy-like-a-fox.html
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolJan Schaumann
'Always wear underwear' and other practical advice for Computer Science students.
A transcript of the talk is available at www.netmeister.org/blog/semper-ubi-sub-ubi.html
Primum non nocere - Ethical Obligations in Internet OperationsJan Schaumann
The document discusses ethical obligations in internet operations and data stewardship. It notes that companies are stewards of users' data and are obligated to act in the public interest. Various codes of ethics from different organizations emphasize prioritizing public safety, health and welfare.
A talk on how system engineers and administrators, the people who maintain the infrastructure of the internet and who write a lot of code without (usually) having any training in software engineering practices, can improve their tools. Originally given at NYCBug in June 2009.
The document discusses useless uses of common Unix/Linux utilities like cat, grep, and *. It provides examples of cases where these utilities are used redundantly or ineffectively, and suggests better alternatives without the unnecessary steps. Specifically, it explains how cat is often redundant when feeding files into other commands directly, how grep can be replaced by simpler tools like awk and sed in many cases, and how using * wildcards without good reason leads to inefficient scripts. The overall message is to simplify commands and remove unnecessary processing to write clearer and more efficient shell scripts.
A presentation on how changes in Daylight Saving Time were handled at Yahoo!. Originally given at BayLISA in May 2007. Slides are available here:
netmeister.org/misc/dst_yahoo.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
6. Know your patterns. @jschauma
VPN Connections
July 4th was a Wednesday
People making up for
People slacking off early
last week?
on a Friday, eh?
5
08/28/12
13. High number of failed logins @jschauma
Admin : <username> (<internal login>, <site login>)
IP : 64.124.192.210 - 64.124.192.210.t01419-07.above.net
Geolocation : Brooklyn, NY, US
Whois : ETSY Inc, ARIN, NET64
# of failed logins : 13
doesn’t know what he’s doing;
do not trust!
Admin : jschauma (jschauma, jschauma)
IP : 207.38.139.33 - 207-38-139-33.c3-0.avec-ubr2.nyr-
avec.ny.cable.rcn.com
Geolocation : New York, United States
Whois : RCN Corporation, ARIN, NET207
# of failed logins : 16
6
08/28/12
19. Of Liars and Outliers (good book, btw) @jschauma
wtf happened
here?
Ooh, right… this:
http://is.gd/fognju
http://is.gd/0hRDLY
http://is.gd/WxcA0r
6
08/28/12
20. This talk was too long! @jschauma
Log it now, log it all.
Geolocate all the things.
Build profiles. (Creepy, I know.)
Reduce false positives. (Whitelists!)
Have defined reactions to all alerts.
Notice the outliers.
Explain them.
That’s all, folks! Thanks!
2
08/28/12