The document discusses securing virtual machine workloads in Azure. It covers securing disks using storage service encryption with platform-managed or customer-managed keys. It also discusses using Azure Disk Encryption and confidential computing. The document compares generation 1 and 2 VMs and covers Azure access management, agents, extensions, managed identities, logging, and Azure Backup.
Attacker's Perspective of Active DirectorySunny Neo
This document provides an overview of attack methodologies from an attacker's perspective when targeting Active Directory environments. It discusses initial access techniques, privilege escalation to domain admin rights, maintaining situational awareness through techniques like password spraying and Kerberoasting, and lateral movement tactics like pass the hash and pass the ticket. It also provides mitigation strategies and detection opportunities for defenders.
An ACE in the Hole - Stealthy Host Persistence via Security DescriptorsWill Schroeder
The document discusses stealthy host persistence techniques using security descriptors. It begins with an introduction to the authors and their research focusing on offensive applications of securable objects. It then provides an overview of securable objects, access control lists, and the authors' methodology for researching new persistence primitives using various securable objects like the Service Control Manager, WinRM, DCOM, WMI namespaces, printers, and the remote registry. Case studies and demonstrations are presented for some of these objects.
Windows Server 2016 offers huge improvements for Active Directory scalability and UI, which we'll talk about in detail. Don't miss a demo session on using Active Directory PowerShell History Viewer and the new graphic user interface for Active Directory Recycle Bin and fine-grained password policy features!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Mike Martin
This document provides information about an IT conference focused on Microsoft Azure. It introduces two speakers, Mike Martin and Kristof Rennen, who will discuss Azure capabilities including regions, virtual machine sizes, PowerShell, and hybrid cloud solutions. The document also summarizes recent Azure announcements and previews upcoming features. Attendees are encouraged to provide feedback and can receive a Lumia 1320 for doing so.
azure track -03- it pros meet azure - againITProceed
by Kristof Rennen, Mike Martin
IaaS in the public cloud, the final frontier. These are the voyages of the Enterprise IT team, it's mission: to be scalable and agile as possible. To achieve their mission goal they can use the new features of Microsoft Azure:
•Azure Files
•Azure RemoteApp
•the new VNET features and it's big brother ExpressRoute
•and much much more
don't forget: Azure goes to Infinity and … beyond!
Enter The Matrix Securing Azure’s AssetsBizTalk360
This talk is mainly on the security aspects of Azure, in any context. you’ll get an overview on where security is handled, some practices and how to monitor and act accordingly to certain threats and issues. It will focus on IaaS, PaaS and SaaS. As security is an integral part of an environment, the integration aspect is not far away. Focus products include Azure and all related services.
Building Azure RemoteApp - Microsoft Campus Days 2014Morgan Simonsen
Azure RemoteApp is Remote Desktop-as-a-Service. It combines the Azure platform capabilities with the proven technology of Remote Desktop Sessions and the RDP Protocol. This is the session I gave at the Microsoft Campus Days 2014 in Copenhagen, Denmark.
Attacker's Perspective of Active DirectorySunny Neo
This document provides an overview of attack methodologies from an attacker's perspective when targeting Active Directory environments. It discusses initial access techniques, privilege escalation to domain admin rights, maintaining situational awareness through techniques like password spraying and Kerberoasting, and lateral movement tactics like pass the hash and pass the ticket. It also provides mitigation strategies and detection opportunities for defenders.
An ACE in the Hole - Stealthy Host Persistence via Security DescriptorsWill Schroeder
The document discusses stealthy host persistence techniques using security descriptors. It begins with an introduction to the authors and their research focusing on offensive applications of securable objects. It then provides an overview of securable objects, access control lists, and the authors' methodology for researching new persistence primitives using various securable objects like the Service Control Manager, WinRM, DCOM, WMI namespaces, printers, and the remote registry. Case studies and demonstrations are presented for some of these objects.
Windows Server 2016 offers huge improvements for Active Directory scalability and UI, which we'll talk about in detail. Don't miss a demo session on using Active Directory PowerShell History Viewer and the new graphic user interface for Active Directory Recycle Bin and fine-grained password policy features!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Mike Martin
This document provides information about an IT conference focused on Microsoft Azure. It introduces two speakers, Mike Martin and Kristof Rennen, who will discuss Azure capabilities including regions, virtual machine sizes, PowerShell, and hybrid cloud solutions. The document also summarizes recent Azure announcements and previews upcoming features. Attendees are encouraged to provide feedback and can receive a Lumia 1320 for doing so.
azure track -03- it pros meet azure - againITProceed
by Kristof Rennen, Mike Martin
IaaS in the public cloud, the final frontier. These are the voyages of the Enterprise IT team, it's mission: to be scalable and agile as possible. To achieve their mission goal they can use the new features of Microsoft Azure:
•Azure Files
•Azure RemoteApp
•the new VNET features and it's big brother ExpressRoute
•and much much more
don't forget: Azure goes to Infinity and … beyond!
Enter The Matrix Securing Azure’s AssetsBizTalk360
This talk is mainly on the security aspects of Azure, in any context. you’ll get an overview on where security is handled, some practices and how to monitor and act accordingly to certain threats and issues. It will focus on IaaS, PaaS and SaaS. As security is an integral part of an environment, the integration aspect is not far away. Focus products include Azure and all related services.
Building Azure RemoteApp - Microsoft Campus Days 2014Morgan Simonsen
Azure RemoteApp is Remote Desktop-as-a-Service. It combines the Azure platform capabilities with the proven technology of Remote Desktop Sessions and the RDP Protocol. This is the session I gave at the Microsoft Campus Days 2014 in Copenhagen, Denmark.
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...Morgan Simonsen
Presentation given at the Nordic Infrastructure Conference (NIC) 2015 about migrating servers to Azure IaaS using the Microsoft Migration Accelerator (MA).
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Indrajit Poddar
This document provides an overview of enabling cognitive workloads on the cloud using GPUs with Mesos, Docker, and Marathon on IBM's POWER systems. It discusses requirements for GPUs in the cloud like exposing GPUs to containers and supporting multiple GPUs per node. It also summarizes Mesos and Kubernetes support for GPUs, and demonstrates running a deep learning workload on OpenPOWER hardware to identify dog breeds using Docker containers and GPUs.
This document provides information about Azure Site Recovery including contact information for Asaf Nakash and Yaruslav Minialov, key features of Azure Site Recovery, a high-level overview of how it works including replication of VMs to Azure, and pricing information for Azure Site Recovery suites. It aims to educate readers on disaster recovery and migration capabilities between on-premises and Azure using Azure Site Recovery.
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxCarlo Sacchi
Carlo Sacchi gave a presentation on confidential computing in Azure (ACC). He discussed key concepts like trusted execution environments (TEEs) that protect data in use through hardware-based isolation. Azure provides confidential computing options like confidential virtual machines and confidential key management. The Confidential Computing Consortium is working to standardize the technology across platforms. Early customers are leveraging ACC for sensitive workloads requiring high levels of data security and privacy.
2020-02-10 Java on Azure Solution BriefingEd Burns
This document provides an overview of running Java workloads on Microsoft Azure. It discusses using virtual machines, containers (Azure Kubernetes Service and Azure Container Instances), and managed services (Azure Spring Cloud and Azure Functions). It also covers DevOps tools integration, IDE support, sample solutions, and pathways for migrating existing applications or developing new applications on Azure.
Deep Dive OpenShitt on Azure & .NET Core on OpenShiftTakayoshi Tanaka
OpenShift can be deployed on Azure using the reference architecture. This allows integrating Azure features like authentication, load balancing, and persistent storage. .NET Core 2.0 and ASP.NET Core 2.0 are now supported on OpenShift via s2i builds. Examples shown include running .NET console apps as cron jobs, using secrets for configuration, and remote debugging from Visual Studio Code.
Windows Server 2022 is now in preview, the next release in our Long-Term Servicing Channel (LTSC), which will be generally available later this calendar year. It builds on Windows Server 2019, our fastest adopted Windows Server ever. This release includes advanced multi-layer security, hybrid capabilities with Azure, and a flexible platform to modernize applications with containers.
This document discusses setting up System Center Configuration Manager (SCCM) on Microsoft Azure. It begins with an overview of cloud computing benefits and Microsoft Azure features. It then reviews the System Center suite and describes the SCCM on Azure architecture with a SQL database, IIS, and load balancer. Steps are provided for deploying the base configuration in Azure. The document demonstrates SCCM functionality and concludes with notes on additional configuration topics.
Identity Server on Azure: A Reference ArchitectureWSO2
As the popularity of cloud-based deployment is on the rise, more and more organizations are moving their mission-critical workloads into cloud services. Microsoft Azure is one of the fastest-growing cloud service providers. They have gained the trust and loyalty of lots of users over the year.
WSO2 identity server is an extensible identity access management solution for implementing cost-effective identity management infrastructure. WSO2 Identity Server supports deployments on-premises, many cloud service providers and hybrid models.
Watch the on-demand recording here - https://wso2.com/library/webinars/identity-server-on-azure-a-reference-architecture/
Azure en Nutanix: your journey to the hybrid cloudICT-Partners
Op zoek naar oplossingen voor een flexibel, schaalbaar, kostenefficiënt en toekomstvast datacenter? Ontdek dan nu de kracht van Microsoft Azure & Nutanix: twee moderne platformen waarmee u de voordelen van uw on-premise infrastructuur kunt combineren met de voordelen van de public cloud.
Presentatie van 30 april 2015
An extremely motivated and proficient individual with overall 4 years of experience in Build/ Release with DevOps & Development, AWS CSA, MCSE(Azure) and JIRA Administrator in IT industry.
Windows Virtual Desktop Infrastructure (VDI) è un servizio di virtualizzazione completo per desktop e app in esecuzione sul cloud. È l'unica infrastruttura per desktop virtuale che offre gestione semplificata, Windows 10 multisessione, ottimizzazioni per Microsoft 365 e supporto per ambienti di Servizi Desktop remoto.
Azure is a great place for all your Java. Microsoft Java experts lead a grand tour of Java on Azure. Learn how to reach cloud-scale with cloud-native innovation for enterprise Java applications.
Java on Your Terms with Azure
The document discusses using MongoDB on the Windows Azure platform. It provides an overview of Windows Azure and its application building blocks. It then discusses how MongoDB can be deployed on Windows Azure in different ways to provide high availability using replica sets or high scalability using sharding. Specific drivers and deployment options for MongoDB on both Windows Azure virtual machines and cloud services are also covered. The presentation includes demos of MongoDB deployed as both a PaaS cloud service and on IaaS virtual machines on Windows Azure. Resources for further information are provided at the end.
Overview of Windows Azure's current support for MongoDB deployments on IaaS virtual machines or PaaS worker roles. Presented at MongoDB Seattle, 9/14/2012.
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting OpportunityIngram Micro Cloud
This presentations covers a few simple questions on how your customers can grow your infrastructure deals substantially in H1. Given the huge cross-sell/upsell opportunity, this breakout will ensure you:
- Understand the breadth of the opportunity around upgrading Windows Server 2003/R2 and SQL 2005
- Take inventory of all the great resources at your disposal to expedite the discovery, planning, targeting and execution of a migration.
- Arm yourself with Azure as a target destination for your migrations, and transform your practice simultaneously.
The document provides an agenda and summary for a Citrix User Group Community webinar on the state of End User Computing (EUC) in 2021. The agenda covers topics like ransomware threats from a VDI perspective, Zero-Trust security models, Secure Access Service Edge (SASE), modern workplace authentication, analytics from Citrix and VMware, updates from Microsoft, Citrix and VMware on virtual desktop infrastructure and cloud platforms, and the future of EUC. The presenters are introduced and instructions are given to submit questions and complete a survey.
More Related Content
Similar to Securing Virtual Machines in Microsoft Azure
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...Morgan Simonsen
Presentation given at the Nordic Infrastructure Conference (NIC) 2015 about migrating servers to Azure IaaS using the Microsoft Migration Accelerator (MA).
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Indrajit Poddar
This document provides an overview of enabling cognitive workloads on the cloud using GPUs with Mesos, Docker, and Marathon on IBM's POWER systems. It discusses requirements for GPUs in the cloud like exposing GPUs to containers and supporting multiple GPUs per node. It also summarizes Mesos and Kubernetes support for GPUs, and demonstrates running a deep learning workload on OpenPOWER hardware to identify dog breeds using Docker containers and GPUs.
This document provides information about Azure Site Recovery including contact information for Asaf Nakash and Yaruslav Minialov, key features of Azure Site Recovery, a high-level overview of how it works including replication of VMs to Azure, and pricing information for Azure Site Recovery suites. It aims to educate readers on disaster recovery and migration capabilities between on-premises and Azure using Azure Site Recovery.
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxCarlo Sacchi
Carlo Sacchi gave a presentation on confidential computing in Azure (ACC). He discussed key concepts like trusted execution environments (TEEs) that protect data in use through hardware-based isolation. Azure provides confidential computing options like confidential virtual machines and confidential key management. The Confidential Computing Consortium is working to standardize the technology across platforms. Early customers are leveraging ACC for sensitive workloads requiring high levels of data security and privacy.
2020-02-10 Java on Azure Solution BriefingEd Burns
This document provides an overview of running Java workloads on Microsoft Azure. It discusses using virtual machines, containers (Azure Kubernetes Service and Azure Container Instances), and managed services (Azure Spring Cloud and Azure Functions). It also covers DevOps tools integration, IDE support, sample solutions, and pathways for migrating existing applications or developing new applications on Azure.
Deep Dive OpenShitt on Azure & .NET Core on OpenShiftTakayoshi Tanaka
OpenShift can be deployed on Azure using the reference architecture. This allows integrating Azure features like authentication, load balancing, and persistent storage. .NET Core 2.0 and ASP.NET Core 2.0 are now supported on OpenShift via s2i builds. Examples shown include running .NET console apps as cron jobs, using secrets for configuration, and remote debugging from Visual Studio Code.
Windows Server 2022 is now in preview, the next release in our Long-Term Servicing Channel (LTSC), which will be generally available later this calendar year. It builds on Windows Server 2019, our fastest adopted Windows Server ever. This release includes advanced multi-layer security, hybrid capabilities with Azure, and a flexible platform to modernize applications with containers.
This document discusses setting up System Center Configuration Manager (SCCM) on Microsoft Azure. It begins with an overview of cloud computing benefits and Microsoft Azure features. It then reviews the System Center suite and describes the SCCM on Azure architecture with a SQL database, IIS, and load balancer. Steps are provided for deploying the base configuration in Azure. The document demonstrates SCCM functionality and concludes with notes on additional configuration topics.
Identity Server on Azure: A Reference ArchitectureWSO2
As the popularity of cloud-based deployment is on the rise, more and more organizations are moving their mission-critical workloads into cloud services. Microsoft Azure is one of the fastest-growing cloud service providers. They have gained the trust and loyalty of lots of users over the year.
WSO2 identity server is an extensible identity access management solution for implementing cost-effective identity management infrastructure. WSO2 Identity Server supports deployments on-premises, many cloud service providers and hybrid models.
Watch the on-demand recording here - https://wso2.com/library/webinars/identity-server-on-azure-a-reference-architecture/
Azure en Nutanix: your journey to the hybrid cloudICT-Partners
Op zoek naar oplossingen voor een flexibel, schaalbaar, kostenefficiënt en toekomstvast datacenter? Ontdek dan nu de kracht van Microsoft Azure & Nutanix: twee moderne platformen waarmee u de voordelen van uw on-premise infrastructuur kunt combineren met de voordelen van de public cloud.
Presentatie van 30 april 2015
An extremely motivated and proficient individual with overall 4 years of experience in Build/ Release with DevOps & Development, AWS CSA, MCSE(Azure) and JIRA Administrator in IT industry.
Windows Virtual Desktop Infrastructure (VDI) è un servizio di virtualizzazione completo per desktop e app in esecuzione sul cloud. È l'unica infrastruttura per desktop virtuale che offre gestione semplificata, Windows 10 multisessione, ottimizzazioni per Microsoft 365 e supporto per ambienti di Servizi Desktop remoto.
Azure is a great place for all your Java. Microsoft Java experts lead a grand tour of Java on Azure. Learn how to reach cloud-scale with cloud-native innovation for enterprise Java applications.
Java on Your Terms with Azure
The document discusses using MongoDB on the Windows Azure platform. It provides an overview of Windows Azure and its application building blocks. It then discusses how MongoDB can be deployed on Windows Azure in different ways to provide high availability using replica sets or high scalability using sharding. Specific drivers and deployment options for MongoDB on both Windows Azure virtual machines and cloud services are also covered. The presentation includes demos of MongoDB deployed as both a PaaS cloud service and on IaaS virtual machines on Windows Azure. Resources for further information are provided at the end.
Overview of Windows Azure's current support for MongoDB deployments on IaaS virtual machines or PaaS worker roles. Presented at MongoDB Seattle, 9/14/2012.
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting OpportunityIngram Micro Cloud
This presentations covers a few simple questions on how your customers can grow your infrastructure deals substantially in H1. Given the huge cross-sell/upsell opportunity, this breakout will ensure you:
- Understand the breadth of the opportunity around upgrading Windows Server 2003/R2 and SQL 2005
- Take inventory of all the great resources at your disposal to expedite the discovery, planning, targeting and execution of a migration.
- Arm yourself with Azure as a target destination for your migrations, and transform your practice simultaneously.
Similar to Securing Virtual Machines in Microsoft Azure (20)
The document provides an agenda and summary for a Citrix User Group Community webinar on the state of End User Computing (EUC) in 2021. The agenda covers topics like ransomware threats from a VDI perspective, Zero-Trust security models, Secure Access Service Edge (SASE), modern workplace authentication, analytics from Citrix and VMware, updates from Microsoft, Citrix and VMware on virtual desktop infrastructure and cloud platforms, and the future of EUC. The presenters are introduced and instructions are given to submit questions and complete a survey.
Marius Sandbu discusses migrating traditional workloads to Windows Virtual Desktop (WVD) in Azure. He covers assessing the current environment using tools like Azure Migrate and Lakeside to understand integration points and performance. Proper planning is important to understand limitations of Azure services and WVD. Marius also reviews the main steps of planning, assessing, building foundations, migrating or rebuilding workloads, and operating and governing WVD in Azure.
State of the EUC - 2020 What's new in End-User ComputingMarius Sandbu
- 2020 saw increased adoption of DaaS/WVD from Microsoft, though it still lacks some management and application layering capabilities provided by Citrix and VMware.
- Microsoft continued optimizing Teams and OneDrive for VDI environments and released the Teams Optimization Pack for Citrix.
- Citrix introduced Workspace Microapps for integrating SaaS services and released the 1912 LTSR version of CVAD with new features like App Protection.
- Application layering saw updates from Citrix and VMware while Microsoft previewed replacing App-V with MSIX AppAttach.
- Microsoft continued merging Intune and SCCM into Endpoint Manager and added new capabilities to Azure, O365, and the Edge browser
State of the EUC - 2020 What's new in End-User ComputingMarius Sandbu
- 2020 saw increased adoption of desktop and application virtualization services like Windows Virtual Desktop (WVD) and FSLogix profile containers from Microsoft, as well as managed desktop offerings from Citrix.
- Updates were made to Microsoft Teams and OneDrive to improve performance and support in virtual environments. Citrix also introduced Workspace MicroApps.
- Microsoft is focusing on consolidating Intune and ConfigMgr into a single Endpoint Manager product and admin center while continuing to develop the individual products.
- Application layering solutions like App Volumes and Citrix App Layering saw updates to support newer versions of Windows 10 and Server 2019. MSIX AppAttach was introduced as a replacement for App-V but is still limited.
This document discusses how to use Azure Sentinel and Microsoft Defender ATP to catch cyber threats. It provides an overview of the Microsoft security ecosystem and capabilities of Azure Sentinel and Defender ATP. Specifically, it outlines how to enable various data sources, design detection rules, and conduct hunting queries using these solutions.
Citrix Cloud XL - Running Ctirix in Public CloudMarius Sandbu
This document provides a comparison of Azure, Google Cloud, and AWS for running Citrix virtual desktops in public clouds. It includes overviews of each platform, key features like infrastructure, storage, networking, security, and management tools. The document highlights the pros of each platform, including automation capabilities, elasticity, and pricing models. It also discusses architecture examples and considerations for designing Citrix deployments in public clouds.
This document discusses using Microsoft Enterprise Mobility Suite (EMS) with Citrix in an Azure environment. It provides an architecture overview including Azure AD, Intune, Citrix XenDesktop/XenApp, NetScaler, and other components. It describes how Intune can deploy Citrix Receiver and VPN profiles, how Azure AD handles authentication to Citrix using SAML, and how NetScaler and Storefront are configured for single sign-on. Conditional access policies, monitoring with Log Analytics, and other considerations are also covered at a high level.
Delivering and optimizing citrix from microsoft azure Marius Sandbu
This document provides an agenda and overview of delivering and optimizing Citrix from Microsoft Azure. It discusses basic building blocks in Azure, identity options, networking considerations, high availability services, provisioning with Machine Creation Services (MCS), automation and monitoring options. Example architectures, tips and tuning, and scripts for automation are also included on the agenda.
The document discusses integrations between Citrix Netscaler and Microsoft System Center 2012 R2. It provides an overview of System Center 2012 R2 components like Virtual Machine Manager, Operations Manager, and Orchestrator. It then describes specific integrations between Netscaler and these System Center components, including using Netscaler with Virtual Machine Manager for load balancing, monitoring Netscaler with the Operations Manager management pack, and automating Netscaler setup and deployment with Orchestrator runbooks.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
* Flere sårbarheter en før* Legge til felles kjøreregler på grunnmuren i plattformen
Definere at tjenester må ha etablert overvåkning, backup, bak definerte sikkerhetsmekanismer som er etablert
Tilgang til tjenesten bade fra sluttbruker og utvikler er basert på kontekst
Benytte kontinuerlig oppdaterte platform tjenester
Ha tjenester som kan kontinuerlig se etter sårbarheter I applikasjonene eller tjenesten
Overvåkning av tjenester
Viktigste element som skyplatform gir er jo automatisering som kan benyttes for å etablere alle disse mekaniseme samt også bygging av applikasjonen.
Med disse mekanismene I bunn har man et godt grunnlag for fremtidige tjenester som blir etablert på en skyplattform.