Do you have remote workers in many locations, each with a unique PC configuration and mobile device? Do you have limited resources to maintain those multiple platforms and devices? Are employees bringing their own devices (BYOD) to the workplace and into the field adding to your woes? In this webinar we'll show you how you can use Windows Intune to manage BYOD, giving real world examples of how you can keep your devices and employees at peak performance from virtually anywhere.
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
Microsoft has given us some amazing capabilities with the Microsoft Enterprise Mobility + Security (EM+S) suite to help protect both our information and our investments in Office 365. This collection of features gives you just about everything you need in the Microsoft Cloud for security, compliance and Information Protection. With such a vast array of services, tools and features, its often challenging to understand everything this product provides or how its layered on top of existing Office 365 security controls. In this session we’ll review the capabilities available to you in Microsoft EM+S, and you'll discover which ones may best fit with your security and compliance needs. Come and join us, as we also dive deep into some of the most useful Microsoft EM+ S tools.
Preparing your enteprise for Hybrid AD Join and Conditional AccessJason Condo
In the presentation learn what you need to do in AD FS, Active Directory, and Azure Active Directory to leverage domain joined machines in conditional access policies to O365 services.
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
This presentation will bring insights into how the Zero Trust framework can help organizations improve their cybersecurity posture and resilience and what the organizational challenges are.
Microsoft Windows Intune getting started guide dec 2012 releaseDavid J Rosenthal
Get the most out of Windows Intune.
This document is designed to help you evaluate the main features of Windows Intune and set up your new Windows Intune environment. To facilitate this process, this document uses an example configuration for a business called Adatum. Throughout this paper, you will see screenshots taken from this environment that illustrate how you can similarly configure your Windows Intune environment. Subsequently, you can implement the documented steps to create and customize your environment to meet your own business needs.
Identity & Access Management Project Challenges and RecoveryHanno Ekdahl
Presented by Hanno Ekdahl at ISACA Atlanta's #GeekWeek2017.
ISACA's 10th Annual Geek Week Conference in Atlanta, GA featured speakers across a wide range of security topics from Risk Management to Penetration Testing. During the conference, policy and technical tracks provided a forum for participants to exchange experiences from the front lines of IT security, including industry best practices as well as driving both accountability and effectiveness for security programs within the organization. The week-long event included plenary and panel sessions, practical workshops and technology demonstrations. This summary presents the key themes, ideas, and considerations that emerged from our Identity Management Presentation at the conference.
This Deck, gives you an overview of the zero trust security posture, considerations you should have while looking to adopt that posture, and the advantages of doing so.
A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end to end strategy.
Identities. Identities whether they represent people, services, or IOT devices define the Zero Trust control plane. When an identity attempts to access a resource, we need to verify that identity with strong authentication, ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices. Once an identity has been granted access to a resource, data can flow to a variety of different devices From IoT devices to smartphones, BYOD to partner managed devices, and on premises workloads to cloud hosted servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health and compliance for secure access.
Applications. Applications and APIs provide the interface by which data is consumed. They may be legacy on premises, lift and shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data. Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified, labeled, and encrypted, and access restricted based on those attributes.
Infrastructure. Infrastructure (whether on premises servers, cloud based VMs, containers, or micro services) represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks. All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe” controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deeper in network micro segmentation) and real time threat protection, end to end encryption, monitoring, and analytics should be employed.
Each of these six foundational elements serves as a source of the signal, a control plane for enforcement, and a critical resource to defend. You should appropriately spread your investments across each of these elements for maximum protection.
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
Define a mobile management strategy that fits the needs of your organization. Apply flexible mobile device and app management controls that let employees work with the devices and apps they choose while protecting your company information.
AppManagEvent: Application deployment across several devices with ConfigMgr 2...Peter Daalmans
Join Peter Daalmans and Kenneth van Surksum in this session where is demonstrated how to deploy 1 application to multiple Microsoft Windows, Android and Apple devices. Peter and Kenneth will explain the Configuration Manager application model, how to deploy an application and demonstrate the end-user experience. This session contains lot's of demos; anyone interested in deploying applications with System Center 2012 Configuration Manager will enjoy and learn more on application deployment.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
Microsoft has given us some amazing capabilities with the Microsoft Enterprise Mobility + Security (EM+S) suite to help protect both our information and our investments in Office 365. This collection of features gives you just about everything you need in the Microsoft Cloud for security, compliance and Information Protection. With such a vast array of services, tools and features, its often challenging to understand everything this product provides or how its layered on top of existing Office 365 security controls. In this session we’ll review the capabilities available to you in Microsoft EM+S, and you'll discover which ones may best fit with your security and compliance needs. Come and join us, as we also dive deep into some of the most useful Microsoft EM+ S tools.
Preparing your enteprise for Hybrid AD Join and Conditional AccessJason Condo
In the presentation learn what you need to do in AD FS, Active Directory, and Azure Active Directory to leverage domain joined machines in conditional access policies to O365 services.
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
This presentation will bring insights into how the Zero Trust framework can help organizations improve their cybersecurity posture and resilience and what the organizational challenges are.
Microsoft Windows Intune getting started guide dec 2012 releaseDavid J Rosenthal
Get the most out of Windows Intune.
This document is designed to help you evaluate the main features of Windows Intune and set up your new Windows Intune environment. To facilitate this process, this document uses an example configuration for a business called Adatum. Throughout this paper, you will see screenshots taken from this environment that illustrate how you can similarly configure your Windows Intune environment. Subsequently, you can implement the documented steps to create and customize your environment to meet your own business needs.
Identity & Access Management Project Challenges and RecoveryHanno Ekdahl
Presented by Hanno Ekdahl at ISACA Atlanta's #GeekWeek2017.
ISACA's 10th Annual Geek Week Conference in Atlanta, GA featured speakers across a wide range of security topics from Risk Management to Penetration Testing. During the conference, policy and technical tracks provided a forum for participants to exchange experiences from the front lines of IT security, including industry best practices as well as driving both accountability and effectiveness for security programs within the organization. The week-long event included plenary and panel sessions, practical workshops and technology demonstrations. This summary presents the key themes, ideas, and considerations that emerged from our Identity Management Presentation at the conference.
This Deck, gives you an overview of the zero trust security posture, considerations you should have while looking to adopt that posture, and the advantages of doing so.
A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end to end strategy.
Identities. Identities whether they represent people, services, or IOT devices define the Zero Trust control plane. When an identity attempts to access a resource, we need to verify that identity with strong authentication, ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices. Once an identity has been granted access to a resource, data can flow to a variety of different devices From IoT devices to smartphones, BYOD to partner managed devices, and on premises workloads to cloud hosted servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health and compliance for secure access.
Applications. Applications and APIs provide the interface by which data is consumed. They may be legacy on premises, lift and shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data. Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified, labeled, and encrypted, and access restricted based on those attributes.
Infrastructure. Infrastructure (whether on premises servers, cloud based VMs, containers, or micro services) represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks. All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe” controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deeper in network micro segmentation) and real time threat protection, end to end encryption, monitoring, and analytics should be employed.
Each of these six foundational elements serves as a source of the signal, a control plane for enforcement, and a critical resource to defend. You should appropriately spread your investments across each of these elements for maximum protection.
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
Define a mobile management strategy that fits the needs of your organization. Apply flexible mobile device and app management controls that let employees work with the devices and apps they choose while protecting your company information.
AppManagEvent: Application deployment across several devices with ConfigMgr 2...Peter Daalmans
Join Peter Daalmans and Kenneth van Surksum in this session where is demonstrated how to deploy 1 application to multiple Microsoft Windows, Android and Apple devices. Peter and Kenneth will explain the Configuration Manager application model, how to deploy an application and demonstrate the end-user experience. This session contains lot's of demos; anyone interested in deploying applications with System Center 2012 Configuration Manager will enjoy and learn more on application deployment.
As nonprofit organizations adopt cloud for basic productivity and database needs, the role of the"technology staff" must shift. Today, IT staff must engage with management and users to understand business needs and manage systems rather than hardware. We will discuss this changing role and how nonprofit leaders can prepare to successfully manage the new IT landscape, and the responsibility of managing data sources, understanding data integration and how this can affect the organization.
IBM i and Your IT Strategy - presentation by Trevor Perry, Fresche's IBM Champion at iBelieve 2016, November 3 in Paris. A presentation about the role of IBM i in your IT strategy.
In today's dynamic and constantly changing world, businesses must evolve quickly and become more agile to the changes around them. Outsourcing help desk services will save you money, enable service around-the-clock, and improve customer satisfaction levels while allowing you to focus on the things that matter most to your business.
Humana Case Study: Paradigm Shift in Reporting by Deploying Four OBIA Module...Emtec Inc.
The case study follows the approach and BI objectives of a Fortune 100 company implementing OBIA. Discover lessons learned, challenges, and managing users adaptability and expectations of the pre-built analytics modules of Human Resources, Financials, Procurement & Spend, Projects and eMoible. This will provide insight into deploying a cross functional project team for successful deployment across multiple organizational units and utilizing eMoible to support strategic decision making for leadership.
ODYA Technology operating in Istanbul-Turkey, develops boutique solutions which monitor the infrastructure systems ensuring high sustainability and service quality of information technologies within local and foreign corporations and government offices. More information on the company can be see @ www.odya.com.tr
Presented to SAIT ICT students on March 6th, 2013.
This presentation introduces Fortress Technology Planners as an employer of choice for IT professionals in the Calgary area. The presentation describes Fortress' Services, Values, Job Roles, and Vision.
The Managing a Great Career section discusses how the high rate of change in IT affects workers in the industry. The presentation explores several important strategies that workers can employ to enjoy a more successful and fulfilling career.
New bi-monthly webinar series offering updates from Windows experts from Ivanti, professional service providers, and your peers from companies like yours. This webinar will feature short, helpful sections including Insider preview, outside insights, migration magic, one best practice, and just ask Rex.
The world is quite a different place than it was six months ago, and with the 2020 holiday season fast approaching, the pressure is on to meet revenue goals in what’s been an uncertain year.
In August, we surveyed 154 marketing executives to find out what they think is likely to happen this holiday season and how they are preparing for it. The results are fascinating, and we’ve distilled them into clear actions you can take right now to adapt and prepare for a very different 2020 holiday season.
In this webinar, Eric Enge (Principal, Digital Marketing at Perficient) and Jim Hertzfeld (Chief Strategist, Digital at Perficient) discussed:
How marketers have already adapted and where they see the most opportunity moving forward
What will be different this holiday season and how to adjust your strategy accordingly
Ways to identify and meet changing customer expectations, wants, and needs
How to determine if your priorities or investments should change
What actions you can take right now to be successful
Transforming Pharmacovigilance Workflows with AI & Automation Perficient, Inc.
Medical information call centers have an opportunity to transform the way they capture, code, and analyze adverse events (AEs) and product quality complaints (PQCs) with artificial intelligence (AI) and automation.
The use of such innovative technology improves data quality and consistency, compliance, and operational efficiency. It helps reduce the frequency of your pharmacovigilance (PV) operations resources going home, saying, “I have more to do at the end of the day than I did when I started."
Our one-hour, on-demand webinar shows you how you can use AI and automation to turbo-charge your end-to-end PV system. Use cases and demonstrations will include:
Analyzing safety data
Auto-coding verbatim terms to official medical dictionary terms
Auto-creating an AE case in your database
Converting speech to text
The Secret to Acquiring and Retaining Customers in Financial ServicesPerficient, Inc.
Data, when leveraged effectively, can help you segment and target customers, analyze spending habits, and can create a personalized experience that builds value and customer loyalty.
Without a 360-degree view of your customers, you can’t properly target them with real-time personalized offers, advice, and other services. In addition, lack of customer intelligence creates lost opportunities for banks and insurers to cross-sell and upsell new products and services.
Our one-hour webinar covered how customer intelligence platforms can help you engage, acquire, and retain customers.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Perficient, Inc.
The only thing certain about forecasting in a volatile economy is that the future is unpredictable. Historically, organizations have effectively utilized statistical techniques for short-term business planning, but leveraging actuals no longer allows us to predict the future. The ability to be prepared, responsive, and agile under these conditions is becoming a crucial success factor. Oracle Strategic Modeling can help you better navigate change to cope with uncertainty.
If your CFO’s questions regarding earnings, liquidity, and cash flow are unceasing and far-reaching, watch our on-demand webinar for a deep dive into strategic modeling. We modeled real-world scenarios to show how you can:
Quickly and easily develop a hierarchical model of your business
Leverage multiple pre-built functions to forecast key performance drivers
Provide transparency on forecasted financials via audit trail
Utilize goal seek to set financial targets and estimate the financials drivers necessary to achieve it
Perform sophisticated “what-if” analysis via simulations to improve the accuracy of your forecast
Use built-in dashboard functionality to deliver powerful reporting capabilities
While many stay-at-home orders have been lifted, consumers’ new digital buying behaviors and habits are here to stay. Watch our panel discussion on the accelerated need for commerce and learn how commerce and content can transform our digital economy.
Topics include:
-What is the “experience economy” and how do you leverage it? -If you move beyond product and price, what’s next?
-How business models have shifted and what you can do to break down silos and leverage new processes to capture the digital dollar.
-How organizations have built agile teams to address the ever-changing needs of customers, including responsive approaches that address the omnichannel consumer.
-Technologies that are best suited to enable your business and customers – and how headless commerce has changed the game.
-How the future of commerce is changing, and what you should do now to prepare.
Our panel features Jordan Jewell, IDC Research analyst known for his insight into the commerce industry. Joining him from Perficient is general manager Brian Beckham, who brings deep expertise in content management and empowering organizations in their digital transformations. Rounding out the panel is Episerver’s Joey Moore, who has spent the last decade helping organizations across the globe advance their digital maturity.
Centene's Financial Transformation Journey: A OneStream Success StoryPerficient, Inc.
Centene, a large multi-line managed care organization, was looking to modernize and streamline its corporate performance management (CPM) applications.
Centene had to move data between platforms multiple times during the close process so that close data could be fully consolidated and made available for reporting. This process had numerous challenges and inefficiencies that Centene wished to improve upon so that they could provide a more streamlined and more transparent process to the functional teams that leverage consolidated financials in their systems for reporting and analysis.
Centene chose OneStream XF for global and US consolidations, currency conversion, eliminations, and ownership percentage.
Michael Vannoni, director, financial systems solutions discussed the migration to OneStream XF including:
-Factors leading to the selection of OneStream XF
-Details of the solution design
-Benefits realized with global consolidation implementation
-Future planned enhancements
WHODrug Koda, developed by Uppsala Monitoring Centre (UMC), is an automated coding service, which uses artificial intelligence (AI) to automate the coding of drug names and ATC selections, improving consistency and operational efficiency. It can also be used to accelerate dictionary upgrades, including the transition from WHODrug B2 format to B3.
Through API (Application Programming Interface) web services, the coding engine can be integrated with custom or off-the-shelf drug safety, medical coding, or data management systems.
In this webinar, Perficient and UMC discussed WHODrug Koda and how you can integrate it into your medical coding activities.
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPerficient, Inc.
There are multiple reasons why companies migrate to a new clinical trial management system (CTMS). Still, the two most common are mergers and acquisitions (i.e., CTMS consolidation) and the desire to switch CTMS vendors. Regardless of the reason, many of the best practices, processes, and tools are the same.
In this webinar, we looked at the migration approaches taken across several case studies. You’ll come away with an understanding of:
Pros and cons of each CTMS migration method
Types of migration tools, including APIs, ETL tools, and adapters
Approximate timelines and costs associated with each migration method
The topics discussed in this webinar can be applied to any CTMS migration project, whether you’re moving to or from Oracle’s Siebel CTMS, Medidata’s Rave CTMS, and Veeva’s Vault CTMS.
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Perficient, Inc.
The pandemic has ushered in a new normal for manufacturers, and the impact of digital communication is more important than ever.
View our on-demand webinar with Tony Kratovil, Regional Vice President of Manufacturing at Salesforce, and Eric Dukart, National Sales Executive at Perficient. They covered why the right digital strategies are critical for manufacturers in the wake of COVID-19.
Our webinar covered:
Current challenges with forecasting, collaboration, and disruptions to distribution networks.
Insights for stabilizing operations, accelerating partner management, and developing a digital strategy that differentiates your business.
Candid Q&A with real-world examples.
New Work.com resources to help manufacturers restart safely and rebuild.
Tools and resources to move forward – fast.
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinPerficient, Inc.
Things move quickly in marketing. How do you identify what your customers need and how you can help? Now more than ever, audience intelligence is the key.
Audience intelligence is about understanding your target customers, their needs, what resonates with them, and how you can reach them. Eric Enge (Digital Marketing Principal, Perficient) and Rand Fishkin (Co-Founder & CEO, SparkToro) discussed this topic live on May 7, 2020. Watch to hear tactics for gaining a better understanding of your customers, how to use audience intelligence to optimize your marketing now, and more.
Cardtronics, the global leader in ATM deployment and management, decided to retire its on-premises Hyperion solution to gain the operational efficiencies, features, and functionality provided by a best-in-class cloud solution.
Cardtronics chose Oracle EPM Cloud including Financial Consolidation and Close, Planning, Management Reporting, Account Reconciliation, Enterprise Data Management, as well as Oracle Analytics Cloud.
In this video, project owner Richard Ng, director, financial systems, Cardtronics, discusses the migration to Oracle EPM Cloud including:
Multi-release 18-month deployment schedule across multiple countries
Benefits of a global Chart of Accounts for ERP and EPM
Seamless integration across ERP Cloud, HCM Cloud, and EPM Cloud
Preparing for Project Cortex and the Future of Knowledge ManagementPerficient, Inc.
Microsoft has turned traditional enterprise content management on its head with its recent announcement of Project Cortex.
Project Cortex uses advanced artificial intelligence to harness collective knowledge from across the enterprise and automatically organize it into shared topics like projects, products, processes, and customers. Using AI, Cortex creates a knowledge network based on relationships among topics, content, and people and delivers it in the apps you use every day – Office, Outlook, and Teams.
This webinar examined Project Cortex in more detail, including:
• What is Project Cortex?
• Why is Project Cortex different than other knowledge network projects previously introduced?
• How does incorporating AI and automation change the game?
• What is possible with Project Cortex?
• What can you do to prepare?
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
With an increasingly mobile workforce, and the spread of shadow IT, the rapid rise of cybercrime - companies must find unique ways to effectively manage their sprawling SaaS portfolio.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. Perficient is a leading information technology consulting firm serving clients
throughout North America.
We help clients implement business-driven technology solutions that integrate
business processes, improve worker productivity, increase customer loyalty and create
a more agile enterprise to better respond to new business opportunities.
About Perficient
3. • Founded in 1997
• Public, NASDAQ: PRFT
• 2012 revenue of $327 million
• Major market locations throughout North America
• Atlanta, Boston, Charlotte, Chicago, Cincinnati, Cleveland, Columbus, Dallas, Denver, Detroit, Fai
rfax, Houston, Indianapolis, Minneapolis, New Orleans, New York, Northern
California, Philadelphia, Southern California, St. Louis, Toronto and Washington, DC
• Global delivery centers in China, Europe and India
• ~2,000 colleagues
• Dedicated solution practices
• ~85% repeat business rate
• Alliance partnerships with major technology vendors
• Multiple vendor/industry technology and growth awards
Perficient Profile
4. Business Solutions
• Business Intelligence
• Business Process Management
• Customer Experience and CRM
• Enterprise Performance Management
• Enterprise Resource Planning
• Experience Design (XD)
• Management Consulting
Technology Solutions
• Business Integration/SOA
• Cloud Services
• Commerce
• Content Management
• Custom Application Development
• Education
• Information Management
• Mobile Platforms
• Platform Integration
• Portal & Social
Our Solutions Expertise
7. Our Speaker
Steve Andrews, Sr. Solutions Architect-Consulting Manager and
Microsoft vTSP
• Assists organizations focusing on cloud by creating, managing, and
monitoring systems - data center automation and optimization
• Specializes in System Center 2012 products
• On product development panels for many Microsoft Server products
and enables a true vision of simplicity through clean clear infrastructure
9. • Employees are spread out in many
physical locations
• Many configuration types on their devices
and licensing concerns
• Security can be compromised on these
unmanaged devices
• Popularity of user owned devices is
gaining in the corporate environment
• Traditionally high infrastructure costs to
mange these mixed devices
• There is no control of application
deployment on these devices
Current State
Remote Workers? Multiple Device Types?
Employees bringing their own devices to work…
11. BYOD Devices Supported by Intune
Supported Operating Systems & Devices
Windows
• Windows XP Professions SP3+
• Windows Vista Enterprise, Ultimate &
Business
• Windows 7 Enterprise, Ultimate &
Professional
• Windows 8 Enterprise & Professional
Mobile
• Windows Phone 8
• iOS 5.0 +
• Android 2.3.4 +
• [BlackBerry not supported]
Intune with System Center 2012
• Windows 8/RT
• Mac OS
• Linux
• Windows Servers
14. • Enables very flexible work styles –quickly
secures and manages PC’s anywhere
• Complements System Center
Configuration Manager 2012 SP1
• Latest in Windows experience
• Very rapid release cycles
• Simple central administration
The Windows Intune Vision
22. Drive Business Efficiencies
• Super-low infrastructure overhead
• Reduce maintenance costs
• Automatic updates to cloud service
• Back-end integration with Office 365
• Instant insight into your PC
environment
• 5 devices per user
• Straightforward predictable billing –
per user
Look around at the devices out on peoples desk where you are….you’ll see such varietyNo longer one user to one desktopJust a year or so ago power users had between 5 and 7 internet connected devices, that’s probably even more todayBy 2016 shipped smart connected devices is forecasted to be 1.84 billion[ADDRESS BULLET POINTS]
What is Windows Intune - Windows Intune combines both cloud and on-premises capabilities to fit your PC and mobile device management needs. Manage your BYOD environment through the cloud, or extend your existing on-premises solution by integrating Windows Intune with System Center Configuration Manager. [TALK THROUGH SUPPORTED DEVICES]
Let’s see how Intune cloud service works – from a high level[WALK THROUGH BULLETS]
Empower users to work from anywhere, anytime with any device using the tools they needIT can deliver simplified enterprise-class managed with lower costs and higher productivityGive users a modern OS experience which leads to greater productivity, better security and mobility benefitsWindows Intune provides customers with continuous improvements and new features without costly deployments
Help Protect PCs from malware with centralized protection built on the Microsoft Malware Protection Engine. This leverages the same trusted technologies as Forefront Endpoint Protection and Microsoft Security Essentials. Centrally manage the deployment of updates to Microsoft® and now, most third-party software, keeping the applications your workers need currentDistribute software: Deploy most software like Microsoft Office or third-party applications, to PC located nearly anywhere.You don’t need to have a server infrastructure or physically touch each PC to install the software or update. Proactively monitor PCs: Receive alerts on updates, threats, offline PCs and more so that you can proactively identify and resolve problems with your PCs virtually anywhere This helps IT pros be as proactive as they would like about potential issues and provides them early insight into the magnitude of the issue. Track hardware and software inventory to help customers in IT planning and asset management purposes. With remote assistance included,IT can deliver remote management and protection to keep both IT and end-users productive from virtually anywhere. IT can now remotely perform the following tasks on Windows Intune managed PCs from the administration console - Full scan, Quick scan, Restart, Update Malware Definitions. Manage your licenses: Manage Microsoft Volume License Agreements and other license agreements - such as Microsoft retail and OEM licenses, as well as third party software - to track how many licenses you’ve purchased against what you’ve installed. Increase insight with reporting: Generate and save reports on updates, software, hardware, and licenses. Export data as a comma separated value file and import it directly into Microsoft Excel® for further analysis. With the new hardware filters, you can create detailed hardware reports. Across all report types, you can now save report parameters, making it easy to run a specific report again in the future if your environment has changed. Upload EA agreements and keep track this way also.Set security policies. Centrally manage update, firewall, and malware protection settings across all PCs, even on remote machines outside the corporate network.
Talking about mobile devices for a moment, from both IT and User sideITIntune allows policies to be set that secure mobile devices – passwords etc.IT can target applications to user profiles – sideloadUsersUsers can bring their own choice of mobile device into the workplaceUsers can access targeted applications through the Intune self service portal
[EXAMPLE OF THE SELF SERVICE PORTAL]Users can go login to the self service portal and choose applications (made available to them), and install User can see the devices they have connected (up to the 5 limit per user) and administer themApplications can be deployed manually, by going self service – or scheduled by the Intune administrator
This benefit comes without the overhead associated with deploying and maintainingon-site PC management servers and software By standardizing your PC environment on the latest operating system and providing all your Intune-managed PCs with needed updates, you can reduce management complexity and give customers the most current and up to date PC experience With more accurate, immediate insight to the health of Windows Intune managed -PCs, it’s less likely for major issues to go unnoticedEach new update builds upon the prior version making it seamless for existing customer to always get the latest features. Lastly, the Windows Intune suite is available for a monthly per user fee, reducing high upfront cost barriers and offering simple, predictable monthly billing. As long as your subscription is active, you’ll always be up to date and current with new features or updates to both the cloud service and the Windows operating system In arecent study from IDC in which Windows Intune testers were surveyed, research showed that businesses using Windows Intune can save nearly $700 annually per PC through improvements in IT and user productivity.