Spellpoint presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. How Customer IAM (CIAM) principles and technology can be applied to identities for microservices to provide authentication and authorization of APIs.
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
Aditro - IAM as part of Cloud Business strategyUbisecure
Identity & Access Management (IAM) as a part of Cloud Business strategy and information security - Aditro presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
eIDAS - Mobile Connect Pilot: How To Combine Cross-border eID Recognition With Convenience For Users And Online Services. GSMA presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018
Inside Security - Strong Authentication with SmartphonesUbisecure
Strong Authentication with Smartphones - Convenience, capabilities, compliance. Inside Security presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. The Global Growth of Digital Identity - cases studies on Digital Identity in the UK, Open Banking and The Passenger Journey.
Telia - The New Norm of the Digital WorldUbisecure
Telia presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. How Telia is helping make internationally federated identities the new norm, and how Telia’s ID service (an authentication provider brokering service) replaces the need for Service Providers to manage a dozen separate authentication provider contracts and integrations with one single brokering platform.
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
At HIMSS 2015 Kantara Initiative will focus on the User Managed Access (UMA) initiative with a networking breakfast held on April 15th sponsored by ForgeRock and MedAllies. More information about HIMSS15 and registration.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
Aditro - IAM as part of Cloud Business strategyUbisecure
Identity & Access Management (IAM) as a part of Cloud Business strategy and information security - Aditro presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
eIDAS - Mobile Connect Pilot: How To Combine Cross-border eID Recognition With Convenience For Users And Online Services. GSMA presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018
Inside Security - Strong Authentication with SmartphonesUbisecure
Strong Authentication with Smartphones - Convenience, capabilities, compliance. Inside Security presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. The Global Growth of Digital Identity - cases studies on Digital Identity in the UK, Open Banking and The Passenger Journey.
Telia - The New Norm of the Digital WorldUbisecure
Telia presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. How Telia is helping make internationally federated identities the new norm, and how Telia’s ID service (an authentication provider brokering service) replaces the need for Service Providers to manage a dozen separate authentication provider contracts and integrations with one single brokering platform.
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
At HIMSS 2015 Kantara Initiative will focus on the User Managed Access (UMA) initiative with a networking breakfast held on April 15th sponsored by ForgeRock and MedAllies. More information about HIMSS15 and registration.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
As European financial institutions work towards compliance with PSD2, there's an intense focus on securing customer data as it's opened up to third parties. Essential requirements around securing APIs to enable direct payments and account aggregation are accompanied by increased regulations for strong customer authentication. Financial institutions are looking to improve their management of digital identities to ensure customer data remains private.
Not only can a modern digital identity platform help companies with API security and authentication requirements, it can also drive innovation in areas like consent management, with dashboards that allow customers to control their personal data at a granular level. Banks can embed identity into their digital platforms in order to use PSD2 as a strategic opportunity to build trusted relationships with their customers.
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
Eve Maler, VP Innovation & Emerging Technology, ForgeRock:
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and people
have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are
recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. The
User-Managed Access (UMA) standard and ForgeRock’s OpenUMA project are stepping into the
breach to give individuals a convenient central hub for proactively authorizing who and what can get
access to their personal data and content.
Patents are a good information resource for obtaining the state of the art of blockchain based decentralized identifier (DID) technology innovation insights.
I. DID Technology Innovation Status
Patents that specifically describe the major blockchain applications for DID are a good indicator of the DID innovations in a specific innovation entity. To find DID technology innovation status, patent applications in the USPTO as of June 15, 2020 that specifically describe the major blockchain applications for DID are searched and reviewed. 29 published patent applications that are related to the key DID technology innovation are selected for detail analysis.
II. DID Technology Innovation Details
Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
DID Management System/ US20200145209 (Alibaba Group)
DID Exchange/US20200044848 (IBM)
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
Identity Relationship Management is about facing customers over the internet using Identity as an enabler to bring value to every interaction with customers and citizens,
Identity is not only for humans, it applies also to things, devices, mobile phones, applications, etc.
Identity is a key enabler to achieve the Digital Transformation
Smart City Lecture 1: How to build a Smart CityPeter Waher
The Smart City series of lectures span the fundamental ideas, visions and the technologies related to the development of services for the Smart City (or Society) and the Internet of Things.
Before building a Smart City, we must agree on what a Smart City is, or could be. This lecture presents a concrete vision for what a Smart City is. We will work through some immediate conclusions. This will help us define some basic requirements on architecture and infrastructure, vital to create a scalable and resilient Smart City. With a focus on decentralized and federated architectures, new standardization efforts are presented that provide a basis for interoperability in the Smart City.
How do you ensure identity and safeguard privacy when the primary communication channel between you and the other party is through mobile apps? Kris explains how itsme makes it easier for anyone with a mobile phone and a Belgian eID to digitally log in, register, confirm transactions and even sign documents.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
Presented at APIdays Paris.
API security is the principal concern when it comes to establishing a trusted API ecosystem. Rightly so, because opening up business systems through APIs by definition expands the attack surface that can be exploited. Although many threat vectors and vulnerabilities are well known, we have to remain on the lookout for new threats continuously.
On the positive side, open standards that help defend against security threats are constantly being created and refined. What is even more helpful are the specifications that aggregate relevant standards into a comprehensive API security profile. Excellent examples of these are the current specifications that support open banking initiatives like UK Open Banking and PSD2. Could these specifications not have a wider applicability? In other words, would we be able to benefit from the security guidelines captured in these specifications in other verticals like logistics, retail, energy, healthcare and government, too?
In this talk, we will compare security guidelines covered in the specifications and see to what extent they may benefit the wider enterprise API developer community.
In this slide deck, WSO2 CEO Tyler Jewell explores the evolution of the integration market and how integration technologies have underpinned digital transformation.
WSO2Con Talk: https://wso2.com/library/conference/2018/07/wso2con-usa-2018-integration-is-sexy/
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
As European financial institutions work towards compliance with PSD2, there's an intense focus on securing customer data as it's opened up to third parties. Essential requirements around securing APIs to enable direct payments and account aggregation are accompanied by increased regulations for strong customer authentication. Financial institutions are looking to improve their management of digital identities to ensure customer data remains private.
Not only can a modern digital identity platform help companies with API security and authentication requirements, it can also drive innovation in areas like consent management, with dashboards that allow customers to control their personal data at a granular level. Banks can embed identity into their digital platforms in order to use PSD2 as a strategic opportunity to build trusted relationships with their customers.
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
Eve Maler, VP Innovation & Emerging Technology, ForgeRock:
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and people
have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are
recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. The
User-Managed Access (UMA) standard and ForgeRock’s OpenUMA project are stepping into the
breach to give individuals a convenient central hub for proactively authorizing who and what can get
access to their personal data and content.
Patents are a good information resource for obtaining the state of the art of blockchain based decentralized identifier (DID) technology innovation insights.
I. DID Technology Innovation Status
Patents that specifically describe the major blockchain applications for DID are a good indicator of the DID innovations in a specific innovation entity. To find DID technology innovation status, patent applications in the USPTO as of June 15, 2020 that specifically describe the major blockchain applications for DID are searched and reviewed. 29 published patent applications that are related to the key DID technology innovation are selected for detail analysis.
II. DID Technology Innovation Details
Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
DID Management System/ US20200145209 (Alibaba Group)
DID Exchange/US20200044848 (IBM)
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
Identity Relationship Management is about facing customers over the internet using Identity as an enabler to bring value to every interaction with customers and citizens,
Identity is not only for humans, it applies also to things, devices, mobile phones, applications, etc.
Identity is a key enabler to achieve the Digital Transformation
Smart City Lecture 1: How to build a Smart CityPeter Waher
The Smart City series of lectures span the fundamental ideas, visions and the technologies related to the development of services for the Smart City (or Society) and the Internet of Things.
Before building a Smart City, we must agree on what a Smart City is, or could be. This lecture presents a concrete vision for what a Smart City is. We will work through some immediate conclusions. This will help us define some basic requirements on architecture and infrastructure, vital to create a scalable and resilient Smart City. With a focus on decentralized and federated architectures, new standardization efforts are presented that provide a basis for interoperability in the Smart City.
How do you ensure identity and safeguard privacy when the primary communication channel between you and the other party is through mobile apps? Kris explains how itsme makes it easier for anyone with a mobile phone and a Belgian eID to digitally log in, register, confirm transactions and even sign documents.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
Presented at APIdays Paris.
API security is the principal concern when it comes to establishing a trusted API ecosystem. Rightly so, because opening up business systems through APIs by definition expands the attack surface that can be exploited. Although many threat vectors and vulnerabilities are well known, we have to remain on the lookout for new threats continuously.
On the positive side, open standards that help defend against security threats are constantly being created and refined. What is even more helpful are the specifications that aggregate relevant standards into a comprehensive API security profile. Excellent examples of these are the current specifications that support open banking initiatives like UK Open Banking and PSD2. Could these specifications not have a wider applicability? In other words, would we be able to benefit from the security guidelines captured in these specifications in other verticals like logistics, retail, energy, healthcare and government, too?
In this talk, we will compare security guidelines covered in the specifications and see to what extent they may benefit the wider enterprise API developer community.
In this slide deck, WSO2 CEO Tyler Jewell explores the evolution of the integration market and how integration technologies have underpinned digital transformation.
WSO2Con Talk: https://wso2.com/library/conference/2018/07/wso2con-usa-2018-integration-is-sexy/
Tyler will explore the evolution of the integration market and how integration technologies have underpinned digital transformation.
Learn more: https://wso2.com/library/conference/2018/08/wso2con-asia-2018-integration-is-sexy/
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
Find here the slides of the presentation on Sentinet, given by Massimo Crippa (Codit) on the BTUG Event of 13th of October 2015.
Sentinet has recently introduced the support for the OAuth and OpenID Connect protocols.
In this presentation you will see the supported authentication flows, how to secure a regular BizTalk SOAP and REST service with OAuth 2.0 and how to call an OAuth-protected API from BizTalk with no coding or any changes in the existing application.
INTERFACE, by apidays - Knowledge Workers of the World Unite.pdfapidays
INTERFACE, by apidays - APIs: the next 10 years
June 8, 9 & 10 2022
Knowledge workers of the world, unite! Low-code/no-code and the future of digital business
Matt Mclarty, Global Field CTO & VP at MuleSoft
------------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Deep dive into the API industry with our reports:
https://www.apidays.global/industry-reports/
Subscribe to our global newsletter:
https://apidays.typeform.com/to/i1MPEW
RESTful APIs,SOAP APIs, Proprietary APIs, protocols beyond APIs, OAuth for Authentication, Federated Authorization Servers across security domains, Token Translation between SAML and JWT, SSO across native applications, all running across Windows desktops and Android mobile computing platforms…and the glue to tie all that together? Are you kidding? A technical chat on a real-life case study of a small but dedicated band of engineers’ attempts to harmonize identity in a very un-harmonized world.
AI Microservices APIs and Business Automation as a Service Denis GagneDenis Gagné
My presentation at the BBC2019 conference.
While the current AI fascination is fueled by Machine Learning, the architecture and application landscape is being redesigned around Microservices and APIs. These technologies are combining forces to affect many facets of business, creating a paradigm shift all around you. Do you know how to take advantage of the tsunami created by these technologies?
In this session, we will explain these technologies and how to extract business value from them. We will demonstrate how line of business people can integrate machine learning into business decisions that are explainable, auditable, and traceable and how they can easily assemble business automations that orchestrate a series of microservices via modern API platforms. With this knowledge in hand, you will be ready to face the next wave of technologies that are hitting your organization.
[WSO2 Summit Brazil 2018] The API-driven WorldWSO2
Paul discusses how APIs are touching every facet of our society and the underlying trends that are going to generate nearly 1 billion APIs in the coming years.
Oracle Code Beijing/Sydney APIM & Microservices: A Match Made in HeavenCapgemini
Luis Weir was the speaker at the Oracle Code 2017 events at Beijing and Sydney. He spoke on API Management & Microservices - A Match Made in Heaven.
API management delivers the processes and platforms required to implement enterprise-grade APIs but also manage the communities around it including:
· Planning
· Design
· Implementation
· Publication
· Operation
· Consumption
· Maintenance
· Retirement
Whereas the Microservices architecture is an architectural style that structures an application as a set of loosely coupled, services organized around business capabilities” - Chris Richardson.
Learn how Capgemini can help enhance your business using Oracle’s API & Microservices platform and processes.
Legacy monitoring and troubleshooting tools can limit visibility and control over your infrastructure and applications. Organizations must find monitoring and troubleshooting tools that can scale with the volume, variety and velocity of data generated by today’s complex applications in order to keep pace with business demands. Our upcoming webinar will discuss how Sumo Logic helped Scripps Networks harness cloud-native machine data analytics to improve application quality and reliability on AWS. Sumo Logic allows IT operations teams to visualize and monitor workloads in real-time, identify issues and expedite root-cause analysis across the AWS environment.
Join us to learn:
• How to migrate from traditional on-premises data centers to AWS with confidence
• How to improve the monitoring and troubleshooting of modern applications
• How Scripps Networks, a leading content developer, used Sumo Logic to optimize their transition to AWS
Who should attend: Developers, DevOps Director/Manager, IT Operations Director/Manager, Director of Cloud/Infrastructure, VP of Engineering
Digital Transformation and Innovation on http://denreymer.com
- Merging the Real World and the Virtual World
- Intelligence Everywhere
- The New IT Reality Emerges
http://www.gartner.com//it/content/2940400/2940420/january_15_top_10_technology_trends_2015_dcearley.pdf
Oracle Code Capgemini: API management & microservices a match made in heavenluisw19
Oracle Code London presentation by Capgemini Luis Weir and Phil Wilkins. Talking about API management relation to microservices, evolution of API gateways and why should developers care about APIs
Advanced Event Broker: what are they, and when should you use one?Solace
Phil Scanlon, VP of Sales Engineering, Asia Pacific & Japan at Solace, explained at Gartner AADI Sydney what an advanced Event Broker really is, and how using one can benefit you.
Looking to learn more? Watch the webinar here: http://bit.ly/2Ml0LF0
APIsecure - April 6 & 7, 2022
APIsecure is the world’s first conference dedicated to API threat management; bringing together breakers, defenders, and solutions in API security.
Harnessing the Speed of Innovation
Jyoti Bansal, CEO & Founder at Traceable
Using externally verified strong identities can reduce the risk of fraud and improve the customer experience in registering and engaging with your services.
Streamline customer registration, login and engagement with your applications and services by supporting bring-your-own social and business network identity credentials.
The world of Identity and Access Management is ruled by two things, acronyms and standards. In our hugely popular blog post on SAML vs OAuth we compared the two most common authorization protocols – SAML2 and OAuth 2.0. This white paper extends that comparison with the inclusion of a third protocol, OpenID Connect. We also touch on the now obsolete OpenID 2.0 protocol.
APIs are now the standard entry point to the majority of newly created ‘back-end’ functionality. These APIs exist to provide not only a standardized, structured way to access the required features or functions, but also to act as ‘gatekeepers’, ensuring appropriate security, auditing, accounting etc. Security is always underpinned by identity and as such, APIs need to know if not who is accessing them, what is the context in which they are being accessed.
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
Internal or enterprise IAM solutions are driven by the HR systems and concentrate on provisioning. Customer IAM solutions provide flexibility and features that facilitate the management of external users. CIAM is a tool to increase capture & conversion, reduce cost, improve the customer experience and journey.
An Introduction to Authentication for ApplicationsUbisecure
This whitepaper is an ideal introduction on authentication categories and their suitability to different requirements. Recommended reading to anyone who wants to get more familiar with online authentication.
Mobile Connect, an initiative by GSMA, has the potential to change online authentication and how we consume online services, on a global basis. This presentation will explain what Mobile Connect is, how it can benefit your organisation and the end users.
General Data Protection Regulation & Customer IAMUbisecure
The “General Data Protection & Customer IAM” white paper outlines the legal premise of the GDPR, and then delves into the specific parts where Customer Identity and Access Management solutions can help your organisation.
SSH presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. How cloud characteristics and the rules of the game have changed for cloud services. Monolith Architecture to Microservices Architecture. Production Updates go from 2/year to 100/day. Roles change from 2 to 10s.
FICORA - Building a Trust Network on Strong IdentificationUbisecure
Building a Trust Network on Strong Identification - Finnish Communications Regulatory Authority (FICORA) presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Microservice has no finger to type with
Securing Access for the non-interactive
24.5.2018 Tero Pasanen, Senior IAM Architect
3. Identity and Access Management (IAM)…
…is needed because all data cannot be available to everyone.
So how to grant and enforce right accesses efficiently
…and how to ensure security.
4. …this holds true for the more traditional software ecosystem, but what
about the modern, agile, API based architectures?
8. So are we lost in digital transformation?
It’s API, it’s all open to
everyone
Someone will take care of
it, we’ll have an API for
that
Where do you get the
data for the access
control API?
Someone will take care of
it, we’ll have an API for that
13. There are more attack surfaces in the microservices world
14. So we need to authenticate and authorize
Authenticate source and target
API’s
To ensure data confidentiality and
integrity
Authorize end-user actions
.. in the way-way back-end systems
18. Take away
With microservices we still have an end-point - service URL - to protect. Lo-and-
behold - that is just what customer IAM SSO services do.
Be efficient utilizing light weight protocols like OpenID Connect for
authentication and OAuth for authorization.
And provide access to legacy applications using the already established
controls.