The presentation I gave at SyScan 10 Singapore on Private Cloud Security in integral form excluding the exploit videos, outlining the security deltas between "classical" virtualization and private cloud security.
CloudSec , don't forget Security in the Cloud !Kris Buytaert
Cloud computing refers to using internet-based computer resources and relies on trends like software as a service and web 2.0. There are different types of cloud including software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Deploying in an untrusted cloud domain presents security challenges that are different from traditional IT environments due to the dynamic scaling and virtualization of resources. Security in the cloud requires approaches like encryption, firewalls, access control, and not storing critical data in the cloud.
Virtualization allows multiple operating systems and applications to run on a single physical machine by dividing the resources of the physical machine. The document discusses the history and types of virtualization including full virtualization, hardware assisted virtualization, and software virtualization. It also covers the evolution of computing from clusters to grids to clouds and some popular cloud services from Amazon including EC2 and S3. The conclusion is that a cloud can be defined differently depending on one's perspective.
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...Corley S.r.l.
This document summarizes steps for deploying and scaling a web application across cloud infrastructure using automation tools. Key steps include:
1. Defining profiles for database, cache, web, and proxy layers using Salt Cloud to provision resources across different cloud providers and regions.
2. Configuring Salt states to deploy and configure applications and middleware like MySQL, Memcached, Nginx on the provisioned instances.
3. Implementing load balancing and high availability by distributing sessions, database queries, and HTTP requests across the instances using tools like Memcached, MySQL replication, and Nginx proxy.
4. Automating the infrastructure deployment and configuration using configuration management with Salt to enable scalability.
The document discusses some of the main security concerns with cloud computing, including data privacy, security, and issues of trust. It suggests adopting a layered security approach, using encryption, strong authentication methods, and choosing reputable cloud providers. While cloud computing security risks exist, the document argues providers have incentives to maintain good security practices and outlines some typical security processes providers have in place. It recommends a gradual approach to cloud adoption starting with non-critical systems.
Cloud computing refers to applications and services delivered over the internet. There are three main types of cloud offerings: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Private clouds run on internal infrastructure behind a company's firewall while public clouds exist outside on external infrastructure. Ubuntu Enterprise Cloud (UEC) allows companies to build private clouds using their own infrastructure that match the API of Amazon EC2, the standard for public clouds. Future releases of UEC aim to improve integration with management tools and provide increased portability between internal and external cloud environments.
This document discusses security in cloud computing environments. It recommends implementing security through layered protections including physically secure and redundant infrastructure, encrypted and separately networked storage, firewalls, intrusion detection systems, secure connectivity, and access management. The document emphasizes that people remain the weakest link and stresses developing securely with care and management. It advocates a layered approach with physical, technical, and procedural security controls to prevent cloud environments from being compromised.
nCrypted Cloud is an application that provides privacy, security and collaboration features for files stored in the cloud. It uses AES 256-bit encryption to securely encrypt files stored on cloud services like Dropbox, Google Drive, OneDrive, Box and Egnyte. nCrypted Cloud manages the encryption keys while the cloud providers store the encrypted files, so that the cloud providers do not have access to the files' contents. It allows users to securely share files, track file access activity, and revoke access to shared files on all platforms. The application was founded by Nick Stamos and is compatible across devices.
CloudSec , don't forget Security in the Cloud !Kris Buytaert
Cloud computing refers to using internet-based computer resources and relies on trends like software as a service and web 2.0. There are different types of cloud including software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Deploying in an untrusted cloud domain presents security challenges that are different from traditional IT environments due to the dynamic scaling and virtualization of resources. Security in the cloud requires approaches like encryption, firewalls, access control, and not storing critical data in the cloud.
Virtualization allows multiple operating systems and applications to run on a single physical machine by dividing the resources of the physical machine. The document discusses the history and types of virtualization including full virtualization, hardware assisted virtualization, and software virtualization. It also covers the evolution of computing from clusters to grids to clouds and some popular cloud services from Amazon including EC2 and S3. The conclusion is that a cloud can be defined differently depending on one's perspective.
Cloud party 2014 - Deploy your infrastructure with Saltstack - Salt Cloud wit...Corley S.r.l.
This document summarizes steps for deploying and scaling a web application across cloud infrastructure using automation tools. Key steps include:
1. Defining profiles for database, cache, web, and proxy layers using Salt Cloud to provision resources across different cloud providers and regions.
2. Configuring Salt states to deploy and configure applications and middleware like MySQL, Memcached, Nginx on the provisioned instances.
3. Implementing load balancing and high availability by distributing sessions, database queries, and HTTP requests across the instances using tools like Memcached, MySQL replication, and Nginx proxy.
4. Automating the infrastructure deployment and configuration using configuration management with Salt to enable scalability.
The document discusses some of the main security concerns with cloud computing, including data privacy, security, and issues of trust. It suggests adopting a layered security approach, using encryption, strong authentication methods, and choosing reputable cloud providers. While cloud computing security risks exist, the document argues providers have incentives to maintain good security practices and outlines some typical security processes providers have in place. It recommends a gradual approach to cloud adoption starting with non-critical systems.
Cloud computing refers to applications and services delivered over the internet. There are three main types of cloud offerings: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Private clouds run on internal infrastructure behind a company's firewall while public clouds exist outside on external infrastructure. Ubuntu Enterprise Cloud (UEC) allows companies to build private clouds using their own infrastructure that match the API of Amazon EC2, the standard for public clouds. Future releases of UEC aim to improve integration with management tools and provide increased portability between internal and external cloud environments.
This document discusses security in cloud computing environments. It recommends implementing security through layered protections including physically secure and redundant infrastructure, encrypted and separately networked storage, firewalls, intrusion detection systems, secure connectivity, and access management. The document emphasizes that people remain the weakest link and stresses developing securely with care and management. It advocates a layered approach with physical, technical, and procedural security controls to prevent cloud environments from being compromised.
nCrypted Cloud is an application that provides privacy, security and collaboration features for files stored in the cloud. It uses AES 256-bit encryption to securely encrypt files stored on cloud services like Dropbox, Google Drive, OneDrive, Box and Egnyte. nCrypted Cloud manages the encryption keys while the cloud providers store the encrypted files, so that the cloud providers do not have access to the files' contents. It allows users to securely share files, track file access activity, and revoke access to shared files on all platforms. The application was founded by Nick Stamos and is compatible across devices.
This document discusses setting up a home internet of things (IoT) system securely. It recommends creating a guest network using the existing router to separate internet access for 3 laptops, 1 gaming system, and a home security system. While subnetting could further separate the connections, it is not needed for this small home network. The document provides instructions for testing the connections by pinging addresses and recommendations for basic security measures like changing default passwords and using WPA2-PSK encryption.
This document discusses cloud computing, including its history and key concepts. It defines cloud computing as on-demand services and solutions delivered over the internet on a pay-per-use basis. The document outlines the benefits of cloud computing like scalability, ubiquity, and cost savings. It also describes different deployment models like public and private clouds and virtualization approaches used in cloud infrastructure. Finally, it provides an overview of major cloud providers that offer cloud services.
OpenStack is an open source cloud operating system that is used by enterprises and service providers to build both private and public clouds. It began development in 2010 with a mission to produce an ubiquitous open source cloud platform. OpenStack provides common services for compute, storage, networking and identity management and is made up of several modular components like Nova (compute), Swift (object storage), Glance (images), and Keystone (identity). The OpenStack community includes over 1,200 active participants from 17 countries working together to rapidly evolve the software through six major releases. Companies can participate by using OpenStack to power their clouds or by contributing code to the project.
The missing piece : when Docker networking and services finally unleashes so...Adrien Blind
Docker now provides several building blocks, combining engine, clustering, and componentization, while the new networking and service features enable many new usecases such as multi-tenancy. In this session, you will first discover the new experimental networking and service features expected soon, and then drift rapidly to software architecture, explaining how a complete Docker stack unleashes microservices paradigms.
The first part of the talk will introduce what SDNs and service registries are to the audience and will cover corresponding network & service experimental features of docker accordingly, with a technical focus. For instance, it explains how to create an overlay network of top of a swarm cluster or how to publish services.
The second part of the talk moves from infrastructure to application concerns, explaining that application architecture paradigms are shifting. In particular, we discuss the growing porosity of companies’s IS (especially due to massive use of cloud services) drifting security boundaries from the global IS perimeter, to the application shape. We also remind that traditional SOA patterns leveraging on buses (ie. ESBs & ETLs) are being replaced by microservices promoting more direct, full-mesh, interactions. To get the picture really complete, we’ll also rapidely remind other trends and shifts which are already covered by other docker components: scalability & resiliency to be supported by the apps themselves, fine-grained applications, or even infrastructure commoditization…
Most of all, the last part depicts a concrete, state-of-the-art application, applying all the properties discussed previously, and leveraging on a multi-tenant docker full stack using new networking and services features, in addition to traditional swarm, compose, and engine components. And just because we say it doesn’t mean it’s true, we’ll be happy to demonstrate this live !
This document summarizes 10 common myths about cloud encryption and provides realities to counter each myth in 1-2 paragraphs. The myths addressed include the ideas that encryption degrades performance, key management is difficult, encryption is hard to deploy, and that encryption in the cloud is not secure. The document advocates for transparent encryption solutions that protect data across virtualization platforms and public clouds.
"Self-hosting With Nextcloud" (including discussion of Docker)
Description: Currently, most of us trust cloud services to store (and manage) vital pieces of our personal lives. But service providers like Amazon, Apple, Google, and many others are very willing to sell your personal data in order to generate additional revenue.
Mr. Olsen will discuss how you can self-host key services like file storage, streaming entertainment, calendars, tasks, photos, and many others.
"If It's Good Enough for Snowden…"
Description: Too many of us trust our ISP, our service providers, and even our government with the data that we use every day. But how can you protect yourself against unintentional and intentional eavesdropping?
Mr. Olsen wil discuss his evolution from Windows to Linux and from Linux to Qubes OS.
This document discusses Docker, a container system for code. It describes how Docker eliminates inconsistencies between development, testing, and production environments by allowing applications to run anywhere using containers. It provides an overview of the Docker ecosystem, including the core components like Engine, Compose, Swarm, and Machine. It also discusses how Docker compares to virtual machines and the benefits it provides for both developers and administrators.
Web Werks Cloud FAQs. Our expert answers all of your questions related to Web Werks Cloud Hosting in this document. Read further to know more about Web Werks Cloud Server Hosting plans, benefits and strategies.
Zero to Nova: A VMware Admin's Month of OpenstackThom Greene
I don't know anything about OpenStack. My mission is to learn this platform in the four weeks leading up to VMworld and then teach it to you, or at least start you out on how to learn it. I'll talk about where to start, how todig into it, what you'll likely stumble over as a VMware admin, and how to build a homelab. I would hope that this 10 minutes would give you the tools to learn OpenStack in two weeks instead of four!
Enhance Virtual Machine Security in OpenStack Using Suricata IPSShila044184
This document discusses enhancing security of virtual machines in OpenStack using Suricata intrusion prevention system (IPS). The objectives are to configure OpenStack, install and integrate Suricata IPS, and test the integration. Suricata IPS will be deployed to secure instances from attacks by monitoring traffic over the virtualized network. The framework involves installing OpenStack on a CentOS 7 virtual machine using VirtualBox, launching instances, and configuring Suricata IPS to integrate with OpenStack SDN to enable deep packet inspection and intrusion detection. The expected result is to improve security of virtual machines in OpenStack cloud platform.
Lessons Learned from an early Multi-Cloud journeyHardway Hou
This document discusses lessons learned from an early multi-cloud journey. It highlights how IT can become more agile and strategic to enable business growth through an IT as a service model and moving to the cloud. Key lessons include standardizing, automating and scaling cloud services; developing a flexible private cloud platform; adopting a holistic multi-cloud orchestration approach; and updating processes and culture to embrace failures as part of innovation. The goal is to deliver an "IT vending machine experience" and become a cloud brokerage service.
This document discusses identity and access management challenges in cloud computing environments and how Forefront Identity Manager (FIM) can help address them. It notes that security is the top concern for cloud adoption and outlines key security issues related to tenant isolation, authentication, authorization, and auditing of access. It then presents FIM as providing the three pillars of identity management - authentication, authorization, and user attributes. The rest of the document provides examples of how FIM can help enhance identity management in a private cloud, including securely managing group membership and roles for access to virtual machines and delegating administration of resources.
The world of computing is moving to the cloud – shared infrastructures, shared systems, instant provisioning and pay-as-you-go services. And users can enjoy anytime, anywhere access to services and their data. But how secure is your data in the cloud and do conventional security products offer the optimal approach to securing your virtualised environments?
In this presentation we examine security and performance concerns along your journey to the cloud and explore new technologies from VMware and Trend Micro. These innovations are all ready helping thousands of businesses to address the security challenges with Physical, Virtual and cloud platforms.
soCloud: distributed multi-cloud platform for deploying, executing and managi...Fawaz Fernand PARAISO
The document summarizes a PhD thesis defense presentation on soCloud, a distributed multi-cloud platform. The presentation covers:
1) The soCloud model, which extends the Service Component Architecture (SCA) model to support annotations for non-functional requirements to deploy components as execution units across multiple clouds.
2) The soCloud platform, which is a distributed component-based PaaS that manages portability, provisioning, elasticity, and high availability across clouds using a reactive architecture.
3) Validation of the soCloud model and platform through modeling applications and providing runtime support to manage applications in multi-cloud environments.
The document discusses attacking virtualization infrastructure through various exploits. It presents the Virtualization ASsessment TOolkit (VASTO) which is an exploit pack focusing on virtualization and cloud security. It then demonstrates several exploits against VMware virtualization software, including path traversal exploits, session hijacking, and code execution exploits affecting the vCenter management console, ESXi hypervisor, and supporting services. The talk encourages testing these attacks to better understand vulnerabilities in virtualization platforms.
[1] DOCTOR BOVE - HOME STAGING PROJECT - MARCH 2017 Carolina Ruiz Amo
El documento proporciona información sobre un proyecto de reforma en el barrio de El Carmelo en Barcelona. Describe la ubicación y características del barrio. Luego detalla el estado anterior deteriorado de las diferentes áreas de la propiedad como el salón, cocina, baños y dormitorios. Finalmente, describe los cambios realizados en la reforma para mejorar la iluminación, acabados y convertirla en un espacio más moderno y acogedor.
Philip Hung Cao - Cloud security, the journey has begunSecurity Bootcamp
This 3 sentence document expresses gratitude to sponsors. It thanks sponsors for their generous support in a respectful and polite manner. The document shows appreciation for those who have contributed funding or resources.
Privacy and security in the cloud Challenges and solutions for our future inf...PRISMACLOUD Project
Thomas Länger presented the challenges we are addressing in PRISMACLOUD and showed our approach and innovations at the World Summit on the Information Society Forum of the ITU, UNESCO, UNPD and UNCTAD
En estos días en México oímos continuamente en los medios de comunicación la palabra sumo pontífice, o el pontificado del papa, o el seminario pontificio pero se ha detenido a pensar ¿Qué significa este título? ¿Cuál es su origen gramático e histórico? ¿Habrá requisitos para ser un sumo pontífice? ¿Qué dice la historia, la arqueología y la lógica al respecto? ¿Qué han hecho en el pasado? ¿Fue Pedro un sumo pontífice?
Este documento describe tres tipos principales de controladores de tensión AC: controladores de voltaje de entrada variable, controladores de fuente de corriente y controladores de ancho de pulso. También discute los controladores AC trifásicos, el control de la velocidad de un motor AC mediante dispositivos semiconductores y un circuito controlador de velocidad para motores DC.
This document discusses setting up a home internet of things (IoT) system securely. It recommends creating a guest network using the existing router to separate internet access for 3 laptops, 1 gaming system, and a home security system. While subnetting could further separate the connections, it is not needed for this small home network. The document provides instructions for testing the connections by pinging addresses and recommendations for basic security measures like changing default passwords and using WPA2-PSK encryption.
This document discusses cloud computing, including its history and key concepts. It defines cloud computing as on-demand services and solutions delivered over the internet on a pay-per-use basis. The document outlines the benefits of cloud computing like scalability, ubiquity, and cost savings. It also describes different deployment models like public and private clouds and virtualization approaches used in cloud infrastructure. Finally, it provides an overview of major cloud providers that offer cloud services.
OpenStack is an open source cloud operating system that is used by enterprises and service providers to build both private and public clouds. It began development in 2010 with a mission to produce an ubiquitous open source cloud platform. OpenStack provides common services for compute, storage, networking and identity management and is made up of several modular components like Nova (compute), Swift (object storage), Glance (images), and Keystone (identity). The OpenStack community includes over 1,200 active participants from 17 countries working together to rapidly evolve the software through six major releases. Companies can participate by using OpenStack to power their clouds or by contributing code to the project.
The missing piece : when Docker networking and services finally unleashes so...Adrien Blind
Docker now provides several building blocks, combining engine, clustering, and componentization, while the new networking and service features enable many new usecases such as multi-tenancy. In this session, you will first discover the new experimental networking and service features expected soon, and then drift rapidly to software architecture, explaining how a complete Docker stack unleashes microservices paradigms.
The first part of the talk will introduce what SDNs and service registries are to the audience and will cover corresponding network & service experimental features of docker accordingly, with a technical focus. For instance, it explains how to create an overlay network of top of a swarm cluster or how to publish services.
The second part of the talk moves from infrastructure to application concerns, explaining that application architecture paradigms are shifting. In particular, we discuss the growing porosity of companies’s IS (especially due to massive use of cloud services) drifting security boundaries from the global IS perimeter, to the application shape. We also remind that traditional SOA patterns leveraging on buses (ie. ESBs & ETLs) are being replaced by microservices promoting more direct, full-mesh, interactions. To get the picture really complete, we’ll also rapidely remind other trends and shifts which are already covered by other docker components: scalability & resiliency to be supported by the apps themselves, fine-grained applications, or even infrastructure commoditization…
Most of all, the last part depicts a concrete, state-of-the-art application, applying all the properties discussed previously, and leveraging on a multi-tenant docker full stack using new networking and services features, in addition to traditional swarm, compose, and engine components. And just because we say it doesn’t mean it’s true, we’ll be happy to demonstrate this live !
This document summarizes 10 common myths about cloud encryption and provides realities to counter each myth in 1-2 paragraphs. The myths addressed include the ideas that encryption degrades performance, key management is difficult, encryption is hard to deploy, and that encryption in the cloud is not secure. The document advocates for transparent encryption solutions that protect data across virtualization platforms and public clouds.
"Self-hosting With Nextcloud" (including discussion of Docker)
Description: Currently, most of us trust cloud services to store (and manage) vital pieces of our personal lives. But service providers like Amazon, Apple, Google, and many others are very willing to sell your personal data in order to generate additional revenue.
Mr. Olsen will discuss how you can self-host key services like file storage, streaming entertainment, calendars, tasks, photos, and many others.
"If It's Good Enough for Snowden…"
Description: Too many of us trust our ISP, our service providers, and even our government with the data that we use every day. But how can you protect yourself against unintentional and intentional eavesdropping?
Mr. Olsen wil discuss his evolution from Windows to Linux and from Linux to Qubes OS.
This document discusses Docker, a container system for code. It describes how Docker eliminates inconsistencies between development, testing, and production environments by allowing applications to run anywhere using containers. It provides an overview of the Docker ecosystem, including the core components like Engine, Compose, Swarm, and Machine. It also discusses how Docker compares to virtual machines and the benefits it provides for both developers and administrators.
Web Werks Cloud FAQs. Our expert answers all of your questions related to Web Werks Cloud Hosting in this document. Read further to know more about Web Werks Cloud Server Hosting plans, benefits and strategies.
Zero to Nova: A VMware Admin's Month of OpenstackThom Greene
I don't know anything about OpenStack. My mission is to learn this platform in the four weeks leading up to VMworld and then teach it to you, or at least start you out on how to learn it. I'll talk about where to start, how todig into it, what you'll likely stumble over as a VMware admin, and how to build a homelab. I would hope that this 10 minutes would give you the tools to learn OpenStack in two weeks instead of four!
Enhance Virtual Machine Security in OpenStack Using Suricata IPSShila044184
This document discusses enhancing security of virtual machines in OpenStack using Suricata intrusion prevention system (IPS). The objectives are to configure OpenStack, install and integrate Suricata IPS, and test the integration. Suricata IPS will be deployed to secure instances from attacks by monitoring traffic over the virtualized network. The framework involves installing OpenStack on a CentOS 7 virtual machine using VirtualBox, launching instances, and configuring Suricata IPS to integrate with OpenStack SDN to enable deep packet inspection and intrusion detection. The expected result is to improve security of virtual machines in OpenStack cloud platform.
Lessons Learned from an early Multi-Cloud journeyHardway Hou
This document discusses lessons learned from an early multi-cloud journey. It highlights how IT can become more agile and strategic to enable business growth through an IT as a service model and moving to the cloud. Key lessons include standardizing, automating and scaling cloud services; developing a flexible private cloud platform; adopting a holistic multi-cloud orchestration approach; and updating processes and culture to embrace failures as part of innovation. The goal is to deliver an "IT vending machine experience" and become a cloud brokerage service.
This document discusses identity and access management challenges in cloud computing environments and how Forefront Identity Manager (FIM) can help address them. It notes that security is the top concern for cloud adoption and outlines key security issues related to tenant isolation, authentication, authorization, and auditing of access. It then presents FIM as providing the three pillars of identity management - authentication, authorization, and user attributes. The rest of the document provides examples of how FIM can help enhance identity management in a private cloud, including securely managing group membership and roles for access to virtual machines and delegating administration of resources.
The world of computing is moving to the cloud – shared infrastructures, shared systems, instant provisioning and pay-as-you-go services. And users can enjoy anytime, anywhere access to services and their data. But how secure is your data in the cloud and do conventional security products offer the optimal approach to securing your virtualised environments?
In this presentation we examine security and performance concerns along your journey to the cloud and explore new technologies from VMware and Trend Micro. These innovations are all ready helping thousands of businesses to address the security challenges with Physical, Virtual and cloud platforms.
soCloud: distributed multi-cloud platform for deploying, executing and managi...Fawaz Fernand PARAISO
The document summarizes a PhD thesis defense presentation on soCloud, a distributed multi-cloud platform. The presentation covers:
1) The soCloud model, which extends the Service Component Architecture (SCA) model to support annotations for non-functional requirements to deploy components as execution units across multiple clouds.
2) The soCloud platform, which is a distributed component-based PaaS that manages portability, provisioning, elasticity, and high availability across clouds using a reactive architecture.
3) Validation of the soCloud model and platform through modeling applications and providing runtime support to manage applications in multi-cloud environments.
The document discusses attacking virtualization infrastructure through various exploits. It presents the Virtualization ASsessment TOolkit (VASTO) which is an exploit pack focusing on virtualization and cloud security. It then demonstrates several exploits against VMware virtualization software, including path traversal exploits, session hijacking, and code execution exploits affecting the vCenter management console, ESXi hypervisor, and supporting services. The talk encourages testing these attacks to better understand vulnerabilities in virtualization platforms.
[1] DOCTOR BOVE - HOME STAGING PROJECT - MARCH 2017 Carolina Ruiz Amo
El documento proporciona información sobre un proyecto de reforma en el barrio de El Carmelo en Barcelona. Describe la ubicación y características del barrio. Luego detalla el estado anterior deteriorado de las diferentes áreas de la propiedad como el salón, cocina, baños y dormitorios. Finalmente, describe los cambios realizados en la reforma para mejorar la iluminación, acabados y convertirla en un espacio más moderno y acogedor.
Philip Hung Cao - Cloud security, the journey has begunSecurity Bootcamp
This 3 sentence document expresses gratitude to sponsors. It thanks sponsors for their generous support in a respectful and polite manner. The document shows appreciation for those who have contributed funding or resources.
Privacy and security in the cloud Challenges and solutions for our future inf...PRISMACLOUD Project
Thomas Länger presented the challenges we are addressing in PRISMACLOUD and showed our approach and innovations at the World Summit on the Information Society Forum of the ITU, UNESCO, UNPD and UNCTAD
En estos días en México oímos continuamente en los medios de comunicación la palabra sumo pontífice, o el pontificado del papa, o el seminario pontificio pero se ha detenido a pensar ¿Qué significa este título? ¿Cuál es su origen gramático e histórico? ¿Habrá requisitos para ser un sumo pontífice? ¿Qué dice la historia, la arqueología y la lógica al respecto? ¿Qué han hecho en el pasado? ¿Fue Pedro un sumo pontífice?
Este documento describe tres tipos principales de controladores de tensión AC: controladores de voltaje de entrada variable, controladores de fuente de corriente y controladores de ancho de pulso. También discute los controladores AC trifásicos, el control de la velocidad de un motor AC mediante dispositivos semiconductores y un circuito controlador de velocidad para motores DC.
The document discusses a dining area. It provides a space for eating meals and socializing. Furnishings typically include a table with chairs for seating several people at once.
El documento proporciona 10 claves para escribir un libro, incluyendo planificar el libro antes de escribir, no dejarse vencer por la página en blanco, leer para inspirarse, establecer un horario de escritura fijo, usar diccionarios, buscar la propia voz como escritor, documentarse bien, buscar opiniones externas, revisar el trabajo escrito varias veces y aprender a escribir mediante la práctica constante.
This document provides a tour of a property located at 897 Concession 10 & 11 in Cochrane, ON. It includes photos of the exterior of the house, kitchen, dining room, front foyer, master bedroom, another bedroom, bathrooms, and cattle and fields surrounding the property located at 897 Concession 10 & 11.
El documento resume varios eventos religiosos que tendrán lugar en Jerez relacionados con cofradías católicas, incluyendo vía crucis, conferencias y el regreso de una imagen religiosa a su altar tras una restauración. También anuncia el fallecimiento de un antiguo hermano mayor de una cofradía.
Journey to the Cloud, Hype or OpportunityCapgemini
The document discusses how cloud computing is a driving force within digital transformation and an opportunity rather than just hype. It provides context on how leading digital companies use cloud to outperform competitors and disrupt industries. The cloud impacts IT organizations by requiring new capabilities around areas like security, open data, and development speed. Companies should view cloud through a digital lens and consider how it can transform customer experience, operations, and business models. The document outlines a four step approach for companies to start their cloud journey including assessment, planning, proof of concept, and execution.
Dimension Data – Enabling the Journey to the Cloud: Real Examplesitnewsafrica
Dimension Data – Enabling the Journey to the Cloud: Real Examples.
Presented by Grant Morgan, General Manager: Cloud at Dimension Data.
September 05, 2013 edition of the IT News Africa Innovation Dinner (www.innovationdinner.co.za)
Security: Enabling the Journey to the CloudCapgemini
Andy Powell VP UK Cybersecurity - Capgemini
Doug Davidson UK CTO for Cybersecurity - Capgemini
Organisations are moving to the Cloud in order to rationalise their legacy application estates and improve the quality of their application services, business performance, and business agility, whilst at the same time reducing their IT cost base. However, the road to Cloud services adoption is fraught with many risks and issues that can trip up the unwary. In this presentation Andy and Doug will outline some of the areas of security risk and threats that customers adopting Cloud services routinely come across. They will also talk through some of the security controls and approaches that you can use to avoid or mitigate business impacts to your cloud services, and will describe how organisations can follow a methodology to securely transition to the Cloud.
Why the cloud is more secure than your existing systemsErnest Mueller
Talk presented by Ernest Mueller at LASCON 2010 on cloud computing security and why it's likely that the cloud is more secure than what you're doing right now.
[Confidence0902] The Glass Cage - Virtualization SecurityClaudio Criscione
The Glass Cage, the presentation I gave at Confidence 2009-02 about virtualization security, detailing various attack patterns to virtualization infrastructures.
This summary provides an overview of the key points from the OpenStack security document:
1. OpenStack is an open source cloud computing platform consisting of several interrelated components like Nova, Swift, Keystone, etc. Each component has its own REST API and is responsible for a certain functionality like compute, storage, identity, etc.
2. The document discusses various security aspects and pain points related to different OpenStack components like authentication tokens, message buses, REST APIs, volumes, and intrusion detection.
3. It also covers strategies for incident response, forensics, and reporting vulnerabilities in OpenStack. Maintaining chain of custody for evidence and providing forensic access to tenants are highlighted.
4. Finally, the
OpenStack - Security Professionals Information ExchangeCybera Inc.
This document provides an introduction to OpenStack and discusses infrastructure as a service (IaaS). It outlines the OpenStack architecture including object storage, image service, and compute components. It also covers OpenStack security fundamentals like keypairs, security groups, and floating IPs. The document discusses IaaS security best practices and OpenStack vulnerability management. It lists some OpenStack projects and other related technologies.
Docker moves very fast, with an edge channel released every month and a stable release every 3 months. Patrick will talk about how Docker introduced Docker EE and a certification program for containers and plugins with Docker CE and EE 17.03 (from March), the announcements from DockerCon (April), and the many new features planned for Docker CE 17.05 in May.
This talk will be about what's new in Docker and what's next on the roadmap
A Cloud Security Ghost Story Craig Baldingcraigbalding
This document provides an overview of cloud security presented by Craig Balding. Some key points include:
- Cloud computing introduces new security challenges compared to traditional IT due to multi-tenancy, elasticity, and other-service models.
- There are different service models for cloud computing including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
- Public clouds like Amazon Web Services (AWS) and Google App Engine provide IaaS and PaaS offerings, while Salesforce is an example of a SaaS provider.
- Security challenges in the cloud include visibility & control, compliance, integration with existing security tools and practices
In this session Arash will show you how to use Open Cloud service delivery models such as Open IaaS and Open PaaS to deploy OpenCms as a service for your organization or your customers. You will learn how Open Source cloud operating systems and platforms such as OpenStack and Cloud Foundry can help jumping and scaling between OpenCms content clouds. Arash will also compare other PaaS solutions like AppScale, CloudBees, OpenShift and Jelastic and show if and how OpenCms can work with them. He will introduce you to the Cloud Federation concept, which helps to avoid vendor lock-in with private, public and hybrid cloud environments. Last but not least, he will explain how to achieve a high level of data security in Open Clouds, so that even system administrators won’t be able to access your OpenCms data. This session is targeted at all types of OpenCms users, such as business users, service providers and developers.
Keynote at Gluecon 2011 by Marten Mickos, CEO, Eucalyptus SystemsMarten Mickos
In the software world, the first decade of this century was ruled by LAMP, the open stack. Is the stack dead now?
With the advent of cloud computing, we are seeing software products coalesce in different ways. What runs on top of what is no longer the key question. Now it's a question of running side by side, with elasticity both in scalability and in configuration.
Common APIs serve as the glue between the components of what might be called the elastic ensemble.
In this presentation, I introduce VASTO, the Virtualization ASsessment TOolkit. VASTO is a collection of Metasploit module to specifically assess virtual infrastructure.
RightScale Webinar: December 8, 2010 – In this Webinar, we discuss the benefits and pain points of multi-cloud as well as key considerations to have in mind when going multi-cloud. We present examples of multi-cloud scenarios and describe the design principles to consider when architecting deployments that must span and migrate across different clouds and providers.
1) The document discusses the concepts of virtualization, virtualization security (VirtSec), open source virtualization, and cloud security (CloudSec).
2) It notes that virtualization changes the network stack and security approaches by putting the network inside machines and allowing live migration across VLANs.
3) It argues that security must focus on automation, configuration management, and avoiding proprietary lock-in to address challenges from virtualization like image sprawl and rapid redeployment.
Confraria Security 17 June - Cloud SecurityVitor Domingos
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services. While it offers advantages like flexibility and cost savings, security is a major concern due to issues like loss of physical control of data and systems, multi-tenancy, and the complexity of massive cloud systems. Key challenges include isolation management between tenants, data encryption, disaster recovery planning and secure virtualization. Organizations should plan for security, encrypt data, backup regularly, audit systems and sandbox applications to help address risks in the cloud.
This document discusses key aspects of enterprise cloud computing including definitions of cloud computing, the SPI model of cloud services, and architectural choices and challenges presented by cloud computing. Some of the main challenges mentioned are the need for elastic resources, stateless and asynchronous system designs, data sharding, and ensuring redundancy and high availability despite constant failures.
The document discusses the future of cloud computing being open through multi-vendor interoperability. It notes the benefits of open solutions for both vendors and consumers in accelerating technology shifts at lower costs. Rackspace has benefited from adopting and leading open solutions like OpenStack, which allows building public and private clouds with common application programming interfaces (APIs).
The future will bring continued rapid change and increasing competition. Cloud computing, mobile devices, and social networking will become more integrated and important. Productivity tools will be best on Windows and other platforms. Services in public, private and hybrid clouds will provide flexibility for businesses of all sizes. Security and management will help organizations protect their data in this environment. Overall, the cloud will transform IT and businesses must adopt cloud-first strategies to remain competitive.
Enterprise-Ready Private and Hybrid Cloud Computing TodayRightScale
RightScale User Conference NYC 2011:
Enterprise-Ready Private and Hybrid Cloud Computing Today
Rich Wolski - Founder and CTO, Eucalyptus
In this session, we'll discuss the use of Eucalyptus and RightScale to build enterprise-grade cloud computing environments. By combining on-premise clouds with Amazon Web Services (AWS) through a common cloud management interface, Eucalyptus and AWS form a coherent platform for reliable and cost-effective enterprise cloud computing. The RightScale Cloud Management Platform delivers the high-level framework for cost-effectively automating and managing this ensemble of technologies.
TLS Interception considered harmful (Chaos Communication Camp 2015)hannob
Talk at the Chaos Communication Camp about TLS interception Man-in-the-Middle proxies and their dangers.
Vidoe here:
https://media.ccc.de/browse/conferences/camp2015/camp2015-6833-tls_interception_considered_harmful.html
This document summarizes different virtualization techniques and cloud computing. It discusses full virtualization, OS-level virtualization, paravirtualization, and hardware-assisted virtualization. It then defines cloud computing and discusses concerns about security, performance, and maturity. Specific cloud services from Amazon Web Services are outlined, including Elastic Compute Cloud (EC2) for computing instances, Elastic Block Storage (EBS), and Simple Storage Service (S3) for storage.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Discover the Unseen: Tailored Recommendation of Unwatched ContentScyllaDB
The session shares how JioCinema approaches ""watch discounting."" This capability ensures that if a user watched a certain amount of a show/movie, the platform no longer recommends that particular content to the user. Flawless operation of this feature promotes the discover of new content, improving the overall user experience.
JioCinema is an Indian over-the-top media streaming service owned by Viacom18.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsScyllaDB
ScyllaDB monitoring provides a lot of useful information. But sometimes it’s not easy to find the root of the problem if something is wrong or even estimate the remaining capacity by the load on the cluster. This talk shares our team's practical tips on: 1) How to find the root of the problem by metrics if ScyllaDB is slow 2) How to interpret the load and plan capacity for the future 3) Compaction strategies and how to choose the right one 4) Important metrics which aren’t available in the default monitoring setup.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Ukraine
Під час доповіді відповімо на питання, навіщо потрібно підвищувати продуктивність аплікації і які є найефективніші способи для цього. А також поговоримо про те, що таке кеш, які його види бувають та, основне — як знайти performance bottleneck?
Відео та деталі заходу: https://bit.ly/45tILxj
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
5. A Taxonomy of clouds Cloud by the book - NIST On-demand self-service Broad network access Resource pooling Rapid elasticity Measured Service Public Community Hybrid Private IaaS PaaS SaaS On-Premise Off-Premise
6. Who plays the game? XEN – XenCloud VMware [And the VMware Express players] Ubuntu – Eucalyptus Red Hat – DeltaCloud, RHVM Amazon – Virtual Private Cloud … and many others
7. The Road to the Clouds Market and the technology are both moving toward cloud oriented architectures Your (new) datacenter is (will be) cloud based The build that syndrome
9. A trojan horse Private Clouds are the “Trojan horse” of the Cloud Industry It’s just like standard virtualization! In the meantime, you get used to those small deltas…
12. Blackberry strikes back Last year this guy was managing his XEN farm using a bugged Web Interface with his Blackberry Now the Blackberry is back on Xen Cloud Platform!
13. By the way… introducing VASTO The Virtualization ASsessment TOolkit It is an “exploit pack” for Metasploit focusing on virtualization security. Announcing Beta 0.2 SyScan10 Edition VASTO now knows some cloud tricks
16. Integration Private cloud vendors push for integration with them “ Stock” virtual machines Management tools Updates This way they can make your cloud feel part of a common Sky. However, they should do it securely!
21. Semantic of the cloud The Holy Roman Emperor Charles V was once asked which languages he typically used. "I speak Spanish to God," he explained, "Italian to women, French to men - and German to my horse.“ If you want to make it happen, you have to be able to state that what-the-cloud-undestands = what-the-cloud-can-do
23. Security labeling We know that “escape from the VM attacks” will happen again To mitigate, we can define “zones” Even if virtualization solutions won’t let us do “host tagging”, admins can do it anyway. Not with Private cloud computing!
25. Who has it, who has not Cloud Solution Version tested Result Eucalyptus 1.6.2 None DeltaCloud Portal 0.1.1 Could be RHEV NA – Public APIs None Abiquo 1.5 None XEN Cloud Platform 0.1.1 None Amazon Virtual Private Cloud NA – March None (redundancy) VMware vCloud Express NA – March None Svirt-LibVirt Library source Partial OpenNebula [Haizea] 1.0 Could be
26. “ The limits of your language are the limits of your world ” - Ludwig Wittgenstein
27. Time to make a stand As “the security community” it’s our role to make sure that new technologies are not simply taken for granted without a security debate. Private Cloud is a great risk and a great opportunity We need to make our voice heard!