Demo of the various tools that are part of the upcoming jBPM6 release (and BPMS6 platform) that can be used by business users (business analysts, end users, etc.) to model, manage and analyze their business processes.
Simplify the complexity of your business processesKris Verlaenen
Presentation on how to use business processes and jBPM to simplify your work, handle complexity and integrate with your enviuronment. It also describes the current status of jBPM 5.4 and the roadmap towards jBPM 6.0.
Process Automation: an Update from the TrenchesKris Verlaenen
Automation has never been more important, but automating business processes end-to-end comes with many challenges. Learn how Red Hat Process Automation Manager has evolved over the years to support the execution of complex processes at scale. Hear about the building blocks we offer that make the life of developers easier and enable easy integration with many other technologies out there. We will show you some of the latest improvements, from event-driven processes to a 100% cloud-native approach to bring your workloads to the hybrid cloud.
Simplify the complexity of your business processesKris Verlaenen
Presentation on how to use business processes and jBPM to simplify your work, handle complexity and integrate with your enviuronment. It also describes the current status of jBPM 5.4 and the roadmap towards jBPM 6.0.
Process Automation: an Update from the TrenchesKris Verlaenen
Automation has never been more important, but automating business processes end-to-end comes with many challenges. Learn how Red Hat Process Automation Manager has evolved over the years to support the execution of complex processes at scale. Hear about the building blocks we offer that make the life of developers easier and enable easy integration with many other technologies out there. We will show you some of the latest improvements, from event-driven processes to a 100% cloud-native approach to bring your workloads to the hybrid cloud.
A look into the crystal ball at JBoss BRMS and BPM SuiteEric D. Schabell
There is nothing like previewing the future of Business Rules and Business Process tooling. Be among the first one to leave footprints in the fresh snow as we take you on a tour of the JBoss Business Rules Management System (BRMS) and JBoss Business Process Management Suite (BPM Suite).
Attendees will be provided with the background architectures, a live demo of their capabilities, and a look at how they are Cloud enabled by the OpenShift cloud service. Join us for an hour of rules, processes, cloud, and crystal ball gazing!
Presentation on Agile Testing Days 2018
Title: Agile Thinking drives digital Innovation
An integrated agile process model for digital innovation
Combination of effective agile methods and efficiency of process structure.
Guideline to implement an agile innovation process in organizations
Innovate 2014 - Customizing Your Rational Insight Deployment (workshop)Marc Nehme
This workshop will enable users on the IBM Rational Insight solution and how to customize it to achieve their specific business needs. The first segment will provide an overview of the Insight offering. The next segment will provide an understanding of framework data modeling and a walkthrough of the customization process. The next segment will be a series of hands-on labs that will allow users to assume the role of an Insight developer and report author. Users will experience and end to end scenario in creating a custom metric and report based on an IBM Rational Team Concert custom attribute, however the process is applicable to any data source.
Real world experience with SharePoint and k2 workflowsJamie McAllister
K2 empowers organizations to build workflow apps for SharePoint with rich forms, powerful workflows and access to all your existing information. At our Swiss IT services company, we had the opportunity to deploy this kind of application to several diverse customers. In this session, we'll present our lessons learned and suggest best practices for your own implementations.
Build Answer-generating Apps that Users Love: Development best practices for ...TIBCO Jaspersoft
More and more employees (not just data analysts or C-level execs) are expected to make data-driven decisions, yet only 20–25% of workers have access to business intelligence (BI) products. And when asked, end users don’t want to use a “BI tool”—another interface to learn, another login—they want easily accessible answers. Instead of offering a standalone dashboard, the new trend is to embed analytics into applications that are already used every day.
This workshop series features a brand new demo application—created by TIBCO Jaspersoft and projekt202—that illustrates and teaches you how to create answer-generating applications. Over four webinars, we will show you to the what and why of data-as-a-feature applications and how you can build your own.
Data-as-a-Feature webinar sessions:
- Build answer-generating apps that users love: Learn best practices for making data valuable to your application users
- Getting started: How to set up your data-as-a-feature project
- Your data in your app: Best practices for embedding interactive reports and visualizations in your app
- Managing the experience + ad hoc reporting: Handling security, multi-tenancy, and self-service reporting for your data-as-a-feature app
As companies around the world look to get a jump on AI efforts, there’s one major question: with dozens of potential AI use cases but limited resources, how can organizations prioritize the right projects?
Carefully selected and well-designed Enterprise AI projects facilitate faster and more efficient collaboration among AI scientists and engineers and ultimately help organizations set up for AI success. In this presentation we share a comprehensive framework for:
1) Choosing relevant projects: defining needs from business lines and cost/benefit analysis.
2) Advanced project scoping: aligning stakeholders, anticipating key steps, defining success metrics.
3) Operationalization of AI projects: challenges and best practices.
BDT has moved from SAS-based workflow a cloud-based workflow leveraging tools like BigQuery, Looker, and Apache Airflow. Originally presented at the 2018 Pennsylvania Data Users Conference: https://pasdcconference.org/
Reproducibility and experiments management in Machine Learning Mikhail Rozhkov
Machine Learning becomes more and more common practice in many companies. ML teams size is growing and collaboration goes out of office and personal laptops. The complexity of ML projects leads to adopting distributed team collaboration, cloud based infrastructure and distributed machine learning. Well defined and manageable process for ML experiments becomes a central issue. Practices to apply automated pipelines, models and data set versioning helps to establish a good manageable process in project and provide reproducible results.
This speech helps to start with handling models and datasets versioning using open source tools: DVC, mlflow, Luigi, etc.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. RED HAT CONFIDENTIAL2
Agenda
- Introduction to BPMS 6 business tools
- Process modeling & simulation
- Data modeling
- Form modeling
- Execution
- Dashboards and reporting
- Products & community projects
- Q & A
6. RED HAT CONFIDENTIAL | Pierre Fricke, Ken Johnson6
Enable process modeling and simulation in a
business user friendly, web-based
environment.
Key features:
■ Web-based process modeler
■ Based on BPMN 2.0
■ Context menu for easy creation of flows
■ Visual validation
■ Integration with service repository
■ Simulation of business process
Benefits:
■ Enable non-technical and technical users to
collaborate creating (executable) business
processes
■ Simulate the execution of a business process
(cost, duration, etc.)
Key features
7. RED HAT CONFIDENTIAL | Pierre Fricke, Ken Johnson7
Target users
Process Analyst Creating and simulating business processes
Developers. Creating business processes, collaboration with process
analysts / developers adding execution details
8. RED HAT CONFIDENTIAL | Pierre Fricke, Ken Johnson8
Demo – Process Modeling & Simulation
10. RED HAT CONFIDENTIAL10
Enable the configuration of logical and physical data models
with no coding.
Key features:
■ Simple data modeling UI.
■ Supports multiple physical representations of data model.
■ Conceptual information added, such as user friendly names.
■ A common tool for analyst and developers.
■ Automatically generates all assets required for execution.
■ Single representation enables developer roundtrip.
Benefits:
■ Make data models first class citizens in the process improvement cycle.
■ Capture and document data models by analyst.
■ Allow for full process automation with data and forms, without the need for
development skills.
■ Productivity tools when generating multiple type of assets that might be required
(SQL schemas, JPA annotations, XML, PDF reports, ...)
Key features
11. RED HAT CONFIDENTIAL11
Target users
Developers.
Create data model.
Process / Data Analyst.
Capture requirements. Create data model.
12. RED HAT CONFIDENTIAL13
Row 1 Row 2 Row 3 Row 4
0
2
4
6
8
10
12
Column 1
Column 2
Column 3
Demo – Project data model
15. RED HAT CONFIDENTIAL16
Enable the configuration and execution of
forms with no coding.
Key features:
■ Form Modeling WYSIWYG UI for forms.
■ Form autogeneration from data model / Java
objects
■ Data binding for Java objects
■ API for embedding and rendering forms with
custom data.
■ Customized forms layouts (*)
■ Forms embedding
■ i18n support.
Benefits:
■ Enable non technical users to create forms and
execute them in processes.
■ Develop complex UI in a WYSWYG fashion for
data capture and presentation.
Key features
16. RED HAT CONFIDENTIAL17
Target users
Process Analyst & developers. Building & testing forms.
Developers. Add advanced configuration to forms. Embed forms in
custom components.
End users. Using forms in tasks or other modules.
22. RED HAT CONFIDENTIAL | Pierre Fricke, Ken Johnson23
Process instance management and task list
management.
Key features:
■ Starting process instances
■ Inspecting the current state of process instances
■ Visualization of current state
■ Managing process instances
■ Task list management
■ Claiming, starting, completing task (using task
forms), etc.
Benefits:
■ Enable business users and end users to start and
manage process instances in a user-friendly manner
■ Task list management and task life cycle
management
Key features
23. RED HAT CONFIDENTIAL | Pierre Fricke, Ken Johnson24
Target users
End users. Starting, inspecting and managing process instances and
tasks
Administrators. Managing process instances and tasks
24. RED HAT CONFIDENTIAL | Pierre Fricke, Ken Johnson25
Demo – Process Instance & Task Management
26. RED HAT CONFIDENTIAL27
Enable the configuration of business
dashboards by configuration with no coding.
Key features:
■ Visual configuration of dashboards
(Drag'n'drop).
■ Graphical representation of KPIs (Key
Performance Indicators).
■ Configuration of interactive report tables.
■ Data export to Excel and CSV format.
■ Filtering and search, both in-memory or SQL
based.
■ Process and tasks dashboards with jBPM.
■ Data extraction from external systems, through
different protocols.
■ Granular access control for different user
profiles.
■ Look'n'feel customization tools.
.
Example: Editing an indicator.
Example: Dashboard with active filter
Key features
27. RED HAT CONFIDENTIAL28
Target users
Managers / Business owners. Consumer of dashboards and reports.
IT / System Architects. Connectivity and data extraction.
Process Analyst. Dashboard composition & configuration.
29. RED HAT CONFIDENTIAL30
DEMO (Create indicator)
1. Click on the panels palette
2. Select 'Key Performance Indicator'
3. Select 'Create panel'
4. Drop panel in the layout region