This document discusses principles for open government data and provides examples of how parliamentary proceedings in the Netherlands have been published according to these principles. It outlines principles from the W3C and Open Government Group for making data human and machine-readable, linked, standardized, and reusable. Recent parliamentary data from 1995 onward is available online, while older historical proceedings from 1814-1995 can also be accessed. The document encourages assessing existing parliamentary websites against these principles and fully implementing open data standards to maximize the value and novel insights that can be gained from the data.
The document discusses internet policy making through the RIPE community. It describes how the RIPE community develops and sets policies for technical coordination and distribution of internet number resources in their service region. The policy development process at RIPE involves stages of discussion, review, last call, and potential acceptance of proposals. Examples are given of ongoing proposals related to IPv4 allocation sizes and requirements for AS numbers and IPv6 space. The presentation encourages participation in the policy discussions.
This document discusses Resource Public Key Infrastructure (RPKI) and how it can be used to secure Internet routing by validating the origin of IP prefixes and autonomous system numbers (ASNs) in the Border Gateway Protocol (BGP). The RIPE NCC issues free digital certificates as part of RPKI that validate an organization's registration of IP address blocks and ASNs. Route Origin Authorizations (ROAs) allow organizations to authorize which ASNs can originate which IP prefixes. Software runs periodic checks on the RPKI repository to determine the validity of BGP route announcements. Router vendors are adding support for RPKI validation which can influence routing decisions based on a route's validity status.
"Lost Stars" - Why Operators Switch Off IPv6RIPE NCC
This document summarizes a presentation given by Emile Aben at NANOG 66 in February 2016 about an analysis of internet service providers that had previously announced IPv6 address space but had since stopped routing it. The analysis found 462 providers had done this. Surveys of 69 respondents found that many had only been testing IPv6 and stopped when testing was complete or faced hardware, software, or routing issues. Others cited lack of customer demand or network changes as reasons for no longer routing their IPv6 space. The presentation examined the experiences of these providers and discussed challenges around IPv6 deployment and obtaining greater usage.
Are Dutch Internet Paths Local - A Measurement Study Using RIPE AtlasRIPE NCC
This document describes a study that used RIPE Atlas to analyze Dutch internet paths. RIPE Atlas is a measurement platform with thousands of probes around the world. The study specifically looked at paths between probes located in the Netherlands. It found that about 60% of paths went through the Amsterdam Internet Exchange (AMS-IX), while 20% went through other Dutch internet exchanges. The study also compared IPv4 and IPv6 paths and identified some paths that did not stay within the Netherlands. The results help identify opportunities to optimize routing and encourage contributions to RIPE Atlas and geolocation databases.
This document discusses RIPE Atlas, a global Internet measurement network. It summarizes the key features of RIPE Atlas including the six types of measurements it can perform. It also discusses how measurements are started through the GUI, APIs, and CLI tools. Visualizations of results are shown including maps, lists, and LatencyMON. Examples are given of research done using RIPE Atlas data, including measuring internet exchange points and identifying internet disruptions. Ways to participate in RIPE Atlas through hosting probes or attending events are also mentioned.
This document discusses principles for open government data and provides examples of how parliamentary proceedings in the Netherlands have been published according to these principles. It outlines principles from the W3C and Open Government Group for making data human and machine-readable, linked, standardized, and reusable. Recent parliamentary data from 1995 onward is available online, while older historical proceedings from 1814-1995 can also be accessed. The document encourages assessing existing parliamentary websites against these principles and fully implementing open data standards to maximize the value and novel insights that can be gained from the data.
The document discusses internet policy making through the RIPE community. It describes how the RIPE community develops and sets policies for technical coordination and distribution of internet number resources in their service region. The policy development process at RIPE involves stages of discussion, review, last call, and potential acceptance of proposals. Examples are given of ongoing proposals related to IPv4 allocation sizes and requirements for AS numbers and IPv6 space. The presentation encourages participation in the policy discussions.
This document discusses Resource Public Key Infrastructure (RPKI) and how it can be used to secure Internet routing by validating the origin of IP prefixes and autonomous system numbers (ASNs) in the Border Gateway Protocol (BGP). The RIPE NCC issues free digital certificates as part of RPKI that validate an organization's registration of IP address blocks and ASNs. Route Origin Authorizations (ROAs) allow organizations to authorize which ASNs can originate which IP prefixes. Software runs periodic checks on the RPKI repository to determine the validity of BGP route announcements. Router vendors are adding support for RPKI validation which can influence routing decisions based on a route's validity status.
"Lost Stars" - Why Operators Switch Off IPv6RIPE NCC
This document summarizes a presentation given by Emile Aben at NANOG 66 in February 2016 about an analysis of internet service providers that had previously announced IPv6 address space but had since stopped routing it. The analysis found 462 providers had done this. Surveys of 69 respondents found that many had only been testing IPv6 and stopped when testing was complete or faced hardware, software, or routing issues. Others cited lack of customer demand or network changes as reasons for no longer routing their IPv6 space. The presentation examined the experiences of these providers and discussed challenges around IPv6 deployment and obtaining greater usage.
Are Dutch Internet Paths Local - A Measurement Study Using RIPE AtlasRIPE NCC
This document describes a study that used RIPE Atlas to analyze Dutch internet paths. RIPE Atlas is a measurement platform with thousands of probes around the world. The study specifically looked at paths between probes located in the Netherlands. It found that about 60% of paths went through the Amsterdam Internet Exchange (AMS-IX), while 20% went through other Dutch internet exchanges. The study also compared IPv4 and IPv6 paths and identified some paths that did not stay within the Netherlands. The results help identify opportunities to optimize routing and encourage contributions to RIPE Atlas and geolocation databases.
This document discusses RIPE Atlas, a global Internet measurement network. It summarizes the key features of RIPE Atlas including the six types of measurements it can perform. It also discusses how measurements are started through the GUI, APIs, and CLI tools. Visualizations of results are shown including maps, lists, and LatencyMON. Examples are given of research done using RIPE Atlas data, including measuring internet exchange points and identifying internet disruptions. Ways to participate in RIPE Atlas through hosting probes or attending events are also mentioned.
Knobbe Martens co-hosted a 2-hour seminar in Silicon Valley on Protecting Your Intellectual Property with a distinguished panel of global practitioners.
This session will be presented jointly by Publisher Solutions International Ltd, Wiley and SAGE Publications, sharing experiences of the work done to combat Subscription Fraud, IP Address Abuse, and Bribery and Corruption in academic publishing. The presenters will be exploring the challenges faced by publishers and the steps taken to monitor and clean up growing and ever changing volumes of data.
Presentation given by Mirjam Kühne and Ivo Dijkhuis at TF-CSIRT (the computer security incident response teams task force) in Poznań on 21st & 22nd May 2015
Knobbe Martens co-hosted a 2-hour seminar in San Diego on Protecting Your Intellectual Property with a distinguished panel of global patent practitioners.
This document discusses Domain VII (Security Operations) of the CISSP exam, focusing on investigations, logging and monitoring, incident management, and backup/disaster recovery. It covers topics such as digital investigations processes and challenges, investigation stages, securing crime scenes, and common forensics tools and techniques. Key aspects of investigations covered are the chain of custody, five rules of evidence, and volatility of digital evidence. Incident management processes are also briefly introduced.
This document outlines Thornton Group's experience preparing for and undergoing a data protection audit by the Office of the Data Protection Commissioner (ODPC). It details Thornton Group's process of conducting an internal review, revising policies and procedures, training staff, and collecting documentation over four weeks to prepare for the audit. On audit day, ODPC investigators reviewed documentation, interviewed staff, and conducted a site visit. The audit resulted in a positive recommendation and reinforced the importance of data protection compliance.
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayRob Robinson
Taken from the Second Annual Intermountain Discovery Conference on 9.24.10, this presentation shares an overview of Litigation Hold in light of Systems, Processes, and Challenges.
Speaker Expert: Daniel S. Day is a Senior Attorney with SUPERVALU, Inc. where he focuses on commercial litigation management, supervision of outside counsel, and dispute resolution in the areas of real estate, construction, business torts, contracts, intellectual property, bankruptcy, and antitrust for a leading national food and drug retail and supply distibution chain.
A member of the Board of Directors of the Association of Corporate Counsel, Mountain West Chapter, Mr. Day previously served as an attorney with Berman, Gaufin, Tomsic, and Savage of Salt Lake City. In his role with Berman, Gaufin, Tomsic, and Savage, Mr. Day was responsible for large complex business litigation to include business torts, securities fraud, contracts, constitutional law, antitrust, banking and utility regulation, bankruptcy, and employment law. Additionally, Mr. Day handled firm administrative responsibilities such as recruiting, insurance, employee benefits, including retirement plans, and other management assignments.
Source: Orange Legal Technologies (OrangeLT.com)
Big Data And The Law: What Every Data Enthusiast Should KnowData Con LA
Data Con LA 2020
Description
Big data and the law have traditionally been considered disparate disciplines. Not anymore. Due to its growing importance, big data is increasingly impacting the legal landscape. In turn, legal developments including regulations and caselaw also affect big data. We will examine those developments that data scientists should be aware of, including:
*Historic relationship between big data and the legal field
*Recent developments in regulations and caselaw regarding big data
*Legal issues in how big data is collected, analyzed, used
*Protection of big data and related intellectual property rights
*Key takeaways for data scientists for IP and legal considerations
Speaker
Hana Oh, O'Melveny, Counsel
Computer forensic is the process of identifying, preserving, analyzing, and presenting digital evidence in a legally acceptable manner. This involves acquiring evidence from computers and other devices, analyzing the evidence, and reporting the findings. Computer forensic is used to find digital evidence related to cyber crimes, unauthorized disclosure of information, and other offenses. It provides evidence for criminal and civil legal cases by examining both persistent and volatile data stored on devices. Proper procedures and validated tools are used to ensure any evidence collected is admissible in court.
The document discusses best practices for processing crime and incident scenes involving digital evidence. It outlines general tasks investigators perform, including identifying digital artifacts as evidence, collecting and preserving evidence, analyzing and organizing it, and reproducing results reliably. It emphasizes the importance of collecting evidence systematically and in compliance with relevant rules and standards to ensure the authenticity and credibility of the evidence.
OpenLI is an open source lawful intercept project started by a group of 6 ISPs and enterprises in New Zealand. It is being developed by the WAND research group at the University of Waikato to provide a less expensive alternative to proprietary lawful intercept solutions. The project aims to capture IP traffic and metadata using libtrace and Intel DPDK to deliver intercepted content and data to law enforcement agencies in accordance with New Zealand's lawful intercept standards. Lightwire and Inspire plan to deploy OpenLI into production by June 2018 and the project is seeking additional funding and partners.
MyComplianceOffice presents our Oct 26th webinar, “ Prepare Your Firm for GDPR", co-hosted by MCO and Emily Mahoney a Technology Lawyer at Mason Hayes & Curran
How To Protect Your Company's Intellectual PropertySecureDocs
This presentation covers cost-effective patent protection for inventions worldwide and protection tactics for unpatented trade secrets. It also gives a compelling argument for why companies should go against the status quo when filing for patents which can help save money and speed up the total patenting process.
This document provides an overview of digital forensics and investigations. It describes the field of digital forensics and the importance of maintaining professional conduct during investigations. It explains how to prepare for both public and private sector investigations by taking a systematic approach, including assessing the case, planning the investigation, securing evidence, and using proper procedures. The document also discusses specific types of investigations like internet abuse, email abuse, and employee termination cases.
The document discusses preparing a medical device company called LaunchPad NewCo for intellectual property (IP) due diligence by potential investors. It provides tips on evaluating ownership of IP, assessing the strength of patent portfolios, determining freedom to operate without infringement risk, and common mistakes made during IP diligence. The panel presentation covers how investors review a company's IP and technology to evaluate investment or acquisition opportunities.
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...Aurélie Pols
The Privacy discussions started with Do Not Track (DNT) some years ago, before we all went through the nightmarish EU Cookie Directive and some kind of consent mechanism. From Cookie cliff, losing over 90% of tracking, to implicit consent; from asking for forgiveness instead of permission, the analytics community is slowly but surely getting used to Privacy, Security and Compliance discussions.
But what does this really imply?
Your role as a company collecting, processing and retargeting data is one thing.
The tools you use, their Terms and Conditions and the surrounding processes yet another.
Follow this session if you make sure that within this chain of data responsibility you are not the weak link.
This document discusses various IT security, compliance, legal risk, and disaster preparedness topics. It begins by outlining the basics of an IT security lifecycle including inventorying assets, identifying risks, remediating risks, and monitoring alerts. It then discusses threats like cybercrime, phishing, and issues related to e-discovery, PCI compliance, and HIPAA compliance. The document provides recommendations for legal risk mitigation, disaster preparation, cyber incident handling, and options for addressing IT security needs either through do-it-yourself methods, outside help, or hiring a support organization.
Knobbe Martens co-hosted a 2-hour seminar in Silicon Valley on Protecting Your Intellectual Property with a distinguished panel of global practitioners.
This session will be presented jointly by Publisher Solutions International Ltd, Wiley and SAGE Publications, sharing experiences of the work done to combat Subscription Fraud, IP Address Abuse, and Bribery and Corruption in academic publishing. The presenters will be exploring the challenges faced by publishers and the steps taken to monitor and clean up growing and ever changing volumes of data.
Presentation given by Mirjam Kühne and Ivo Dijkhuis at TF-CSIRT (the computer security incident response teams task force) in Poznań on 21st & 22nd May 2015
Knobbe Martens co-hosted a 2-hour seminar in San Diego on Protecting Your Intellectual Property with a distinguished panel of global patent practitioners.
This document discusses Domain VII (Security Operations) of the CISSP exam, focusing on investigations, logging and monitoring, incident management, and backup/disaster recovery. It covers topics such as digital investigations processes and challenges, investigation stages, securing crime scenes, and common forensics tools and techniques. Key aspects of investigations covered are the chain of custody, five rules of evidence, and volatility of digital evidence. Incident management processes are also briefly introduced.
This document outlines Thornton Group's experience preparing for and undergoing a data protection audit by the Office of the Data Protection Commissioner (ODPC). It details Thornton Group's process of conducting an internal review, revising policies and procedures, training staff, and collecting documentation over four weeks to prepare for the audit. On audit day, ODPC investigators reviewed documentation, interviewed staff, and conducted a site visit. The audit resulted in a positive recommendation and reinforced the importance of data protection compliance.
The Litigation Hold – Systems, Processes and Challenges | Daniel S. DayRob Robinson
Taken from the Second Annual Intermountain Discovery Conference on 9.24.10, this presentation shares an overview of Litigation Hold in light of Systems, Processes, and Challenges.
Speaker Expert: Daniel S. Day is a Senior Attorney with SUPERVALU, Inc. where he focuses on commercial litigation management, supervision of outside counsel, and dispute resolution in the areas of real estate, construction, business torts, contracts, intellectual property, bankruptcy, and antitrust for a leading national food and drug retail and supply distibution chain.
A member of the Board of Directors of the Association of Corporate Counsel, Mountain West Chapter, Mr. Day previously served as an attorney with Berman, Gaufin, Tomsic, and Savage of Salt Lake City. In his role with Berman, Gaufin, Tomsic, and Savage, Mr. Day was responsible for large complex business litigation to include business torts, securities fraud, contracts, constitutional law, antitrust, banking and utility regulation, bankruptcy, and employment law. Additionally, Mr. Day handled firm administrative responsibilities such as recruiting, insurance, employee benefits, including retirement plans, and other management assignments.
Source: Orange Legal Technologies (OrangeLT.com)
Big Data And The Law: What Every Data Enthusiast Should KnowData Con LA
Data Con LA 2020
Description
Big data and the law have traditionally been considered disparate disciplines. Not anymore. Due to its growing importance, big data is increasingly impacting the legal landscape. In turn, legal developments including regulations and caselaw also affect big data. We will examine those developments that data scientists should be aware of, including:
*Historic relationship between big data and the legal field
*Recent developments in regulations and caselaw regarding big data
*Legal issues in how big data is collected, analyzed, used
*Protection of big data and related intellectual property rights
*Key takeaways for data scientists for IP and legal considerations
Speaker
Hana Oh, O'Melveny, Counsel
Computer forensic is the process of identifying, preserving, analyzing, and presenting digital evidence in a legally acceptable manner. This involves acquiring evidence from computers and other devices, analyzing the evidence, and reporting the findings. Computer forensic is used to find digital evidence related to cyber crimes, unauthorized disclosure of information, and other offenses. It provides evidence for criminal and civil legal cases by examining both persistent and volatile data stored on devices. Proper procedures and validated tools are used to ensure any evidence collected is admissible in court.
The document discusses best practices for processing crime and incident scenes involving digital evidence. It outlines general tasks investigators perform, including identifying digital artifacts as evidence, collecting and preserving evidence, analyzing and organizing it, and reproducing results reliably. It emphasizes the importance of collecting evidence systematically and in compliance with relevant rules and standards to ensure the authenticity and credibility of the evidence.
OpenLI is an open source lawful intercept project started by a group of 6 ISPs and enterprises in New Zealand. It is being developed by the WAND research group at the University of Waikato to provide a less expensive alternative to proprietary lawful intercept solutions. The project aims to capture IP traffic and metadata using libtrace and Intel DPDK to deliver intercepted content and data to law enforcement agencies in accordance with New Zealand's lawful intercept standards. Lightwire and Inspire plan to deploy OpenLI into production by June 2018 and the project is seeking additional funding and partners.
MyComplianceOffice presents our Oct 26th webinar, “ Prepare Your Firm for GDPR", co-hosted by MCO and Emily Mahoney a Technology Lawyer at Mason Hayes & Curran
How To Protect Your Company's Intellectual PropertySecureDocs
This presentation covers cost-effective patent protection for inventions worldwide and protection tactics for unpatented trade secrets. It also gives a compelling argument for why companies should go against the status quo when filing for patents which can help save money and speed up the total patenting process.
This document provides an overview of digital forensics and investigations. It describes the field of digital forensics and the importance of maintaining professional conduct during investigations. It explains how to prepare for both public and private sector investigations by taking a systematic approach, including assessing the case, planning the investigation, securing evidence, and using proper procedures. The document also discusses specific types of investigations like internet abuse, email abuse, and employee termination cases.
The document discusses preparing a medical device company called LaunchPad NewCo for intellectual property (IP) due diligence by potential investors. It provides tips on evaluating ownership of IP, assessing the strength of patent portfolios, determining freedom to operate without infringement risk, and common mistakes made during IP diligence. The panel presentation covers how investors review a company's IP and technology to evaluate investment or acquisition opportunities.
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...Aurélie Pols
The Privacy discussions started with Do Not Track (DNT) some years ago, before we all went through the nightmarish EU Cookie Directive and some kind of consent mechanism. From Cookie cliff, losing over 90% of tracking, to implicit consent; from asking for forgiveness instead of permission, the analytics community is slowly but surely getting used to Privacy, Security and Compliance discussions.
But what does this really imply?
Your role as a company collecting, processing and retargeting data is one thing.
The tools you use, their Terms and Conditions and the surrounding processes yet another.
Follow this session if you make sure that within this chain of data responsibility you are not the weak link.
This document discusses various IT security, compliance, legal risk, and disaster preparedness topics. It begins by outlining the basics of an IT security lifecycle including inventorying assets, identifying risks, remediating risks, and monitoring alerts. It then discusses threats like cybercrime, phishing, and issues related to e-discovery, PCI compliance, and HIPAA compliance. The document provides recommendations for legal risk mitigation, disaster preparation, cyber incident handling, and options for addressing IT security needs either through do-it-yourself methods, outside help, or hiring a support organization.
Navigating IP Addresses: Insights from your Regional Internet RegistryRIPE NCC
The document summarizes insights from Alena Muravska of the RIPE NCC about navigating IP addresses. It provides statistics on Internet number resources allocated to Poland by the RIPE NCC, including that Poland has 687 members and 737 LIRs. It discusses the depletion of IPv4 addresses and the new IPv4 allocation policy, noting that 32 Polish LIRs are currently waiting in the IPv4 waiting list. It also covers IPv6 allocations and assignments for members and non-members, and provides graphs on IPv4 holdings and IPv6 capability in Poland.
The presentation discusses the RPKI system and a recent incident where a threat actor gained access to an organization's RPKI dashboard using a leaked password. This led to unexpected changes being made to the organization's RPKI ROAs, causing a routing outage that disrupted internet connectivity. The presentation emphasizes the importance of strong passwords, multi-factor authentication, network security monitoring, and having an incident response plan to prevent similar incidents and increase routing resilience.
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RISRIPE NCC
This document discusses how network operators can minimize the impact of incidents on their networks using RIPE Atlas and Routing Information Services (RIS). It recommends strategically deploying RIPE Atlas probes and peering with RIS to continuously monitor the network. It also suggests setting up alerts to detect abnormalities and anomalies swiftly. Additional recommendations include maintaining low latency through debugging, and impressing customers by showcasing network performance.
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfRIPE NCC
This document summarizes Alena Muravska's presentation on engaging the Ukrainian community during times of war. It discusses how the Ukrainian community can participate in the RIPE community through various working groups and meetings. It also outlines how the RIPE NCC has supported Ukraine, including dedicating sessions to discuss the internet in Ukraine and forming a task force on best practices to survive disasters or war. Finally, it discusses efforts taken to protect Ukrainian resource holders, such as preventing unauthorized transfers of internet resources and examining changes made to country codes during the invasion.
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfRIPE NCC
The document discusses opportunities for youth involvement in internet governance through the RIPE NCC. It describes the RIPE NCC as the regional internet registry for Europe, the Middle East, and Central Asia that allocates IP addresses and supports the open internet community. It outlines how individuals can participate in RIPE community working groups, meetings, policy development processes, and more. It specifically highlights the RIPE Fellowships and RIPE Academic Cooperation Initiative programs that fund youth attendance at RIPE meetings and encourage engagement between academia and the RIPE community.
The document discusses the RIPE NCC's Internet measurement tools - RIPE Routing Information Service (RIPE RIS), RIPEstat, and RIPE Atlas. It provides details on each tool, including how they collect and analyze routing data, Internet traffic maps, and performance measurements from over 12,000 probes worldwide. The tools are used by network operators, researchers, and policymakers to monitor routing, identify incidents, and inform future plans. Future plans include improving data collection and analysis, open sourcing components, and renewing back-end systems.
This document discusses RPKI (Resource Public Key Infrastructure) for securing Internet routing. It provides statistics on RPKI adoption in Luxembourg and neighboring countries, showing that while Luxembourg has over 65% of its address space covered by ROAs, not all networks have fully implemented RPKI. The goal is 100% RPKI implementation to validate all routes and prevent route hijacking, but obstacles still exist to full deployment. The presenter's contact information is provided for any questions.
The document discusses RIPE NCC's engagement in Southeast Europe, including organizing meetings, supporting network operator groups, developing internet exchange points, and funding opportunities. It then covers the topics of internet resiliency, analyzing networks in Belarus, Ukraine, Turkey and Poland using routing data. Next, it provides an analysis of internet landscapes in specific Southeast European countries. Key findings include the role of incumbent telecom operators, efficiency of regional routing but some anomalies, and modest diversity in routes into the region. Data sources used are also listed.
Know Your Network: Why Every Network Operator Should Host RIPE AtlasRIPE NCC
The document discusses the benefits of network operators hosting RIPE Atlas probes. It describes RIPE Atlas as an active measurements platform that monitors internet reachability through probes hosted by volunteers around the world. It highlights that RIPE Atlas data is publicly available and can be used by network operators to monitor performance, identify issues, validate findings, and plan improvements. The document encourages network operators in Africa to install RIPE Atlas probes to better monitor their networks and neighborhoods.
Minimising Impact When Incidents Occur With RIPE AtlasRIPE NCC
The document discusses how the online gaming company Mbappe uses RIPE Atlas to monitor network performance and minimize latency issues for their global users. It recommends strategically deploying RIPE Atlas probes, continuously monitoring measurements, and setting up alerts to quickly detect anomalies. When issues are found, the recommended actions are to identify network problems swiftly, debug issues to maintain low latency, and showcase network performance to impress customers. Installing probes in specific autonomous systems and networks could help identify parts of the network with high latency that are important to address.
- RIPE NCC provides internet measurement services including the Routing Information Service (RIS), RIPEstat, and RIPE Atlas to collect and provide data on internet routing and performance.
- RIS collects raw BGP data from remote route collectors at internet exchange points to observe real internet routing. RIPEstat and RIPE Atlas provide tools to analyze and visualize this data.
- RIPE Atlas specifically operates a global network of internet measurement devices that actively monitor connectivity, reachability, and performance. Its data and custom measurement tools are available to both network operators and researchers.
RIPE Atlas is a global measurement platform that uses probes hosted by volunteers to monitor internet connectivity and latency. It provides latency maps showing routes between networks and allows custom measurements. The presentation highlighted how RIPE Atlas can be used to identify networks with high latency, view routes and locations of probes, and conduct DNS and traceroute tests while remaining secure and low cost. Hosting a RIPE Atlas probe or improving coverage in certain regions would further benefit internet monitoring.
Presentasi menjelaskan tentang penggunaan RIPE Atlas untuk mendeteksi masalah latensi di internet. RIPE Atlas adalah platform pengukuran internet global yang menggunakan probe di seluruh dunia untuk melakukan pengukuran kinerja jaringan seperti ping dan traceroute. Presentasi mendemonstrasikan bagaimana RIPE Atlas dapat digunakan untuk mengidentifikasi anomali latensi dan membantu perusahaan game online menyelesaikan masalah kinerja mereka.
RIPE Atlas is a global network measurement platform that uses volunteer-hosted probes to monitor Internet performance and availability. It runs tests including ping, traceroute, and DNS to identify issues like high latency. The presentation discusses using RIPE Atlas to help an online gaming company identify and address latency problems impacting users in different regions. It also provides examples of the probes and measurements available in Southeast Asian countries like the Philippines.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
1. IPv4 Hijacking:
Our Experience
Mirjam Kühne, Ivo Dijkhuis
TF-CSIRT 43 | Rome - Italy | 18 September 2014
2. Overview
• Introduction to the RIPE NCC
• Our definition of hijacking
• Common approaches we observe
• Investigations and interventions
• Common difficulties and typical responses
• What you can do
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
2
3. Introduction to the RIPE NCC
• Not-for-profit, independent membership association
• Neutral and impartial
• Established in Amsterdam in 1992
• Provides open community platform
• Over 10,000 members in 76 countries
• Bottom-up industry self regulation
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
3
4. RIPE NCC Activities
• Distribute IP addresses and AS numbers
• Support policy development in the RIPE NCC
service region (Europe, Middle East, parts of central
Asia)
• Maintain RIPE registry (RIPE whois Database)
• Resource certification (RPKI)
• Training Courses
• Tools and measurements
- RIPE Atlas, RIPEstat
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
4
5. Our Definition of Hijacking
!
“Taking control of issued Internet number
resources under false pretences”
!
• IPv4 addresses get re-registered to hijackers or
another (innocent) organisation
• IPv4 addresses have economic value due to IPv4
scarcity
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
5
6. Background Information
• 12 September 2012: the RIPE NCC starts allocating
from the last /8
• The RIPE NCC sees an increase in hijackings of
apparently unused and/or abandoned addresses
• Hijacks found so far
• 227 cases investigated, 19 hijacks found, 6 ongoing
• Often cases get resolved before they turn into hijack
• Most hijacking cases involve organisations we don’t
have a business relationship with (PI, legacy)
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
6
7. When Do We Investigate?
• A resource holder sends us a complaint or abuse
report
• An experienced staff member notices something
out of the ordinary
• Follow-up from existing investigations: one case
often leads to another
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
7
8. Common Approaches Hijackers Use
• Research company histories and provide paper
trails to demonstrate changes in business structure
• Conduct BGP test announcements to check if
addresses are unused
• Re-register expired domain names to make email
change requests look legitimate
• Copy websites, with identical pages hosted on
(almost) identical domain names
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
8
9. Common Approaches Hijackers Use
• Forged documentation
• Faked IDs
• Faked company registration papers
• Forged signatures of real people on contracts
• Forged stamps and signatures of notaries and resource
holders
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
9
10. How Do We Investigate?
• We check changes in company structure
• Public records
• National chamber of commerce registries
• We contact former and current resource holders
(where possible)
• Contact notaries found on documentation
• Phone calls, emails and faxes
• Using other contact information beyond what was
provided
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
10
11. What Do We Do?
• Allowing time to support claim to the address space
• Reverting all changes immediately
• Resources are de-registered if no legitimate holder
found
• Where member involvement in the hijacking case can
be proven
• Closure of member account and de-registration of
IP resources
• Reporting to authorities where appropriate
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
11
12. Common Difficulties
• The resource holder expects immediate action while
we need to investigate carefully
• It can be difficult to find and contact the resource
holder in question
• No effective penalty and lots to gain for the hijacker:
• They can open a new RIPE NCC member account
• No high costs involved
• No blacklists, no fine
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
12
13. What You Can Do
• Protect your resources against hijacking by making
sure your RIPE Database objects and contact
information are up to date
• If acquiring resources, ensure you are in contact
with the legitimate holder or representative
• If you need help, or think your resources may have
been hijacked, contact: reg-review@ripe.net
!
!
https://www.ripe.net/lir-services/resource-management/address-hijacking-in-the-ripe-ncc-service-region
!
Kühne & Dijkhuis - TF-CSIRT 43 - 18/9/2014
13