What is "The Cloud"?
Get the basics on using "The Cloud" to store files; share and collaborate; backup your computer; and manage multiple online storage accounts. This manual serves as part of a workshop that introduces participants to "The Cloud".
Digitizing Financial Records: From Paper to the Clouddlhaase
Webinar I presented for the American Association of Daily Money Managers in September 2011. Still holds up today. New year is the time to revisit your storage habits for important documents and records.
Www.batteryfast.co.uk - Tech News: How to Sync Your PC, Tablet, and Smartphonebattery-fast. com
A few years ago business people carried a laptop on the road, used a desktop PC in the office, and worked on another PC at home. Maybe they had a BlackBerry, too–but only if they were real big shots.
Digitizing Financial Records: From Paper to the Clouddlhaase
Webinar I presented for the American Association of Daily Money Managers in September 2011. Still holds up today. New year is the time to revisit your storage habits for important documents and records.
Www.batteryfast.co.uk - Tech News: How to Sync Your PC, Tablet, and Smartphonebattery-fast. com
A few years ago business people carried a laptop on the road, used a desktop PC in the office, and worked on another PC at home. Maybe they had a BlackBerry, too–but only if they were real big shots.
Technology Tips for Students-New Student Tech CampStephanie Moore
New student tech camp hosted two weeks before school begins. Material and information used to ready students in the use of their 1:1 Tablet PCs at Villa Duchesne
NGS Luncheon Lecture at RootsTech 2013, Salt Lake CIty, UT, 23 March 2013. "Internet Privacy and Security Follies and Foibles" covering Digital Due Process
How-To Insert YouTube Video into PowerPoint with a LIVE Internet ConnectionEddie Vega
If at any time you need to insert a YouTube Video into PowerPoint, this mini-presentation is part of a Professional Development Workshop geared towards Professors and Teachers. This PDW will also cover, Open Source, Basic 3D Animation, SMART Boards and how-to put it all together.
Technology Tips for Students-New Student Tech CampStephanie Moore
New student tech camp hosted two weeks before school begins. Material and information used to ready students in the use of their 1:1 Tablet PCs at Villa Duchesne
NGS Luncheon Lecture at RootsTech 2013, Salt Lake CIty, UT, 23 March 2013. "Internet Privacy and Security Follies and Foibles" covering Digital Due Process
How-To Insert YouTube Video into PowerPoint with a LIVE Internet ConnectionEddie Vega
If at any time you need to insert a YouTube Video into PowerPoint, this mini-presentation is part of a Professional Development Workshop geared towards Professors and Teachers. This PDW will also cover, Open Source, Basic 3D Animation, SMART Boards and how-to put it all together.
Video Editing in Blender Workshop: 3D Text (DRAFT)Eddie Vega
This section is a draft for the instructional tutorial on Video Post Production in Blender Workshop for Graduate Students in the Teacher Education program.
The hands-on workshop will focus on how-to import clips into Blender's video editor; how-to trim/edit; fade-in & out; import graphics; create 3D titles; work with audio; export your project; and then uploading to YouTube, Teacher Tube and School Tube.
Currently, working on the audio component of the workshop which will include importing a file created in Audacity.
Video Editing in Blender is a "Basics Level" Workshop geared towards Educators and Students who want more than what iMovie and Windows Movie Maker can offer.
This workshop is hands-on and participants must bring in their own footage, preferably on a USB drive.
The workshop will take you through creating 3D titles; to importing & editing video; importing graphics created with GIMP into your timeline; working with Audacity; and much more.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. lou y!a !ood thing!
d !g
ha t's
r ec ast: C Yes, t
Fo
What is "The Cloud"?
According to WikiPedia, it's:
A file hosting service, cloud storage service, online
file storage provider, or cyberlocker is an Internet
hosting service specifically designed to host user
files. It allows users to upload files that could then be
accessed over the internet from a different computer,
tablet, smart phone or other networked device, by the
same user or possibly by other users, after a
password or other authentication is provided.
With technology trends moving towards cloudbased Typically, the services allow HTTP access, and
computing and online virtual storage capabilities, more and sometimes FTP access. Related services are
more companies are offering online storage services. contentdisplaying hosting services (i.e. video, image,
audio/music), virtual storage, and remote backup.
http://en.wikipedia.org/wiki/File_hosting_service
Why the importance?
Jump/Flash Drives get lost, boken, stolen, or
they may simply just fail. Storing information in
"the cloud" allows you to access your information
from any device that connects to the Internet
such as: Desktop, Laptop, Netbook, Tablet,
SmartPhone, or any portable media device.
Newsletter
3. "The Cloud" also serves as a backup device.
This is also a good way to backup an existing
tablet, netbook, laptop, etc.
Other benefits include the ability to "share"
files or folders with others. This may be used to
collaborate on a project; swap family photos;
disseminate information to a class or board
members.
As a side note: I wouldn't advise placing
personal information into "The Cloud" for
securuty reasons and peace of mind.
While on the topic of security, these services
offer solid security as is. You must first create an
account by registering at the site and
establishing a USERNAME and PASSWORD.
This is key if you wish to gain access to your
information.
Since many companies are now offering
"cloud" services, they understand that security,
accessability, continuous backups are critical to
mainstream users. For those who desire
additional features [for a fee], there is also tech For more information on how to create a solid password,
support, greater storage capacity, and in some please read this NY Times article:
cases, the ability to manage multiple storage
accounts. http://www.nytimes.com/2012/11/08/technology/personalt
ech/howtodevisepasswordsthatdrivehackers
away.html?smid=lishare
Issue 1 Page 3
4. How does this work?
After you create an account, will may need to
check your email in order to verify the account.
This is another form of security.
Once you're in, create your profile. This is
now your space, so you can make modifications
to the account settings. Next, you can create
Folders, much the same way you would on your
computers desktop. Then, search your hard
drive for content to upload.
Some sites, such as Dropbox.com, ask you to
download a small app to your computer. This
app (short for "application"), allows you to have a
shortcut folder on your computer. Meaning, you
can save files directly to this new folder and items
will automatically upload to your account. Items
can be uploaded and shared regardless of the
platform you are using.
Page 4 Newsletter Header
5. What is the size of my storage
account?
Dropbox.com offers you 2GB of online
storage. All you need is to sign up to open a free
account. For addition storage capacity, in the
5GB range, there are other options, such as: the
Google Drive, Ubuntu One, OpenDrive, and
Amazon's own Cloud Drive. While SkyDrive
from Microsoft offers 7GB. For those who need
even more storage, there is 4Shared.com
which provide you with 15GB of online storage.
Early subscribers to Microsoft's SkyDrive
where able to acquire 25GB of online storage. As
stated above, current subscribers can only get
7GB.
Are there other types of online
storage available?
Yes. There are online services for musicians,
such as SoundCloud (http://soundcloud.com/)
where a musician or DJ can upload their music
files, share them, and monitor the number of
listeners that have come by. There is a FREE
version, but the feebased version has additional
features.
There are also online storage for artists, such
as MyFolio (http://www.myfolio.com/) where
artists can store and share their artwork as well
as collaborate with other artists.
Issue 1 Page 5
6. Now ‐
For this workshop, we'll create an account at
4Shared.com since they offer 15GB of free
online storage, let's take advantage of this.
On your way to creating this account bear in
mind that there are somethings to watch out for.
For example, you will be asked to download and
install the "4Shared.com Toolbar" please
decline. In my experience, the toolbar has
some features that should be disabled, but
unfortunately, I was not able to get the "Toolbar
Options" to work at all.
You'll also be asked whether you want to
download and install "4Sync". This is a good
idea to do if you have multiple devices such as,
Laptops, Tablets, SmartPhones, etc. By
'syncing' all of your devices, you will always have
access to your information.
Page 6 Newsletter Header
7. How to store and share files!
After you establish your account, begin by
uploading files: documents, powerpoints,
spreadsheets, music/audio files, video clips,
graphics/photos, etc.
Select the file you wish to share.
Issue 1 Page 7
8. Type in the name(s) of the people you want to
share with and press ENTER when done.
The receipient(s) will reveive a notification
that something has been sent to them. Once this
notification is clicked, they can see what the item
is and if they choose to, click the item, then the
download process will begin.
Page 8 Newsletter Header
9. Once the download is complete, it will appear in
your list of files. Click the file to preview.
Click the DOWNLOAD button to store the file
onto your computer.
Issue 1 Page 9
10. How do you manage multiple
accounts?
If you're like me, who has multiple online
storage accounts and do not enjoy having to
login into every account to see where things are
located, then try ZeroPC [www.zeropc.com].
The user interface allows you to easily access
your accounts all at once. All this for FREE.
There is also a subscription option to ZeroPC,
where you can then add additional accounts to
your online storage arsenal, which in turn would
significantly increase your storage size
capabilities. I use the subscription version which
allows me to add additional Dropbox and
4Shared accounts. This interface can also be
accessed from your desktop, laptop, notebook or
netbook, and tablet.
Note: I have not tried a SmartPhone yet.
Page 10 Newsletter Header
11. One Location ‐ Accessed One Time ‐
With the FREE version, you can have all of
these accounts at your finger tips with just one
login.
You can view your accounts at a glance.
Issue 1 Page 11
12. At a glance, you'll be able to view the status of
your virtual storage drives.
Page 12 Newsletter Header
13. The ZeroPC Interface on your computer.
The interface as it looks on a tablet.
Issue 1 Page 13
14. A view of additional features
The Cloud
Page 14 Newsletter Header