The good, the bad and the tech strategy annashipman
A strategy tells you what you are going to do - and what you are NOT going to do - and should tie into your business strategy. Your tech strategy underpins much of the work that your team will do - and for that reason, it’s a critical document. But if we were to ask you now, could you really say what a tech strategy is or how your team contributes to it?
In this talk, we’ll outline some of the fundamentals of tech strategies. We’ll demonstrate how every strategy needs diagnosis (what is the problem?), vision (what end-state do you want to get to?) and coherent action (the plans, resource commitments, actions to get you to that desired end state).
After the launch: the difficult teenage yearsannashipman
The document discusses the challenges that can occur after launching a new product or system ("the difficult teenage years"). It recommends three strategies to address these challenges: 1) Set a clear vision for what comes after the initial launch; 2) Identify and prioritize the highest impact areas to focus on improving; 3) Communicate the vision and priorities extensively within and outside the team through updates, talks, blog posts and other channels. Repeated and thorough communication is important to ensure everyone understands the direction.
What I learnt at the Government Digital Serviceannashipman
The document discusses things Anna Shipman learned from her time at the Government Digital Service (GDS) and things she thinks GDS could learn from her current employer, the Financial Times. Specifically, she notes that GDS is relentlessly focused on understanding user needs, has regular retrospectives to improve processes, and does thorough work to simplify products and content. For things GDS could learn, she says the Financial Times has a clear mission that doesn't change, is highly data-driven in its decision making, and works to make employees feel valued through various benefits and rewards.
Analysing, Deciding, Doing: How to develop and execute an effective strategyannashipman
We all know we should have a strategy, but how to create a good strategy and drive it is not always obvious. This talk gives you tools and techniques to analyse your context, decide your strategy, and then execute it.
Paolo Zanzottera en The Inbounder: 'Historia de una app'We Are Marketing
The document discusses the challenges of developing successful mobile apps. It argues that app success in 2016 depends more on the business model than the app itself. Developers should focus on developing a strong business model idea that leverages the mobile platform, rather than just an app idea. The app is presented as a tool to enable the business model, not the central focus. Examples are given of how mobile apps like Uber succeeded due to their innovative business models rather than just their product.
This document summarizes the growth strategies implemented at Skyscanner over 4.5 years. It discusses transitioning to growth-focused teams organized into tribes. The key aspects that helped drive growth include adopting a lean startup approach with agile marketing principles. This involved highly aligned autonomous teams, frequent experimentation, and customer-focused collaboration across functions. It also emphasizes adopting a growth mindset and culture throughout the organization to support innovative strategies for driving impact.
This document provides an agenda and details for an event on app retention and engagement in Toronto, Canada. The agenda includes presentations on mobile retention strategies from CleverTap and a panel discussion with mobile app companies doing well in retention. Topics to be covered are the importance of analytics, segmentation, and personalized messaging for moving users through customer journeys in mobile apps. The document outlines segmentation techniques and how combining segmentation with timely, contextual messages can significantly improve user conversion rates.
The good, the bad and the tech strategy annashipman
A strategy tells you what you are going to do - and what you are NOT going to do - and should tie into your business strategy. Your tech strategy underpins much of the work that your team will do - and for that reason, it’s a critical document. But if we were to ask you now, could you really say what a tech strategy is or how your team contributes to it?
In this talk, we’ll outline some of the fundamentals of tech strategies. We’ll demonstrate how every strategy needs diagnosis (what is the problem?), vision (what end-state do you want to get to?) and coherent action (the plans, resource commitments, actions to get you to that desired end state).
After the launch: the difficult teenage yearsannashipman
The document discusses the challenges that can occur after launching a new product or system ("the difficult teenage years"). It recommends three strategies to address these challenges: 1) Set a clear vision for what comes after the initial launch; 2) Identify and prioritize the highest impact areas to focus on improving; 3) Communicate the vision and priorities extensively within and outside the team through updates, talks, blog posts and other channels. Repeated and thorough communication is important to ensure everyone understands the direction.
What I learnt at the Government Digital Serviceannashipman
The document discusses things Anna Shipman learned from her time at the Government Digital Service (GDS) and things she thinks GDS could learn from her current employer, the Financial Times. Specifically, she notes that GDS is relentlessly focused on understanding user needs, has regular retrospectives to improve processes, and does thorough work to simplify products and content. For things GDS could learn, she says the Financial Times has a clear mission that doesn't change, is highly data-driven in its decision making, and works to make employees feel valued through various benefits and rewards.
Analysing, Deciding, Doing: How to develop and execute an effective strategyannashipman
We all know we should have a strategy, but how to create a good strategy and drive it is not always obvious. This talk gives you tools and techniques to analyse your context, decide your strategy, and then execute it.
Paolo Zanzottera en The Inbounder: 'Historia de una app'We Are Marketing
The document discusses the challenges of developing successful mobile apps. It argues that app success in 2016 depends more on the business model than the app itself. Developers should focus on developing a strong business model idea that leverages the mobile platform, rather than just an app idea. The app is presented as a tool to enable the business model, not the central focus. Examples are given of how mobile apps like Uber succeeded due to their innovative business models rather than just their product.
This document summarizes the growth strategies implemented at Skyscanner over 4.5 years. It discusses transitioning to growth-focused teams organized into tribes. The key aspects that helped drive growth include adopting a lean startup approach with agile marketing principles. This involved highly aligned autonomous teams, frequent experimentation, and customer-focused collaboration across functions. It also emphasizes adopting a growth mindset and culture throughout the organization to support innovative strategies for driving impact.
This document provides an agenda and details for an event on app retention and engagement in Toronto, Canada. The agenda includes presentations on mobile retention strategies from CleverTap and a panel discussion with mobile app companies doing well in retention. Topics to be covered are the importance of analytics, segmentation, and personalized messaging for moving users through customer journeys in mobile apps. The document outlines segmentation techniques and how combining segmentation with timely, contextual messages can significantly improve user conversion rates.
This document discusses the importance of providing constructive feedback during performance reviews and 1:1 meetings. It encourages managers to give specific, actionable feedback to employees to help them improve, with one thing the employee does well and one thing that could be improved. It also notes that feedback should be given sincerely and soon after the relevant event to be most helpful, and that employees can choose whether to apply feedback they receive. The overall message is that constructive feedback is a gift that can help both parties improve.
This document discusses the Government Digital Service's approach to open source software. It notes that in 2012, GOV.UK was first launched and by 2016, much of the government's code was openly accessible. The key aspects of the GDS's open source approach are using existing open source software, contributing to open source projects, and openly publishing their own code. The document outlines several benefits of this approach, including improved code quality, increased collaboration, and greater transparency around government technology work. It also acknowledges some challenges of open source like security risks but argues that open source overall helps make government more digital by default.
At the UK's Government Digital Service, we write most of our code in the open. This has been a huge transformation from the previous government culture. This talk is about how we got here, how this works for us and what's next.
Slides from my http://2015.ffconf.org/ talk.
Links on the last page:
Configuration management
https://www.scriptrock.com/articles/the-7-configuration-management-tools-you-need-to-know
http://gettingstartedwithchef.com/first-steps-with-chef.html
https://docs.vagrantup.com/v2/getting-started/provisioning.html
Virtualisation
http://searchvirtualdatacentre.techtarget.co.uk/definition/Virtualisation
http://searchservervirtualization.techtarget.com/definition/server-virtualization
http://www.infoworld.com/article/2621446/server-virtualization/server-virtualization-top-10-benefits-of-server-virtualization.html
Using Vagrant
https://www.vagrantup.com/
http://blog.bennycornelissen.nl/otto-a-modern-developers-new-best-friend/
https://github.com/patrickdlee/vagrant-examples (Useful getting started examples)
Docker
http://patg.net/containers,virtualization,docker/2014/06/05/docker-intro/
https://zeltser.com/security-risks-and-benefits-of-docker-application/
Containerisation vs Virtualisation
http://www.slideshare.net/bcantrill/docker-and-the-future-of-containers-in-production
https://www.scriptrock.com/articles/docker-vs-vagrant
Make instead of Grunt/Gulp
http://blog.keithcirkel.co.uk/why-we-should-stop-using-grunt/
https://www.youtube.com/watch?v=0RYETb9YVrk (Talk on using NPM as a build tool)
https://blog.jcoglan.com/2014/02/05/building-javascript-projects-with-make/
Tools for better dev
http://www.leancrew.com/all-this/2011/12/more-shell-less-egg/ (More detail on the 6-line Unix program)
Delivering GOV.UK: Devops for the nationannashipman
This document discusses how the Government Digital Service (GDS) implements DevOps practices to deliver GOV.UK, the United Kingdom's central government website. It provides an overview of how GDS uses an agile approach with developers deploying their own code to production. It also describes some of the tools and processes used, such as monitoring, on-call responsibilities, and documenting systems for new employees. Challenges of implementing DevOps in a government context are also mentioned.
The document discusses how the Government Digital Service built vCloud Tools to automate provisioning of virtual machines using vCloud Director and the vCloud API. It describes how they used open, agile practices with multidisciplinary teams, GDS development practices like Git, code review and testing, and integrating with tools like Jenkins. It also discusses some of the hard problems encountered with conflicting requirements from early users and upgrades.
Slides from my 2013 Strata/Velocity Ignite talks. If you don't know how an Ignite talk works: you submit 20 slides and they advance automatically every 15 seconds :)
This talk was inspired by my experiences with a leak in my flat - written up in this blog post: http://www.annashipman.co.uk/jfdi/roof-bug-fixing.html
The author's roof was recently repaired and she wants the repairers to test it to ensure it is truly fixed. While they claim the roof is repaired, she remains unsure and wants an inspection to ease her fears that it may not be properly fixed.
The document outlines an agenda for a presentation, including sections on background context, what was wanted to be achieved, what was tried, something that succeeded, something that failed, something surprising, and reflections six months later. The presentation is for the Government Digital Service and will be given by James Stewart, Technical Architect, and Anna Shipman, Developer.
Andy Parker and Mike Hill won an egg race with their entry for the SPA 2011 competition. Their winning entry involved using SVG paths, JSON data structures, and JavaScript libraries like D3 and Raphael to create interactive data visualizations. The document provided several useful links about techniques and libraries for creating SVG and canvas graphics and visualizing data in JavaScript.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
This document discusses the importance of providing constructive feedback during performance reviews and 1:1 meetings. It encourages managers to give specific, actionable feedback to employees to help them improve, with one thing the employee does well and one thing that could be improved. It also notes that feedback should be given sincerely and soon after the relevant event to be most helpful, and that employees can choose whether to apply feedback they receive. The overall message is that constructive feedback is a gift that can help both parties improve.
This document discusses the Government Digital Service's approach to open source software. It notes that in 2012, GOV.UK was first launched and by 2016, much of the government's code was openly accessible. The key aspects of the GDS's open source approach are using existing open source software, contributing to open source projects, and openly publishing their own code. The document outlines several benefits of this approach, including improved code quality, increased collaboration, and greater transparency around government technology work. It also acknowledges some challenges of open source like security risks but argues that open source overall helps make government more digital by default.
At the UK's Government Digital Service, we write most of our code in the open. This has been a huge transformation from the previous government culture. This talk is about how we got here, how this works for us and what's next.
Slides from my http://2015.ffconf.org/ talk.
Links on the last page:
Configuration management
https://www.scriptrock.com/articles/the-7-configuration-management-tools-you-need-to-know
http://gettingstartedwithchef.com/first-steps-with-chef.html
https://docs.vagrantup.com/v2/getting-started/provisioning.html
Virtualisation
http://searchvirtualdatacentre.techtarget.co.uk/definition/Virtualisation
http://searchservervirtualization.techtarget.com/definition/server-virtualization
http://www.infoworld.com/article/2621446/server-virtualization/server-virtualization-top-10-benefits-of-server-virtualization.html
Using Vagrant
https://www.vagrantup.com/
http://blog.bennycornelissen.nl/otto-a-modern-developers-new-best-friend/
https://github.com/patrickdlee/vagrant-examples (Useful getting started examples)
Docker
http://patg.net/containers,virtualization,docker/2014/06/05/docker-intro/
https://zeltser.com/security-risks-and-benefits-of-docker-application/
Containerisation vs Virtualisation
http://www.slideshare.net/bcantrill/docker-and-the-future-of-containers-in-production
https://www.scriptrock.com/articles/docker-vs-vagrant
Make instead of Grunt/Gulp
http://blog.keithcirkel.co.uk/why-we-should-stop-using-grunt/
https://www.youtube.com/watch?v=0RYETb9YVrk (Talk on using NPM as a build tool)
https://blog.jcoglan.com/2014/02/05/building-javascript-projects-with-make/
Tools for better dev
http://www.leancrew.com/all-this/2011/12/more-shell-less-egg/ (More detail on the 6-line Unix program)
Delivering GOV.UK: Devops for the nationannashipman
This document discusses how the Government Digital Service (GDS) implements DevOps practices to deliver GOV.UK, the United Kingdom's central government website. It provides an overview of how GDS uses an agile approach with developers deploying their own code to production. It also describes some of the tools and processes used, such as monitoring, on-call responsibilities, and documenting systems for new employees. Challenges of implementing DevOps in a government context are also mentioned.
The document discusses how the Government Digital Service built vCloud Tools to automate provisioning of virtual machines using vCloud Director and the vCloud API. It describes how they used open, agile practices with multidisciplinary teams, GDS development practices like Git, code review and testing, and integrating with tools like Jenkins. It also discusses some of the hard problems encountered with conflicting requirements from early users and upgrades.
Slides from my 2013 Strata/Velocity Ignite talks. If you don't know how an Ignite talk works: you submit 20 slides and they advance automatically every 15 seconds :)
This talk was inspired by my experiences with a leak in my flat - written up in this blog post: http://www.annashipman.co.uk/jfdi/roof-bug-fixing.html
The author's roof was recently repaired and she wants the repairers to test it to ensure it is truly fixed. While they claim the roof is repaired, she remains unsure and wants an inspection to ease her fears that it may not be properly fixed.
The document outlines an agenda for a presentation, including sections on background context, what was wanted to be achieved, what was tried, something that succeeded, something that failed, something surprising, and reflections six months later. The presentation is for the Government Digital Service and will be given by James Stewart, Technical Architect, and Anna Shipman, Developer.
Andy Parker and Mike Hill won an egg race with their entry for the SPA 2011 competition. Their winning entry involved using SVG paths, JSON data structures, and JavaScript libraries like D3 and Raphael to create interactive data visualizations. The document provided several useful links about techniques and libraries for creating SVG and canvas graphics and visualizing data in JavaScript.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
The difficult teenage years: setting your tech strategy after the launch
1. Anna Shipman
Tech Director of Customer Products, Financial Times
@annashipman
The di
ffi
cult teenage
years: setting your tech
strategy after the launch