A presentation of KeeeX, the onty totally private, sustainable, blockchain and future ready collaboration solution.
This document supersedes and replaces the previous teaser xukih-mazav
This document aims at listing key issues in Data Governance and study the value offered by KeeeX (http://keeex.io)
• KeeeX is non intrusive, since documents retain normal functionality, and there is no infrastructure
• Hence KeeeX needs not solve the whole technical data governance problem, but may operate as a complement to existing frameworks and infrastructures
[JSDC 2021] Blockchain 101 for Frontend EngsLucien Lee
Talk video(Chinese): https://vimeo.com/641650302
The blockchain introduction for frontend engineers, talk at JSDC TW 2021
In the talk, I shared what's blockchain and its taxonomy for newbies. Then, I explain how blockchain can provide a "decentralized", "unforgeable" and "immutable" p2p network.
Finally, you will learn, as frontend engs, how do you join the trend of the blockchain.
---
前端工程師也可以懂的區塊鏈, JSDC 2021
在 20 分鐘內,帶你快速了解區塊鏈是什麼,以及區塊鏈可以做到什麼?我用樸實簡單的語言帶你揭開區塊鏈神秘的面紗,最後分享作為一個前端工程師,你可以怎麼加入區塊鏈的浪潮。
The world is growing more decentralized, in large part due to the transformative power of the internet.
- While originally thought to be isolated to use cases such as email and news media, the internet laid the foundation for unprecedented, multi-billion dollar industries and innovations such as ecommerce, social media, the cloud, smartphones, and online gaming
- However, the internet also enabled activities like identity theft, unwarranted surveillance, and the monopolization of personal data
- Blockchains bring security and privacy to the decentralized, digital world potentially addressing many of these undesirable consequences of the internet
Blockchain technology carries a similar revolutionary potential to that of the internet, though be wary of the hype.
- By making certain data immutable and shared across a network, blockchains allow value to be digitized, exchanged, and recorded without the facilitation (and cost) of a trusted third party – something truly unprecedented
- This means that any industries not already disrupted by the internet whose services include data collection, curation, verification, and/or dissemination could now be disrupted, especially those that are currently centralized and monopolized (e.g., banking)
- This also means that services previously susceptible to malpractice once digitized (e.g., voting and music sharing) can now be safely and securely brought into the 21st century
- And finally, this means that the tedious activities associated with data silos and imperfect communication, like filling out a medical history form every time we visit a new doctor, can be things of the past. We can now make (and own) one record that's stored on an immutable, append-only blockchain, and anyone we select can reference our record anywhere at any time
- Despite this awesome potential, we are still very much in the early 90s of the blockchain adoption and development curves. Much work has yet to be done as the technology matures, and business cases are only beginning to be flushed out. The priority now is to learn and pursue low-risk pilots
This report explores the definition of blockchains, how they work, the current state, and next steps for putting distributed ledger technologies on the radar.
For more information, please visit www.scottmadden.com.
Deja vu Security - Blockchain Security Summit - Adam CecchettiScott Strang
Deja vu Security and Peach Tech founder Adam Cecchetti slides from Deja vu Security's December 2017 Security Summit.
The Realities of Enterprise Blockchain
Blockchain is currently everywhere and on the minds of everyone from entrepreneurs to enterprise architects. This talk will explore some of the enterprise focused Blockchain technologies. It will overview how they can fit in the enterprise security ecosystem and what security, integrity, and transnational guarantees they can and cannot provide.
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
Blockchain is a tool. Samson Williams likens blockchain to a group text message, in which each participant receives a distributed, time-stamped, tamper-resistant (and encrypted) record of data transactions. Each group text has these characteristics. Everyone in the group “sees” the data, and none can change or gainsay any group message. Smart contracts are computer code put on the blockchain (how, exactly?) that establishes self-executing terms and conditions of a transaction. Are smart contracts smart? If certain data comes in and fulfills a pre-set term or condition, then rights and responsibilities are formed, terminated, modified, or shifted among the parties. Ah certainty and transparency, but also ah garbage in and garbage out. Are some contractual terms not amenable to smart contracting? And are smart contracts necessarily contracts? If not, can they still be useful? If a smart contract is a contract, what is the governing document? Is it the words business people and lawyers use, or is it the code that is supposed to reflect the words?
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/blockchain-and-smart-contracts-2021/
This document aims at listing key issues in Data Governance and study the value offered by KeeeX (http://keeex.io)
• KeeeX is non intrusive, since documents retain normal functionality, and there is no infrastructure
• Hence KeeeX needs not solve the whole technical data governance problem, but may operate as a complement to existing frameworks and infrastructures
[JSDC 2021] Blockchain 101 for Frontend EngsLucien Lee
Talk video(Chinese): https://vimeo.com/641650302
The blockchain introduction for frontend engineers, talk at JSDC TW 2021
In the talk, I shared what's blockchain and its taxonomy for newbies. Then, I explain how blockchain can provide a "decentralized", "unforgeable" and "immutable" p2p network.
Finally, you will learn, as frontend engs, how do you join the trend of the blockchain.
---
前端工程師也可以懂的區塊鏈, JSDC 2021
在 20 分鐘內,帶你快速了解區塊鏈是什麼,以及區塊鏈可以做到什麼?我用樸實簡單的語言帶你揭開區塊鏈神秘的面紗,最後分享作為一個前端工程師,你可以怎麼加入區塊鏈的浪潮。
The world is growing more decentralized, in large part due to the transformative power of the internet.
- While originally thought to be isolated to use cases such as email and news media, the internet laid the foundation for unprecedented, multi-billion dollar industries and innovations such as ecommerce, social media, the cloud, smartphones, and online gaming
- However, the internet also enabled activities like identity theft, unwarranted surveillance, and the monopolization of personal data
- Blockchains bring security and privacy to the decentralized, digital world potentially addressing many of these undesirable consequences of the internet
Blockchain technology carries a similar revolutionary potential to that of the internet, though be wary of the hype.
- By making certain data immutable and shared across a network, blockchains allow value to be digitized, exchanged, and recorded without the facilitation (and cost) of a trusted third party – something truly unprecedented
- This means that any industries not already disrupted by the internet whose services include data collection, curation, verification, and/or dissemination could now be disrupted, especially those that are currently centralized and monopolized (e.g., banking)
- This also means that services previously susceptible to malpractice once digitized (e.g., voting and music sharing) can now be safely and securely brought into the 21st century
- And finally, this means that the tedious activities associated with data silos and imperfect communication, like filling out a medical history form every time we visit a new doctor, can be things of the past. We can now make (and own) one record that's stored on an immutable, append-only blockchain, and anyone we select can reference our record anywhere at any time
- Despite this awesome potential, we are still very much in the early 90s of the blockchain adoption and development curves. Much work has yet to be done as the technology matures, and business cases are only beginning to be flushed out. The priority now is to learn and pursue low-risk pilots
This report explores the definition of blockchains, how they work, the current state, and next steps for putting distributed ledger technologies on the radar.
For more information, please visit www.scottmadden.com.
Deja vu Security - Blockchain Security Summit - Adam CecchettiScott Strang
Deja vu Security and Peach Tech founder Adam Cecchetti slides from Deja vu Security's December 2017 Security Summit.
The Realities of Enterprise Blockchain
Blockchain is currently everywhere and on the minds of everyone from entrepreneurs to enterprise architects. This talk will explore some of the enterprise focused Blockchain technologies. It will overview how they can fit in the enterprise security ecosystem and what security, integrity, and transnational guarantees they can and cannot provide.
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
Blockchain is a tool. Samson Williams likens blockchain to a group text message, in which each participant receives a distributed, time-stamped, tamper-resistant (and encrypted) record of data transactions. Each group text has these characteristics. Everyone in the group “sees” the data, and none can change or gainsay any group message. Smart contracts are computer code put on the blockchain (how, exactly?) that establishes self-executing terms and conditions of a transaction. Are smart contracts smart? If certain data comes in and fulfills a pre-set term or condition, then rights and responsibilities are formed, terminated, modified, or shifted among the parties. Ah certainty and transparency, but also ah garbage in and garbage out. Are some contractual terms not amenable to smart contracting? And are smart contracts necessarily contracts? If not, can they still be useful? If a smart contract is a contract, what is the governing document? Is it the words business people and lawyers use, or is it the code that is supposed to reflect the words?
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/blockchain-and-smart-contracts-2021/
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017BigchainDB
Towards the internet of value & trust.
"To develop shared global compute infrastructure,
we must first understand the status quo of infrastructure,
...and how to change it accordingly."
Dimitri De Jonghe, lead developer of BigchainDB talking about blockchain technology beyond the financial sector.
Blockchain for Land Records and Real EstateJohn Mirkovic
An in-depth presentation on why and how blockchain technology can be applied to keeping government records of real estate transactions. Information on how bitcoin and blockchains function.
Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Abstract.
A purely peer-to-peer version of electronic cash would allow online
payments to be sent directly from one party to another without going through a
financial institution. Digital signatures provide part of the solution, but the main
benefits are lost if a trusted third party is still required to prevent double-spending.
We propose a solution to the double-spending problem using a peer-to-peer network.
The network timestamps transactions by hashing them into an ongoing chain of
hash-based proof-of-work, forming a record that cannot be changed without redoing
the proof-of-work. The longest chain not only serves as proof of the sequence of
events witnessed, but proof that it came from the largest pool of CPU power. As
long as a majority of CPU power is controlled by nodes that are not cooperating to
attack the network, they'll generate the longest chain and outpace attackers. The
network itself requires minimal structure. Messages are broadcast on a best effort
basis, and nodes can leave and rejoin the network at will, accepting the longest
proof-of-work chain as proof of what happened while they were gone.
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...Edureka!
** Blockchain Training: https://www.edureka.co/blockchain-training **
This Edureka's Blockchain tutorial consists of the frequently asked Blockchain Interview Questions which will help you in the preparation of Blockchain Interviews. Below are the topics covered in this tutorial:
1. Blockchain Market Trends
2. General Blockchain Interview Questions
3. Advanced Blockchain Interview Questions
Here is the link to the Blockchain blog series: https://goo.gl/DPoAHR
You can also refer this playlist on Blockchain: https://goo.gl/V5iayd
Blockchain Primer - Founder Collective - December 2017Parul Singh
As 2017 comes to a close, blockchain is everywhere (or more accurately perhaps “bitcoin, bitcoin, bitcoin.”) here is a primer on blockchain that I prepared for my team at Founder Collective to help frame some of the exciting use cases we see coming down the pike. Further reading is on the last slide.
Why Blockchain Matters to Big Data - Big Data London Meetup - Nov 3, 2016BigchainDB
Why does blockchain matter to Big Data?
Bruce Pon, CEO and Co-Founder of BigchainDB talks about how blockchain and big data work together.
Follow BigchainDB on LinkedIn, download the whitepaper or sign up with at the IPDB Foundation to get access to a first test network build with BigchainDB to build your own blockchain application.
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...Edureka!
This Edureka "Getting started With BlockChain" tutorial will help you in understanding the fundamentals of BitCoin and Blockchain. Below are the topics covered in this tutorial.
1. Issues with Current Banking Systems
2. How Bitcoin solves these issues?
3. Bitcoin Transaction
4. BlockChain to the rescue
5. BlockChain Concepts
6. BlockChain Features
7. BlockChain Use Cases
8. Demo – Banking Use Case
Here is a structured training on BlockChain, check out the details: https://goo.gl/Z9rJgU
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Blockchain is one of the trending technology that is catching up in the tech space. It solves multiple use cases where the data integrity should be high. In this ppt, the author has worked on explaining the concepts in a simple and elegant way
Rather than trying to scale up blockchain technology, BigchainDB starts with a big data distributed database and then adds blockchain characteristics - decentralized control, immutability and the transfer of digital assets.
This introductory session for the security model of blockchain will cover the 101 of blockchain technology, how transactions work and the use of cryptography for securing the distributed ledger, private and public keys, multisignature and review one of the hacks Ethereum has been exposed to, the parity wallet hack.
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
A primer on Blockchain, Semantic Web and Ricardian Contracts.
Semantic Blockchain is a proposal where the Semantic Web meets the Blockchain. Combining these two technologies could provide the Semantic web with a transparent proof of work and trust mechanism while conversely disambiguating data stored on the blockchain, solving one of the key challenges with Riccardian/Smart contracts. This presentation will explore how these two technologies might be combine using the example of a smart contract. However the potential application is much bigger and could provide a key back bone underlying the Internet of Things.
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017BigchainDB
Towards the internet of value & trust.
"To develop shared global compute infrastructure,
we must first understand the status quo of infrastructure,
...and how to change it accordingly."
Dimitri De Jonghe, lead developer of BigchainDB talking about blockchain technology beyond the financial sector.
Blockchain for Land Records and Real EstateJohn Mirkovic
An in-depth presentation on why and how blockchain technology can be applied to keeping government records of real estate transactions. Information on how bitcoin and blockchains function.
Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Abstract.
A purely peer-to-peer version of electronic cash would allow online
payments to be sent directly from one party to another without going through a
financial institution. Digital signatures provide part of the solution, but the main
benefits are lost if a trusted third party is still required to prevent double-spending.
We propose a solution to the double-spending problem using a peer-to-peer network.
The network timestamps transactions by hashing them into an ongoing chain of
hash-based proof-of-work, forming a record that cannot be changed without redoing
the proof-of-work. The longest chain not only serves as proof of the sequence of
events witnessed, but proof that it came from the largest pool of CPU power. As
long as a majority of CPU power is controlled by nodes that are not cooperating to
attack the network, they'll generate the longest chain and outpace attackers. The
network itself requires minimal structure. Messages are broadcast on a best effort
basis, and nodes can leave and rejoin the network at will, accepting the longest
proof-of-work chain as proof of what happened while they were gone.
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...Edureka!
** Blockchain Training: https://www.edureka.co/blockchain-training **
This Edureka's Blockchain tutorial consists of the frequently asked Blockchain Interview Questions which will help you in the preparation of Blockchain Interviews. Below are the topics covered in this tutorial:
1. Blockchain Market Trends
2. General Blockchain Interview Questions
3. Advanced Blockchain Interview Questions
Here is the link to the Blockchain blog series: https://goo.gl/DPoAHR
You can also refer this playlist on Blockchain: https://goo.gl/V5iayd
Blockchain Primer - Founder Collective - December 2017Parul Singh
As 2017 comes to a close, blockchain is everywhere (or more accurately perhaps “bitcoin, bitcoin, bitcoin.”) here is a primer on blockchain that I prepared for my team at Founder Collective to help frame some of the exciting use cases we see coming down the pike. Further reading is on the last slide.
Why Blockchain Matters to Big Data - Big Data London Meetup - Nov 3, 2016BigchainDB
Why does blockchain matter to Big Data?
Bruce Pon, CEO and Co-Founder of BigchainDB talks about how blockchain and big data work together.
Follow BigchainDB on LinkedIn, download the whitepaper or sign up with at the IPDB Foundation to get access to a first test network build with BigchainDB to build your own blockchain application.
BlockChain Tutorial | Getting Started With BlockChain | BlockChain Certificat...Edureka!
This Edureka "Getting started With BlockChain" tutorial will help you in understanding the fundamentals of BitCoin and Blockchain. Below are the topics covered in this tutorial.
1. Issues with Current Banking Systems
2. How Bitcoin solves these issues?
3. Bitcoin Transaction
4. BlockChain to the rescue
5. BlockChain Concepts
6. BlockChain Features
7. BlockChain Use Cases
8. Demo – Banking Use Case
Here is a structured training on BlockChain, check out the details: https://goo.gl/Z9rJgU
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Blockchain is one of the trending technology that is catching up in the tech space. It solves multiple use cases where the data integrity should be high. In this ppt, the author has worked on explaining the concepts in a simple and elegant way
Rather than trying to scale up blockchain technology, BigchainDB starts with a big data distributed database and then adds blockchain characteristics - decentralized control, immutability and the transfer of digital assets.
This introductory session for the security model of blockchain will cover the 101 of blockchain technology, how transactions work and the use of cryptography for securing the distributed ledger, private and public keys, multisignature and review one of the hacks Ethereum has been exposed to, the parity wallet hack.
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
A primer on Blockchain, Semantic Web and Ricardian Contracts.
Semantic Blockchain is a proposal where the Semantic Web meets the Blockchain. Combining these two technologies could provide the Semantic web with a transparent proof of work and trust mechanism while conversely disambiguating data stored on the blockchain, solving one of the key challenges with Riccardian/Smart contracts. This presentation will explore how these two technologies might be combine using the example of a smart contract. However the potential application is much bigger and could provide a key back bone underlying the Internet of Things.
File share and sync (bara) är så 2017!
Att dela filer bekvämt och säkert var bara början. Box har gått vidare till att integrera delade filer i applikationer och processflöden, och revolutionera både internt och externt arbete. Hur kan det revolutionera för dig?
Talare: Jan Hygstedt, Director Nordic, Box
Presentation från Watson Kista Summit 2018
Most people have heard of Bitcoin, and also know that blockchain is one of the underlying concepts behind this cryptocurrency. However, the ability to share information via a shared, trusted distributed network with embedded business logic also has many potential benefits for an enterprise deployment.
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final.pptx
Optimizing slideshow...
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final.pptx
Optimizing slideshow...
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final.pptx
Optimizing slideshow...
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final.pptx
Optimizing slideshow...
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final.pptx
Optimizing slideshow...
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final.pptx
Optimizing slideshow...
the advanced robot went over the hill to find the bunker filled with explosives
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
Watch full webinar here: https://bit.ly/3xWXuSN
Malgré le besoin croissant d'agilité, les entreprises restent réticientes à héberger leur données sensibles dans le Cloud pour des raisons de sécurité. Par ailleurs, le chiffrement basique ne suffit plus, car masquer la donnée ou la fournir de façon partielle empêche son utilisation.
La cryptographie avancée associée à la Logical Data Fabric constitue un duo gagnant pour intensifier l’utilisation de ces données sensibles dans le Cloud tout en garantissant le maximum de sécurité et de confidentialité. D’une part, la Logical Data Fabric permet aux organisations ayant un écosystème hybride d’accéder à l’ensemble de leur patrimoine data en temps réel tout en étalissant des politiques de sécurité, alors que la cryptographie avancée permet de stocker les données chiffrées dans le cloud, même pendant son utilisation, tout en y incluant des droits d’accès.
Rejoignez ce webinar pour découvrir :
- Les enjeux d’accès et de partage des données dans les environnements hybrides et multiclouds.
- Comment la Logical Data Fabric de Denodo simplifie l’adoption du Cloud grâce à un point unique d’accès à la donnée tout en fournissant une couche de sécurité et de gouvernance.
- Comment les fonctionnalités avancées de la cryptographie de Cosmian se différencient des approches traditionnelles de chiffrement.
- Une démo live sur comment la cryptographie applicative permet de créer des politiques de sécurité et d’accès aux données dans des environnements zéro trust.
Securing Your CI Pipeline with HashiCorp Vault - P2Ashnikbiz
Today, CI/CD is becoming a practice for optimum software delivery in almost every organization. What is key is how you manage the secrets in your pipeline, especially in a large organization with multiple projects, across several teams.
Hashicorp Vault helps organizations to centrally manage secrets even in your CI/CD pipelines.
WEBINAR COVERS:
Why is it critical to secure your pipeline which needs to access a lot of important secrets in order to provision and deploy
How Vault provides a unified interface to any secret while providing tight access control and recording a detailed audit log
Customer use cases and scenarios
Demo: How to secure your CI pipeline with Vault
Watch on demand: https://bit.ly/35QCq0u
A Litigator's Guide to Cloud-Based eDiscovery and Document ReviewLexbe_Webinars
Newer scalable cloud computing allows firms to access substantial processing and review capacity when needed, at a fraction of traditional costs. When properly addressed, security increases in a cloud environment. This is a result of dedicated security staff, locked down data centers, data center certifications, full data encryption, and overall best practices security and confidentiality. These improvements amazingly come at a lower cost than traditional approaches.
Ten Things Every Tech Savvy Exec Should KnowDeltinaU
A guide for COOs, CEOs, CFOs, or any exec looking to become tech savvy. Ten Things Every Tech Savvy Exec Should Know features information on Social Media, Cloud Computing, Mobile Apps, Advanced Analytics, Customer Relations Managers, Collaborative Technologies, Tablet Computers, E-Readers, Smart Phones, and more.
APIdays Paris 2018 - Cloud computing - we went through every steps of the Gar...apidays
Cloud computing - we went through every steps of the Gartner Hype cycle. Now it's time to debrief.
Ludovic Piot, Lead of Customer Care, Clever Cloud
Apply to be a speaker here - https://apidays.typeform.com/to/J1snsg
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
Nov. 2020 presentation on Insurtech, how cloud is enabling insurtech and cybersecurity for cloud and insurtech.
Prepared by Henrique Centieiro for CII - Chartered Insurance Institute Hong Kong
There is a lot of talk in technology circles about 'the Cloud' these days. Wondering what it means for you and your business systems? While this new era of cloud computing can bring benefits to your organization these need to be weighed against the risks.
Learn from experts what is really happening today and what you should be considering for the future.
Internet of Things (IoT) - in the cloud or rather on-premises?Guido Schmutz
You want to implement a Big Data or Internet of Things (IoT) solution and like to know if it should be implemented in the cloud or on-premises. You are interested in the cloud offerings of vendors and what benefits they provide and if a similar solution would not be possible on-premises.
This presentation deals with this and other questions. Starting from a vendor-independent reference architecture and corresponding design patterns, different cloud solutions from various vendors are compared and rated. Additionally, it will be shown how such solution could be implemented on-premises and how a hybrid IoT solution could look like.
Similar to The KeeeX teaser 2015-12-23-lh-xovoz-tonos (20)
Projet MeRS restitution finale kx-lh-2019-12-02-xuheh-gofigLaurent Henocque
Le projet MeRS a permis la mise en oeuvre d'une solution blockchain pour la dématérialisation du flux documentaire export multimodal entre Lyon et Marseille Fos. Le document en décrit les enjeux et témoigne des choix techniques effectués et des perspectives.
Une présentation de KeeeX, l'unique solution de collaboration à la fois totalement confidentielle, pérenne et compatible avec le futur des données, les blockchain.
Ce document subsume et remplace le précédent xoloh-lypin-cemem.
How One to One Sharing Enforces Secure Collaboration - xonomLaurent Henocque
Slides presented at Connect Security World Marseille 2015-08-06-lh-xonom
KeeeX lets users define per recipient sharing means (over weblinks, dropbox, google drive, even nfs or webdav) and encryption settings.
Then sharing targets can be selected in a single click: no groups, no access rights, extreme simplicity.
KeeeX is unique no infrastructure, #nosaas solution.
Présentation Trophées Euro Cloud (KeeeX version xunab)Laurent Henocque
Présentation réalisée aux Trophées du Cloud, organisé par Eurocloud France, le vendredi 10 Juillet 2015 au grand auditorium du Palais Brongniart à Paris, pour la dernière journée de la Cloud Week 2015 Paris
KeeeX - Kit de Survie dans la Jungle Numérique - xuros-zebom-vesihLaurent Henocque
Ce diaporama est une présentation non technique de KeeeX. En deux parties. Il est destiné à illustrer les difficultés auxquelles KeeeX (http://keeex.io) permet de répondre.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
1. Totally Private, Sustainable, Blockchain ready Collaboration
Reclaim and Futurize your Collaboration
Teaser December 2015
http://keeex.me
2. We need collaboration tools.
But we distrust Cloud and SaaS.
Increasing need in
agile collaboration
Decreasing trust in cloud
privacy & security
Facts
ROI > 800%
$5.9B 2018
Losses in IP ?
Unfair competition ?
Sources Mc Kinsey…
3. ‣ Files neither carry their own trust, nor organization
‣ We thus cannot operate them away from infrastructures or servers
‣ We cannot deploy file based automation
We need Cloud apps because we think that trusting
standalone files is impossible
Alice Bob
Please send me F!
Is this really F ? The latest?
The right version? Unmodified?
Facts
So we need a server
4. However, organizing Data inside‘trusted’servers has a
huge cost
Search, wrong versions, redoing
SaaS , network issues
Disconnected and incompatible apps,
processes, data silos
Heavy, expensive, non sustainable
infrastructures
Files needing protection by
2020
90%
6s
9h
per page load
per week
M€
Facts
Sources IDC, Esselte, Xerox…
So why not do the opposite?
5. approval
second
version
reference
first
version
final version
KeeeX is a game changer. It injects trust, versions, tags,
links, digital signatures straight inside files. No tier.
tag...
TAG: Report
KX
KX
KX
KXKX
reference
TheInnovation
A unique, patent
protected process.
Works with 250+
file formats
6. ‣ prove that a file was never modified wherever it is, in any format
‣ warrant that Paul in Marseille and Jim in New York read the same
‣ prove author authenticity
‣ embed organization and versions
‣ share confidentially
‣ allow for finding anywhere
KeeeX can, without infrastructure :
KeeeX
7. This is the KeeeX app! Sipmple as SMS. Available
worldwide. Freemium
KeeeX
beta
2016
Agile, social, secure
but
keeps files on your
side, instantly
localizable
8. KeeeX in entreprise, to do what ?
‣ To work faster, better, lose nothing.
‣ To simplify intra and inter private sharing
‣ To discard incompatible captive solutions
‣ To connect processes and control data
‣ To protect one’s Industrial Property
‣ To use blockchains, smart contracts, timestamping
‣ To leverage the value of their digital heritage
‣ To safeguarrd all possibilities of future data reuse
KeeeX
10. KeeeX creates on your side a self organized, valid and
authenticated document network, blockchain ready
10
certifies
topaz
11. 'topaz ?'
'topaz !'
Search becomes instantaneous, exact, humanized
Internet
Disk
DB - ECM
Cloud
Ultimately even on the internet,
even with Unix ‘GREP’
'topaz !'
'topaz !''topaz !'
KeeeX
13. Your Identity can be certified by someone who knows
you!
…
certifies
topaz
+
public key
+
signature
certifies
Tech
certifies
certifies
certifies
certifies
14. Digital Signatures can also be checked online
Here a signature
verified in one click on
http://coinig.com
Example
15. Hubic, Dropbox, Box, S3, NFS, NAS …
Absolute P2P
KeeeX encrypts on client side. Any content. Over any
channel. And does not see a single byte of user data.
Tech
Cloud sync folders are promoted to
secure transfer channels
Dropbox, Box, OneDrive, GoogleDrive
… become Zero Knowledge
16. KeeeX memorises per user encryption and sharing
settings - Peer 2 Peer - M2M
KX
Tech
KeeeX uses state of the art for
computing a shared secret, freely
revoquable and renewable, without
publicc key exchange, different on
every machine
Diffie Hellmann, AES 256, SHA 256, ECDSA,
symmetric cryptography, elliptic signatures
17. KeeeX
All this with no Risk, no Tie-In, no Change
Low CPU & memory
footprint
KeeeX does not reveal your
private data
No change in infrastructures
No change in legacy software
Your files behave as before
KeeeX
18. Dematerializing processes is an industrial must
‣ Quality control
‣ Digital notarization of contracts, bills
‣ Virtual property transfer (letters of credit)
‣ Massive development of blockchains for timestamped
notarization and smart contracts
‣ Some proofs must be made public, or accessible to tiers
with no infrastructure
Facts
19. A keeexed file can be timestamped using
Twitter, G+, Facebook… Even an email.
topaz
topaz
topaz
topaz
Tech
21. Every keeexed file can be timestamped or smart
contracted over a blockchain (Bitcoin…)
topaz
topaz
Tech
Notarizing a single
document protects the
entire tre of its
references
23. Ensuring the sustainable value of data is difficult
‣ Data are split across non connected, non sustainable silos
‣ Processes cannot easily be connected
‣ Every new need is served by a new fancy app
‣ The entreprise loses the control of data
‣ It is very hard to value older data using new tools
‣ The business model of apps exploits the cost of leaving
Facts
24. Disk ,Cloud sync …
Local NoSQL DB
KeeeX
Plugin
Manager
An API opens data for unlimited future exploitation
Tech
29. Industry and people initiate an ultra
secure re appropriation of their data
and IP as well as their publication,
sharing, collaboration under total
control, yet accessible to future techs,
automations, blockchains…
The KeeeX IdentityVision
Offer a foundation for the unlimited
exploitation of personal and
corporate digital heritage, under
absolute control, risk free.
And the best partner of the
blockchains.
Agile desktop and mobile
collaboration apps with no
infrastructure, #nosaas, peer 2 peer,
ultra secure, without exposing private
data, blockchain ready.
The smal or mid size company not
fully equipped in ECM, secure
sharing, collaboration, process. The
large company willing to anticipate
and seamlessly improve its activity.
Offer
AmbitionMarket