My keynote address at the 2003 Spring VON conference, presented on April 1, 2003. I pointed to real 100/100 Mbps Internet connectivity (deployed in 1999-2000, in Ulmea Sweden) emphasizing this was only possible by getting control of local fiber away from the incumbent PTT.
With the arriving of Over-The-Top
players, Mobile Network Operators
are being called “dumb pipes”.
If marketing and innovation are the
only variables that create value, the
path to success is only one: to
generate innovative value.
Gregor Smith: Director UK Mobile, comScore provides a reflective look back at the trends of what has happened across the global online and mobile markets. The session will also cover the latest ideas driving the business of online and mobile services and applications.
My keynote address at the 2003 Spring VON conference, presented on April 1, 2003. I pointed to real 100/100 Mbps Internet connectivity (deployed in 1999-2000, in Ulmea Sweden) emphasizing this was only possible by getting control of local fiber away from the incumbent PTT.
With the arriving of Over-The-Top
players, Mobile Network Operators
are being called “dumb pipes”.
If marketing and innovation are the
only variables that create value, the
path to success is only one: to
generate innovative value.
Gregor Smith: Director UK Mobile, comScore provides a reflective look back at the trends of what has happened across the global online and mobile markets. The session will also cover the latest ideas driving the business of online and mobile services and applications.
International App development and challengesAffiliate Dag
Everything about international app development, the differences with webdevelopment and the future of mobile, differences between tablets and mobile and some great opportunities and examples.
Symantec Next Generation Network ProtectionSymantec
Symantec Next Generation Network Protection allows communication service providers to better secure networks; better manage policy enforcement and user preferences; and increase profitability by boosting customer satisfaction to prevent churn and reduce costs associated with network misuse, malware proliferation and spam.
Android has revolutionized the mobile and device landscape and like many FOSS projects, Android is complex. Effective management and control requires training, tools, processes and standards. The SPDX standard will reduce friction in the mobile supply chain, increase efficiency and promote compliance.
At EMEA Vision 2010, Symantec unveiled a major update to its mobile security and management strategy – a broad approach to provide mobile solutions for enterprises, consumers and communication service providers to secure and manage any mobile device anytime, anywhere.
Business processes are not your businessMarc Buyens
BPM is hot, but has some limitations and deficiencies. In this presentation, we explore the need for a more interaction-focused approach that we call Business Interaction Management (BIM)
International App development and challengesAffiliate Dag
Everything about international app development, the differences with webdevelopment and the future of mobile, differences between tablets and mobile and some great opportunities and examples.
Symantec Next Generation Network ProtectionSymantec
Symantec Next Generation Network Protection allows communication service providers to better secure networks; better manage policy enforcement and user preferences; and increase profitability by boosting customer satisfaction to prevent churn and reduce costs associated with network misuse, malware proliferation and spam.
Android has revolutionized the mobile and device landscape and like many FOSS projects, Android is complex. Effective management and control requires training, tools, processes and standards. The SPDX standard will reduce friction in the mobile supply chain, increase efficiency and promote compliance.
At EMEA Vision 2010, Symantec unveiled a major update to its mobile security and management strategy – a broad approach to provide mobile solutions for enterprises, consumers and communication service providers to secure and manage any mobile device anytime, anywhere.
Business processes are not your businessMarc Buyens
BPM is hot, but has some limitations and deficiencies. In this presentation, we explore the need for a more interaction-focused approach that we call Business Interaction Management (BIM)
The Megatrend of M2M - a View of the Year 2018 - Craig Rispin Keynote at - C...Craig Rispin
The Megatrend of M2M - a View of the Year 2018
M2M is poised to become the biggest technology trend in the history of mankind. Tomorrow M2M will change your business, help you live longer, and probably save your life too. Who will be able to take advantage of the technology in the future? How can you position yourself to take advantage of the M2M Megatrend? Those questions, and many more will be answered in this keynote talk. The session will be interactive, so bring your mobile devices!
Overview of the latest developments in the mobile industry. Early facts on usage of newspapers on iPads. List of questions newsmedia publishers need to answer.
The IDATE DigiWorld Yearbook has become an essential tool for digital professionals, providing a compact and accessible review of the main events of the past year, the latest data on the markets and market players, and the major trends on the world stage.
'Measuring the French mobile internet audience' - Médiamétrie (Mobile Researc...QuestBack AG
All French mobile customers were measured as part of this ambitious collaborative project to build a coherent picture of mobile internet use across Europe. Now for the first time in France advertisers can see real, aggregated mobile audience data offering the insight they need for better planning of marketing campaigns, and, in return, inevitably accelerate sales of mobile advertising inventory. Médiamétrie will explain how they carried out this extensive study of French mobile users and what this means for mobile research as a methodology, as well as mobile advertising.
Dangerous demo at TAD Summit 2016, in Lisbon. Running Kamailio on Ubuntu Phone, turning it into a SIP routing platform for large number of requests per second. The demo was done by stressing with sipp at a rate of 2000req/sec while audience was able to make calls between them.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
12. Mobile is Personal
CC By http://www.flickr.com/photos/seandreilinger/133299418
13. Mobile is Social
CC by http://www.flickr.com/photos/polvero/3551035260
14. Mobile has Context
CC By http://www.flickr.com/photos/delphien/3029504174
15. Mobile is always near
CC By http://www.flickr.com/photos/lanier67/2979124681
16. Most important medium
10-19 25 22 11 42
Age
20-29 23 37 12 28
30-39 39 30 10 21
TV PC Other Mobile
17. Number of devices 4,600
3,900
2,200
1,500
1,100 1,200
480
Newspapers PC’s Landlines TV’s Bank accounts Radio’s Mobile Phones
18. Massai krijgers
CC by http://www.flickr.com/photos/markkelley/1022720488/
19. Mobile Internet Outpaces Desktop Internet Adoption
iPhone + iTouch Users = 8x AOL Users 8 Quarters After Launch
iPhone + iTouch vs. NTT docomo i-mode vs. Netscape vs. AOL Users
First 20 Quarters Since Launch
~57MM
60 Mobile Internet Desktop Internet
iPhone + iTouch Netscape*
50 Launched 6/07 Launched 12/94
40
Subscribers (MM)
~25MM Mobile Internet
30 NTT docomo i-mode
Launched 6/99
20
~11MM
Desktop Internet
10
AOL*
~7MM v 2.0 Launched 9/94
Q1 Q3 Q5 Q7 Q9 Q11 Q13 Q15 Q17 Q19
Quarters Since Launch
iPhone + iTouch NTT docomo i-mode AOL Netscape
Note: *AOL subscribers data not available before CQ3:94; Netscape users limited to US only. 33
Source: Company Reports , Morgan Stanley Research.
32. Fastest Hardware User Growth in Consumer Tech History
Global Cumulative Unit Shipments in First 10 Quarters
iPhone + iTouch vs. Wii / DS / PSP / iPod / BlackBerry
60
Nintendo Wii
Cumulative Unit Shipments (MM)
50
Apple
iPhone + iTouch Nintendo DS
40
Sony PSP
30
20
Apple RIM
iPod Blackberry
10
Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10
Quarters Since Launch
Note: iPhone launched in CQ2:07; iTouch launched in CQ3:07; iPod launched in CQ4:01; Wii launched in CQ4:06; D
launched in CQ4:04; PSP launched in CQ1:05; Blackberry smartphone launched in C2002. Source: Apple, Nintendo, Son
63. “Phone differentiation used to be about
radios and antennas and things like
that...We think, going forward, the phone of
the future will be differentiated by software”
Steve Jobs
CC By http://www.flickr.com/photos/gilderic/3517477267
65. Android
More open than iPhone:
Possible to replace native parts (ie contacts)
hook into OS. (ie: Receive SMS)
run background tasks.
Market & Own distribution possible (but not common).
Growing, but not there yet
68. Normal vs. Mobile web
Few browsers Many browsers
Consistent behaviour Different browsers
Big screens Different screen sizes
Input: mouse Keypad/touch/mouse
emulator
69. Mobile web is the future
Like normal web: distribution rules
Interface & sensor access will get there
Most apps are lists & screens with data anyway
HTML 5 is leading the way: Cool new things
78. Which platform?
Reach in YOUR target group
Capabilities needed
Future-ness (that’s a perfectly cromulent word!)
It’s still nowhere near a mature market
If possible, go with the web
79. Multiple Platforms
Don’t start from scratch all the time
Build (internal) API
If you are popular others will build for you :) eg: Twitter
88. Why go native on mobile?
More control over the user experience
Richer interaction (make buttons do stuff)
Access to sensor data
Distribution through appstores