Presentation from Networkshop46.
Liberate case study, by Josh Howlett, head of trust and identity, Jisc.
UK Access Management Federation update, by Rhys Smith, chief technical architect, trust and identity, Jisc and Alex Stuart, principal technical support specialist (UK federation), Jisc.
eduTEAMS, by Niels Van Dijk, SURFnet.
GÉANT supports over 40 National Research and Education Networks (NRENs) across Europe which in turn support over 10,000 institutions and 50 million academic users. eduTEAMS is a suite of services developed by GÉANT to enable the use of federated identity and access management (AAI) for research collaborations. This includes an eduTEAMS Membership Management service, Identity Hub, and Discovery Service that can be used together or separately to help collaborative organizations manage user identities and access to their services in a federated way. Several pilots are underway to test eduTEAMS with research communities, infrastructures, and NRENs.
'Cyber in the Liverpool City Region' hosted by the North West Cyber Security Cluster on Thursday 24th March 2022 in Liverpool. Three guest speakers discussing Cyber Security careers and university courses, How does the Digital Tech Cluster help tech start-ups and scale-ups?, and Cyber Security and Space.
This document summarizes an IT seminar for auditors presented by Mantran Consulting on June 10, 2014. The seminar discussed evolving trends in IT, their impact on auditing, and provided examples. Key trends discussed include cloud computing, big data, social media, bring your own devices, and data privacy. Challenges and solutions related to auditing these trends were also presented.
This document discusses implementing a data loss prevention (DLP) system using a step-by-step approach involving metrics, risk management, and maturity levels. It recommends defining metrics to measure the DLP program's goals and objectives, assessing risks, and improving processes over time. Key aspects include creating an asset inventory, establishing governance, training, and incident response processes, and monitoring DLP controls and metrics like the number of data leakage incidents. The overall framework presented allows an organization to develop a comprehensive DLP system through measurement, management of risks, and continual adaptation and improvement.
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data where ever it is stored or travels is a top priority.
GÉANT supports over 40 National Research and Education Networks (NRENs) across Europe which in turn support over 10,000 institutions and 50 million academic users. eduTEAMS is a suite of services developed by GÉANT to enable the use of federated identity and access management (AAI) for research collaborations. This includes an eduTEAMS Membership Management service, Identity Hub, and Discovery Service that can be used together or separately to help collaborative organizations manage user identities and access to their services in a federated way. Several pilots are underway to test eduTEAMS with research communities, infrastructures, and NRENs.
'Cyber in the Liverpool City Region' hosted by the North West Cyber Security Cluster on Thursday 24th March 2022 in Liverpool. Three guest speakers discussing Cyber Security careers and university courses, How does the Digital Tech Cluster help tech start-ups and scale-ups?, and Cyber Security and Space.
This document summarizes an IT seminar for auditors presented by Mantran Consulting on June 10, 2014. The seminar discussed evolving trends in IT, their impact on auditing, and provided examples. Key trends discussed include cloud computing, big data, social media, bring your own devices, and data privacy. Challenges and solutions related to auditing these trends were also presented.
This document discusses implementing a data loss prevention (DLP) system using a step-by-step approach involving metrics, risk management, and maturity levels. It recommends defining metrics to measure the DLP program's goals and objectives, assessing risks, and improving processes over time. Key aspects include creating an asset inventory, establishing governance, training, and incident response processes, and monitoring DLP controls and metrics like the number of data leakage incidents. The overall framework presented allows an organization to develop a comprehensive DLP system through measurement, management of risks, and continual adaptation and improvement.
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data where ever it is stored or travels is a top priority.
The document discusses the activities of the Internet Society Bangladesh Dhaka Chapter, including their focus on bridging the digital divide through education, awareness, and research. They have participated in conferences on standards, policy, and technology run by organizations like IETF, ICANN, and ITU. The chapter also aims to support training, seminars, and grants through their partnership with the global Internet Society organization.
ECM as a Platform - Next Generation of Enterprise Content Management - Nuxeo ...Nuxeo
Slide deck that accompanied the May 2010 webinar delivered by Cheryl McKinnon, CMO of Nuxeo - Open Source ECM. Full recorded session is available here: http://www.nuxeo.com/en/about/events/ecm-as-a-platform/registration
CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrowerdri_ireland
Keynote address to the 2013 Czech Digital Preservation Society conference, Czech National Archives, Prague, October 1, 2013. Discusses two conceptions of trust: one that is technical, one that is about relationship-building
CDW is a leading provider of technology products and services that can help clients address various IT challenges through their expansive offerings and expertise. They have dedicated account teams, a large inventory, configuration centers, and software licensing consultants. Their goal is to deliver the right technology solutions to meet clients' needs through a variety of services and one-stop shopping.
Building Successful API Programs in Higher Education3scale
In this webinar, hosted on August 27, 2015, Steven Willmott discusses the benefits of API development in higher education.
APIs are not exclusive to for-profit organizations. In higher education—from statewide university and college systems to smaller private institutions—schools like Notre Dame and Brigham Young University have built highly successful API programs.
This document provides an operational update on the UK Access Management Federation:
1) It has over 1,100 member organizations and 2,200 entities using web single sign-on based on SAML to solve the problem of N2 authentication interactions.
2) Recent growth has been linear with over 1,000 Shibboleth service providers and 500 Shibboleth identity providers, mainly from higher education.
3) New initiatives include moving to just-in-time metadata distribution (MDQ) for lower resource usage, planning for a self-service portal for entities, and improving metadata quality for better global interoperability.
The document discusses the transition from the centralized Athens access management service to a federated access management model in the UK. Key points include:
- JISC will support federated access as the preferred solution and continue funding Athens until July 2008, when it will be available via subscription.
- The UK Access Management Federation will launch in November 2006 with early adopters in August 2006, transitioning members from the successful SDSS pilot federation.
- Federated access involves authentication at the institution with attributes shared between institutions and service providers to determine access.
The Edugate federation has been in operation in Ireland for two years. As your nearest neighbouring federation, we have looked on with envy as the gardens of the UK federation matured, but we have been busy growing on our side of the fence too and we will present some of the tools that can be borrowed from our shed and show our finest exhibits that are ready for cross-pollination.
Chair: Josh Howlett, head of trust and identity, Jisc.
The importance of trust and identity to the network continues to grow in step with the rapid expansion in the scale and complexity of delivering services and content to distant users. As a result, the consumers and providers of digital services and content need access to increasingly sophisticated capabilities to make the best of the opportunities offered by the network.
This presents technical and resource challenges to those charged with providing these capabilities. In this session, we explore how Jisc and other organisations and initiatives are responding to the opportunities and challenges faced by institutions.
Running order of talks:
09:15-09:40 - Jisc service update
Speaker: Simon Cooper, trust and identity services group manager, Jisc.
09:40-10:05 - National AAAI pathfinder project
Speaker: Jeremy Yates, UCL.
10:05-10:30 - Better together!
Speaker: Klaas Wierenga, GÉANT.
The document discusses Jisc's trust and identity services including the UK Access Management Federation, Assent, eduroam, Liberate, Certificate Service, Domain Registry, and Student Voter Registration services. It provides updates on growth of members and usage of the UK Access Management Federation, interfederation through eduGAIN, and deployment technologies. Plans are discussed to develop a self-service management portal and include additional services under Jisc's ISO 27001 certification.
Jisc cloud services: helping our members deliver their cloud strategiesJisc
Jisc is a cloud-first organization that uses cloud services like Office 365, Salesforce, and Amazon Redshift to underpin many of its own services and remain agile. It provides cloud services and expertise to help members deliver their cloud strategies, including cloud strategy advice, assessments, implementation services, and connectivity frameworks. Jisc's identity and access management services Liberate and AMF are underpinned by cloud infrastructure from AWS and Azure to provide scalability, resilience, and high availability.
Data Innovation Spaces are identified by BDVA as a key instrument to foster the Data-Driven Innovation in Europe. They provide innovation and experimentation environments where companies in their respective ecosystems could have their data-driven and AI-related products and solutions piloted, tested, and exploited before going to the market. BDVA launches every year a process to identify and recognize relevant initiatives in Europe that meet specific quality criteria in infrastructures, services, projects, and sectors of application, ecosystem and sustainability (BDVA i-Spaces call for labels).
During this session, we will present the concept of BDVA i-Spaces (as it is reflected in the BDVA SRIA), the process and steps of i-Spaces labeling, the value proposition of being an i-Space and activities and examples of collaboration. The session will also include examples of first-hand experience from three recognized i-Spaces: ITAINNOVA (DIH Aragon), UPM, and Demokritos NCSR (aheed DIH).
This document summarizes a webinar about BDVA i-Spaces, which are data innovation spaces that foster data-driven innovation. The webinar discussed what i-Spaces are, their value in collaborating and connecting to other initiatives, and the process for obtaining an i-Space label. Experiences from several labelled i-Spaces were also shared. The goal of i-Spaces is to establish a network across Europe for testing, piloting and exploiting big data technologies and applications through technical and business support services. Obtaining the i-Space label recognizes quality and impacts spaces that connect existing initiatives and promote data-driven innovation.
Trust and identity in the Géant project - Networkshop44Jisc
The document discusses trust and identity in the GÉANT project. It provides an overview of how identity federations currently work through interoperability via eduGAIN [1]. It then discusses how research environments are becoming more complex, requiring identity solutions that can support more flexible collaboration beyond local campuses [2]. Finally, it outlines some developments underway through the GÉANT project to develop tools and services that can help balance risk while enabling attribute sharing to better support modern research needs like those of the LIGO collaboration [3].
On digital object identifiers for research publication, presented virtually at the Eko Konnect Users Conference, Lagos, Nigeria on January 25, 2023.
The slides contains useful basic information about DOI and a use case that would be relevant to anyone who wants to understand this onerous scholarly communication digital infrastructure.
Cultivating Sustainable Software For ResearchNeil Chue Hong
Keynote given at the NSF Cyberinfrastructure Software and Sustainability Workshop, March 26th-27th 2009, Indianapolis.
Exploration of software sustainability based on experiences from UK.
This document summarizes authentication and access of licensed content in Ohio libraries. It discusses OhioLINK's mission to provide academic resources to students and faculty. It outlines OhioLINK's membership, which includes 121 member libraries at 90 institutions. It also describes OARnet's role in providing technology solutions and infrastructure like fiber optic networks to higher education institutions in Ohio. The document reviews a survey of OhioLINK member libraries on their current authentication methods and technical support structures. It identifies challenges for members in considering new authentication procedures, such as costs, technical relationships on campus, and requiring technical expertise.
The document summarizes the establishment and growth of the Australian Access Federation (AAF) from its founding in 2009 to becoming self-sustaining by the end of 2011. Key points include:
- The AAF was established in 2009 with seed funding and an aim to have 67 subscribers and be self-sustaining by the end of 2011, which it achieved.
- It has established policies, procedures, technology infrastructure and a business model to manage identity federation for research and education in Australia.
- The AAF aims to break even through a subscription model that accounts for diversity in subscriber size and usage.
The webinar discussed Jisc's proposal for a Research Data Shared Service (RDSS) to address issues with research data management across UK higher education institutions. The RDSS would provide cost-effective solutions for depositing, describing, storing, publishing, and preserving research data through standardized technology and shared expertise. An alpha version was being piloted with 16 institutions and would include repository, preservation, and advisory services. The goal was to increase access to and reuse of research data while reducing costs and risks for institutions.
The document discusses the activities of the Internet Society Bangladesh Dhaka Chapter, including their focus on bridging the digital divide through education, awareness, and research. They have participated in conferences on standards, policy, and technology run by organizations like IETF, ICANN, and ITU. The chapter also aims to support training, seminars, and grants through their partnership with the global Internet Society organization.
ECM as a Platform - Next Generation of Enterprise Content Management - Nuxeo ...Nuxeo
Slide deck that accompanied the May 2010 webinar delivered by Cheryl McKinnon, CMO of Nuxeo - Open Source ECM. Full recorded session is available here: http://www.nuxeo.com/en/about/events/ecm-as-a-platform/registration
CNZ2013 Keynote | Trust in Digital Preservation | Natalie Harrowerdri_ireland
Keynote address to the 2013 Czech Digital Preservation Society conference, Czech National Archives, Prague, October 1, 2013. Discusses two conceptions of trust: one that is technical, one that is about relationship-building
CDW is a leading provider of technology products and services that can help clients address various IT challenges through their expansive offerings and expertise. They have dedicated account teams, a large inventory, configuration centers, and software licensing consultants. Their goal is to deliver the right technology solutions to meet clients' needs through a variety of services and one-stop shopping.
Building Successful API Programs in Higher Education3scale
In this webinar, hosted on August 27, 2015, Steven Willmott discusses the benefits of API development in higher education.
APIs are not exclusive to for-profit organizations. In higher education—from statewide university and college systems to smaller private institutions—schools like Notre Dame and Brigham Young University have built highly successful API programs.
This document provides an operational update on the UK Access Management Federation:
1) It has over 1,100 member organizations and 2,200 entities using web single sign-on based on SAML to solve the problem of N2 authentication interactions.
2) Recent growth has been linear with over 1,000 Shibboleth service providers and 500 Shibboleth identity providers, mainly from higher education.
3) New initiatives include moving to just-in-time metadata distribution (MDQ) for lower resource usage, planning for a self-service portal for entities, and improving metadata quality for better global interoperability.
The document discusses the transition from the centralized Athens access management service to a federated access management model in the UK. Key points include:
- JISC will support federated access as the preferred solution and continue funding Athens until July 2008, when it will be available via subscription.
- The UK Access Management Federation will launch in November 2006 with early adopters in August 2006, transitioning members from the successful SDSS pilot federation.
- Federated access involves authentication at the institution with attributes shared between institutions and service providers to determine access.
The Edugate federation has been in operation in Ireland for two years. As your nearest neighbouring federation, we have looked on with envy as the gardens of the UK federation matured, but we have been busy growing on our side of the fence too and we will present some of the tools that can be borrowed from our shed and show our finest exhibits that are ready for cross-pollination.
Chair: Josh Howlett, head of trust and identity, Jisc.
The importance of trust and identity to the network continues to grow in step with the rapid expansion in the scale and complexity of delivering services and content to distant users. As a result, the consumers and providers of digital services and content need access to increasingly sophisticated capabilities to make the best of the opportunities offered by the network.
This presents technical and resource challenges to those charged with providing these capabilities. In this session, we explore how Jisc and other organisations and initiatives are responding to the opportunities and challenges faced by institutions.
Running order of talks:
09:15-09:40 - Jisc service update
Speaker: Simon Cooper, trust and identity services group manager, Jisc.
09:40-10:05 - National AAAI pathfinder project
Speaker: Jeremy Yates, UCL.
10:05-10:30 - Better together!
Speaker: Klaas Wierenga, GÉANT.
The document discusses Jisc's trust and identity services including the UK Access Management Federation, Assent, eduroam, Liberate, Certificate Service, Domain Registry, and Student Voter Registration services. It provides updates on growth of members and usage of the UK Access Management Federation, interfederation through eduGAIN, and deployment technologies. Plans are discussed to develop a self-service management portal and include additional services under Jisc's ISO 27001 certification.
Jisc cloud services: helping our members deliver their cloud strategiesJisc
Jisc is a cloud-first organization that uses cloud services like Office 365, Salesforce, and Amazon Redshift to underpin many of its own services and remain agile. It provides cloud services and expertise to help members deliver their cloud strategies, including cloud strategy advice, assessments, implementation services, and connectivity frameworks. Jisc's identity and access management services Liberate and AMF are underpinned by cloud infrastructure from AWS and Azure to provide scalability, resilience, and high availability.
Data Innovation Spaces are identified by BDVA as a key instrument to foster the Data-Driven Innovation in Europe. They provide innovation and experimentation environments where companies in their respective ecosystems could have their data-driven and AI-related products and solutions piloted, tested, and exploited before going to the market. BDVA launches every year a process to identify and recognize relevant initiatives in Europe that meet specific quality criteria in infrastructures, services, projects, and sectors of application, ecosystem and sustainability (BDVA i-Spaces call for labels).
During this session, we will present the concept of BDVA i-Spaces (as it is reflected in the BDVA SRIA), the process and steps of i-Spaces labeling, the value proposition of being an i-Space and activities and examples of collaboration. The session will also include examples of first-hand experience from three recognized i-Spaces: ITAINNOVA (DIH Aragon), UPM, and Demokritos NCSR (aheed DIH).
This document summarizes a webinar about BDVA i-Spaces, which are data innovation spaces that foster data-driven innovation. The webinar discussed what i-Spaces are, their value in collaborating and connecting to other initiatives, and the process for obtaining an i-Space label. Experiences from several labelled i-Spaces were also shared. The goal of i-Spaces is to establish a network across Europe for testing, piloting and exploiting big data technologies and applications through technical and business support services. Obtaining the i-Space label recognizes quality and impacts spaces that connect existing initiatives and promote data-driven innovation.
Trust and identity in the Géant project - Networkshop44Jisc
The document discusses trust and identity in the GÉANT project. It provides an overview of how identity federations currently work through interoperability via eduGAIN [1]. It then discusses how research environments are becoming more complex, requiring identity solutions that can support more flexible collaboration beyond local campuses [2]. Finally, it outlines some developments underway through the GÉANT project to develop tools and services that can help balance risk while enabling attribute sharing to better support modern research needs like those of the LIGO collaboration [3].
On digital object identifiers for research publication, presented virtually at the Eko Konnect Users Conference, Lagos, Nigeria on January 25, 2023.
The slides contains useful basic information about DOI and a use case that would be relevant to anyone who wants to understand this onerous scholarly communication digital infrastructure.
Cultivating Sustainable Software For ResearchNeil Chue Hong
Keynote given at the NSF Cyberinfrastructure Software and Sustainability Workshop, March 26th-27th 2009, Indianapolis.
Exploration of software sustainability based on experiences from UK.
This document summarizes authentication and access of licensed content in Ohio libraries. It discusses OhioLINK's mission to provide academic resources to students and faculty. It outlines OhioLINK's membership, which includes 121 member libraries at 90 institutions. It also describes OARnet's role in providing technology solutions and infrastructure like fiber optic networks to higher education institutions in Ohio. The document reviews a survey of OhioLINK member libraries on their current authentication methods and technical support structures. It identifies challenges for members in considering new authentication procedures, such as costs, technical relationships on campus, and requiring technical expertise.
The document summarizes the establishment and growth of the Australian Access Federation (AAF) from its founding in 2009 to becoming self-sustaining by the end of 2011. Key points include:
- The AAF was established in 2009 with seed funding and an aim to have 67 subscribers and be self-sustaining by the end of 2011, which it achieved.
- It has established policies, procedures, technology infrastructure and a business model to manage identity federation for research and education in Australia.
- The AAF aims to break even through a subscription model that accounts for diversity in subscriber size and usage.
The webinar discussed Jisc's proposal for a Research Data Shared Service (RDSS) to address issues with research data management across UK higher education institutions. The RDSS would provide cost-effective solutions for depositing, describing, storing, publishing, and preserving research data through standardized technology and shared expertise. An alpha version was being piloted with 16 institutions and would include repository, preservation, and advisory services. The goal was to increase access to and reuse of research data while reducing costs and risks for institutions.
Trust and identity - enabling intra- and inter-organisational authentication ...Jisc
A presentation from Networkshop48 by Rhys Smith, chief technical architect, trust and identity, Jisc and Mark Williams, UK Access Management Federation manager, Jisc.
Jisc has a range of trust and identity services that enable intra- and inter-organisational authentication and authorisation. These already play a key part in enabling on- and off- campus access to both internal resources (such as VLEs) and external resources (e-books, journals, collaboration tools). In these extraordinary times, these are more important than ever.
[Workshop] Digital Transformation: Breaking Down Boundaries for Greater Conne...WSO2
This deck will cover the problem with running systems in isolation. how you can move away from isolated systems, an Introduction to the concept of services oriented architecture and integration hub, the benefits of sharing information and services, and will introduce the concept of API Management.
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...TheInevitableCloud
OpenStack is an open source cloud computing platform that allows users to provision resources like compute, storage, and networking on demand. It has grown significantly since starting in 2010, with over 800 developers from 50 companies contributing code. The OpenStack community and ecosystem have also grown rapidly, with over 8,000 individual members from around the world. Many large companies are now using OpenStack to power their internal and external cloud services due to its flexibility, scalability and ability to reduce costs.
The document announces a community launch event for digital storytelling in January 2024. It discusses using digital storytelling in higher education to support learning and teaching. Examples include using digital stories for formative assessment, reflective exercises, and research dissemination across various disciplines. Feedback from students and staff who participated in digital storytelling workshops was very positive and found it to be transformative and help give voice to their experiences. The document also profiles speakers who will discuss using digital stories to explore difficult concepts, hear the student voice, and facilitate staff reflections. It emphasizes that digital storytelling can introduce humanity and creativity into pedagogy and help develop core skills. Attendees will participate in a Miro activity to discuss benefits, applications,
This document summarizes a Jisc strategy forum that took place in Northern Ireland on December 14, 2023. It outlines Jisc's planned services and initiatives for 2023-2024, including expanding network access and launching new cybersecurity, analytics, and equipment services. It discusses feedback received from further and higher education members on how Jisc can better deliver solutions, empower communities, and provide vision/strategy. Activities at the forum focused on understanding members' needs/challenges and discussing how Jisc can better support key priorities in Northern Ireland, such as affordable infrastructure, digital skills, and cybersecurity for FE and efficiency, student experience, and collaboration for HE.
This document summarizes a Jisc Scotland strategy forum that took place on December 12, 2023. It outlines Jisc's planned solutions and services for 2023-2024 including deploying resilient Janet access, IT health checks, online surveys, SD-WAN services, and more. The document discusses how Jisc engages stakeholders through relationship management, research, communities, training and events. It summarizes feedback from further education and higher education members on how Jisc can improve advocacy by delivering the right solutions, empowering communities, and having a clear vision and strategy. Finally, it outlines activities for the forum, including understanding members' needs and priorities and discussing how Jisc supports national priorities in Scotland.
The Jisc provided a strategic update to stakeholders. Key highlights included:
- Achievements from the last year like data collection and analysis following the HESA merger, digital transformation support, and cost savings from licensing deals.
- Customer testimonials from Bridgend College on extending eduroam and from the University of Northampton on curriculum design support from Jisc.
- Priorities for the coming year like connectivity upgrades, new cybersecurity services, and improved customer experience.
- A financial summary showing income sources like membership fees and expenditures on areas like connectivity and cybersecurity.
This document summarizes VirtualSpeech, a company that provides virtual reality (VR) and artificial intelligence (AI) powered professional development training. It offers over 150 online courses covering topics like public speaking, leadership, and sales. Users can practice skills in immersive VR scenarios and receive feedback from conversational AI. The training is used by over 450,000 individuals across 130 countries and 150 universities. VirtualSpeech aims to enhance traditional learning with interactive VR practice sessions and real-time feedback to boost skills retention.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
3. >Access management is critical to HE, FE, and
Research
>The R&E requirement is often challenging and hard to
address with commercial products
>The R&E requirement often requires effort from highly
skilled staff
>As a result, it can be complex and costly to organise
and deliver good access management
What is Liberate?
4. >A fully-managed, cloud-based solution for access
management
>Provides an access management solution for
>UK Access Management Federation
>Eduroam (Home and Visited)
>IP-authenticated services
>Assent
>Developed and operated by Jisc on AWS in Dublin, and
connected to Janet
>A subscription service which launched in October 2017
>Fully supported by our team of technical experts
What is Liberate?
5.
6. >Fourteen subscribers
>Seven FE colleges
>Four HE institutions
>One Research organisation
>Two Library Authorities
>Many other organisations piloting
>Internal administrative issues resulted in a four month
delay to the Eduroam functionality
>100% uptime and no technical issues reported yet
Progress update
7. >Significant savings (£Ks) if replacing a competitor
>Obtain new access management capabilities that were
previously unaffordable
>Seamless transition with no interruption to services
>Staff able to focus on other priorities
>Peace of mind (software updates, etc.)
Key benefits seen by early adopters
8. >The SCL represents 151 Library Authorities in England,
Wales, and Northern Ireland
>Public Libraries share some of the same access
management issues as HE/FE institutions
>Currently being piloted by five Library Authorities
>Introducing chargeable service in April 2018 (two
already signed up)
Jisc collaboration with Society for Chief Librarians
9.
10. Except where otherwise noted, this work is licensed under CC-BY-NC-ND.
Josh Howlett
Head, trust & identity
josh.howlett@jisc.ac.uk
I have been…
One Castlepark, Tower Hill, Bristol, BS2 0JA
T 01235 822 363
customerservices@jisc.ac.uk
jisc.ac.uk
14. >Web Single Sign-On based on SAML
>1131 member organisations; 2278 entities
>Research and Education: 100% HE, ~80% FE,
and representation from schools, government,
public libraries, NHS
>Federation to solve problem of N2 interactions*
>Interfederation through eduGAIN allows interoperability
with thousands more entities from
50 other federations*
Some numbers...
* some conditions apply
15. Data:1-Mar-2018 00:00:00
Registered Entities byType
Entities
0
300
600
900
1200
1500
Dec 06Feb 08 Apr 09 Jun 10 Aug 11Oct 12Dec 13 Feb 15 Apr 16 Jun 17
SPs IdPs
Type of entities 1
16. >500 Shibboleth IdPs (66%) and
Open Athens (30%)
>Recent security advisories reported on
Shibboleth announce list:
>LDAPS connector using non-standard
configuration
>ROBOT
>Shibboleth IdP v2 to v3 transition, minority of
IdPs still on v2 (End of life was July 2016)
Type of
entities 2:
IdPs
17. >Publishers, collaboration tools, research project
sites, gateways to e-Infrastructures, business
apps, student sites, inventories...
>Linear growth “for ever”
>Over 1000 Shibboleth SPs (75%) with a long
tail of other types of software (many open
source libraries, some products)
>Security advisories in last 12 months distributed
on Shibboleth announce:
>XMLtooling x 2
>ROBOT
>MDQ client misconfiguration
Type of
entities 3:
SPs
18. >99% support SAML 2 so can we just turn off SAML 1?
>Unfortunately, support != use
>Using WAYF protocol with the Central Discovery
Service implies SAML 1, so in June 2017 we
deprecated the WAYF protocol
>MDUI support (primarily logos) at 30%
>Algorithmic agility for XML cryptography
Protocol support
21. >Not really “new” any more - live for over a year
>What is it?
>Traditional MD distribution is regular syncing of the
MD aggregate – currently 36MB
>MDQ is just-in-time fetching of bits of metadata
instead
>FAR lower resource requirements for software
– IdP uses far less memory
– SP will startup far faster
>Currently ~10% of clients now using MDQ.
>But the traffic for that 10% is 0.0001% of total
MDQ
24. >UKf CDS services ~4,000,000 CDS flows/month
>Very stable and reliable, but running on old code
>Currently deciding what to replace it with
>Awaiting results of RA21 working group
>Don’t worry – look and feel will remain as consistent
as possible (hopefully identical)
Central Discovery Service
27. >Web portal on the Jisc community website to manage
your own entities, domains, etc.
>Can still make use of helpdesk if you’re worried or
unsure about making changes!
>Coming later this year (finally)
Self Service
31. >For example:
>Improving quality of UKf Metadata
>UKf Working with eduGAIN to improve quality of
international metadata – better global interoperability
>Managed Federation – rebuilding UKf backend
systems in a containerised deployable way, to let us
run other federation’s backend systems.
>Rebuilding distribution infrastructure for MFS – UKf
infrastructure should become even more resilient and
performant
>Tracking OIDC and other emerging technologies
Behind the scenes tweaking
32. Rhys Smith
Chief technical architect, trust and identity
rhys.smith@jisc.ac.uk
We have been...
service@ukfederation.org.uk
jisc.ac.uk/uk-federation
Alex Stuart
Principal technical support specialist (UK federation)
alex.stuart@jisc.ac.uk
35. GÉANT supports and represents over 40 NRENs across Europe.
Together they support over 10,000 institutions and 50 million academic users.
About GÉANT
36. eduroam - secure global roaming access service 250+ million authentications per
month in 89 territories
eduGAIN - interconnects identity federations around the world, simplifying access to
content, services and resources ~ 3500 identity providers accessing services
AARC project – collaborating with e-infrastructures, research collaborations,
libraries & federations to share policies, architectures, training materials & pilots that
avoid re-inventing the authentication & authorisation wheel
REFEDs – supporting identity federations worldwide
Trusted Introducer – services for security and incident response teams
Certificate Service – delivering cost-effective digital certificates.
In partnership with
Supporting users and enabling secure access to services
Trust, Identity & Security
37. • Challenges in Authentication space
• International Collaboration
• Collaborative organisations work with people outside
scope of R&E communities as well
• Requires Collaborative organisations to peer with other
non R&E Identity providers or maintain an additional
Identity provider
• Challenges in Authorization space
• Services run by Collaborative Organisations often need
attribute or group related information in the context of
their collaboration, which are not issued by Institutions
• Requires Collaborative Organisations to manage and
provide additional attributes and groups towards their
services, independently from the Institutions
37
Challenges for Collaborative Organisations
38. • The FIM4R paper (April 2012) was one of the first to articulate
collective requirements for using Federated AAI for VOs.
• The VOPaaS has performed a survey among several small and
large Pan-European VOs to (re-)validate the requirements.
38
Market Analysis
40. • Goal
• Investigate the conditions that would allow GÉANT to provide
services to support Collaborative organisations
• Focus on delivery of technical services
• Out of scope:
• Technical development
• Policy & LOA development
• Activities
• Gather requirements and priorities with/from communities
• Look at existing tools and technologies
• Look into delivery model
• Investigate business case & sustainability
• Pilot with communities
• Operations and Market
40
GEANT CO Platform as a Service Project
41. Objectives Conclusions Q&AChallenges Achievements
Components
• eduTEAMS Membership
Management service
• eduTEAMS Discovery
Service
• eduTEAMS Identity Hub
Characteristics
• 2 monthly release cycle
• Supports AARC
architecture
• Single- and multi-tenant
options
Documentation, Cookbooks,
Privacy Policy etc available
https://wiki.geant.org/display/ED
eduTEAMS
A suite of services for using federated AAI for collaborations
Collaboration suite
to enable use of
federated identity
in research
communities
Partner for any e-
Infra or Research
Infra inc. “long tail”,
informal groups
41
42. eduTEAMS - Pilots
Engaging with communities, eInfras and NRENs
42
Research communities and
e-Infrastructures
• AARC2-as-VO (Pilot committed)
• LifeScience AAI (Pilot)
• Umbrella (Pilot committed)
• HPC-Europe (Pilot intrest)
• EUDAT (Pilot committed)*
• EGI *
* as part of AARC2 interoperability
activity
NRENS
• JISC (UK)
Moonshot Pathfinder project
• SURFnet (NL)
Science Collaboration Zone project
• WAYF (DK)
eduVPN
Collaboration usecases
43. Components – LEGO approach
Choose how much of the platform they want
• eduTEAMS Membership Management service
• VO specific workflows for onboarding members
• Registry for VO persistent Identifier
• Limited set of attributes to maximise interoperability
• Use of eduperson entitlement to carry richer info
• Available through eduGAIN
• eduTEAMS Identity Hub
• One persistent (SAML) IdP for many ‘Guest’ Identity Providers
• Available and accessible through eduGAIN
• Supports Research and Scholarship Entity Category
• Discovery Service
• Service based or embedded discovery for eduGAIN SPs
• Allows per SP filtering of IdPs
• Allows per entity category filtering, e.g. R&S
45. Objectives Conclusions Q&AChallenges Achievements 45
eduTEAMS
Membership Management Service (MMS)
Manage Roles and Rights
• Available trough eduGAIN
• CoCo and R&S supported
• Strong focus on privacy and GDPR
• part of AARC2 interop activity
• Technical and cookbooks:
https://wiki.geant.org/display/ED/Membership
+Management+Service
• Service:
https://registry.eduTEAMS.org
NRENS
• JISC (Pilot committed)
• Moonshot Pathfinder project
• SURFnet (Pilot committed)
• Science Collaboration Zone project
• GARR (Pilot interest)
• SWITCH (Pilot interest)
• SWITCH eduID
• Swiss Personalised Health Network
• Swiss Data Science Center
• Swiss National Supercomputing Centre
46. Objectives Conclusions Q&AChallenges Achievements
eduTEAMS
Discovery Service
• Component of eduTEAMS, but
generically usable for eduGAIN SPs
• Based on proven service from CESNET
• Engaged in RA21 Pilot – Resource Access
for the 21st Century (https://ra21.org)
• Publishers, libraries and users
https://wiki.geant.org/display/ED/Discovery+Servic
e
46
47. Objectives Conclusions Q&AChallenges Achievements 47
eduTEAMS Identity
Hub Persistent ID
Account
Recovery
LOA
Implemented
Future
eduTEAMS
Identity Hub
https://wiki.geant.org/display/ED/Identity+Hub
48. • Moonshot interaction with third-party AA systems
• investigate potential for Assent service
• and also all kinds of scientific collaborations
• Combined access & authorization for web-based and non-web based
services
JISC eduTEAMS pilot
48
49. Moonshot and eduTEAMS
49
SAML AA
COmanage
eduTEAMS
Membership
Management
eduTEAMS
Identity Hub
IdP
External IdP
Webbased
Service
Moonshot
Compute
resource
Storage
resource
Groups
& roles
Mesh federation to solve N^2 interactions sets up introduction to MDQ
Interfederation caveat leads to UKf metadata checking
45% of Ukf metadata is imported
Ukf is 40% of eduGAIN
Linear growth in number of SPs BUT complexity of metadata increasing, and churn of staff
V3 Shibboleth rewrite and moving to semantic versioning
V3.4 deprecations (later in 2018) with removals in v4
# date, Shib IdPs, v2, v3, assumed down, unclassified
2017-07-14, 488, 114, 205, 137, 32
2018-03-14, 502, 65, 271, 133, 33
ROBOT: did scans, worked with Ukf members,
The university is not just researchers, teachers and students; plenty of professional staff
New tools developed to manage metadata in git repo
SIRTFI – hopefully Rhys gonna talk about that, but this will set up
MDQ: benefits and risks on UKf website
Also simpleSAMLphp security advisories in underlying library
TODO: stats for WAYF protocol using SPs
Alex presented at NWS42 (Exeter, 2014) saying “let’s get rid of SAML 1” also phasing out PKIX, 900 SPs
Can talk about RA21 project and improving MDUI
AuthN: people not in eduGAIN
AuthZ:
groups, attributes, in context of VO
audit trail: who, when, by who
Conducted Market Analysis including
FIM4R paper
Interview Vos
include AARC findings
Virtual Organisation Platform as a Service Project in GEANT:
Create and Run a service to support Collaborative Organisations
Requirements from communities
Use existing software
Create a sustainable service
Run the service