Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
Passkeys: Developing APIs to enable passwordless authentication
Cody Salas, Sr Developer Advocate | Solutions Architect - Yubico
Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024)
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Digital Retail Africa 2023 hosted by IT News Africa - Carrie Peter speaks on Balancing User Experience and Security Compliance at Scale at the Digital Retail Africa 2023 conference. #retailtech #ecommerce #customerexperience #onlineshopping #securitycompliance
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
Passkeys: Developing APIs to enable passwordless authentication
Cody Salas, Sr Developer Advocate | Solutions Architect - Yubico
Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024)
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Digital Retail Africa 2023 hosted by IT News Africa - Carrie Peter speaks on Balancing User Experience and Security Compliance at Scale at the Digital Retail Africa 2023 conference. #retailtech #ecommerce #customerexperience #onlineshopping #securitycompliance
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 12 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Trust Your Supplier - trust your product in the supply chain Mohan Venkataraman
Presented at BiTA Symposium 2020. The presentation talks about Trust Your Supplier - A blockchain based supplier qualification and identity platform, how it was overlay-ed and integrated with IBM Sterling Commerce platform to qualify suppliers during the Covid-19 pandemic. It also talks about trusting your product in the supply chain using IoT, ML, Digital Identity and Smart Tags.
Building trust for cloud customers - the value of cif certificationDavid Terrar
My presentation on behalf of the Cloud Industry Forum at Cloud Expo Europe 2014 - setting the scene on why service providers need CIF certification, and how it helps buyers pick and choose between a good provider and a bad provider. The intro explains that we are at the most exciting but disruptive time in IT for over 50 years with the shift to cloud, social and mobile happening simultaneously - we've never had 3 shifts at once before!
This Case Study discussed an implementation strategy for recording Degrees and Certificates on the Blockchain for authenticity and verification purposes.
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsChristophe Begue
We introduce the key use cases for blockchain solutions in the Electronics Industry. We present tangible examples of blockchain solutions deployed by IBM across its global supply chain and operations, as well as additional examples of blockchain solution being piloted across the industry. We show that, for electronics industry companies there are multiples ways to start using blockchain solutions from designing its own solution, to subscribing to existing blockchain based services, to joining with others in forming a consortium of companies dedicated to the designing and deployment of blockchain solutions. We provide several examples where we are already seeing traction in consortium based approach for blockchain.
Proposal for e-Procurement System for Developing CountryGuisun Han
This proposal is about an e-Procurement system for developing country and its contents are following.
Ⅰ. Background
Ⅱ. Introduction
Ⅲ. Prerequisites
Ⅳ. Configuration
Ⅴ. Major Functions
Ⅵ. Investment Cost Analysis
Ⅶ. Conclusion
You can get more details thru the link.
With my regards,
Guisun Han
Security and Authentication at a Low CostDonald Malloy
Online security, strong authentication and One time Password technology has been too expensive for too long. Open source using OATH algorithms provide security without being prohibitively expensive.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 12 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Trust Your Supplier - trust your product in the supply chain Mohan Venkataraman
Presented at BiTA Symposium 2020. The presentation talks about Trust Your Supplier - A blockchain based supplier qualification and identity platform, how it was overlay-ed and integrated with IBM Sterling Commerce platform to qualify suppliers during the Covid-19 pandemic. It also talks about trusting your product in the supply chain using IoT, ML, Digital Identity and Smart Tags.
Building trust for cloud customers - the value of cif certificationDavid Terrar
My presentation on behalf of the Cloud Industry Forum at Cloud Expo Europe 2014 - setting the scene on why service providers need CIF certification, and how it helps buyers pick and choose between a good provider and a bad provider. The intro explains that we are at the most exciting but disruptive time in IT for over 50 years with the shift to cloud, social and mobile happening simultaneously - we've never had 3 shifts at once before!
This Case Study discussed an implementation strategy for recording Degrees and Certificates on the Blockchain for authenticity and verification purposes.
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsChristophe Begue
We introduce the key use cases for blockchain solutions in the Electronics Industry. We present tangible examples of blockchain solutions deployed by IBM across its global supply chain and operations, as well as additional examples of blockchain solution being piloted across the industry. We show that, for electronics industry companies there are multiples ways to start using blockchain solutions from designing its own solution, to subscribing to existing blockchain based services, to joining with others in forming a consortium of companies dedicated to the designing and deployment of blockchain solutions. We provide several examples where we are already seeing traction in consortium based approach for blockchain.
Proposal for e-Procurement System for Developing CountryGuisun Han
This proposal is about an e-Procurement system for developing country and its contents are following.
Ⅰ. Background
Ⅱ. Introduction
Ⅲ. Prerequisites
Ⅳ. Configuration
Ⅴ. Major Functions
Ⅵ. Investment Cost Analysis
Ⅶ. Conclusion
You can get more details thru the link.
With my regards,
Guisun Han
Security and Authentication at a Low CostDonald Malloy
Online security, strong authentication and One time Password technology has been too expensive for too long. Open source using OATH algorithms provide security without being prohibitively expensive.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
4. Wednesday, May 8, 2024
Introduction Agenda
• Traditional Purchase Process
• Existing Manual Tendering Process
• Limitation of Manual System
• Proposed e-Tendering Process
• Overall Advantages
• Advantages to Vendors
5. Wednesday, May 8, 2024
Traditional Purchase Process
• Manual processes
• Long chain of internal authorizations and scrutiny (at times
involving several departments)
• Several visits by Vendors to Departments
• Generation of reams of paper-based statements and evaluations
Indentor Indent / PR
Purchase
Department
RFQ / NIT /
RFP / RFI
Vendors
Bid/Offer
Purchase
Order
Material / Service
7. Wednesday, May 8, 2024
Limitation of Manual System
• Delay in issue of tender schedules to Vendors
• Disadvantage for geographically spread bidders to participate
• Physical request / threats to bidders
• Risk of Tender Boxes at Multiple locations
• Delays in finalization of tenders
• Human interface at every stage leading to loss of objectivity
• Lack of Transparency
8. Wednesday, May 8, 2024
Vendor
Upload
(BHEL)
Vendor
Activation
Tender
View
DSC
Mapping
Technical CS
Bid
Submission
Authentication
(BHEL)
Response
Submission
CS View
Price Bid
CS
On line
Clarification
Proposed Tendering Process
Re – Bid
Submission
PO View
Purchase
Order
PO
Acknowledgement
9. Wednesday, May 8, 2024
Overall Advantages
The main objectives of the e-Procurement initiative are to:
• Reduce the time and cost of doing business for both vendors and BHEL
• Realize better value for money spent through increased competition
• Standardize the procurement processes across departments/agencies
• Allow equal opportunity to all vendors
• Bring transparency
10. Wednesday, May 8, 2024
Advantages to Vendors
• Automatic Email alerts
• Re Bid submission
• Location independent
• Increased opportunities
• Transparency and eliminated buyer subjectivity
• Online confirmation of tender submission
• Consistency of process
• 24X7 Accessibility
11. Wednesday, May 8, 2024
Advantages to Vendors
• Elimination of dependency on officials for information
• Encrypted tenders at the time of submission
• Digital Signature – signing & verification
• Online Clarification
• Automatic viewing of all tenders online
• Past data for reference
• All tender related information available online
13. Wednesday, May 8, 2024
Personnel Skills
• Awareness of the Procurement Process
• Knowledge of simple Internet applications
• Basic computer skills (e.g. basic MS office)
• Has valid email address
• Training in e-procurement application
14. Wednesday, May 8, 2024
Other Requirements
• Should have a Computer
• Should have access to internet
• Should have valid class III Digital Certificate
• Enrolled with e procurement application
36. Wednesday, May 8, 2024
Digital Certificate Agenda
• What is a Digital Certificate?
• Why Digital Certificate needed for e-Tendering?
• Who Issues Digital Certificates?
• How a Foreign Vendor can apply for a digital certificate?
• Types of Digital Certificates
• Validity of a Digital Certificate
• How to Apply for a Digital Certificate?
• Do’s & Dont’s of Digital Certificate
37. Wednesday, May 8, 2024
What is a Digital Certificate?
• Digital Certificates serve as an identity of an individual for a
certain purpose, e.g. a driving license identifies someone
who can legally drive in a particular country.
• Digital Certificate can be presented electronically to prove
your identity or your right to access information or services
on the Internet.
• Use of Legally Valid Class III Digital Signature and USB
Token to store the Signature is compulsory as per Indian IT
Act 2000 - Amendment 2004
38. Wednesday, May 8, 2024
Why Digital Certificate needed for e-Tendering?
To enable Trust & Security
• Authentication : How do you verify whether the vendors are really
sending the information or some others?
• Confidentiality : How do you make sure that the information sent
is read only by intended users and nobody else?
• Integrity : How do you make sure that the information sent is not
altered dishonestly or falsely?
39. Wednesday, May 8, 2024
Who Issues Digital Certificates?
• Certifying Authority (CA) issues the digital certificates
• There are 7 CA’s in India who in turn report to the Controller of
Certifying Authorities (CCA)
• The licensed CA’s in India are:
• Safescrypt
• NIC
• IDRBT
• TCS
• MTNL
• (n)Code Solution CA (GNFC)
• e-Mudhra
40. Wednesday, May 8, 2024
Types of Digital Certificates
There are 3 different classes of certificates for different
applications
• Class 1 is for email.
• Class 2 is for IT filing, etc.,
• Class 3 are high assurance certificates, primarily intended for e-
commerce applications and are issued to individuals only on their
personal (physical) appearance before the Certifying Authorities.
* Only Class III 2048 Bit Signing & Encryption (Company / Enterprise
User) Digital Certificate is valid for BHEL e-Tendering
41. Wednesday, May 8, 2024
Validity of a Digital Certificate
Digital certificate can be issued by CA’s
for a period of minimum of one year
to two years.
IE -> Tools -> Internet Options ->
-> Content -> Certificate -> View
42. Wednesday, May 8, 2024
How to Apply for a Digital Certificate?
A digital certificate can be bought from any of the CAs or from any
of the Local Registration Authority (LRA) as approved by any of
the CAs.
1. Application –
a. Access the CA website to select customer type and class of
certificate needed and to accept Subscriber Agreement.
b. Fill the online registration form and choose a password for later
authentication.
c. After due verification of mandatory fields, confirm the given
details again and print the displayed form to hand sign and send it
across to the CA.
43. Wednesday, May 8, 2024
2. Authentication
a. The CA verifies and validates the information provided in
the online application and identification form.
b. Upon approval, the CA sends an email on the email
address provided in the application form with a link for
email id verification.
c. Generally it takes around 3 weeks for an Indian national
& 5 weeks for an foreign national to get an digital certificate
from the date of his/her application for the same.
How to Apply for a Digital Certificate?
44. Wednesday, May 8, 2024
How a Foreign Vendor can apply for a DSC?
• Procure Digital Signature Certificate (Class-III) from any
of the empanelled Certifying Authorities of India
• Scanned copy of Power of Attorney wherein the person having the
Digital Signature Certificate is mentioned as the true and lawful
attorney.
• Scanned copy of the firm registration certificate
45. Wednesday, May 8, 2024
Do’s of Digital Certificates
The token containing certificate should be preserved in the safe
custody of the owner of the certificate.
If the token is lost, inform the concerned CA and request for
revocation of the certificate.
Protect your computer from unauthorized access by keeping it
physically secure.
Use access control products or operating system protection
features (such as a system password).
Take measures to protect your computer from viruses.
Always choose to protect your private key with a good password
46. Wednesday, May 8, 2024
Dont’s of Digital Certificates
Don’t share your DSC.
Your DSC should be protected by a password and should never
be sent across any network.
84. Wednesday, May 8, 2024
• Always check that your e-mail address in your registration is
accurate. You will not receive addendum notifications if this address
is wrong
• Bidders are requested to make note of dynamic time being
displayed on BHEL e-Procurement portal to ensure that the bids
are submitted on time.
• Try to avoid responding at the last minute. Try to submit you Bids
through e-Procurement well in time.
• Helpdesk Numbers:033-66106426/033-66106454 (During
Business Hours) and Cell :09231027017/09163348104 till 20:30
Hours.