Join Storage Switzerland and Tegile Systems for our on demand webinar, “How to Design Primary Storage for GDPR,” to learn how design primary storage architectures in the GDPR era. The data center now has three realities to deal with.
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research
in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are
slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research
in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are
slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
Some basic security controls you can (and should) implement in your web apps. Specifically this covers:
1 - Beyond SQL injection
2 - Cross-site Scripting
3 - Access Control
Big data security challenges and recommendations!cisoplatform
What will you learn:
- Key Insights on Existing Big Data Architecture
- Unique Security Risks and Vulnerabilities of Big Data Technologies
- Top 5 Solutions to mitigate these security challenges
Dcg cba legal ethics and the cloud final 06.20.17DENNIS GARCIA ☁
This is a copy of a presentation I delivered at the Chicago Bar Association on June 20, 2017 about Legal Ethics Considerations with using Cloud Computing solutions in the United States.
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to:
https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2020/
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
In this 30-minute webinar, Microsoft Data Platform MVP Kendra Little explores the key challenges and recommendations to prevent exposure of private data in your next data breach, featuring insight from Gartner’s 2018 Market Guide for Data Masking.
Michael Jay Freer - Information Obfuscationiasaglobal
In this session, Michael Jay Freer will explore defining a common data-masking language, defining standard masking business-rules, defining best practices for manipulating the data, and how to get started without attempting to "Boil-the-ocean."
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareStorage Switzerland
Three primary storage challenges that keep IT up at night:
* How to keep up with application performance demand
* How to affordably manage and store the vast amount of data that IT has to store
* How to protect that data so that applications can quickly return to service if a server, storage system or entire data center fails
To meet these challenges IT has either used multiple solutions from multiple vendors, creating cost overruns and massive complexity or they have to try to consolidate to a single vendor via hyperconvergence or cloud migration leading to inefficient use of resources and feature shortfalls.
In this on demand webinar experts from Storage Switzerland and Commvault discuss the top 10 reasons that backup breaks and how to fix it. Attendees will learn how they can make backup a reliable and cost-effective IT process, that their organization can count on when they need it most.
Some basic security controls you can (and should) implement in your web apps. Specifically this covers:
1 - Beyond SQL injection
2 - Cross-site Scripting
3 - Access Control
Big data security challenges and recommendations!cisoplatform
What will you learn:
- Key Insights on Existing Big Data Architecture
- Unique Security Risks and Vulnerabilities of Big Data Technologies
- Top 5 Solutions to mitigate these security challenges
Dcg cba legal ethics and the cloud final 06.20.17DENNIS GARCIA ☁
This is a copy of a presentation I delivered at the Chicago Bar Association on June 20, 2017 about Legal Ethics Considerations with using Cloud Computing solutions in the United States.
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to:
https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2020/
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
In this 30-minute webinar, Microsoft Data Platform MVP Kendra Little explores the key challenges and recommendations to prevent exposure of private data in your next data breach, featuring insight from Gartner’s 2018 Market Guide for Data Masking.
Michael Jay Freer - Information Obfuscationiasaglobal
In this session, Michael Jay Freer will explore defining a common data-masking language, defining standard masking business-rules, defining best practices for manipulating the data, and how to get started without attempting to "Boil-the-ocean."
Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage NightmareStorage Switzerland
Three primary storage challenges that keep IT up at night:
* How to keep up with application performance demand
* How to affordably manage and store the vast amount of data that IT has to store
* How to protect that data so that applications can quickly return to service if a server, storage system or entire data center fails
To meet these challenges IT has either used multiple solutions from multiple vendors, creating cost overruns and massive complexity or they have to try to consolidate to a single vendor via hyperconvergence or cloud migration leading to inefficient use of resources and feature shortfalls.
In this on demand webinar experts from Storage Switzerland and Commvault discuss the top 10 reasons that backup breaks and how to fix it. Attendees will learn how they can make backup a reliable and cost-effective IT process, that their organization can count on when they need it most.
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
Learn how to leverage state of the art technology to build an efficient data protection risk management strategy.
To view the webinar on demand, click here: https://symc.ly/2GU8Ehb.
Webinar: The All-Flash Fix – How to Create a Hybrid Storage ArchitectureStorage Switzerland
The All-Flash Data Center was supposed to eliminate all storage problems and allow the application architecture to scale to new heights. The problem is data capacities are growing faster than the cost per GB of flash can decrease. Most data centers can’t afford to go all-flash, and in most cases, since the bulk of data sits idle, it makes no sense to go all-flash. It is just more practical and cost-effective to design an architecture that leverages several storage systems to meet all the needs of the data center and to do so cost-effectively.
Join experts from Storage Switzerland and Western Digital as we discuss the All-Flash Fix, How to Create a Hybrid Storage Architecture. In this webinar you’ll learn how to create an architecture that meets the need to deliver high performance, protect the organization from disaster and meet the organization’s long-term data retention and privacy needs.
Register now to get a copy of our latest white paper “Creating a High Performing but Cost Effective All-Flash Strategy” available exclusively to webinar registrants.
The new dominant companies are running on data SnapLogic
The cost of Digital Transformation is dropping rapidly. The technologies and methodologies are evolving to open up new opportunities for new and established corporations to drive business. We will examine specific examples of how and why a combination of robust infrastructure, cloud first and machine learning can take your company to the next level of value and efficiency.
Rich Dill, SnapLogic's enterprise solutions architect, at Big Data LDN 2017.
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Storage Switzerland
Join Storage Switzerland and Micro Focus for this on demand webinar where we discuss the key disruptors in the market that could impact your data protection plan and what you need to consider to avoid them.
Understand the key 5 trends and their implications on your data center:
●The Shift to Hybrid IT
●Ransomware and other Cyber Threats
●The Proliferation of Mission Critical Applications
●Cloud Storage and Cloud Applications
●The Rise of Remote Office Computing (ROBO)
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.
To watch the webinar on demand click here: https://symc.ly/2Ivwblu.
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid ITStorage Switzerland
Data protection is critical to data-driven organizations that are fully dependent on data for operations. The hybrid nature of the environment though makes protecting that much more challenging. Join us as we discuss exactly what Hybrid IT is, what it looks like and why data driven organizations are embracing it. Then we will discuss the data protection challenges that IT must overcome as they create a hybrid infrastructure.
5 in 1 Data Protection - This solution is listed on "Gartner's Cool Vendor in Business Continuity and IT Disaster Recovery Management."
Always Protected. Always There.
- Automated Backup
- One-Click Disaster Recovery
- Local & Cloud-Based Protection
Cloud backup, archive, disaster recovery, and file sharing. Protecting servers (physical and virtual), desktops and laptops, and mobile endpoints coverage with your choice of cloud targets – your cloud, our cloud, or any cloud. This is data protection on your terms.
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
The first webinar of the series starts at the beginning: preparing for GDPR compliance. In this session, we look at how technology and process come together to let organisations get to grips with the GDPR relevant data that flows around their companies and work towards compliance. We will give you practical examples on how to apply data discovery, data minimisation, data protection and security as well as the role of the record of processing in this.
Webinar: The Three New Requirements of Unstructured Data ProtectionStorage Switzerland
Can your backup deliver? Join Storage Switzerland and Aparavi for this on demand webinar where they discuss the unstructured data problem, why legacy solutions fall short and the three key capabilities that modern unstructured data protection solutions must deliver so that organizations can extract maximum value from their unstructured data investment.
Webinar: Overcoming the Five Distributed Data Protection ChallengesStorage Switzerland
Please join George Crump, Founder of Storage Switzerland and Seyi Verma, Director of Product Marketing at Druva for an interactive webinar discussion, and learn the best strategies to protect your distributed data.
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesDataStax
The European Union’s General Data Protection Regulation (GDPR) has sweeping effects on how enterprises manage their data. Without the right policies and safeguards in place, a tiny data mishap could end up turning into a catastrophic mistake. Join Datastax and our partner Thales eSecurity for a live webinar to learn how GDPR effects impact data management and the various ways enterprises can both comply and thrive in a hybrid cloud environment.
View recording: https://youtu.be/QZ48_qkK9PU
Explore all DataStax webinars: https://www.datastax.com/resources/webinars
In memory computing principles by Mac Moore of GridGainData Con LA
In the presentation, we will provide an overview of general in-memory computing principles and the drivers behind it. We will start with a summary of the technical drivers (abundant hardware resources) and market forces (the rise of Big Data). We will cover popular and emerging use cases for in-memory computing, from financial industry trading platforms to mobile payment processing, online advertising, online/mobile gaming back-ends and more. We will then present some foundational concepts and terminology, and discuss considerations around any in-memory solution. From there, we will illustrate how a complete in-memory computing stack like GridGain combines clustering, high performance computing, in-memory data grids, stream processing and Hadoop acceleration into one unified and easy to use platform.
Similar to Webinar: How to Design Primary Storage for GDPR (20)
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Storage Switzerland
Join Storage Switzerland and Aparavi for our in-person webinar to learn how to improve your ability to protect unstructured data while at the same time gaining insight into it.
To some, tape storage may seem like an outdated technology in the era of NAS and object-based storage. But— here’s a surprise – tape today is more relevant than ever. Even the most modern data centers can benefit from its low cost of ownership, scalability, reliability and security. In our on demand webinar, Storage Switzerland is joined by Spectra Logic, Fujifilm and Iron Mountain to discuss why tape use shouldn’t just continue but actually expand, including in hybrid cloud environments.
Special Presentation of Meet The CEOs - Commvault and HedvigStorage Switzerland
Commvault has acquired Hedvig. What are the ramifications for the combined companies and the storage industry? Find out when we have Sanjay Mirchandani, CEO of Commvault and Avinash Lakshman, CEO of Hedvig in a special Live Edition of our Meet The CEO Webinar series.
Join us to learn a little bit more about the CEO behind this acquisition, what motivated the two companies to come together and what role Hedvig’s scale-out Software Defined Storage Software play’s in Commvault’s future. Most importantly ask questions directly of our CEO’s.
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Storage Switzerland
Vendors are re-writing software and adding custom hardware in an attempt to not bottleneck extremely low latency NVMe Flash and Storage Class Memory technologies. Eventually, they all are at the mercy of physics. Data has to traverse an internal and sometimes and external network so the computing tier can process it. Computational Storage offers an alternative by performing at least some of the processing on the storage device itself, eliminating most of the network activity.
Join Storage Switzerland's Lead Analyst, George Crump as he leads a panel of computational storage experts to include NGD System's Scott Shadley, ScaleFlux's Thad Omura, and Samsung's Pankaj Mehra as preview the Computational Storage Workshop at the Flash Memory Summit on Thursday, August 8th.
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudStorage Switzerland
Organizations are moving to the cloud but according to a recent Osterman Research study, only 14% of companies have completed that transformation. The study clearly identifies data storage as an area where IT can easily accelerate their cloud transformation journey. Potentially more so than any other component, intelligently moving data to the cloud has the opportunity to significantly lower on-premises storage costs without the threat of impacting day to day operations.
Join Storage Switzerland, HubStor and Osterman Research for our webinar where we discuss the results of the Osterman Research study, what it means for IT, and how IT can take advantage of that research to leverage the cloud to alleviate data management and data protection concerns.
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIStorage Switzerland
During our on demand webinar, “Simplifying the Large-Scale Hybrid Cloud”, Storage Switzerland and Axellio discuss how Microsoft Azure Stack HCI and Axellio’s FabricXpress Servers can deliver new levels of consolidation in the enterprise. Learn how to intelligently leverage Azure to simplify operations like data protection, business continuity, and data center operations – while deploying less infrastructure and less software for your demanding on-premises workloads.
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Storage Switzerland
Most storage consolidation strategies fail because they attempt to consolidate to a single piece of storage hardware. To successfully consolidate storage, IT professionals need to look at consolidation strategies that worked. Server consolidation was VMware’s first use case. It was successful because instead of consolidating hardware, VMware consolidated the environment under a single hypervisor (ESXi) and console (vCenter) but still provided organizations with hardware flexibility. A successful storage consolidation strategy needs to follow a similar formula by providing a single software solution that controls a variety of storage hardware, but that software also has to extract maximum performance and value from each hardware platform on which it sits.
Join Storage Switzerland and StorOne in which we discuss how to design a storage consolidation strategy for today, the future and the cloud.
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Storage Switzerland
In this webinar Storage Switzerland and Carbonite discuss the increased importance of endpoints and why organizations need to upgrade their strategy to make sure these devices are protected, secure and in compliance. In light of increasing legal requirements and potential penalties, organizations can no longer afford to ignore this critical issue.
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthStorage Switzerland
Join Storage Switzerland and SwiftStack, a Splunk technology partner, for our webinar where our panel of experts will discuss the value of having Splunk analyze larger datasets while providing insight into overcoming infrastructure cost and complexity challenges through Splunk enhancements like SmartStore.
Backup software is continuously improving. Solutions like Veeam Backup and Replication deliver instant recoveries, enabling virtual machine volumes to instantiate directly on the backup device, without having to wait for data to transfer back to primary storage. These solutions can also move older backups to higher capacity, lower cost object storage or cloud storage systems. To deliver meaningful performance during instant recovery without exceeding the backup storage budget requires IT to re-think its backup storage architecture.
Modern backup processes need high performance, low capacity systems to deliver high-performance instant recovery, as well as high-capacity, modest performance systems to store backup data long term and software to manage data placement for the most appropriate recovery performance while not breaking the budget.
It is 2019, why are we still backing up production storage? The simple answer is that most production storage systems can provide some level of data protection but they can’t fully replace backup. It's time to consider what backup independence means. The technology is there for production storage to replace backup but most organizations haven’t fully leveraged it. Join Storage Switzerland and ClearSky Data for our webinar to learn how to design a self-protecting production storage infrastructure that not only protects data but replaces backup.
Join us to learn:
•. The difference between data protection and backup
•. Why most production systems can’t replace backup
• How to architect a production system that is fully protected and achieves backup inde-pendence
For over a decade Network Attached Storage (NAS) was the go to file storage device for organizations needing to store large amounts of unstructured data. But unstructured data is changing. While large file use cases are still prevalent, small file use cases are becoming more dominant. Workloads like artificial intelligence, analytics and IoT are typically driven by millions, if not billions of small files.
Object Storage is often hailed as the heir apparent but is it? Can file systems be redesigned to continue to support traditional NAS workloads while also supporting modern, small file and high velocity workloads? Join Storage Switzerland and Qumulo for our webinar, “NAS vs. Object — Can NAS Make a Comeback,” to learn the state of unstructured data storage and if NAS file systems can provide a superior alternative to object storage.
Join us on our event to learn
•. Why traditional NAS solutions fall short
•. Why object storage systems haven't replaced NAS
• How to bridge the gap by modernizing NAS file systems
•. Live Q&A with file system and NAS experts
The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions fall short of delivering enterprise class data protection.
Most cloud backup solutions are too complicated to set up and upgrade, don't provide complete platform support, don't provide flexible recovery options, can't meet the enterprises RTO/RPO requirements and don't provide a class of support that enables organizations to lower their operational expense.
In this live webinar Storage Switzerland and Carbonite discuss the five critical capabilities that enterprises, looking to move to cloud backup, need to make sure their solution has.
Join us for this event to learn:
1. Why switch to the cloud for enterprise backup?
2. The five critical capabilities enterprises MUST have in cloud backup solutions. What they are and why enterprises need them.
3. Why and where most solutions miss the mark
4. How Carbonite Server delivers the five critical capabilities
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureStorage Switzerland
Most organizations use Network Attached Storage (NAS) to store data, but the modern workforce and organization expect more capabilities than what the typical NAS can provide. Also, as organizations themselves become more distributed, the idea of a single centralized file server with users tunneling through virtual private networks won’t scale. The common alternative, putting a NAS in each remote office offers problems of its own when IT tries to make sure the data is protected and made available to the right users at the right time.
Join Storage Switzerland and Nasuni for our webinar “Providing Global File Services Using Microsoft Azure.” By attending this event, you’ll learn:
1. The shortcomings of the Legacy NAS
2. The Cloud Advantage
3. Where the Cloud Needs Help and How to Get it
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsStorage Switzerland
Reducing or a least slowing the growth of storage costs is a top priority facing IT organizations in 2019. In this live webinar with Storage Switzerland and SolarWinds, you will learn the three steps IT professionals can take to lower storage costs WITHOUT buying more storage (the typical vendor answer). The biggest challenges are that IT professionals don't arm themselves with the tools they need to be successful, take the next step in their career path and of course, save their company money.
Join our on demand webinar and learn:
1. How to Eliminate/Resolve Storage Problems - Not Throw Hardware at the Problem
2. Plan and be prepared for capacity growth and performance demands
3. How to manage multiple vendor's storage systems without replacing them
NVMe storage systems and NVMe networks promise to reduce latency further and increase performance beyond what SAS based flash systems and current networking technology can deliver. To take advantage of that performance gain however, the data center must have workloads that can take advantage of all the latency reduction and performance improvements that NVMe offers. Vendors emphatically state that NVMe is the next must-have technology, yet many still continue to provide SAS based arrays using traditional networks.
How do IT planners know then, that investing in NVMe will truly provide their organizations the benefits of NVMe for their demanding applications and see a measurable return on investment? Just creating a test environment to perform an NVMe evaluation can break the IT budget!
Register now to join Storage Switzerland, Virtual Instruments, and SANBlaze as we look at the state of the data center and provide IT planners with the information they need to decide if NVMe is an investment they should make now or if they should wait a year or more. The key is determining which applications can benefit from NVMe-based approaches.
In this event, IT professionals will learn
- About NVMe, NVMe Storage Systems and NVMe over Fabric Networking
- The Performance Potential of NVMe Storage and Networks
- What attributes are needed for a workload to take advantage of NVMe
- Why NVMe creates problems for current IT testing strategies
- Why a Workload Simulation approach is the only practical way to test NVMe
- How to build a storage performance validation practice
Webinar: All in the Cloud - Data Protection Up, Costs DownStorage Switzerland
Managing and protecting critical data across servers and applications in multiple locations around the globe is challenging. And the more decentralized and complex your infrastructure, the more difficult it is to manage your data. The potential bad news? Data loss, site outages, revenue loss, and potential non-compliance with regulations.
But here’s the good news: centralizing data protection in the cloud can make all the difference. That’s why you should join our webinar and hear from storage expert, George Crump, from Storage Switzerland and Druva’s W. Curtis Preston, Chief Technologist, as they discuss:
• Why protecting a distributed data center is challenging with traditional methods
• How a cloud-centralized backup strategy can be a game changer for your organization
• How Druva can help you drastically improve data protection quality, reduce costs, and simplify global management and configuration?
Hyperconverged Infrastructure is supposed to simplify the data center by creating an environment that automatically scales as new applications and workloads are added to it. The problem is that the current generation of HCI solutions can only address specific use cases like virtual desktops or tier 2 applications. First generation HCI solutions don’t have the per node power to accommodate enterprise workloads and tier 1 applications. The organization needs a next generation HCI solution, HCI 2.0, that can address HCI 1.0 shortcomings and fulfill the original promises of HCI; Lower costs, faster innovation, simpler scale, single vendor and unified management. The combination enables HCI 2.0 to handle a variety of storage intensive workloads.
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data MadnessStorage Switzerland
Join Storage Switzerland and Igneous for another Fifteen Minute Friday: Storage Tips for the Weekend. Most organizations are not satisfied with their ability to backup, recovery and correctly retain unstructured data. The combination of unprecedented growth and increased scrutiny caused by regulations like GDPR and CCPA is pushing organizations to the brink. It's time to stop the madness!
By joining this short webinar, you’ll learn tips to overcome:
- The Unstructured Data Backup Challenge
- The Archive Challenge
- The Data Privacy / Data Retention Challenge
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Storage Switzerland
Join Storage Switzerland, Caringo, Cloudian and Scality, for a live roundtable discussion on Object Storage. Learn what you need to know to develop a strategy for object storage. Our panel of experts will discuss what object storage is, what is better/different about object storage than other types of storage and what are the use cases enterprises should consider.
Our Object Storage Panel will provide specific details on how to get started with object storage, what use cases pay the most immediate return on the investment and where object storage fits in an organization's overall storage strategy. The panel will also discuss what is coming next in object storage. Each expert will also give a brief overview of their company's object storage solution. We will close out the roundtable by taking questions from our live audience.
By attending one webinar, you’ll learn everything you need to know about object storage, provide actionable information in developing an object storage strategy and hear from three top vendors about how their products will fit into those plans.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Webinar: How to Design Primary Storage for GDPR
1. Webinar
How to Design Primary Storage for GDPR
In this Webinar
You Will Learn About:
1. Meeting the applications demand for more and
more performance
2. Meeting the immediate disaster recovery
demands of GDPR
3. Meeting the long-term data retention demands
of GDPR
For audio playback and Q&A go to: http://bit.ly/GDPRStorage
2. Our Speakers
Narayan Venkat, Chief Marketing Officer at Tegile Systems is a highly passionate and experienced
technology professional with over 20+ years of experience in the IT industry. Experienced executive
with a demonstrated history of success in the computer systems industry. Skilled in Enterprise
Software and Storage, Go-to-market Strategy, Demand Generation, and Digital Marketing. Extensive
start-up leadership experience, great team builder, and accomplished marketer with a MBA focused in
Marketing, Finance from The University of Chicago - Booth School of Business.
George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the
subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is
widely recognized for his articles, white papers, and videos on such current approaches as all-flash
arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking.
He has over 25 years of experience designing storage solutions for data centers across the US.
3. What is GDPR? ● EU Regulation focused on data
protection and management of personal
data
● Impacts ANY business doing business in
the EU
● Enforceable after May 25th 2017
● Does not require national governments to
pass any enabling legislation
4. Key Factors
● Right of Access
● Right of Erasures
● Data Portability
● Data Protection
5. GDPR and Storage
● Heavy Security Focus
● Encryption and decryption operations
carried out locally, not by remote
service
● Keys and data must remain in the
power of the data owner if any privacy is
to be achieved
● Outsourced data storage on remote
clouds is practical and relatively safe, as
long as only the data owner, not the
cloud service, holds the decryption keys
6. GDPR and Data Protection
● Largely overlooked is Article 32 “The Security
of Processing”
● “the ability to ensure the ongoing
confidentiality, integrity, availability and
resilience of processing systems and services”
● “the ability to restore the availability and access to personal data in a timely
manner in the event of a physical or technical incident”
● “a process for regularly testing, assessing and evaluating the effectiveness of
technical and organisational measures of ensuring the security of the
processing”
7. The “Timely
Manner”
Problem
● The problem is
“Timely Manner” is not
defined anywhere!
● Previous EU
regulations gave
seven days, but
“timely manner”
implies something far
less
8. The Data Protection
Problem
● Most organizations count on backup for
both day to day recovery and for long
term data retention
● Typical backup and recovery takes
hours-days to recover systems
● Retention is challenged by inability to
find data
● Further challenged by inability to delete
discrete data sets
9. Meanwhile… Users still
want High Performance
NOW!
● All-flash is becoming the dominant
architecture
● But not ideal for data protection and data
retention
● Yet many primary storage systems have
attributes that will help with GDPR
compliance...
10. Modern Storage and
GDPR Compliance
● Instant and unlimited
snapshots
● Rapid full volume copies
● Improving search tools
● Replication
12. Two or Three
Storage Systems
● System A on-premises to service
production applications
● System B off-site to cover DR
requirement
● Optional System C on-premises to
protect from more common disaster
● Each set with a different snapshot
schedule to protect from
ransomware and other cyber-
attacks
A
C
B?
13. Overcoming the Expense of All-Flash
● Don’t do All-Flash
● System B and System C
should be Hybrid (HDD and
Flash)
○ Assumes vendor has
flash and hybrid
options and can
replicate between them
● Amount of flash in each
system will vary
14. The Role of
Data Protection
● The backup of last
resort
● Can service retention
requests but
○ An archive
system is a much
better choice
15. Solution
● Invest in Primary Storage
instead / with backup
● Change backups role to
backup of last resort
● Invest in archive solution to
provide search and deletion
assurance