This document summarizes the activities from the IETF 93 meeting in Prague related to DNS, DNSSEC, DANE, DHCP, and IPv6. Key topics discussed included proposed updates to DNS transport over TCP, KSK rollover in the root zone, the Yeti-DNS experimental IPv6-only root server project, new DANE record extensions, secure DHCP updates, and IPv6/IPv4 transition technologies. Work is ongoing on several draft documents around DNS, DNSSEC, DANE and other areas.
In the webinar hear what was new on:
- Amplification DDoS Attacks – Defenses for Vulnerable Protocols
- news from DNS-OARC meeting (DNS measurements, open resolver stats)
-Strengthening the Internet Against Pervasive Monitoring
-What Went Wrong With IPv6?
-RIPE IPv6 Analyser
-IPv6 troubleshooting procedures for helpdesks
-Using DDoS to Trace the Source of a DDoS Attack
-Measuring DNSSEC from the End User Perspective
-Google DNS Hijacking in Turkey
-The Rise and Fall of BIND 10
-Knot DNS Update – DNSSEC and beyond
-Bundy-DNS – the new life of BIND 10
Report from IETF 89 in London - DNS, DHCP and IPv6Men and Mice
The IETF, Internet Engineering Task Force, those that are working on new Internet Standards, met in London in March 2014.
In this webinar, Carsten Strotmann from the Men & Mice Services team reports fresh from the IETF meeting. This session distills interesting developments from the DNS, DHCP and IPv6 working groups.
What can be expected:
DNS
-DNS transport encryption
-Special Names in DNS
-Simplifying DNSSEC key trust anchor exchange between child and parent
- EDNS option updates
-Passive DNS
-DNSSEC Validator Requirements
-DNS cookies
DNSSEC/DANE
-Using DANE to Associate OpenPGP public keys with email addresses
- IPSec and DNSSEC/DANE
- DANE Security for MX and SRV records
- DANE and smtp
IPv6
-Reducing Multicast in IPv6 Neighbor Discovery
-IPv6 Operational Guidelines for Data centers
-Recommendations of Using Unique Local Addresses
-DHCPv6/SLAAC Interaction Operational Guidance
-Sunsetting IPv4
DHCP
-DHCPv6 Load Balancing and Failover
-DHCP stateless reconfiguration
-Dynamic Allocation of Shared IPv4 Addresses
-Customizing DHCP Configuration on the Basis of Network Topology
Hacking school computers for fun profit and better grades shortVincent Ohprecio
The document discusses various topics related to hacking including motivations, methodologies, and tools. It describes how hackers conduct reconnaissance on targets, develop exploits, execute exploits, and maintain access. Specific hacking methods like fuzzing, malware kits, and shellcode are explained. Potential targets mentioned include students, faculty computers, wireless networks, and websites. The document also provides biographical information about the author and recommends books and resources for hacking.
Presented at FITC Toronto 2016
See details at www.fitc.ca
Responsive design, content adaptation, automatically adjustable brightness and other techniques are meant to improve the end user experience. However, those techniques take in consideration device sensors input and not you as a human being! Of course, you can adjust your device settings, but think for a second how cool it would be to have the app adapt to you automatically. Imagine you playing a game where the main character changes accordingly to your genome profile. During this talk, we’ll discover how to embed in an existing game the logic needed to have a character interact with the game environment according to strength, speed, resistance, etc. provided by your DNA profile.
Target Audience
Mobile engineers, engineering managers, entrepreneurs.
Assumed Audience Knowledge
Some bases of iOS and Android development, consuming restful API and some experience with the mobile development ecosystem.
Five Things Audience Members Will Learn
How to read basic info from a human genome
Effectively consume external data on an unreliable network
Integrating external data into existing game engines
Influence the game engine and character behaviors
Exchange securely data on a mobile network
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonOpenDNS
This document discusses using passive DNS data and BGP routing tables to analyze IP addresses and autonomous system numbers (ASNs) that may be hosting malicious infrastructure or content. It introduces Marauder, a tool that scans passive DNS data and the AS graph to detect suspicious patterns, such as sibling leaf ASNs delivering similar malicious campaigns. Several use cases are presented, including analyzing suspicious sibling leaf ASNs hosting malware, identifying ASNs that are lax about hosting shady content, and detecting rogue ASNs that have been de-peered or gone stealth mode. The document also discusses the platforms, tools and Python libraries used to implement Marauder.
This document discusses monitoring cloud infrastructure and services. It outlines the goals of building a system for collecting millions of signals from servers across multiple data centers to enable robust metrics collection, concurrent and redundant event analysis, and predictive capabilities. The key aspects covered are the technology used including Node.js, Cassandra, Esper, and custom tools. It also discusses how the system was built including aspects like reducing friction, well-greased deployments, and a focus on safety and redundancy across data centers.
This document summarizes the activities from the IETF 93 meeting in Prague related to DNS, DNSSEC, DANE, DHCP, and IPv6. Key topics discussed included proposed updates to DNS transport over TCP, KSK rollover in the root zone, the Yeti-DNS experimental IPv6-only root server project, new DANE record extensions, secure DHCP updates, and IPv6/IPv4 transition technologies. Work is ongoing on several draft documents around DNS, DNSSEC, DANE and other areas.
In the webinar hear what was new on:
- Amplification DDoS Attacks – Defenses for Vulnerable Protocols
- news from DNS-OARC meeting (DNS measurements, open resolver stats)
-Strengthening the Internet Against Pervasive Monitoring
-What Went Wrong With IPv6?
-RIPE IPv6 Analyser
-IPv6 troubleshooting procedures for helpdesks
-Using DDoS to Trace the Source of a DDoS Attack
-Measuring DNSSEC from the End User Perspective
-Google DNS Hijacking in Turkey
-The Rise and Fall of BIND 10
-Knot DNS Update – DNSSEC and beyond
-Bundy-DNS – the new life of BIND 10
Report from IETF 89 in London - DNS, DHCP and IPv6Men and Mice
The IETF, Internet Engineering Task Force, those that are working on new Internet Standards, met in London in March 2014.
In this webinar, Carsten Strotmann from the Men & Mice Services team reports fresh from the IETF meeting. This session distills interesting developments from the DNS, DHCP and IPv6 working groups.
What can be expected:
DNS
-DNS transport encryption
-Special Names in DNS
-Simplifying DNSSEC key trust anchor exchange between child and parent
- EDNS option updates
-Passive DNS
-DNSSEC Validator Requirements
-DNS cookies
DNSSEC/DANE
-Using DANE to Associate OpenPGP public keys with email addresses
- IPSec and DNSSEC/DANE
- DANE Security for MX and SRV records
- DANE and smtp
IPv6
-Reducing Multicast in IPv6 Neighbor Discovery
-IPv6 Operational Guidelines for Data centers
-Recommendations of Using Unique Local Addresses
-DHCPv6/SLAAC Interaction Operational Guidance
-Sunsetting IPv4
DHCP
-DHCPv6 Load Balancing and Failover
-DHCP stateless reconfiguration
-Dynamic Allocation of Shared IPv4 Addresses
-Customizing DHCP Configuration on the Basis of Network Topology
Hacking school computers for fun profit and better grades shortVincent Ohprecio
The document discusses various topics related to hacking including motivations, methodologies, and tools. It describes how hackers conduct reconnaissance on targets, develop exploits, execute exploits, and maintain access. Specific hacking methods like fuzzing, malware kits, and shellcode are explained. Potential targets mentioned include students, faculty computers, wireless networks, and websites. The document also provides biographical information about the author and recommends books and resources for hacking.
Presented at FITC Toronto 2016
See details at www.fitc.ca
Responsive design, content adaptation, automatically adjustable brightness and other techniques are meant to improve the end user experience. However, those techniques take in consideration device sensors input and not you as a human being! Of course, you can adjust your device settings, but think for a second how cool it would be to have the app adapt to you automatically. Imagine you playing a game where the main character changes accordingly to your genome profile. During this talk, we’ll discover how to embed in an existing game the logic needed to have a character interact with the game environment according to strength, speed, resistance, etc. provided by your DNA profile.
Target Audience
Mobile engineers, engineering managers, entrepreneurs.
Assumed Audience Knowledge
Some bases of iOS and Android development, consuming restful API and some experience with the mobile development ecosystem.
Five Things Audience Members Will Learn
How to read basic info from a human genome
Effectively consume external data on an unreliable network
Integrating external data into existing game engines
Influence the game engine and character behaviors
Exchange securely data on a mobile network
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonOpenDNS
This document discusses using passive DNS data and BGP routing tables to analyze IP addresses and autonomous system numbers (ASNs) that may be hosting malicious infrastructure or content. It introduces Marauder, a tool that scans passive DNS data and the AS graph to detect suspicious patterns, such as sibling leaf ASNs delivering similar malicious campaigns. Several use cases are presented, including analyzing suspicious sibling leaf ASNs hosting malware, identifying ASNs that are lax about hosting shady content, and detecting rogue ASNs that have been de-peered or gone stealth mode. The document also discusses the platforms, tools and Python libraries used to implement Marauder.
This document discusses monitoring cloud infrastructure and services. It outlines the goals of building a system for collecting millions of signals from servers across multiple data centers to enable robust metrics collection, concurrent and redundant event analysis, and predictive capabilities. The key aspects covered are the technology used including Node.js, Cassandra, Esper, and custom tools. It also discusses how the system was built including aspects like reducing friction, well-greased deployments, and a focus on safety and redundancy across data centers.
How to become DNSSEC-ure
DNSSEC (short for DNS Security Extensions) adds security to the Domain Name System.
The original design of the Domain Name System (DNS) did not include security; instead it was designed to be a scalable distributed system. The Domain Name System Security Extensions (DNSSEC) attempts to add security, while maintaining backwards compatibility.
Yeti-DNS is an international research project with the purpose of testing new technologies and procedures in running the Internet root zone. The project runs tests on DNSSEC key rollovers in the root, as well as experimenting with new ways to manage the DNSSEC keys (multiple zone signing keys).
An interview with Shane Kerr, a coordinator for the Yeti-DNS project, forms part of this webinar. The interview sheds light on the technical and political aspects of the project and introduces the latest results from experiments.
The webinar also includes a tutorial on how to use the Yeti-DNS root name servers to configure a BIND 9 DNS resolver in order to take part in the project.
The document summarizes discussions from IETF 94 and RIPE 71 conferences. Several new DNS-related RFCs were published, including ones on DNSSEC, DANE, and IPv6. Discussions also covered DNS record ordering, DS record management automation, and measuring the SMTP over TLS adoption. IPv6 performance improvements were noted since 2011, though challenges remain. DNSTAP was introduced as a new technology for monitoring DNS server operations with minimal performance impact.
A webinar that looks into the new features that the Windows Server 2016 will offer in the DNS, DHCP and IPv6 space.
Showcase of some of the new stuff using the latest tech preview and the aim is to give administrators a quick overview of the Windows Server 2016 and enough information to decide if early adoption is worthwhile.
Topics covered in the webinar:
- IPv6 segment routing
- synchronizing DNS parent and child zones using the DNS protocol
- Status update on Knot-DNS 2.0 DNS Server and the Knot-DNS resolver
- DNSSEC look-aside validation (DLV) sunset
- network tuning for DNS zone transfers
- Use cases for IPv6 extension headers
- Zonemaster DNS and DNSSEC testing tool
- DNS based DDoS attacks
Knot-DNS is a high-performance authoritative DNS server that supports DNSSEC and dynamic updates. It is free and open-source software released under GPLv3. Knot-DNS features include master and slave zones, zone transfers, DNSSEC signing, response rate limiting, dynamic zone loading, and good performance on modern hardware. It includes tools like knotc for control and kdig similar to dig for queries.
This document provides an overview of PowerDNS, an open-source authoritative DNS server. It discusses PowerDNS' backends for storing zone data like BIND and SQL databases, its DNSSEC signing capabilities, and its support for remote and Lua scripting backends. It also demonstrates configuring PowerDNS to use BIND, MySQL, and remote backends. Finally, it summarizes Men & Mice's generic PowerDNS controller and upcoming training courses.
In this installment of the Men & Mice webinar series, Mr. Carsten Strotmann will talk about the role that DNS plays in fighting malware and spam.
The discussion will dig into DNS blacklists, domain reputation, Response Policy Zones and how the new TLDs have changed the game.
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
Keeping DNS server up-and-running with “runitMen and Mice
A traditional Unix/Linux init system like SystemV-Init or BSD rc does start a DNS server process on server boot, but it does not restart the service in case of an abnormal termination. Modern init replacements like systemd provide process supervision, but bring extra complexities and possible stability and security issues.
This webinar demonstrates an alternative, open source process supervision system called “runit”.
“runit” is lean and fast and sticks to the Unix tradition to do one thing, and do that right.
In this webinar you will learn how to manage DNS server processes such as BIND 9, Unbound and NSD from runit.
This document discusses DNS server monitoring using DNSTAP, an open protocol to capture and store DNS server events. It begins by noting the performance impact of traditional monitoring methods and limitations of network packet capture. It then provides an overview of how DNSTAP works, implementations in Unbound, Knot DNS, and upcoming BIND 9, dependencies, available tools, and examples of configuring DNSTAP in Unbound, Knot DNS, and BIND 9.
DNS High-Availability Tools - Open-Source Load Balancing SolutionsMen and Mice
The DNS protocol has built-in high availability for authoritative DNS servers (this will be better explained in the webinar!), but client machines can see a degraded DNS service if a DNS resolver (caching DNS server) is failing.
In this webinar, we will look into how the DNS clients in popular operating systems (Windows, Linux, macOS/iOS) choose the DNS resolver among a list of available servers, and how a DNS resolver service can be made failure-tolerant with open-source solutions such as “dnsdist” from PowerDNS and “relayd” from OpenBSD.
It goes without saying that DNS is only as secure as its servers. To ensure the successful and secure operation of a DNS server, secure configuration is paramount.
The new BIND 9 version 9.11 is a major version of the popular DNS server, released in August by ISC.
In this webinar Mr. Carsten Strotmann will demonstrate new features such as:
- Catalog Zones,
- dnssec-keymgr, new *rndc* functions
- CDS/CDNSKEY auto generation
- Negative Trust Anchor
- DNS cookies
-Refuse “any”
-and more.
Logging is important for troubleshooting a DNS service. Conveniently with BIND 9, almost all problems will show up somewhere in the log output, but only if the logging is enabled and configured correctly.
In this webinar, we’ll discuss the BIND 9 logging configuration and best practices in searching through large log-files to find the entries of interest. In addition, we’ll release log-management tools used by Men & Mice Services.
How DNS wildcards really work & how to prevent that DNS wildcard bite!
Tailored for DNS administrators on Unix and Windows operating authoritative DNS Servers with one or more zone-files, as well as all those interested in the topic.
Scripting and automation with the Men & Mice SuiteMen and Mice
The powerful SOAP interface & how and where scripts can be integrated
Beside the Men & Mice Management Console, the Web Interface and the command line interface (CLI) there are other ways to access the Men & Mice Suite.
IETF 90 Report – DNS, DHCP, IPv6 and DANEMen and Mice
At this webinar, Mr. Carsten Strotmann from the Men & Mice Services team gives an overview of interesting developments from the working groups inside the IETF, after attending online at the IETF 90 in Toronto.
Hear more on:
- DNS
- DNS-Privacy
- IPv6
- DANE
- DHCP(v6)
- and new RFCs that have been published since the last IETF in March 2014
This document summarizes MongoDB usage at MapMyFitness from a DevOps perspective. It describes how MongoDB is used for storing routes, sessions, live tracking data and API logging. It provides examples of implementation patterns like replica sets, sharding and automated provisioning. It also covers topics like monitoring, security, maintenance and lessons learned.
Imola informatica - cloud computing and software developmentFilippo Bosi
This document provides an agenda and overview of a cloud computing workshop held in September 2011. The agenda includes an overview of cloud computing, its impacts on software development, and a hands-on demonstration of Platform as a Service (PaaS). Key concepts discussed include Infrastructure as a Service (IaaS) using Amazon EC2, PaaS options like Google App Engine, CloudBees, and RedHat OpenShift. Developing applications on IaaS provides more control but requires managing infrastructure, while PaaS hides these details and allows focusing on development.
How to become DNSSEC-ure
DNSSEC (short for DNS Security Extensions) adds security to the Domain Name System.
The original design of the Domain Name System (DNS) did not include security; instead it was designed to be a scalable distributed system. The Domain Name System Security Extensions (DNSSEC) attempts to add security, while maintaining backwards compatibility.
Yeti-DNS is an international research project with the purpose of testing new technologies and procedures in running the Internet root zone. The project runs tests on DNSSEC key rollovers in the root, as well as experimenting with new ways to manage the DNSSEC keys (multiple zone signing keys).
An interview with Shane Kerr, a coordinator for the Yeti-DNS project, forms part of this webinar. The interview sheds light on the technical and political aspects of the project and introduces the latest results from experiments.
The webinar also includes a tutorial on how to use the Yeti-DNS root name servers to configure a BIND 9 DNS resolver in order to take part in the project.
The document summarizes discussions from IETF 94 and RIPE 71 conferences. Several new DNS-related RFCs were published, including ones on DNSSEC, DANE, and IPv6. Discussions also covered DNS record ordering, DS record management automation, and measuring the SMTP over TLS adoption. IPv6 performance improvements were noted since 2011, though challenges remain. DNSTAP was introduced as a new technology for monitoring DNS server operations with minimal performance impact.
A webinar that looks into the new features that the Windows Server 2016 will offer in the DNS, DHCP and IPv6 space.
Showcase of some of the new stuff using the latest tech preview and the aim is to give administrators a quick overview of the Windows Server 2016 and enough information to decide if early adoption is worthwhile.
Topics covered in the webinar:
- IPv6 segment routing
- synchronizing DNS parent and child zones using the DNS protocol
- Status update on Knot-DNS 2.0 DNS Server and the Knot-DNS resolver
- DNSSEC look-aside validation (DLV) sunset
- network tuning for DNS zone transfers
- Use cases for IPv6 extension headers
- Zonemaster DNS and DNSSEC testing tool
- DNS based DDoS attacks
Knot-DNS is a high-performance authoritative DNS server that supports DNSSEC and dynamic updates. It is free and open-source software released under GPLv3. Knot-DNS features include master and slave zones, zone transfers, DNSSEC signing, response rate limiting, dynamic zone loading, and good performance on modern hardware. It includes tools like knotc for control and kdig similar to dig for queries.
This document provides an overview of PowerDNS, an open-source authoritative DNS server. It discusses PowerDNS' backends for storing zone data like BIND and SQL databases, its DNSSEC signing capabilities, and its support for remote and Lua scripting backends. It also demonstrates configuring PowerDNS to use BIND, MySQL, and remote backends. Finally, it summarizes Men & Mice's generic PowerDNS controller and upcoming training courses.
In this installment of the Men & Mice webinar series, Mr. Carsten Strotmann will talk about the role that DNS plays in fighting malware and spam.
The discussion will dig into DNS blacklists, domain reputation, Response Policy Zones and how the new TLDs have changed the game.
Kea DHCP – the new open source DHCP server from ISCMen and Mice
This webinar will highlight the differences between the old ISC DHCP and new Kea DHCP (database support, dynamic reconfiguration, performance wins, scripting hooks) and will showcase the Men & Mice Suite as a graphical front-end to both ISC DHCP and Kea to ease the migration.
Keeping DNS server up-and-running with “runitMen and Mice
A traditional Unix/Linux init system like SystemV-Init or BSD rc does start a DNS server process on server boot, but it does not restart the service in case of an abnormal termination. Modern init replacements like systemd provide process supervision, but bring extra complexities and possible stability and security issues.
This webinar demonstrates an alternative, open source process supervision system called “runit”.
“runit” is lean and fast and sticks to the Unix tradition to do one thing, and do that right.
In this webinar you will learn how to manage DNS server processes such as BIND 9, Unbound and NSD from runit.
This document discusses DNS server monitoring using DNSTAP, an open protocol to capture and store DNS server events. It begins by noting the performance impact of traditional monitoring methods and limitations of network packet capture. It then provides an overview of how DNSTAP works, implementations in Unbound, Knot DNS, and upcoming BIND 9, dependencies, available tools, and examples of configuring DNSTAP in Unbound, Knot DNS, and BIND 9.
DNS High-Availability Tools - Open-Source Load Balancing SolutionsMen and Mice
The DNS protocol has built-in high availability for authoritative DNS servers (this will be better explained in the webinar!), but client machines can see a degraded DNS service if a DNS resolver (caching DNS server) is failing.
In this webinar, we will look into how the DNS clients in popular operating systems (Windows, Linux, macOS/iOS) choose the DNS resolver among a list of available servers, and how a DNS resolver service can be made failure-tolerant with open-source solutions such as “dnsdist” from PowerDNS and “relayd” from OpenBSD.
It goes without saying that DNS is only as secure as its servers. To ensure the successful and secure operation of a DNS server, secure configuration is paramount.
The new BIND 9 version 9.11 is a major version of the popular DNS server, released in August by ISC.
In this webinar Mr. Carsten Strotmann will demonstrate new features such as:
- Catalog Zones,
- dnssec-keymgr, new *rndc* functions
- CDS/CDNSKEY auto generation
- Negative Trust Anchor
- DNS cookies
-Refuse “any”
-and more.
Logging is important for troubleshooting a DNS service. Conveniently with BIND 9, almost all problems will show up somewhere in the log output, but only if the logging is enabled and configured correctly.
In this webinar, we’ll discuss the BIND 9 logging configuration and best practices in searching through large log-files to find the entries of interest. In addition, we’ll release log-management tools used by Men & Mice Services.
How DNS wildcards really work & how to prevent that DNS wildcard bite!
Tailored for DNS administrators on Unix and Windows operating authoritative DNS Servers with one or more zone-files, as well as all those interested in the topic.
Scripting and automation with the Men & Mice SuiteMen and Mice
The powerful SOAP interface & how and where scripts can be integrated
Beside the Men & Mice Management Console, the Web Interface and the command line interface (CLI) there are other ways to access the Men & Mice Suite.
IETF 90 Report – DNS, DHCP, IPv6 and DANEMen and Mice
At this webinar, Mr. Carsten Strotmann from the Men & Mice Services team gives an overview of interesting developments from the working groups inside the IETF, after attending online at the IETF 90 in Toronto.
Hear more on:
- DNS
- DNS-Privacy
- IPv6
- DANE
- DHCP(v6)
- and new RFCs that have been published since the last IETF in March 2014
This document summarizes MongoDB usage at MapMyFitness from a DevOps perspective. It describes how MongoDB is used for storing routes, sessions, live tracking data and API logging. It provides examples of implementation patterns like replica sets, sharding and automated provisioning. It also covers topics like monitoring, security, maintenance and lessons learned.
Imola informatica - cloud computing and software developmentFilippo Bosi
This document provides an agenda and overview of a cloud computing workshop held in September 2011. The agenda includes an overview of cloud computing, its impacts on software development, and a hands-on demonstration of Platform as a Service (PaaS). Key concepts discussed include Infrastructure as a Service (IaaS) using Amazon EC2, PaaS options like Google App Engine, CloudBees, and RedHat OpenShift. Developing applications on IaaS provides more control but requires managing infrastructure, while PaaS hides these details and allows focusing on development.
This document discusses DNS reflection attacks and ways to mitigate them. DNS uses UDP, allowing source IP addresses to be spoofed. An attacker can spoof the victim's IP and use open DNS resolvers to reflect large DNS responses, overwhelming the victim. Response rate limiting aims to throttle responses to a network if too many identical queries are received, reducing the attack payload size. Configuring DNS servers to provide minimal responses and closing open resolvers also helps reduce the risks.
This document provides an introduction and overview of exercises for a workshop on using Node-RED, a visual tool for wiring together hardware devices, APIs, and online services for Internet of Things (IoT) projects. The workshop will teach participants how to build a basic web server and chat application using Node-RED's flow-based programming. Key aspects covered include installing and starting Node-RED, creating simple flows to inject and output test data, setting up HTTP requests and responses to build a static website, using templates and functions to add dynamic and styled content, and handling form submissions to return user input to the Node-RED flow. The exercises build up skills for retaining state across flows, integrating input and output, and developing a
Context-Aware Access Control for RDF Graph StoresSerena Villata
This document describes SHI3LD, a context-aware access control system for RDF graph stores. SHI3LD uses semantic web technologies and vocabularies to define access policies and user contexts. It evaluates policies against user contexts to determine which named graphs the user can access. This allows fine-grained, context-sensitive access control over RDF data. The system was evaluated using a SPARQL benchmark dataset, and response times increased only slightly as more user contexts and consumers were added. Future work may focus on improving context data trustworthiness and performing user-centered evaluations.
An overview of the technology options for adding speech to web applications. It covers the HTML5 Speech Input API for speech recognition, using the Audio tag with 3rd party APIs for text-to-speech, and an overview of WebRTC application possibilities.
Presented at the Atlanta Ruby Users Group meeting on November 13, 2013.
In this presentation, I illustrate, and discuss initial results from a quantitative analysis of the performance of WPS servers. To do so, two test scenarios were used to measure response time, response size, throughput, and failure rate of five WPS servers including 52North, Deegree, GeoServer, PyWPS, and Zoo. I also assess each WPS server in terms of qualitative metrics such as software architecture, perceived ease of use, flexibility of deployment, and quality of documentation. A case study addressing accessibility assessment is used to evaluate the relative advantages and disadvantages of each implementation, and point to challenges experienced while working with these WPS servers.
This document discusses workflows in astronomy and the Virtual Observatory (VO). It defines workflows as combinations of data and processes into structured steps that implement computational solutions. It describes different types of workflows used in astronomy, such as personal scripts, multi-archive recipes, and processing pipelines. The document then summarizes several tools used to create workflows, including Taverna, Kepler, Triana, ESO Reflex, AstroTaverna, and the Aladin JLOW plugin. It also discusses related initiatives involving workflows, such as Wf4Ever, Cyber-SKA, Montage, and Astro-WISE. Finally, it outlines how workflows and web services could be important for the next generation of astronomical archives and data analysis in the
The document discusses recommender systems used by the music streaming service Rdio, including baseline popularity models, nearest neighbor models, matrix factorization models, and Bayesian personalized ranking. It provides an overview of these approaches, their pros and cons, and results showing Bayesian personalized ranking performs best. Current and future work at Rdio includes building ensemble models, simplifying A/B testing, incorporating content-based recommendations, and experimenting with deep learning techniques.
IPv6 IAB/IETF Activities Report from ARIN 32 given by Cathy Aronson
Full meeting report from ARIN 32 available at: https://www.arin.net/participate/meetings/reports/ARIN_32/index.html
NGS Informatics and Interpretation - Hardware Considerations by Michael McManusKnome_Inc
View this webinar at: http://www.knome.com/webinar-ngs-informatics-and-interpretation-hardware-considerations. In this presentation, Knome’s Senior Vice President of Operations, Michael McManus, PhD, will review the k100 and k25 hardware models of the knoSYS including servers, storage, networks, and power components. While doing so, he will answer:
- Why would someone purchase hardware when they can process NGS data on the cloud?
- For an organization not interested in using the cloud, what sort of hardware should be considered?
- What hardware specifications are needed for conducting align + call (FASTQ and/or BAM files) versus interpretation (VCF files)?
- Is all hardware alike? How does someone compare systems apples-to-apples?
Archiving Best Practices -- Creative Operations Essentialsglobaledit®
This webinar will help you think strategically about archiving assets at the end of their lifecycle.
What you’ll learn:
- Setting a company archiving strategy
- What, when, how much to archive
- The cost of archiving today
Watch the full webinar here: http://bit.ly/1T1Fpru
This slideshow is part of a "Creative Operations Essentials" webinar series brought to you by Globaledit, the online SaaS platform that empowers creative professionals to manage visual production at scale. You can CAPTURE, REVIEW, APPROVE, MARKUP, SHARE, ARCHIVE your digital files all within Globaledit.
More information about globaledit: www.globaledit.com
This document provides details about the SentiXchange project, which aims to perform sentiment analysis on Twitter feeds. It outlines the requirements, user interface design rules, data mining principles and algorithms to be used, including Naive Bayes classification, maximum entropy modeling, and support vector machines. The architecture involves interacting with the Twitter APIs to search and stream tweets, analyze sentiment, and display results through a web interface. Historical analysis of keywords and creation of a sentiment index are also described.
Fingerprint Biometrics - The link between the analog and digital you - IDEXIDEX ASA
The document discusses IDEX's financial results for Q4 2012 and outlook for 2013. It summarizes that IDEX signed a memorandum of understanding with a Chinese partner in Q4 2012 and expects a deal with an OEM partner. The biometrics market is positioned for strong growth driven by increasing smartphone, tablet, and Internet of Things adoption. IDEX is well positioned in the market with a strong patent portfolio in capacitive fingerprint sensing.
Getting Things Done for Technical CommunicatorsKaren Mardahl
This document discusses the Getting Things Done (GTD) methodology for productivity and stress reduction. It provides an overview of the key aspects of GTD, including capturing tasks, clarifying actions, maintaining lists organized by project and context, regular reviews, and closing completed tasks to keep focused on what matters. The presenter shares their personal experience using GTD and recommends it as a way to more efficiently manage one's time.
Atlas Hugged: How Atlassian Tools Enabled a Software Internalization TeamAtlassian
Software internationalization requires the involvement of people around the world in different roles, from sales and marketing to engineering and management. Join Sarah as she tells the story of how the combination of Confluence and JIRA enabled QAD's Internationalization Team to come together and work closely to meet requirements efficiently and effectively.
Atlas Hugged: How Atlassian Tools Enabled a Software Internalization TeamAtlassian
Software internationalization requires the involvement of people around the world in different roles, from sales and marketing to engineering and management. Join Sarah as she tells the story of how the combination of Confluence and JIRA enabled QAD's Internationalization Team to come together and work closely to meet requirements efficiently and effectively.
HTML5 is the Future of Mobile, PhoneGap Takes You There Todaydavyjones
PhoneGap allows developers to build mobile apps using HTML, CSS and JavaScript instead of relying on platform-specific languages like Objective-C or Java. The document discusses PhoneGap's capabilities and advantages, including writing apps once that run on multiple platforms, using web technologies that are widely known by developers, and leveraging growing browser capabilities on mobile through HTML5. It also outlines PhoneGap's APIs, tools, libraries, and community to help developers get started building cross-platform mobile apps.
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesMen and Mice
Want to know what's bogging down your Hybrid and Multicloud strategies? Here we discuss some typical hurdles, shift in decision-making between DevOps and Network Managers and the importance of utilizing the service-native features available within the solutions that comprise your network, whether on-premise or cloud.
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSMen and Mice
The focus of this webinar will be to take a deeper look into this local name-resolution system and the implementations for other Unix systems like Linux and FreeBSD. Linux’s new über-Daemon “systemd” supports both mDNS and the Windows LLMNR (Link-Local-Multicast-Name-Resolution). We will also show how well a Systemd-Linux behaves in heterogenous networks running both Windows and macOS.
Part 2 - Local Name Resolution in Windows NetworksMen and Mice
This webinar discusses local name resolution protocols in Windows networks. It focuses on Link Local Multicast Name Resolution (LLMNR) and Peer Name Resolution Protocol (PNRP). LLMNR provides serverless name resolution on the local subnet using multicast queries. PNRP is a peer-to-peer name resolution protocol that operates over IPv6 or IPv4-IPv6 tunnels. The webinar explains how these protocols work, how to configure and use them, and potential security issues to be aware of when using them. It also advertises upcoming Men & Mice training courses on DNS and name resolution topics.
Google has changed Chrome's code to enforce HTTPS encryption on all ".dev" domains by default. This causes problems for developers who use ".dev" locally without HTTPS. Alternatives for local domain names include subdomains of owned domains, reserved domains like ".test", or protocols besides DNS like LLMNR and mDNS. Unbound and BIND can configure local zones to resolve names without internet access.
How to send DNS over anything encryptedMen and Mice
Today, nearly all DNS queries are send unencrypted. This makes DNS vulnerable to eavesdropping by someone with access to the network. The DNS-Privacy group (DPRIVE) inside the Internet Engineering Task Force (IETF), as well as people outside the IETF, are working on new transport protocols to encrypt DNS traffic between DNS clients and resolver.
* DNS over TLS (RFC 7858)
* DNS over DTLS (RFC 8094)
* DNS over HTTP(S) (ID-draft)
* DNS over QUIC (ID-draft)
* DNS over DNSCrypt (outside IETF)
* DNS over TOR (outside IETF)
In this webinar, we will explain the protocols available or discussed inside and outside the IETF, and give some example configurations on how to use this new privacy protocols today.
The DNSSEC key signing key (or KSK) of the DNS root zone will be changed in the summer of 2017. During the time between July and October, all DNSSEC validating resolver need to get the new key material.
In this webinar we explain the KSK roll, how DNS resolver will load the new KSK with the RFC 5011 protocol and how a DNS administrator can verify that the new KSK is present in the resolvers configuration.
The CAA-Record for increased encryption securityMen and Mice
The CAA Record (Certification Authority Authorization) is used to signal which certification authority (CA) can issue an x509 certificate for a given domain. CAA creates a DNS mechanism that enables domain name owners to whitelist CAs that are allowed to issue certificates for their hostnames.
Starting from September 2017, certificate issuing CA must support the CAA record.
This explains the CAA record, how it works, how to enter CAA into a zone and how certification authorities are about to use the record.
SMTP STS (Strict Transport Security) vs. SMTP with DANEMen and Mice
The Internet Public Key Infrastructure (PKIX) is broken, but several solutions exist to fix some of the issues around transport encryption with TLS and x509 certificates.
This webinar will take a deeper look at two solutions: RFC 7672 “SMTP with DANE” and draft-ietf-uta-mta-sts “SMTP MTA Strict Transport Security (MTA-STS)”. What problems are solved with these solutions? What is needed to implement MTA-STS and SMTP-DANE? Is one solution preferable over the other, or should you deploy both?
This webinar is designed as an easy-to-follow tutorial on DNSSEC signing a zone for DNS admins. Our focus will be on DNSSEC zone signing automation with the Knot DNS Server and BIND 9.
DNSSEC and DANE – E-Mail security reloadedMen and Mice
This document discusses Domain Name System Security Extensions (DNSSEC) and the DNS-based Authentication of Named Entities (DANE) protocol. It describes how DANE uses DNSSEC and Transport Layer Security (TLS) records (TLSA) to authenticate TLS certificates and secure email transport (SMTP) without relying on certificate authorities. Benefits include preventing man-in-the-middle attacks and securely validating certificates through DNS rather than certificate revocation lists. The document provides instructions and examples for configuring mail servers, DNS servers, and validating TLSA records to implement DANE for email.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.