This slide deck explores the role of identity in today’s software-driven economy and its evolution over the years
Watch video: https://wso2.com/library/conference/2018/07/wso2con-usa-2018-identity-is-eating-the-world/
This document discusses trends in identity and access management. It notes that identity standards like OpenID Connect are rising while others like SAML are fading. Authentication methods are shifting from traditional multi-factor authentication to continuous adaptive authentication. Privacy and centralized identity systems are concerns driving interest in self-sovereign identity models using blockchain and decentralized identifiers. Large countries are implementing national digital identity systems and blockchain may help improve transparency. The role of mobile identity is growing as phone numbers become integral identifiers.
The document discusses the rise of social media and its relevance for retailers in Asia-Pacific. It defines social media as internet-powered platforms that allow people and organizations to interact. It notes over 1.5 billion people now use social media worldwide. The document then provides examples of how retailers have successfully used social media platforms like Facebook, Foursquare, and blogs to engage customers, drive awareness, and increase sales. It concludes by outlining eight steps retailers can take to harness social media, such as defining objectives, understanding audiences, and continually testing and learning from strategies.
RSA - Behind the scenes of a fake token mobile app operationjuan_h
In the last few years, we have seen the mobile space explode with malware. According
to a recent report by Trend Micro, the number of malware and high-risk apps available on the Android platform has crossed the one million mark, growing more than a thousand fold in under 3 years.
We Are Social's Guide to Social, Digital, and Mobile in Hong Kong, Dec 2011We Are Social Singapore
This is the December 2011 edition of We Are Social Singapore’s guide to Social, Digital and Mobile in Hong Kong. You can find more of these Asia reports at http://wearesocial.sg
White Space Design is a full service design and marketing agency based in Ipswich that works with local clients. The document introduces the concepts of e-marketing, which includes websites, email, mobile phones, and social networking. It emphasizes that the internet provides opportunities to learn more about customers and how they want information delivered. New technologies like mobile phones and social networking allow brands and consumers to interact directly.
The document discusses how technology will impact human social interaction within the next 10 years. It notes that by 2025, over half the world's population will have internet access and digital technologies like smartphones, virtual reality, and artificial intelligence will be ubiquitous. While this connectivity could support communication and collaboration, it also risks isolation, privacy issues, and an erosion of in-person interaction. The document considers how technologies may transform various domains like healthcare, education, business and entertainment. It argues that humans must ensure technology supplements rather than replaces real relationships to avoid negative outcomes like delusion, distrust and loss of identity.
No business is too small or too big to be susceptible to hacking, phishing, cryptolocker. Learn from the mistakes of these companies and get expert tips you can use. Visit throttlenet.com
This document discusses trends in identity and access management. It notes that identity standards like OpenID Connect are rising while others like SAML are fading. Authentication methods are shifting from traditional multi-factor authentication to continuous adaptive authentication. Privacy and centralized identity systems are concerns driving interest in self-sovereign identity models using blockchain and decentralized identifiers. Large countries are implementing national digital identity systems and blockchain may help improve transparency. The role of mobile identity is growing as phone numbers become integral identifiers.
The document discusses the rise of social media and its relevance for retailers in Asia-Pacific. It defines social media as internet-powered platforms that allow people and organizations to interact. It notes over 1.5 billion people now use social media worldwide. The document then provides examples of how retailers have successfully used social media platforms like Facebook, Foursquare, and blogs to engage customers, drive awareness, and increase sales. It concludes by outlining eight steps retailers can take to harness social media, such as defining objectives, understanding audiences, and continually testing and learning from strategies.
RSA - Behind the scenes of a fake token mobile app operationjuan_h
In the last few years, we have seen the mobile space explode with malware. According
to a recent report by Trend Micro, the number of malware and high-risk apps available on the Android platform has crossed the one million mark, growing more than a thousand fold in under 3 years.
We Are Social's Guide to Social, Digital, and Mobile in Hong Kong, Dec 2011We Are Social Singapore
This is the December 2011 edition of We Are Social Singapore’s guide to Social, Digital and Mobile in Hong Kong. You can find more of these Asia reports at http://wearesocial.sg
White Space Design is a full service design and marketing agency based in Ipswich that works with local clients. The document introduces the concepts of e-marketing, which includes websites, email, mobile phones, and social networking. It emphasizes that the internet provides opportunities to learn more about customers and how they want information delivered. New technologies like mobile phones and social networking allow brands and consumers to interact directly.
The document discusses how technology will impact human social interaction within the next 10 years. It notes that by 2025, over half the world's population will have internet access and digital technologies like smartphones, virtual reality, and artificial intelligence will be ubiquitous. While this connectivity could support communication and collaboration, it also risks isolation, privacy issues, and an erosion of in-person interaction. The document considers how technologies may transform various domains like healthcare, education, business and entertainment. It argues that humans must ensure technology supplements rather than replaces real relationships to avoid negative outcomes like delusion, distrust and loss of identity.
No business is too small or too big to be susceptible to hacking, phishing, cryptolocker. Learn from the mistakes of these companies and get expert tips you can use. Visit throttlenet.com
How the Internet is Redesigning Business by @JoeySheppEarthsite
This document outlines a presentation about how the internet is reshaping business and the curriculum for a new MBA in Digital Media. The presentation covers trends like the growth of social media platforms and mobile technology. It then details courses in the MBA program that focus on how digital transformation is affecting operations, marketing, and finance. These include modules on cloud computing, video conferencing, e-commerce, data visualization, microfinance, and more. The presentation concludes by emphasizing that even as technology advances, business will continue to be about human relationships.
The 5 Immutable Laws of Attracting MillennialsBrent Kelly
By 2025, 75% of the global workforce will be made up of Millennials. Is the term Millennial overused? Yes, but that doesn't underscore the importance of understanding how to attract and sell to the most important generation since the baby boomers.
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
Blockchain technology has the potential to disrupt privacy, identity, and advertising. It allows for decentralized verification of identity claims and more transparent, permission-based advertising and marketing. Self-sovereign identity systems powered by blockchain could give individuals control over their personal data and identity information, rather than having it controlled by corporations or governments. Blockchain-based solutions may also address issues with fraud and lack of transparency in online advertising. However, technological limitations remain, such as transaction speed, that need to be addressed for blockchain to fully enable these new systems and business models.
HighBlood is a swipe-dating app with the option to verify your income, education and profession through image capture of certified documents such as tax returns.
This document provides an overview of blockchain technology and its potential to disrupt several industries such as banking, remittances, and vendor payments. It discusses how blockchain uses distributed storage across many nodes, consensus algorithms like proof-of-work, and cryptography to enable open and anonymous transactions. The document also outlines several potential applications of blockchain like digital identity management, machine-to-machine payments, decentralized governance models, notary services, and smart legal contracts. In closing, it notes that blockchain has the potential to transform and decentralize how all human activity is conducted in a way that enhances values like liberty, equality, and innovation.
MBA in Social Media by @JoeyShepp of @EarthsiteEarthsite
The Internet is having a profound impact on all areas of business. In this presentation, learn a to leverage social media media technology to power all aspects of your start-up or small business.
This document summarizes data breach incidents from 2013. It reports that there were 2,164 data breach incidents in 2013, resulting in over 822 million records being stolen. The largest breaches exposed over 100 million records each. Most breaches were caused by hacking from external sources, with the top causes being malware, stolen computers, and exploitation of vulnerabilities. The largest breaches of 2013 compromised personal information like names, email addresses, passwords, credit cards, and social security numbers from major companies and government agencies. The document emphasizes that data breaches are increasingly common and that all organizations are at risk of being hacked.
Payment Week - Andrew Barnes, Managing Director___CashstarAndrew Barnes
This article discusses how Bluetooth Low Energy (BLE) technology could enable new contactless payment methods at retail stores. BLE allows smartphones to detect signals from antennas installed at stores. Partnerships between stores and payment companies like Apple or PayPal could allow customers to pay for in-store purchases by authorizing payments through mobile apps on their BLE-enabled phones without physical card interaction. The technology has potential benefits for customers, merchants, and payment providers in driving new payment and marketing ecosystems. However, payment networks may view it as a threat if it bypasses their existing models.
Bitcoin, Ethereum, and Blockchain - Digital Literacy @ Columbia University Bu...Chris Castiglione
Bitcoin is two things: a digital currency AND a new technology.
In this course I'll give you the tools to think intelligently about the technology of Bitcoin, and the skills to buy, trade, and store your digital currencies.
Online course:
https://onemonth.com/courses/bitcoin
Bitcoin vs. Ethereum
https://learn.onemonth.com/bitcoin-vs-ethereum/
Join Coinbase
https://www.coinbase.com/join/5341c04e2e00c46d2100006c
Slides of the talk titled - "India's Data Dilemma with India Stack" at the Strata Data Conference, London 2019.
Video Link - https://www.youtube.com/watch?v=wfonMXjfw8M
i developed this presentation for Women Wired Weekend event, basic idea was to open the techno savvy audience's mind to digital divide, and to propose videogames as a media as one of fun
The Internet of Things is connecting more everyday objects to the network as devices like showerheads and refrigerators gain sensors and connectivity. Video now accounts for most internet traffic, measured in zettabytes, and video views on platforms like Facebook generate billions each day. 3D printing is also growing commercially with printers now large enough to produce nearly entire cars. Messaging apps are the most frequently used with WhatsApp sending 30 billion messages daily. Pre-tail allows consumers to place orders for products and services early in development, and Amazon is aggregating these offerings from startups on its new Launchpad storefront. Micro-neighborhoods are fragmenting existing districts into smaller zones as tastes diversify over smaller areas within cities.
The document provides data from a global internet users report for 2022. It includes statistics on total population, internet users, active social media users, and device ownership percentages for the Philippines. Specific statistics for the Philippines include a total population of 110.3 million people, 73.91 million internet users (67% of the population), and 89 million active social media users (80.7% of the population). The document also shows the average daily time internet users in the Philippines spend on different media and devices.
This year's SXSW conference saw discussions around privacy and data use following Edward Snowden's leaks about government surveillance programs. Both Snowden and Julian Assange appeared virtually to discuss these issues. Other popular topics included wearable tech, drones, crowdfunding platforms like Indiegogo challenging Kickstarter, and the growing "maker movement" enabled by accessible tools like Little Bits and free/open source software.
The document summarizes a regional consultation meeting for child helplines in Asia Pacific regarding new technologies. The agenda includes member presentations on social networking for child helplines, followed by a coffee break and summary session. A quiz is also included to engage participants on topics like internet and mobile usage trends, and risks to children online like sexual solicitation. The document encourages child helplines to utilize social networking and new technologies to better support and communicate with young people.
This document discusses the digital divide and its consequences. It defines the digital divide as the gap between those who have access to computers and the internet versus those who do not. It explains that lack of access to technology puts poorer nations at an economic disadvantage and prevents schools from teaching vital tech skills. The document suggests ways for governments to help solve this issue, such as providing cheaper tech alternatives, improving rural infrastructure, and offering training to help people learn new technologies.
Lalo Huber - El impacto de la Economía Digital - Econ2017Lalo Huber
The document discusses the impact of the digital economy on organizations. It describes how the digital economy is significantly transforming business models, industries, and the relationship between business and technology. Key trends discussed include the rise of platforms, on-demand services, data and analytics, artificial intelligence, robots, sensors, and new technologies like blockchain. The document also addresses how organizations must change their strategies, structures, processes and culture to adapt to the digital world.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
How the Internet is Redesigning Business by @JoeySheppEarthsite
This document outlines a presentation about how the internet is reshaping business and the curriculum for a new MBA in Digital Media. The presentation covers trends like the growth of social media platforms and mobile technology. It then details courses in the MBA program that focus on how digital transformation is affecting operations, marketing, and finance. These include modules on cloud computing, video conferencing, e-commerce, data visualization, microfinance, and more. The presentation concludes by emphasizing that even as technology advances, business will continue to be about human relationships.
The 5 Immutable Laws of Attracting MillennialsBrent Kelly
By 2025, 75% of the global workforce will be made up of Millennials. Is the term Millennial overused? Yes, but that doesn't underscore the importance of understanding how to attract and sell to the most important generation since the baby boomers.
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
Blockchain technology has the potential to disrupt privacy, identity, and advertising. It allows for decentralized verification of identity claims and more transparent, permission-based advertising and marketing. Self-sovereign identity systems powered by blockchain could give individuals control over their personal data and identity information, rather than having it controlled by corporations or governments. Blockchain-based solutions may also address issues with fraud and lack of transparency in online advertising. However, technological limitations remain, such as transaction speed, that need to be addressed for blockchain to fully enable these new systems and business models.
HighBlood is a swipe-dating app with the option to verify your income, education and profession through image capture of certified documents such as tax returns.
This document provides an overview of blockchain technology and its potential to disrupt several industries such as banking, remittances, and vendor payments. It discusses how blockchain uses distributed storage across many nodes, consensus algorithms like proof-of-work, and cryptography to enable open and anonymous transactions. The document also outlines several potential applications of blockchain like digital identity management, machine-to-machine payments, decentralized governance models, notary services, and smart legal contracts. In closing, it notes that blockchain has the potential to transform and decentralize how all human activity is conducted in a way that enhances values like liberty, equality, and innovation.
MBA in Social Media by @JoeyShepp of @EarthsiteEarthsite
The Internet is having a profound impact on all areas of business. In this presentation, learn a to leverage social media media technology to power all aspects of your start-up or small business.
This document summarizes data breach incidents from 2013. It reports that there were 2,164 data breach incidents in 2013, resulting in over 822 million records being stolen. The largest breaches exposed over 100 million records each. Most breaches were caused by hacking from external sources, with the top causes being malware, stolen computers, and exploitation of vulnerabilities. The largest breaches of 2013 compromised personal information like names, email addresses, passwords, credit cards, and social security numbers from major companies and government agencies. The document emphasizes that data breaches are increasingly common and that all organizations are at risk of being hacked.
Payment Week - Andrew Barnes, Managing Director___CashstarAndrew Barnes
This article discusses how Bluetooth Low Energy (BLE) technology could enable new contactless payment methods at retail stores. BLE allows smartphones to detect signals from antennas installed at stores. Partnerships between stores and payment companies like Apple or PayPal could allow customers to pay for in-store purchases by authorizing payments through mobile apps on their BLE-enabled phones without physical card interaction. The technology has potential benefits for customers, merchants, and payment providers in driving new payment and marketing ecosystems. However, payment networks may view it as a threat if it bypasses their existing models.
Bitcoin, Ethereum, and Blockchain - Digital Literacy @ Columbia University Bu...Chris Castiglione
Bitcoin is two things: a digital currency AND a new technology.
In this course I'll give you the tools to think intelligently about the technology of Bitcoin, and the skills to buy, trade, and store your digital currencies.
Online course:
https://onemonth.com/courses/bitcoin
Bitcoin vs. Ethereum
https://learn.onemonth.com/bitcoin-vs-ethereum/
Join Coinbase
https://www.coinbase.com/join/5341c04e2e00c46d2100006c
Slides of the talk titled - "India's Data Dilemma with India Stack" at the Strata Data Conference, London 2019.
Video Link - https://www.youtube.com/watch?v=wfonMXjfw8M
i developed this presentation for Women Wired Weekend event, basic idea was to open the techno savvy audience's mind to digital divide, and to propose videogames as a media as one of fun
The Internet of Things is connecting more everyday objects to the network as devices like showerheads and refrigerators gain sensors and connectivity. Video now accounts for most internet traffic, measured in zettabytes, and video views on platforms like Facebook generate billions each day. 3D printing is also growing commercially with printers now large enough to produce nearly entire cars. Messaging apps are the most frequently used with WhatsApp sending 30 billion messages daily. Pre-tail allows consumers to place orders for products and services early in development, and Amazon is aggregating these offerings from startups on its new Launchpad storefront. Micro-neighborhoods are fragmenting existing districts into smaller zones as tastes diversify over smaller areas within cities.
The document provides data from a global internet users report for 2022. It includes statistics on total population, internet users, active social media users, and device ownership percentages for the Philippines. Specific statistics for the Philippines include a total population of 110.3 million people, 73.91 million internet users (67% of the population), and 89 million active social media users (80.7% of the population). The document also shows the average daily time internet users in the Philippines spend on different media and devices.
This year's SXSW conference saw discussions around privacy and data use following Edward Snowden's leaks about government surveillance programs. Both Snowden and Julian Assange appeared virtually to discuss these issues. Other popular topics included wearable tech, drones, crowdfunding platforms like Indiegogo challenging Kickstarter, and the growing "maker movement" enabled by accessible tools like Little Bits and free/open source software.
The document summarizes a regional consultation meeting for child helplines in Asia Pacific regarding new technologies. The agenda includes member presentations on social networking for child helplines, followed by a coffee break and summary session. A quiz is also included to engage participants on topics like internet and mobile usage trends, and risks to children online like sexual solicitation. The document encourages child helplines to utilize social networking and new technologies to better support and communicate with young people.
This document discusses the digital divide and its consequences. It defines the digital divide as the gap between those who have access to computers and the internet versus those who do not. It explains that lack of access to technology puts poorer nations at an economic disadvantage and prevents schools from teaching vital tech skills. The document suggests ways for governments to help solve this issue, such as providing cheaper tech alternatives, improving rural infrastructure, and offering training to help people learn new technologies.
Lalo Huber - El impacto de la Economía Digital - Econ2017Lalo Huber
The document discusses the impact of the digital economy on organizations. It describes how the digital economy is significantly transforming business models, industries, and the relationship between business and technology. Key trends discussed include the rise of platforms, on-demand services, data and analytics, artificial intelligence, robots, sensors, and new technologies like blockchain. The document also addresses how organizations must change their strategies, structures, processes and culture to adapt to the digital world.
Similar to [WSO2Con USA 2018] Identity is Eating the World! (20)
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
At its core, the challenge of managing Human Resources data is an integration challenge: estimates range from 2-3 HR systems in use at a typical SMB, up to a few dozen systems implemented amongst enterprise HR departments, and these systems seldom integrate seamlessly between themselves. Providing a multi-tenant, cloud-native solution to integrate these hundreds of HR-related systems, normalize their disparate data models and then render that consolidated information for stakeholder decision making has been a substantial undertaking, but one significantly eased by leveraging Ballerina. In this session, we’ll cover:
The overall software architecture for VHR’s Cloud Data Platform
Critical decision points leading to adoption of Ballerina for the CDP
Ballerina’s role in multiple evolutionary steps to the current architecture
Roadmap for the CDP architecture and plans for Ballerina
WSO2’s partnership in bringing continual success for the CD
The integration landscape is changing rapidly with the introduction of technologies like GraphQL, gRPC, stream processing, iPaaS, and platformless. However, not all existing applications and industries can keep up with these new technologies. Certain industries, like manufacturing, logistics, and finance, still rely on well-established EDI-based message formats. Some applications use XML or CSV with file-based communications, while others have strict on premises deployment requirements. This talk focuses on how Ballerina's built-in integration capabilities can bridge the gap between "old" and "new" technologies, modernizing enterprise applications without disrupting business operations.
Platformless Horizons for Digital AdaptabilityWSO2
In this keynote, Asanka Abeysinghe, CTO,WSO2 will explore the shift towards platformless technology ecosystems and their importance in driving digital adaptability and innovation. We will discuss strategies for leveraging decentralized architectures and integrating diverse technologies, with a focus on building resilient, flexible, and future-ready IT infrastructures. We will also highlight WSO2's roadmap, emphasizing our commitment to supporting this transformative journey with our evolving product suite.
Quantum computers are rapidly evolving and are promising significant advantages in domains like machine learning or optimization, to name but a few areas. In this keynote we sketch the underpinnings of quantum computing, show some of the inherent advantages, highlight some application areas, and show how quantum applications are built.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
3. CONTINUOUS / ADAPTIVE AUTHENTICATION
WSO2 IDENTITY SERVER TO SUPPORT ADAPTIVE
AUTHENTICATION IN 5.7.0
MFA COULD REDUCE THE ACCOUNT COMPROMISE BY 99.99%
90% GOOGLE USERS HAVE NOT ENABLED 2FA
CONTINUOUS AND ADAPTIVE AUTHENTICATION ARE THE THE NEXT
PHASE OF MFA
4. THE WORLD BEFORE 2005
THE RISE OF WEB 2.0 AND SOFTWARE-DRIVEN ECONOMY
NO PUBLIC FACEBOOK, NO YOUTUBE, NO INSTAGRAM,
NO WHATSAPP, NO TWITTER
5. 1 BILLION OPENIDs BY 2009
WSO2 IDENTITY SERVER ENABLES OPENID LOGINS FOR 4M+
SAUDI CITIZENS
CALL FOR STANDARDS!
NO ONE IS USING OPENID TODAY, EXCEPT AMAZON
8. THE RISE OF OPENID CONNECT!
92% OF THE 8B+ AUTHENTICATION REQUESTS AZURE AD
HANDLED IN MAY 2018 WERE FROM OPENID CONNECT
ENABLED APPLICATIONS
SAML 2.0 STARTING TO FADE OUT
9. THE TCP/IP MOMENT OF IDENTITY
TCP/IP WAS A LUXURY IN EARLY 1980s BUT NO MORE!
SUPPORTING IDENTITY STANDARDS IS A MUST
NO IAM VENDOR TO GET COMPETITIVE ADVANTAGE BY
JUST SUPPORTING STANDARDS
10. ACQUISITIONS, MERGERS AND PARTNERSHIPS LEAD
TO BUSINESS GROWTH
BY 2020, 60% OF ALL DIGITAL IDENTITIES THAT INTERACT WITH
BUSINESSES WILL COME FROM EXTERNAL IDENTITY PROVIDERS
SILOS KILL GROWTH OPPORTUNITIES
11. OAUTH 2.0: THE LITTLE MAGICIAN
OAUTH 2.0 IS BECOMING THE GLUE FOR ALL IDENTITY INTERACTIONS
ENTERPRISES DIDN’T GO WITH OAUTH 1.0, BUT WITH OAUTH 2.0
12. THE RISE OF MOBILE IDENTITY
WSO2 IDENTITY SERVER ENABLES MOBILE CONNECT FOR MORE
THAN 800 MILLION SUBSCRIBERS IN INDIA
MOBILE CONNECT GETTING TRACTION IN EUROPE AND
ASIA PACIFIC
TURNS ALL MOBILE NETWORK OPERATORS INTO IDPs
13. IN 2017, THE NUMBER OF PEOPLE CONNECTED TO
MOBILE SERVICES SURPASSED 5 BILLION
IN 2025 IT IS EXPECTED THAT THIS NUMBER WILL REACH 5.9
BILLION, WHICH IS ALMOST 71% OF THE WORLD POPULATION
MOBILE ADOPTION IS UNSTOPPABLE
14. IDENTITY IS THE NEW MONEY
DAVID BIRCH WRITES THE BOOK, IDENTITY IS THE NEW
MONEY IN 2014
EVERYONE WE KNOW, IS NOW REPRESENTED BY
A 10 DIGIT NUMBER
MOBILE PHONE, WHICH IS TIED TO ONE’S IDENTITY ALSO
COULD ACT AS MONEY
15. AADHAAR PAY IS POWERED BY AADHAAR
1.2 BILLION AADHAAR NUMBERS
THE LARGEST DIGITAL IDENTITY SYSTEM ON EARTH
AADHAAR
AADHAAR COLLECTS NAME, DOB, GENDER, ADDRESS, MOBILE NUMBER,
EMAIL ALONG WITH FINGERPRINTS AND IRIS
16. AADHAAR PAY IS A DIGITAL PAYMENT PLATFORM FOR MERCHANTS
WENT LIVE IN APRIL 2017, WITH 20 BANKS IN INDIA
AADHAAR PAY
17. INTEGRATED AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
(IAFIS) RUN BY FBI HAS 70M+ CRIMINAL RECORDS ALONGSIDE
34M+ CIVIL RECORDS
NOT JUST AADHAAR!
18. PRIVACY IS MOSTLY ABOUT HOW MUCH CONTROL YOU HAVE
OVER YOUR OWN PERSONAL IDENTIFIABLE INFORMATION
ALEKSANDR KOGAN WAS ABLE TO GRAB PERSONAL DATA OF
87 MILLION FACEBOOK USERS AND LATER SHARE THEM WITH
CAMBRIDGE ANALYTICA
PRIVACY, NO MORE A LUXURY!
19. PRIVACY CONCERNS AND GROWING ANGER AGAINST
CENTRALIZED SYSTEMS ON THE RISE!
THE RISE OF THE INTEREST ON SELF-SOVEREIGN IDENTITY
KILL THE KING!
20. CENTRALIZED | FEDERATED | USER CENTRIC |
SELF-SOVEREIGN
PATH TO SELF-SOVEREIGN IDENTITY
MICROSOFT PASSPORT IS ONE OF THE VERY FIRST
FEDERATED IDENTITY SYSTEMS ON THE WEB
21. ANY KIND OF A CENTRALIZED SYSTEM IS JUST A HONEY
POT AWAITING TO BE ATTACKED!
FACEBOOK, GOOGLE, MICROSOFT, YAHOO, ALL MANAGE
YOUR IDENTITY CENTRALLY
CAMBRIDGE ANALYTICA NEVER HAD TO INTRUDE FACEBOOK TO
GET HOLD OF PERSONAL DATA
PERSONAL DATA OF MORE THAN 143 MILLION AMERICAN RESIDENTS
WERE EXPOSED IN EQUIFAX ATTACK
BLURRED BORDERS
22. DNS IS A DISTRIBUTED, CENTRALIZED SYSTEM WHICH IS
GOVERNED BY ICANN
THE MANAGEMENT OF THE COUNTRY-TLDS OF AFGHANISTAN
AND IRAQ WERE REASSIGNED DURING THE WAR TIMES
WIKILEAKS WAS BLOCKED IN USA AFTER THE
DISCLOSURE OF DIPLOMATIC CABLES
MORE WORRIES ON CENTRALIZED TRUST!
23. THERE ARE MORE THAN 70 MILLION SMALL BUSINESS
ON FACEBOOK, USING IT ON A DAY TO DAY BASIS
WHAT IF FACEBOOK IS BANNED?
24. THE HOLDER IS THE OWNER OF THE
IDENTITY INFORMATION
DID OR THE DECENTRALIZED IDENTIFIER IS
A GLOBALLY UNIQUE IDENTIFIER
SELF-SOVEREIGN IDENTITY ARCHITECTURE
ESTABLISHES A LIFETIME PORTABLE
IDENTIFIER
25. BLOCKCHAIN 1.0 IS ABOUT CURRENCY
BLOCKCHAIN 2.0 IS ABOUT CONTRACTS
BLOCKCHAIN 3.0 IS ABOUT APPLICATIONS BEYOND
CURRENCY, FINANCE, AND MARKETS
BLOCKCHAIN GENERATIONS
26. THE ZOOKO’S TRIANGLE SAYS ANY IDENTIFIER CANNOT BE
UNIQUE, DECENTRALIZED AND HUMAN READABLE
ALL TOGETHER
BLOCKSTACK LETS YOU CREATE AN IDENTIFIER, WHICH IS
GLOBALLY UNIQUE, DECENTRALIZED AND HUMAN READABLE
UNIQUE, DECENTRALIZED AND MEMORABLE
27. BETTER AADHAAR WITH BLOCKCHAIN
BLOCKCHAIN HELPS TO MAKE AADHAAR TRANSPARENT AND
PUBLICLY AUDITABLE
ACCESS TO 1 BILLION IDENTITIES IN 10 MINUTES FOR RS. 500
1 IN 7 EMPLOYEES WOULD BE WILLING TO SELL THEIR LOGIN
CREDENTIALS FOR AS LITTLE AS $150
28. BRINGING BLOCKCHAIN IDENTITY TO THE REAL WORLD
ESTONIA KSI BLOCKCHAIN
STATE OF ILLINOIS
CANADA IS TESTING A DIGITAL IDENTITY SYSTEM BASED ON
BLOCKCHAIN
SINGAPORE
DUBAI
29. ID2020
MORE THAN 1.5B PEOPLE AROUND THE WORLD HAVE NO
PROPER LEGAL IDENTITY (IDENTIFIER)
PERSONAL, PRIVATE, PERSISTENT, PORTABLE IDENTIFIERS
LEGAL IDENTITY FOR ALL BY 2030
GIVING AN ID MEANS GIVING RIGHTS
30. TAKEAWAYS!
IDENTITY AND ACCESS MANAGEMENT IS A CROSS VERTICAL
DISCIPLINE AND A KEY ENABLER FOR DIGITAL TRANSFORMATION
STICK TO STANDARD BASED IAM FOR BETTER INTEROPERABILITY
AND FOR BEST PRACTICES
IDENTITY BASED PAYMENT SYSTEMS ARE ON THE RISE
MOBILE PHONE/SIM IS BECOMING AN INTEGRAL PART OF ONE’S
IDENTITY
31. LARGE SCALE NATIONAL DIGITAL IDENTITY SYSTEMS ARE ON
THE RISE
BLOCKCHAIN BASED IDENTITY SYSTEMS ARE USED BY
GOVERNMENTS. STILL EXPERIMENTAL AT THE ENTERPRISE LEVEL
IDENTITY IS EATING THE WORLD! NO ESCAPE! BE PREPARED!
MFA IS A MUST. THE NEXT SHIFT IS CONTINUOUS AND
ADAPTIVE AUTHENTICATION
TAKEAWAYS!