Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense measures essential for modern digital ecosystems.
The document describes the services and capabilities of Wireless Applications Corp., a company that provides customized software, GIS consulting, and FCC/FCC filing services for the wireless telecommunications industry. It summarizes their SiteSync platform which includes tools for structure searching, RF propagation modeling, microwave path analysis, and demographic analysis. It also describes their new SiteSync Pro and API suite products which allow automated batch processing and integration with other systems.
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
The document discusses Cisco's SD-WAN solution with Viptela. It provides an overview of the key components of Cisco's SD-WAN architecture including the management plane (vManage), control plane (vSmart), data plane (vEdge), and orchestration plane (vBond). It also summarizes capabilities like zero touch provisioning, VPN segmentation, application policies, and centralized management.
This document discusses Internet of Things (IoT) technology. It provides an overview of what IoT is, noting that it involves connecting devices to the internet to transfer data without human interaction. It then discusses some of the key issues around IoT, including security challenges and the need for protocols like OTrP to help protect connected devices. It also briefly summarizes some industry perspectives on IoT spending trends and how companies like IBM, GE, and others are applying IoT technology.
Ixia provides network testing and security solutions. Some key points:
- Ixia solutions are used by over 74 Fortune 100 companies, 45 of the top 50 service providers, and 15 of the top network equipment manufacturers.
- Their portfolio includes network testing, security, visibility, and traffic generation solutions that work across infrastructure, platforms, and network types from mobile to data center.
- Their intelligent monitoring solutions provide tools for network operations, application monitoring, and security through network packet brokers that aggregate, filter, and load balance traffic to monitoring tools.
Keynote at ISCRAM-China2008: Next generation of Safety Networks
The document discusses next generation safety networks and the transition from IPv4 to IPv6. It provides the following key points:
1) IPv6 is needed to power the next generation of smart transportation, e-society, e-commerce, and other advanced applications that require more addresses and capabilities than IPv4 can provide.
2) China has undertaken major initiatives like CNGI to build out IPv6 infrastructure nationwide in preparation for IPv4 address exhaustion and to promote next generation applications.
3) The 2008 Beijing Olympics demonstrated the first large-scale use of IPv6 for applications like visual surveillance and facility management across multiple venues.
IT systems evolve at a rapid pace. What does it take to keep these mission-critical systems supported now and in the future? Learn how field service technicians are keeping pace with high-stakes, high-availability environments.
In this presentation, CompTIA’s own Dr. James Stanger interviews Bob Marlatt, information systems operations manager for the Washington State Patrol. Marlatt has worked in IT for two decades, both as a consultant and IT manager. His current responsibilities include managing the IT infrastructure for law enforcement in Washington State. You’ll learn more about how he helps ensure system uptime and how his systems make it possible for law enforcement to share vital information in real-time. He’ll also share some of the tips, tricks and traps for supporting evolving IT systems that can have an impact in your business.
Plus you can view the full webinar online at http://www.comptia.org/events/webinars/webinars-on-demand and earn CE Credit toward renewal of your CompTIA A+ certification.
The document discusses several initiatives related to securing critical infrastructure systems:
- The Security Fabric Alliance aims to deploy security solutions for the power grid through collaboration between utilities, technology companies, and standards bodies.
- The Industrial Internet Consortium works to accelerate development and adoption of technologies connecting industrial systems for security and productivity.
- The OMG process establishes market standards to certify conformity and interoperability of the Security Fabric for critical infrastructure.
- Initiatives are described to utilize hybrid cloud/device services, protected by the Security Fabric, to support rural electric co-ops across the U.S.
The document discusses several initiatives related to securing critical infrastructure systems:
- The Security Fabric Alliance aims to deploy security solutions for the power grid through collaboration between utilities, technology companies, and standards bodies.
- The Industrial Internet Consortium works to accelerate development and adoption of technologies connecting industrial systems for security and productivity.
- The OMG process establishes market standards to certify that solutions meet requirements for interoperability and security in critical infrastructure systems.
- The document outlines a vision for an "Agile Fractal Grid" with cloud services, advanced analytics, and end-to-end security protections to achieve grid reliability and resiliency.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses selecting devices for a small network based on factors like cost and speed. Common network applications and protocols used in small networks are also identified, including protocols for real-time voice and video. The document explains how a small network design can scale to support larger networks as business needs grow. Methods for verifying connectivity between devices using commands like ping and traceroute are presented. Finally, commands for viewing host IP configurations on Windows and Linux systems are covered.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses [1] selecting common devices for a small network like routers, switches, and end devices, [2] applications and protocols used in small networks such as HTTP, SMTP, and DHCP, and [3] using the ping and traceroute commands to verify connectivity between devices and troubleshoot connectivity issues.
This document summarizes recent developments in web standards. Key points include: the rise of mobile and JavaScript, new real-time communication technologies like WebRTC, debates around DRM extensions, advances in offline capabilities and push notifications, evolving system application APIs, and work on payments, HTTP 2.0, and securing the web. It also discusses upcoming elections for the W3C Technical Architecture Group and encourages getting involved in W3C working groups.
Attobahn is developing a new wireless network called the Quantum Speed Network that will provide ultra-fast internet speeds of up to 20 Gbps per user through a unique architecture of protonic switching nodes, nucleus switches, and V-Rover base stations. The network aims to address the exponential growth in mobile data usage and provide highly secure dedicated bandwidth to support technologies like virtual reality and the internet of things. Attobahn has filed patents on its breakthrough transmission technology and plans to generate revenue through network access fees and partnerships.
While IPv6 has been a defined standard since 1998, the end-user adoption of this standard is minimal. Less than 1% of Internet peers utilize IPv6 in the course of normal operation. However, IPv6 support within operating systems and network routers is becoming commonplace. While IT personnel continue to be focused on IPv4, IPv6 capabilities may already be active by default on many Internet connected systems within an IT professional's environment. These IPv6 interfaces generate traffic which can bypass traditional controls based on IPv4 technology. Although IPv6 is likely to eclipse IPv4 as the dominant Internet protocol, the path to this state is disorganized and unclear. This state indicates that as IPv6 gains inertia as a legitimate Internet protocol, IT administrators need to be aware of and manage IPv6 traffic on their network with as much vigilance as they would apply to the more commonplace IPv4.
Kevin D. Wilkins, CISSP, Senior Network Engineer, iSecure LLC
After coursework at the Rochester Institute of Technology, Kevin’s professional experience includes ISP and VOIP operations. Kevin has 10 years of industry experience in system and network engineering and platform management. In the last few years, a focus on information security has brought his experiences together into a consolidated viewpoint of enterprise-wide security policy and implementation.
Peter Rounds, Senior Network Engineer, Syracuse University
Peter has been a Sr. Network Engineer at Syracuse University for 11 years. He is responsible for maintaining core network infrastructure consisting of Internet edge traffic identification/management, Internet BGP routing and security profile management, campus OSPF and security profile management, and data center network and security profile management. He is responsible for numerous security technologies for the University.
The presentation discussed software-defined internet exchange points (SDXs) and the iSDX platform. SDXs can help solve internet routing problems by offering more flexible traffic control and innovative services compared to traditional Border Gateway Protocol (BGP)-based internet exchanges. The iSDX project developed an industrial-scale SDX that can support the data plane performance and scalability required for a major internet exchange through optimization techniques. It is deployed via an open source software stack and several organizations are working to adopt iSDX in public internet exchanges and enterprise networks.
The document discusses the network infrastructure needed for electronic commerce (e-commerce). It describes how the information superhighway (I-way) provides the network infrastructure for all types of e-commerce activities through its ability to deliver integrated voice, data, and video services. The I-way has changed how businesses advertise, market, and sell products and services. The document then goes on to discuss various components that make up the I-way infrastructure including internet protocols, intranets, extranets, switches, routers, and gateways. It also covers mobile commerce and technologies like wireless networks that further enable e-commerce through mobile devices.
This document outlines an educational course on audio and video over IP. The course covers IP networking fundamentals and standards including TCP/IP, OSI models, and SMPTE ST 2110. It also examines IP infrastructure, routing, timing issues, switching, compression techniques and case studies for broadcast facilities transitioning to IP. The document provides an in-depth outline of topics covered in each session, from IP basics to designing and integrating both hybrid and fully IP-based outside broadcast trucks. The goal is to educate on best practices for implementing audio and video over IP workflows and infrastructure.
Blockchain and Cyber Defense Strategies in new genre times
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.
This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries.
Key topics covered include:
An overview of quantum computing and its implications for blockchain security.
Current cryptographic standards and their vulnerabilities in the face of quantum threats.
Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems.
Case studies and real-world implications of quantum-resistant blockchain implementations.
Strategies for integrating post-quantum cryptography into existing blockchain frameworks.
Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.
The presentation is one unique presentation peculiar to TALLINN MANUAL version 1.0 and 2.0. Along with is discussed cyber policy attempts of other countries.The Tallinn Manual has long been the flagship research initiative of the NATO CCDCOE. The original Tallinn Manual (published in 2013 by Cambridge University Press) addressed the most severe cyber operations followed by version 2.0. The presentation cover the origin details of why this manual arrived at the global scene and what followed around at the global attempts for framing the global cyber policy.
Cyber Security : An attempt to assimilate and technically understand it
his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.
IETE mid-term symposium on digital forensics and information security : 23 M...
While anyone of us discusses cryptocurrency, we invariably hover around BITCOIN only , but as on date we have 2000+ cryptocurrencies in the world and the sad thing is CRYPTOCURRENCY CRIMES ARE RISING FAST undeterred.This presentation, given at the IETE mid term symposium on 23rd May 2020 ,brings a brief over view of how cryptocrimes work and what are the challenges around?
Coalition of IoT and Blockchain: Rewards and Challenges
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Proof of Work (PoW) is the original blockchain consensus algorithm, and is used in projects such as Bitcoin. It is the mechanism that enables users on a blockchain network to reach an agreed ‘truth’. A proof of work is essentially an answer to a complex mathematical problem. It takes a lot of work to find the Nonce but is easy for others to validate.PoW solves the Byzantine Generals Problem as it achieves a majority agreement without any central authority, in spite of the presence of unknown/potentially untrustworthy parties and despite the network not being instantaneous.This presentation brings out the concept Byzantine Generals proof and its connect with Bitcoin.
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
The world of Blockchain and Cryptocurrencies is undeniably amazing and has infinity to explore at hands.Recently I took on a 4 hour session at the prestigious Central Bureau of Investigations,CBI Academy ,Ghaziabad, vide Indian Technical and Economic Cooperation Programme organised by Ministry of External Affairs , to cover right from scratch to overview of mechanics and architecture of how this world works.Sharing here the presentation for info and awareness of anyone who is interested to take a dip in this domain and related cyber crime activities.
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies was held at G D Goenka University, Sohna Road,Gurgaon on 22nd Feb 2018.Sharing here the presentation I gave for info.Readers may contact me for any clarifications on the subject content please.
This document discusses Bitcoin and blockchain technology. It begins with an introduction to Bitcoin, including its use as a digital currency and the blockchain network that underlies it. It then provides definitions of key Bitcoin and blockchain terms, such as wallets, addresses, mining, blocks, and hashes. The document also discusses tools and techniques related to Bitcoin forensics, such as analyzing blockchain data and artifacts from seized computers and devices.
This document provides examples to explain the Swirlds hashgraph consensus algorithm. It shows a hashgraph growing over time as members create events and gossip with each other. Each event contains cryptographic hashes linking it to previous events. Rounds are defined, with each member's first event in a round being a "witness." Elections are held for witnesses to determine if they are "famous," with later witnesses counting votes. The goal is for all members to reach consensus on the order and timestamps of all events.
Presentation I gave at 4th International Information Security Meet in the Hakon 2017 conference on 08th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at http://www.hakonindia.org/hakon-2017-speakers/
Presentation I gave at BRIGHTTALK webinar in the BLOCKCHAIN SUMMIT on 10th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at https://www.brighttalk.com/webcast/1570/272431/bitcoin-forensics
The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics ie Bitcoin Forensics. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.But with a pleothra of advantages that it offers,there is a definete side to worry too and thats the money laundering transactions.On an average it is estimated that around 3 lakh bitcoin transactions happen inside a day and its not an easy task any day for a forensic investigator to trace the origins here.This presentation will bring out the technical overview and evolving forensics developments in the domain.
Blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block and is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks.Bitcoin is a proven application that runs on BLOCKCHAIN.This ppt gives the reader an over view of the concept of BLOCKCHAIN.The same was presented by self on 20th June 2017 at Gurgaon Commissioner of Police office during Summer Internship Program under aegis of Shri Rakshit Tandon
Equation Group : Advanced Secretive Computer Espionage Group
The Equation Group is a highly advanced secretive computer espionage group, suspected by security expert Claudio Guarnieri and unnamed former intelligence operatives of being tied to the United States National Security Agency (NSA). Because of the group's predilection for strong encryption methods in their operations, the name Equation Group was chosen by Kaspersky Lab, which discovered this operation and also documented 500 malware infections by the group's tools in at least 42 countries.This presentation gives an over view in brief based on the Kaspersky Report.
This small presentation wil sail through a set of questions for any web/Internet user and will mark for every question as the user decides to answer.The safety score as it ends up lets the user know of where he stands in terms of IT SECURITY on the web!!!!
This document provides a checklist for hardening an Android device with various security settings and recommendations. It suggests forgetting unused Wi-Fi networks, turning off location services and Bluetooth when not in use, limiting saved SMS/MMS messages, updating to the latest OS version, and not rooting or installing apps from untrusted sources. It also recommends enabling encryption, auto-lock, and the Android Device Manager for remote wiping a lost device. Additional security measures mentioned include disabling network notifications and form auto-fill, and showing security warnings for visited sites.
Most of us are part of various Social Engineering Sites and keep updating ourselves via status updates, pictures and tweeting small life updates. Related privacy and security issues in respect of these social engineering sites available is already a serious concern among users. Additionally for these all social engineering sites/applications whether accessible on a desktop or a mobile, we all are not so serious responding and interacting but that’s the difference when we see viz-a-viz LinkedIn. When it is LinkedIn…we are mostly serious…no jokes, no clips, no tagging, no personal comments, no WOWs…it’s all professional. And when most of us take it seriously, we also feed serious inputs on it. But do we take necessary precautions too?...I have mostly seen a negated curve amongst my friend circle….hardly anyone has spared time to configure LinkedIn Privacy and Security settings. In this post I bring you out basic and necessary configuration steps involved to harden your LinkedIn interface to the world.
APT 28 :Cyber Espionage and the Russian Government?
Russia may be behind a long-standing, careful campaign designed to steal sensitive data relating to governments, militaries and security firms worldwide.This presentation based on a report made public by FireEye brings an over view of their opinion.....uploaded here just for general info to understand how its all happening!!!!
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Best Practices for Effectively Running dbt in Airflow.pdf
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
Details of description part II: Describing images in practice - Tech Forum 2024
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
A joint presentation of Yokogawa and NextNine about a 60-site global cybersecurity deployment, including what went right, what went wrong, necessary changes to the processes and technology, and the new technology was developed.
Its Dirt Simple. We have both wireless Telecom consulting services and Software tools that rival all. Over the many years of development, we invite you to see just what might excite you, whether you own the company, work for the company or invest in it.
Just out our Telecom API Suite and see how easy it is to take our tools and integrate straight into your products.
The document describes the services and capabilities of Wireless Applications Corp., a company that provides customized software, GIS consulting, and FCC/FCC filing services for the wireless telecommunications industry. It summarizes their SiteSync platform which includes tools for structure searching, RF propagation modeling, microwave path analysis, and demographic analysis. It also describes their new SiteSync Pro and API suite products which allow automated batch processing and integration with other systems.
The document discusses Cisco's SD-WAN solution with Viptela. It provides an overview of the key components of Cisco's SD-WAN architecture including the management plane (vManage), control plane (vSmart), data plane (vEdge), and orchestration plane (vBond). It also summarizes capabilities like zero touch provisioning, VPN segmentation, application policies, and centralized management.
This document discusses Internet of Things (IoT) technology. It provides an overview of what IoT is, noting that it involves connecting devices to the internet to transfer data without human interaction. It then discusses some of the key issues around IoT, including security challenges and the need for protocols like OTrP to help protect connected devices. It also briefly summarizes some industry perspectives on IoT spending trends and how companies like IBM, GE, and others are applying IoT technology.
Ixia provides network testing and security solutions. Some key points:
- Ixia solutions are used by over 74 Fortune 100 companies, 45 of the top 50 service providers, and 15 of the top network equipment manufacturers.
- Their portfolio includes network testing, security, visibility, and traffic generation solutions that work across infrastructure, platforms, and network types from mobile to data center.
- Their intelligent monitoring solutions provide tools for network operations, application monitoring, and security through network packet brokers that aggregate, filter, and load balance traffic to monitoring tools.
Keynote at ISCRAM-China2008: Next generation of Safety Networksglobal
The document discusses next generation safety networks and the transition from IPv4 to IPv6. It provides the following key points:
1) IPv6 is needed to power the next generation of smart transportation, e-society, e-commerce, and other advanced applications that require more addresses and capabilities than IPv4 can provide.
2) China has undertaken major initiatives like CNGI to build out IPv6 infrastructure nationwide in preparation for IPv4 address exhaustion and to promote next generation applications.
3) The 2008 Beijing Olympics demonstrated the first large-scale use of IPv6 for applications like visual surveillance and facility management across multiple venues.
IT systems evolve at a rapid pace. What does it take to keep these mission-critical systems supported now and in the future? Learn how field service technicians are keeping pace with high-stakes, high-availability environments.
In this presentation, CompTIA’s own Dr. James Stanger interviews Bob Marlatt, information systems operations manager for the Washington State Patrol. Marlatt has worked in IT for two decades, both as a consultant and IT manager. His current responsibilities include managing the IT infrastructure for law enforcement in Washington State. You’ll learn more about how he helps ensure system uptime and how his systems make it possible for law enforcement to share vital information in real-time. He’ll also share some of the tips, tricks and traps for supporting evolving IT systems that can have an impact in your business.
Plus you can view the full webinar online at http://www.comptia.org/events/webinars/webinars-on-demand and earn CE Credit toward renewal of your CompTIA A+ certification.
The document discusses several initiatives related to securing critical infrastructure systems:
- The Security Fabric Alliance aims to deploy security solutions for the power grid through collaboration between utilities, technology companies, and standards bodies.
- The Industrial Internet Consortium works to accelerate development and adoption of technologies connecting industrial systems for security and productivity.
- The OMG process establishes market standards to certify conformity and interoperability of the Security Fabric for critical infrastructure.
- Initiatives are described to utilize hybrid cloud/device services, protected by the Security Fabric, to support rural electric co-ops across the U.S.
The document discusses several initiatives related to securing critical infrastructure systems:
- The Security Fabric Alliance aims to deploy security solutions for the power grid through collaboration between utilities, technology companies, and standards bodies.
- The Industrial Internet Consortium works to accelerate development and adoption of technologies connecting industrial systems for security and productivity.
- The OMG process establishes market standards to certify that solutions meet requirements for interoperability and security in critical infrastructure systems.
- The document outlines a vision for an "Agile Fractal Grid" with cloud services, advanced analytics, and end-to-end security protections to achieve grid reliability and resiliency.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses selecting devices for a small network based on factors like cost and speed. Common network applications and protocols used in small networks are also identified, including protocols for real-time voice and video. The document explains how a small network design can scale to support larger networks as business needs grow. Methods for verifying connectivity between devices using commands like ping and traceroute are presented. Finally, commands for viewing host IP configurations on Windows and Linux systems are covered.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses [1] selecting common devices for a small network like routers, switches, and end devices, [2] applications and protocols used in small networks such as HTTP, SMTP, and DHCP, and [3] using the ping and traceroute commands to verify connectivity between devices and troubleshoot connectivity issues.
This document summarizes recent developments in web standards. Key points include: the rise of mobile and JavaScript, new real-time communication technologies like WebRTC, debates around DRM extensions, advances in offline capabilities and push notifications, evolving system application APIs, and work on payments, HTTP 2.0, and securing the web. It also discusses upcoming elections for the W3C Technical Architecture Group and encourages getting involved in W3C working groups.
Attobahn is developing a new wireless network called the Quantum Speed Network that will provide ultra-fast internet speeds of up to 20 Gbps per user through a unique architecture of protonic switching nodes, nucleus switches, and V-Rover base stations. The network aims to address the exponential growth in mobile data usage and provide highly secure dedicated bandwidth to support technologies like virtual reality and the internet of things. Attobahn has filed patents on its breakthrough transmission technology and plans to generate revenue through network access fees and partnerships.
While IPv6 has been a defined standard since 1998, the end-user adoption of this standard is minimal. Less than 1% of Internet peers utilize IPv6 in the course of normal operation. However, IPv6 support within operating systems and network routers is becoming commonplace. While IT personnel continue to be focused on IPv4, IPv6 capabilities may already be active by default on many Internet connected systems within an IT professional's environment. These IPv6 interfaces generate traffic which can bypass traditional controls based on IPv4 technology. Although IPv6 is likely to eclipse IPv4 as the dominant Internet protocol, the path to this state is disorganized and unclear. This state indicates that as IPv6 gains inertia as a legitimate Internet protocol, IT administrators need to be aware of and manage IPv6 traffic on their network with as much vigilance as they would apply to the more commonplace IPv4.
Kevin D. Wilkins, CISSP, Senior Network Engineer, iSecure LLC
After coursework at the Rochester Institute of Technology, Kevin’s professional experience includes ISP and VOIP operations. Kevin has 10 years of industry experience in system and network engineering and platform management. In the last few years, a focus on information security has brought his experiences together into a consolidated viewpoint of enterprise-wide security policy and implementation.
Peter Rounds, Senior Network Engineer, Syracuse University
Peter has been a Sr. Network Engineer at Syracuse University for 11 years. He is responsible for maintaining core network infrastructure consisting of Internet edge traffic identification/management, Internet BGP routing and security profile management, campus OSPF and security profile management, and data center network and security profile management. He is responsible for numerous security technologies for the University.
The presentation discussed software-defined internet exchange points (SDXs) and the iSDX platform. SDXs can help solve internet routing problems by offering more flexible traffic control and innovative services compared to traditional Border Gateway Protocol (BGP)-based internet exchanges. The iSDX project developed an industrial-scale SDX that can support the data plane performance and scalability required for a major internet exchange through optimization techniques. It is deployed via an open source software stack and several organizations are working to adopt iSDX in public internet exchanges and enterprise networks.
The document discusses the network infrastructure needed for electronic commerce (e-commerce). It describes how the information superhighway (I-way) provides the network infrastructure for all types of e-commerce activities through its ability to deliver integrated voice, data, and video services. The I-way has changed how businesses advertise, market, and sell products and services. The document then goes on to discuss various components that make up the I-way infrastructure including internet protocols, intranets, extranets, switches, routers, and gateways. It also covers mobile commerce and technologies like wireless networks that further enable e-commerce through mobile devices.
This document outlines an educational course on audio and video over IP. The course covers IP networking fundamentals and standards including TCP/IP, OSI models, and SMPTE ST 2110. It also examines IP infrastructure, routing, timing issues, switching, compression techniques and case studies for broadcast facilities transitioning to IP. The document provides an in-depth outline of topics covered in each session, from IP basics to designing and integrating both hybrid and fully IP-based outside broadcast trucks. The goal is to educate on best practices for implementing audio and video over IP workflows and infrastructure.
Similar to Data Protection in a Connected World: Sovereignty and Cyber Security (20)
Blockchain and Cyber Defense Strategies in new genre timesanupriti
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threatsanupriti
In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.
This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries.
Key topics covered include:
An overview of quantum computing and its implications for blockchain security.
Current cryptographic standards and their vulnerabilities in the face of quantum threats.
Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems.
Case studies and real-world implications of quantum-resistant blockchain implementations.
Strategies for integrating post-quantum cryptography into existing blockchain frameworks.
Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESanupriti
The presentation is one unique presentation peculiar to TALLINN MANUAL version 1.0 and 2.0. Along with is discussed cyber policy attempts of other countries.The Tallinn Manual has long been the flagship research initiative of the NATO CCDCOE. The original Tallinn Manual (published in 2013 by Cambridge University Press) addressed the most severe cyber operations followed by version 2.0. The presentation cover the origin details of why this manual arrived at the global scene and what followed around at the global attempts for framing the global cyber policy.
Cyber Security : An attempt to assimilate and technically understand itanupriti
his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
While anyone of us discusses cryptocurrency, we invariably hover around BITCOIN only , but as on date we have 2000+ cryptocurrencies in the world and the sad thing is CRYPTOCURRENCY CRIMES ARE RISING FAST undeterred.This presentation, given at the IETE mid term symposium on 23rd May 2020 ,brings a brief over view of how cryptocrimes work and what are the challenges around?
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Proof of Work and connect with BYZANTINE Generalsanupriti
Proof of Work (PoW) is the original blockchain consensus algorithm, and is used in projects such as Bitcoin. It is the mechanism that enables users on a blockchain network to reach an agreed ‘truth’. A proof of work is essentially an answer to a complex mathematical problem. It takes a lot of work to find the Nonce but is easy for others to validate.PoW solves the Byzantine Generals Problem as it achieves a majority agreement without any central authority, in spite of the presence of unknown/potentially untrustworthy parties and despite the network not being instantaneous.This presentation brings out the concept Byzantine Generals proof and its connect with Bitcoin.
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEanupriti
The world of Blockchain and Cryptocurrencies is undeniably amazing and has infinity to explore at hands.Recently I took on a 4 hour session at the prestigious Central Bureau of Investigations,CBI Academy ,Ghaziabad, vide Indian Technical and Economic Cooperation Programme organised by Ministry of External Affairs , to cover right from scratch to overview of mechanics and architecture of how this world works.Sharing here the presentation for info and awareness of anyone who is interested to take a dip in this domain and related cyber crime activities.
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies anupriti
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies was held at G D Goenka University, Sohna Road,Gurgaon on 22nd Feb 2018.Sharing here the presentation I gave for info.Readers may contact me for any clarifications on the subject content please.
This document discusses Bitcoin and blockchain technology. It begins with an introduction to Bitcoin, including its use as a digital currency and the blockchain network that underlies it. It then provides definitions of key Bitcoin and blockchain terms, such as wallets, addresses, mining, blocks, and hashes. The document also discusses tools and techniques related to Bitcoin forensics, such as analyzing blockchain data and artifacts from seized computers and devices.
This document provides examples to explain the Swirlds hashgraph consensus algorithm. It shows a hashgraph growing over time as members create events and gossip with each other. Each event contains cryptographic hashes linking it to previous events. Rounds are defined, with each member's first event in a round being a "witness." Elections are held for witnesses to determine if they are "famous," with later witnesses counting votes. The goal is for all members to reach consensus on the order and timestamps of all events.
Presentation I gave at 4th International Information Security Meet in the Hakon 2017 conference on 08th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at http://www.hakonindia.org/hakon-2017-speakers/
Presentation I gave at BRIGHTTALK webinar in the BLOCKCHAIN SUMMIT on 10th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at https://www.brighttalk.com/webcast/1570/272431/bitcoin-forensics
The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics ie Bitcoin Forensics. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.But with a pleothra of advantages that it offers,there is a definete side to worry too and thats the money laundering transactions.On an average it is estimated that around 3 lakh bitcoin transactions happen inside a day and its not an easy task any day for a forensic investigator to trace the origins here.This presentation will bring out the technical overview and evolving forensics developments in the domain.
Blockchain and Bitcoin : A Technical Overviewanupriti
Blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block and is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks.Bitcoin is a proven application that runs on BLOCKCHAIN.This ppt gives the reader an over view of the concept of BLOCKCHAIN.The same was presented by self on 20th June 2017 at Gurgaon Commissioner of Police office during Summer Internship Program under aegis of Shri Rakshit Tandon
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
The Equation Group is a highly advanced secretive computer espionage group, suspected by security expert Claudio Guarnieri and unnamed former intelligence operatives of being tied to the United States National Security Agency (NSA). Because of the group's predilection for strong encryption methods in their operations, the name Equation Group was chosen by Kaspersky Lab, which discovered this operation and also documented 500 malware infections by the group's tools in at least 42 countries.This presentation gives an over view in brief based on the Kaspersky Report.
This small presentation wil sail through a set of questions for any web/Internet user and will mark for every question as the user decides to answer.The safety score as it ends up lets the user know of where he stands in terms of IT SECURITY on the web!!!!
This document provides a checklist for hardening an Android device with various security settings and recommendations. It suggests forgetting unused Wi-Fi networks, turning off location services and Bluetooth when not in use, limiting saved SMS/MMS messages, updating to the latest OS version, and not rooting or installing apps from untrusted sources. It also recommends enabling encryption, auto-lock, and the Android Device Manager for remote wiping a lost device. Additional security measures mentioned include disabling network notifications and form auto-fill, and showing security warnings for visited sites.
Harden your LinkedIn Settings : A Necessity Nowanupriti
Most of us are part of various Social Engineering Sites and keep updating ourselves via status updates, pictures and tweeting small life updates. Related privacy and security issues in respect of these social engineering sites available is already a serious concern among users. Additionally for these all social engineering sites/applications whether accessible on a desktop or a mobile, we all are not so serious responding and interacting but that’s the difference when we see viz-a-viz LinkedIn. When it is LinkedIn…we are mostly serious…no jokes, no clips, no tagging, no personal comments, no WOWs…it’s all professional. And when most of us take it seriously, we also feed serious inputs on it. But do we take necessary precautions too?...I have mostly seen a negated curve amongst my friend circle….hardly anyone has spared time to configure LinkedIn Privacy and Security settings. In this post I bring you out basic and necessary configuration steps involved to harden your LinkedIn interface to the world.
APT 28 :Cyber Espionage and the Russian Government?anupriti
Russia may be behind a long-standing, careful campaign designed to steal sensitive data relating to governments, militaries and security firms worldwide.This presentation based on a report made public by FireEye brings an over view of their opinion.....uploaded here just for general info to understand how its all happening!!!!
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
Details of description part II: Describing images in practice - Tech Forum 2024BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
6. Number of Factors and Vectors effect into
Directly-Indirectly effecting into DATA
sovereignty
DATA SOVEREIGNTY
7. Refers to the idea that a country or jurisdiction
has the authority and right to govern and control
the data generated within its borders.
Source: https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-sovereignty/
18. FRONTIER : Speed of 1685 PETAFLOPS
AIRAWAT : Speed of 13.17 PETAFLOPS
SUPERCOMPUTERs
19. DO WE HAVE A TRULY INDIGENOUS INDIAN FOOT PRINT HERE OR WE ARE HAPPY
BEING USERS?
AR – VR –ER - MR
20. • Theoretically reduced risk of built-in functionalities that could gather user data for foreign entities.
• Alignment with government regulations or data residency requirements for data sovereignty.
BROWSERs
21. STORAGE SSD/HDD/RAMs
• Hardware Backdoors: Theoretical risk that foreign governments could introduce hardware
backdoors during production
• Supply Chain Vulnerabilities: Supply chain for foreign-made HDDs can be complex, making it
harder to track and potentially introducing vulnerabilities where malicious actors could tamper with the
drives.
22. • Enterprise routers/switches: Smaller process (14nm-7nm) for better performance
and lower power consumption.
• Home routers/basic switches: Larger process (28nm+) for lower cost.
MODEM / ROUTER / SWITCHES
23. ASIC/ FPGA/ TPU/ GPU
Potential vulnerabilities or backdoors built into the chips during manufacturing
24. SEMI CONDUCTORS & PROCESSORS
Semiconductors play a role in bigger picture of Data
Sovereignty
Potential vulnerabilities or backdoors built into the chips during manufacturing
25. SEMI CONDUCTORS & PROCESSORS
Number of countries involved in new generation nm chip
manufacturing is indeed difficult due to the complex and
global nature of the supply chain…any GUESSES?
32. Total length of operational undersea cables
is estimated to be around 1.4 million
kilometers (nearly 870,000 miles) & carries
vast majority(~99 %) of internet traffic
across oceans.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
33. Cognyte & Septier
Who is Sniffing!!!!!
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
34. Individual undersea cables systems
(over 550)
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
35. Individual undersea cables systems
(over 550)
Chinese state-owned have sought a greater stake in the
global submarine cable network, almost certainly increasing
China’s ability to Manipulate, Surveil, and Interfere with
worldwide data flows.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
36. Individual undersea cables systems
(over 550)
Chinese state-owned have sought a greater stake in the
global submarine cable network, almost certainly increasing
China’s ability to Manipulate, Surveil, and Interfere with
worldwide data flows.
Huawei Marine Systems, now owns ~10% of the cable laying
market, and 3 state-owned Chinese telecom providers have
ownership stakes in nearly 40 cables.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
37. Individual undersea cables systems
(over 550)
Chinese companies have increased their involvement in
deploying cables globally, especially in Southeast Asia, the
Middle East, and Africa, as part Belt and Road Initiative (BRI),
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
39. China Company’s had built or repaired almost
25% of the world’s cables
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
40. Recently completed the Pakistan & East Africa Connecting
Europe (PEACE) submarine cable, bridging Singapore,
Pakistan, Kenya, Egypt, and France, among other countries.
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
41. Recently completed the Pakistan & East Africa Connecting
Europe (PEACE) submarine cable, bridging Singapore,
Pakistan, Kenya, Egypt, and France, among other countries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
42. Recently completed the Pakistan & East Africa Connecting
Europe (PEACE) submarine cable, bridging Singapore,
Pakistan, Kenya, Egypt, and France, among other countries.
Recently completed the Hong Kong landing of the Asia Direct
Cable, which will link mainland China, Japan, the Philippines,
Singapore, Thailand, and Vietnam
Global ownership consortium of the 2 Africa cable project,
which will connect 46 cable landing stations in 33 countries
across Africa, Asia, and Europe
Source: https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf
46. Accurate timestamps from NTP are crucial in legal
settings to validate electronic records, impacting data
sovereignty during legal scrutiny or disputes.
50. ● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and
recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO
includes stakeholder groups representing business, intellectual property interests, non-commercial users, and
Internet service providers.
● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies
related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's
decision-making processes.
● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP
address allocation policies and representing the interests of the Regional Internet Registries (RIRs).
● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual
Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by
regional At-Large organizations.
● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related
to public policy and government concerns.
● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related
to the operation, administration, security, and integrity of the root server system, which is a critical part of the
Internet's infrastructure.
● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on
issues related to the security and stability of the Internet's naming and address allocation systems.
ICANN
51. ● Generic Names Supporting Organization (GNSO) - The GNSO is responsible for developing and
recommending to the ICANN Board global policies related to generic top-level domains (gTLDs). The GNSO
includes stakeholder groups representing business, intellectual property interests, non-commercial users, and
Internet service providers.
● Country Code Names Supporting Organization (ccNSO) - The ccNSO is responsible for developing policies
related to country-code top-level domains (ccTLDs) and representing the interests of ccTLD operators in ICANN's
decision-making processes.
● Address Supporting Organization (ASO) - The ASO is responsible for advising the ICANN Board on global IP
address allocation policies and representing the interests of the Regional Internet Registries (RIRs).
● At-Large Advisory Committee (ALAC) - The ALAC is responsible for representing the interests of individual
Internet users in ICANN's decision-making processes. The ALAC is composed of members who are appointed by
regional At-Large organizations.
● Governmental Advisory Committee (GAC) - The GAC provides advice to the ICANN Board on issues related
to public policy and government concerns.
● Root Server System Advisory Committee (RSSAC) - The RSSAC advises the ICANN Board on matters related
to the operation, administration, security, and integrity of the root server system, which is a critical part of the
Internet's infrastructure.
● Security and Stability Advisory Committee (SSAC) - The SSAC advises the ICANN community and Board on
issues related to the security and stability of the Internet's naming and address allocation systems.
ICANN
52. CLOUD HARDWARE LEADING COMPANIES
• Dell Technologies
• Hewlett Packard Enterprise (HPE)
• Lenovo
• Cisco
• Inspur (Chinese company)
• Huawei (Chinese company)
• Gigabyte
• Supermicro
• NetApp
• NVIDIA
CLOUD SOFTWARE/APIs LEADING COMPANIES
• Microsoft Azure
• Amazon Web Services
• Google Cloud Platform
• VMware (Software)
• Red Hat (Software)
• OpenStack
• CloudBees
• Chef
• Puppet
• Ansible
CLOUD INFRASTRUCTURE
INSERT PIC ZERO DAY- SIDE CHANNEL ETC
55. DATA EMBASSIES?
• India to establish "Data Embassies": Indian government will facilitate the creation
of data embassies to help countries with digital continuity solutions.
• Digital continuity solutions: Involve storing copies of critical data in a secure
location outside a country's borders, in case the main servers are compromised.
• Initial rollout in GIFT City: Initially, data embassies will be set up only in Gujarat
International Finance Tec-City (GIFT), a financial services center in India.
• Nationwide rollout possible: in future
56. • Snapdeal
• Swiggy
• Udaan
• Zomato
• Dream 11
• Flipkart
• Hike
• MakeMyTrip
• Byju's
• Ola
• Oyo
• Paytm Mall
• Paytm.com
• PolicyBazaar
• Quikr
• Rivigo
• Snapdeal
• BigBasket
Source: https://sundayguardianlive.com/news/chinese-investments-deep-rooted-
india#:~:text=These%2018%20Unicorn%20companies%20in,of%20dollars%20in%20Chinese%20investments.
18 Unicorn companies
in India have over
$3,500 million of
Chinese investments
58. DEVELOPED COUNTRIES ARE DATA SOVEREIGN BY
DEFAULT ?
USA-RUSSIA-CHINA...........
OPERATING SYSTEMS
USA - WINDOWS/iOS
RUSSIA - Astra Linux, Mandriva, Sailfish
China - HarmonyOS
GPS
USA - NAVSTAR
RUSSIA - GLONASS
China - BeiDou
CRYPTOGRAPHY
USA - NIST
RUSSIA - GOST
(Gosudarstvennyĭ Standart)
China - SCA (State Cryptography
Administration)
INTERNET
USA - ICANN(Non Govt)
RUSSIA - RuNET
China - GFW