Podcasts about concept poc

  • 34PODCASTS
  • 40EPISODES
  • 31mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 3, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about concept poc

Latest podcast episodes about concept poc

The Daily Decrypt - Cyber News and Discussions
700k DrayTek Routers Vulnerable, Tech Recruiters Targeted with Malware – Cybersecurity News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Oct 3, 2024


Video Episode: https://youtu.be/7et_7YkwAHs In today’s episode, we dive into the alarming rise of malware delivery through fake job applications targeting HR professionals, specifically focusing on the More_eggs backdoor. We also discuss critical gaming performance issues in Windows 11 24H2 and the vulnerabilities in DrayTek routers that expose over 700,000 devices to potential hacking. Lastly, we address the urgent exploitation of a remote code execution flaw in Zimbra email servers, emphasizing the need for immediate updates to safeguard against evolving threats. Links to articles: 1. https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html 2. https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-windows-11-24h2-gaming-performance-issues/ 3. https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html 4. https://www.bleepingcomputer.com/news/security/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails/ Timestamps 00:00 – Introduction 01:14 – Zimbra RCE Vulnerability 02:17 – 700k DrayTek Routers Vulnerable 04:36 – Recruiters Targeted with Malware 06:14 – Microsoft blocks updates for gamers 1. What are today’s top cybersecurity news stories? 2. How is More_eggs malware targeting HR professionals? 3. What vulnerabilities exist in DrayTek routers? 4. Why did Microsoft block Windows 11 24H2 upgrades? 5. What is the impact of the Zimbra RCE flaw? 6. How do fake job applications spread malware? 7. What security measures can protect against More_eggs malware? 8. What are the latest gaming issues with Windows 11? 9. How can DrayTek router vulnerabilities be mitigated? 10. What are the latest tactics used by cybercriminals in email attacks? More_eggs, Golden Chickens, spear-phishing, credential theft, Microsoft, Windows 11, Asphalt 8, Intel Alder Lake+, DrayTek, vulnerabilities, exploits, cyber attackers, Zimbra, RCE, vulnerability, exploitation, # Intro HR professionals are under siege as a spear-phishing campaign disguised as fake job applications delivers the lethal More_eggs malware, leading to potentially devastating credential theft. Powered by the notorious Golden Chickens group, this malware-as-a-service targets recruiters with chilling precision. **How are recruitment officers unknowingly downloading malicious files, and what methods are threat actors using to bypass security measures?** “Microsoft is blocking Windows 11 24H2 upgrades on some systems due to critical gaming performance issues like Asphalt 8 crashes and Easy Anti-Cheat blue screens. The company is scrambling to resolve these problems that uniquely impact devices with Intel Alder Lake+ processors.” How can gamers with affected systems work around these issues until Microsoft releases a fix? Over 700,000 DrayTek routers are currently vulnerable to 14 newly discovered security flaws, with some critical exploits that could be used to take full control of the devices and infiltrate enterprise networks. Despite patches being released, many routers remain exposed, creating a lucrative target for cyber attackers. How can these vulnerabilities impact businesses that rely on DrayTek routers for network security? Hackers are leveraging a critical Zimbra RCE vulnerability to backdoor servers through specially crafted emails that execute malicious commands, revealing widespread exploitation just days after a proof-of-concept was published. Notable security experts warn of attackers embedding harmful code in the email’s CC field, which the Zimbra server inadvertently executes. How are attackers camouflaging their malicious emails to slip through security measures unnoticed? # Stories Welcome back to our podcast. Today, we’re talking about a new cyber threat targeting HR professionals. Researchers at Trend Micro have uncovered a spear-phishing campaign where fake job applications deliver a JavaScript backdoor called More_eggs to recruiters. This malware, sold as malware-as-a-service by a group known as Golden Chickens, can steal credentials for online banking, email accounts, and IT admin accounts. What’s unique this time is that attackers are using spear-phishing emails to build trust, as observed in a case targeting a talent search lead in engineering. The attack sequence involves downloading a ZIP file from a deceptive URL, leading to the execution of the More_eggs backdoor. This malware probes the host system, connects to a command-and-control server, and can download additional malicious payloads. Trend Micro’s findings highlight the persistent and evolving nature of these attacks, which are difficult to attribute because multiple threat actors can use the same toolkits. The latest insights also connect these activities to known cybercrime groups like FIN6. Stay vigilant, especially if you work in HR or recruitment. 1. **Spear-Phishing**: – **Definition**: A targeted phishing attack aiming at specific individuals or companies, typically using information about the victim to make fraudulent messages more convincing. – **Importance**: This method is specifically dangerous because it can trick even tech-savvy users by exploiting personalized details, leading to significant security breaches like credential theft. 2. **More_eggs**: – **Definition**: A JavaScript backdoor malware sold as a malware-as-a-service (MaaS) with capabilities to siphon credentials and provide unauthorized access to infected systems. – **Importance**: Due to its ability to latently steal sensitive information and its widespread use by various e-crime groups, More_eggs represents a significant threat to corporate cybersecurity. 3. **Malware-as-a-Service (MaaS)**: – **Definition**: A business model where malicious software is developed and sold to cybercriminals who can then use it to conduct attacks. – **Importance**: This model lowers the barrier of entry for cybercriminals, allowing even those with limited technical skills to launch sophisticated attacks using pre-made malware. 4. **Golden Chickens**: – **Definition**: A cybercriminal group (also known as Venom Spider) attributed with developing and distributing the More_eggs malware. – **Importance**: Understanding threat actors like Golden Chickens can help cybersecurity professionals anticipate and defend against specific threat tactics. 5. **Command-and-Control (C2) Server**: – **Definition**: A server used by threat actors to maintain communications with compromised systems within a target network to execute commands and control malware. – **Importance**: Disrupting C2 servers is crucial because it can cut off the attacker's control over their malware, mitigating the threat. 6. **LNK File**: – **Definition**: A shortcut file in Windows that points to another file or executable. – **Importance**: Misuse of LNK files in phishing campaigns can lead to automated execution of malicious payloads, making them an effective vector for malware distribution. 7. **PowerShell**: – **Definition**: A task automation framework from Microsoft consisting of a command-line shell and scripting language. – **Importance**: PowerShell is often used by attackers to execute and conceal malicious scripts due to its powerful capabilities and integration with Windows. 8. **Tactics, Techniques, and Procedures (TTPs)**: – **Definition**: The behavior patterns or methodologies used by cyber threat actors to achieve their goals. – **Importance**: Identifying TTPs helps security professionals understand, detect, and mitigate specific attack strategies used by threat actors. 9. **Obfuscation**: – **Definition**: The process of deliberately making code or data difficult to understand or interpret. – **Importance**: Obfuscation is commonly used by malware developers to conceal malicious activities and bypass security mechanisms. 10. **Cryptocurrency Miner**: – **Definition**: Software used to perform the computational work required to validate and add transactions to a blockchain ledger in exchange for cryptocurrency rewards. – **Importance**: Unauthorized cryptocurrency mining (cryptojacking) can misuse system resources for financial gain, leading to performance degradation and security vulnerabilities. — On today’s tech update: Microsoft has blocked upgrades to Windows 11 version 24H2 on certain systems due to gaming performance issues. Players of Asphalt 8 may encounter game crashes, while some systems running Easy Anti-Cheat might experience blue screens. These problems mainly affect devices with Intel Alder Lake+ processors. Until Microsoft resolves these issues, impacted users are advised not to manually upgrade using tools like the Media Creation Tool. Microsoft is working on fixes and will include them in upcoming updates. 1. **Windows 11 24H2**: A version of Microsoft’s Windows 11 operating system, released in the second half (H2) of 2024. It is significant because it represents Microsoft’s ongoing update cycle aimed at improving system performance and user experience, though it also highlights the challenges of software compatibility and stability. 2. **Asphalt 8 (Airborne)**: A popular racing video game often used for showcasing graphical and processing capabilities of devices. Its relevance lies in exposing potential software and hardware compatibility issues when new operating systems are released. 3. **Easy Anti-Cheat**: A software tool designed to detect and prevent cheating in multiplayer games. It is crucial for maintaining fair play and integrity in online gaming environments but can pose compatibility challenges with system updates. 4. **Blue Screen of Death (BSoD)**: An error screen displayed on Windows computers following a system crash. It is important as it signals serious software or hardware issues that could affect system stability and data integrity. 5. **Intel Alder Lake+ processors**: A generation of Intel’s microprocessors known for their hybrid architecture design. Understanding these chips is important for recognizing which systems might be more susceptible to the reported compatibility issues. 6. **vPro platform**: A set of Intel technologies aimed at enhancing business security and manageability. It’s critical to cybersecurity professionals because it allows for hardware-level encryption and more robust security management, but compatibility with OS updates can be problematic. 7. **MEMORY_MANAGEMENT error**: A specific type of error indicating system memory management problems, often leading to system crashes. It is crucial for cybersecurity and IT professionals as it affects the stability and reliability of a system. 8. **Compatibility holds (Safeguard IDs)**: Mechanisms employed by Microsoft to prevent system upgrades when known issues are detected. These are essential for protecting users from potential system failures and ensuring a stable computing environment. 9. **Media Creation Tool**: A Microsoft utility used for installing or upgrading Windows OS. It's important for IT professionals as it provides a means to manually deploy Windows updates, though it highlights the risks of bypassing automatic update safeguards. 10. **KB5043145 (Preview Update)**: A specific Windows update known to cause issues such as reboot loops and connection failures. Understanding these updates is crucial for maintaining system stability and ensuring that deployed systems are free from vulnerabilities and bugs. — In a recent cybersecurity alert, over 700,000 DrayTek routers have been identified as vulnerable to hacking due to 14 newly discovered security flaws. These vulnerabilities, found in both residential and enterprise routers, include two rated critical, with one receiving the maximum CVSS score of 10.0. This critical flaw involves a buffer overflow in the Web UI, potentially allowing remote code execution. Another significant vulnerability is OS command injection via communication binaries. The report highlights the widespread exposure of these routers’ web interfaces online, creating a tempting target for attackers, particularly in the U.S. DrayTek has released patches to address these vulnerabilities, urging users to apply updates, disable unnecessary remote access, and utilize security measures like ACLs and two-factor authentication. This development coincides with international cybersecurity agencies offering guidance to secure critical infrastructure, emphasizing the importance of safety, protecting valuable OT data, secure supply chains, and the role of people in cybersecurity. 1. **Vulnerability**: A weakness in a system or software that can be exploited by hackers. – **Importance**: Identifying vulnerabilities is crucial in cyber security because it helps protect systems from attacks. 2. **Router**: A device that routes data from one network to another, directing traffic on the internet. – **Importance**: Routers are essential for internet connectivity and their security is vital to prevent unauthorized access to networks. 3. **Buffer Overflow**: A coding error where a program writes more data to a buffer than it can hold, potentially leading to system crashes or unauthorized code execution. – **Importance**: Buffer overflows are common vulnerabilities that can be exploited to gain control of a system. 4. **Remote Code Execution (RCE)**: A type of vulnerability that allows an attacker to execute code on a remote system without authorization. – **Importance**: RCE vulnerabilities are highly critical as they enable attackers to take over affected systems. 5. **Cross-site Scripting (XSS)**: A web security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites. – **Importance**: XSS can be used to steal information, deface websites, and spread malware. 6. **Adversary-in-the-Middle (AitM) Attack**: An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. – **Importance**: AitM attacks can lead to data theft, man-in-the-middle proxy attacks, and unauthorized access to sensitive information. 7. **Denial-of-Service (DoS)**: An attack intended to shut down a machine or network, making it inaccessible to its intended users. – **Importance**: DoS attacks disrupt the availability of services and can cause significant downtime and financial loss. 8. **Access Control List (ACL)**: A list of permissions attached to an object that specifies which users or system processes can access the object and what operations they can perform. – **Importance**: ACLs are crucial for implementing security policies to control access to resources. 9. **Two-Factor Authentication (2FA)**: A security process in which the user provides two different authentication factors to verify themselves. – **Importance**: 2FA improves security by adding an additional layer of verification, making it harder for attackers to gain unauthorized access. 10. **Operational Technology (OT)**: Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events in an enterprise. – **Importance**: OT security is critical for the functioning and safety of critical infrastructure systems, such as those in manufacturing, power generation, and transportation. — Today, we’re discussing a critical remote code execution (RCE) vulnerability in Zimbra email servers, tracked as CVE-2024-45519, which hackers are actively exploiting. This flaw allows attackers to trigger malicious commands simply by sending specially crafted emails, which are processed by Zimbra’s post journal service. First flagged by Ivan Kwiatkowski of HarfangLab and confirmed by Proofpoint, the exploit involves spoofed emails with commands hidden in the “CC” field. Once processed, these emails deliver a webshell to the server, giving attackers full access for data theft or further network infiltration. A proof-of-concept exploit was released by Project Discovery on September 27, prompting immediate malicious activity. Administrators are urged to apply security updates released in Zimbra’s latest versions—9.0.0 Patch 41 and later—or disable the vulnerable postjournal service and ensure secure network configurations to mitigate the threat. Stay vigilant and update your Zimbra servers immediately to protect against this critical vulnerability. 1. **Remote Code Execution (RCE)** – **Definition**: A type of security vulnerability that enables attackers to run arbitrary code on a targeted server or computer. – **Importance**: This flaw can be exploited to gain full control over the affected machine, leading to data theft, unauthorized access, and further network penetration. 2. **Zimbra** – **Definition**: An open-source email, calendaring, and collaboration platform. – **Importance**: Popular among organizations for its integrated communication tools, making it a significant target for cyberattacks due to the sensitive data it handles. 3. **SMTP (Simple Mail Transfer Protocol)** – **Definition**: A protocol used to send and route emails across networks. – **Importance**: Integral to email services, its exploitation can deliver malicious content to servers and users, forming a vector for cyber-attacks. 4. **Postjournal Service** – **Definition**: A service within Zimbra used to parse incoming emails over SMTP. – **Importance**: Its vulnerability can be leveraged to execute arbitrary commands, making it a crucial attack point for hackers. 5. **Proof-of-Concept (PoC)** – **Definition**: A demonstration exploit showing that a vulnerability can be successfully taken advantage of. – **Importance**: PoC exploits serve as proof that theoretical vulnerabilities are practical and dangerous, necessitating urgent security responses. 6. **Base64 Encoding** – **Definition**: A method of encoding binary data into an ASCII string format. – **Importance**: Often used to encode commands within emails or other data streams to evade basic security detections. 7. **Webshell** – **Definition**: A type of malicious script that provides attackers with remote access to a compromised server. – **Importance**: Webshells afford attackers sustained control over a server, allowing for ongoing data theft, disruptions, and further exploits. 8. **CVE (Common Vulnerabilities and Exposures)** – **Definition**: A list of publicly known cybersecurity vulnerabilities and exposures, identified by unique CVE IDs. – **Importance**: Helps standardize and track security issues, facilitating communication and management of vulnerabilities across the cybersecurity community. 9. **Patch** – **Definition**: An update to software aimed at fixing security vulnerabilities or bugs. – **Importance**: Patching vulnerabilities is critical for protecting systems from attacks exploiting known security flaws. 10. **Execvp Function** – **Definition**: A function in Unix-like operating systems that executes commands with an argument vector, featuring improved input sanitization. – **Importance**: By replacing vulnerable functions like ‘popen,’ ‘execvp’ helps prevent the execution of malicious code, thus enhancing system security. —

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

 Want to make the most out of your next podcast appearance? https://content.leadquizzes.com/lp/fk1JL_FgeQ Connect to John Gilroy on LinkedIn    https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Donald Rumsfeld is famous for talking about the “unknown unknowns.” Well, today we will be a little more specific and focus on some “knowns.” Most listeners know that cyber threat companies regularly list vulnerabilities. Jay Wallace estimates VulnCheck alone has a list of 300,000 known threats. The Cybersecurity & Infrastructure Security Agency (CISA) decided to help federal agencies narrow down this list. They put together a list of vulnerabilities that were specific to federal networks. For example, if no federal agency ever uses “XYZ” software, why should a federal information professional care about it? It is not and will never be on their systems. The key to understanding the KVE is that CISA will not just put a vulnerability on a list and say, “Good luck.”  They will post a patch to remediate the problem. VulnCheck helps federal agencies with prioritization, proof of concept, and a community.  Prioritization For example, VulnCheck can assist in setting up priorities or these varying threats. Proof of Concept For example, during the interview, Jay Wallace mentions something called a Proof of Concept (PoC). VulnCheck can look like software combinations and determine if they can be a threat. Community Also, VulnCheck has an active community where these threats are discussed. Just this year, the VulnCheck community has been active in many areas, including making information about vulnerabilities consumed in a more palatable manner. Malicious actors know about vulnerabilities, and a responsible federal manager should become familiar with how to manage this vulnerability list.

Welcome to TheInquisitor Podcast
Roee Hartuv: Sustainable Efficient Process Driven Growth

Welcome to TheInquisitor Podcast

Play Episode Listen Later Jul 11, 2024 65:54


Roee Hartuv, a former combat helicopter pilot and current expert at Winning by Design, shares insights from his unique journey from the military to revenue architect. His profound understanding of the importance of process design helps identify what works, what doesn't, and what needs to happen to meet business goals. This episode delves into the nuances of sales processes, customer acquisition, and the hidden costs that can drain a company's resources. Roee discusses how his interest in process design began during his time as a pilot, emphasizing the critical importance of understanding effective and ineffective processes in high-stakes environments. He provides an in-depth analysis of customer churn and its financial implications, revealing why reaching a Proof of Concept (POC) can cost $43,000 even if the customer does not convert. Salespeople are encouraged to rethink their training, recognizing that the buyer's journey is not linear and requires strategic adjustments. Roee critiques vendor-biased sales methodologies like MEDIC and BANT, highlighting the need to focus on desired customer impacts rather than just product features and pain points. Mapping the sales process to a non-linear buyer journey, understanding the Ideal Customer Profile (ICP), and their decision-making process are key topics. The episode also examines the conflicting goals of stakeholders, from VCs to profit-driven businesses, and how growth rate-driven valuations can harm long-term profitability. A deeper understanding of customer acquisition costs beyond surface-level metrics is necessary, along with evaluating data to genuinely understand company performance. Roee explains why some companies will never recover from an unprofitable foundation, even if they pivot to customer-focused strategies. He emphasizes that poor processes lead to amplified negative outcomes with AI implementation. To avoid over-investment, developing a solid growth plan and resisting investor pressure is crucial. Roee offers strategic advice for business success, stressing the difficulty of abandoning ineffective practices and the necessity of operational support for enterprise sales. The dangers of a poorly managed pipeline and the resulting increase in churn are examined, along with strategies to enhance customer success activities to improve reputation and reduce churn. Roee shares the benefits of customer advisory boards and the extended role of marketing teams beyond top-of-funnel activities. Addressing the skills gap among middle managers who thrived during the growth-at-all-costs phase is essential, preparing them for a changed business landscape. Finally, the importance of testing processes before scaling and having a measurable process to identify problems and opportunities for improvement is highlighted. Tune in to gain valuable insights from Roee Hartuv and discover how to perfect your sales processes and strategies to drive sustainable growth. Don't miss this engaging and informative conversation! Contact Information: Roee Hartuv: LinkedIn Marcus Cauchi: LinkedIn Winning by Design Read Jacco van der Kooij‘s book ‘Revenue Architecture” https://amzn.to/3xJ4k0G Subscribe, rate, and review our podcast to stay updated with the latest in sales strategies and business optimization.

Develpreneur: Become a Better Developer and Entrepreneur
Solving Problems Without Solving the Problem

Develpreneur: Become a Better Developer and Entrepreneur

Play Episode Listen Later Jul 2, 2024 21:15


Welcome back to episode 3 of Season 22 of our Building Better Developers podcast. In this episode, we continue exploring problem-solving strategies. Previously, we discussed general problem-solving approaches. This episode delves into a nuanced topic: Solving Problems Without Solving the Problem. This concept frequently arises in various professional contexts, particularly in project management and consultancy. Listen to Rob and Michael Discuss Solving Problems Without Solving the Problem The Paradox of Over-Delivering Often, you may find yourself in a situation where you're asked to demonstrate your ability to solve a problem. This could be through creating a proof of concept, drafting a proposal, or designing a demo. However, the challenge lies in balancing showing your capability for solving the problem and over-delivering to the point where you've essentially completed the project without a formal commitment. It's a common scenario in industries involving side hustles and freelance work. Why Solving Problems Without Solving the Problem Matters Imagine agreeing to demonstrate a solution, only to have the client continually ask for a bit more until you realize you've spent countless hours on something that isn't yet contracted. This predicament is akin to a lawyer giving away free advice until they've essentially provided their entire service without compensation. The key is knowing where to draw the line. Proof of Concept (PoC) as a Strategy So, how do we navigate this delicate balance? We advise starting with a small, manageable PoC. The PoC should be a scaled-down version of the potential solution designed to validate key assumptions and feasibility without excessive time and resource investment. Here's how to approach it: Identify the Core Problem: Clearly define what you're trying to solve. Start Small: Begin with a minimal dataset or a simplified version of the problem. Incremental Testing: Gradually expand the scope, testing the solution with increasingly larger datasets or more complex scenarios. For instance, if your project involves processing data from CSV files, start with just a few records. Verify that the basic process works before scaling up to larger datasets. This method helps in understanding the solution's scalability and potential issues early on. Avoiding Overcommitment A crucial aspect of managing a PoC is ensuring you don't inadvertently find yourself with a live project before it's ready. This can happen when a PoC evolves into a fully functioning solution without proper planning and resource allocation. Here's how to prevent this: Set Clear Boundaries: Define what the PoC will and won't cover. Communicate this clearly to stakeholders. Regular Check-Ins: Have frequent reviews to assess progress and realign expectations. Documentation: Keep detailed records of what the PoC entails and the steps required to transition to a full project. Leveraging Existing Solutions Another vital point is recognizing that you don't always need to build solutions from scratch. Often, there are existing APIs, tools, or open-source projects that can be adapted to meet your needs. This is particularly relevant in industries like healthcare, where compliance and security are paramount. When choosing between building and buying (or adapting), consider: Compliance: Does the existing solution meet necessary regulatory standards? Cost: Is purchasing and customizing an existing solution more cost-effective than building one from scratch? Integration: How well does the existing solution integrate with your current systems? Real-World Application of Solving Problems Without Solving the Problem An example shared in the podcast involved automating a manual process in a billing center. Initially, the team replicated the existing manual worksheets into a web application as a PoC. This small-scale implementation was well-received, but the project faced challenges when it inadvertently moved towards a live deployment too quickly. The lesson here is to be cautious of scope creep and ensure that all stakeholders understand the PoC's limitations. Agile Methodology as a Solution The Agile development framework, particularly Scrum, is designed to address the issue of premature live deployment by delivering incremental, usable software at the end of each sprint. This approach allows for continuous feedback and adjustment, ensuring that the solution evolves in a controlled manner. Continue Your Journey By Solving Problems Without Solving the Problem Embracing the concept of solving problems without fully solving them allows for efficient use of resources and better project management. Start small, validate assumptions, leverage existing tools, and communicate clearly with stakeholders. By doing so, you can navigate the complexities of PoCs and avoid the pitfalls of overcommitting. Stay Connected: Join the Developreneur Community We invite you to join our community and share your coding journey with us. Whether you're a seasoned developer or just starting, there's always room to learn and grow together. Contact us at info@develpreneur.com with your questions, feedback, or suggestions for future episodes. Together, let's continue exploring the exciting world of software development. Additional Resources One Offs, Side Projects, and Veering From Standards Setting Realistic Expectations In Development The Importance of Properly Defining Requirements The Developer Journey Videos - With Bonus Content Behind the Scenes Podcast Video - With Bonus Content

Futurum Tech Podcast
5G Factor: Key MWC24 Takeaways – The Cloud and Telcos

Futurum Tech Podcast

Play Episode Listen Later Mar 25, 2024 28:37


In this episode of The 5G Factor, our series that focuses on all things 5G, the IoT, and the 5G ecosystem as a whole, we look at the top cloud and telco takeaways from conversations and sessions at Mobile World Congress 2024. The major takeaways consist of Red Hat and Tech Mahindra boosting their hybrid cloud collaboration, Red Hat and NTT working with Fujitsu and NVIDIA to ready IOWN environments for real-time edge AI data analytics, Indonesia's Telkomsel selecting Google Cloud to integrate GenAI for augmenting its operations and product offerings, VMware focusing on assuring the DISH Wireless Open RAN build in the US, and TELUS using HPE servers to complete its Open RAN mission in Canada.  Our analytical review focused on: Red Hat and Tech Mahindra Uplift Hybrid Cloud Capabilities. Red Hat and Tech Mahindra announced a collaboration aimed at making it easier for telecommunication service providers to accelerate and manage 5G adoption and deployments across the hybrid cloud. Tech Mahindra's Multi-mode Companion Cloud with Red Hat OpenShift running on AWS can support multiple network use cases, spanning RAN, edge computing, transport and 5G core, to extend capabilities across hybrid cloud environments with integrated automation and orchestration capabilities. We delve into why Red Hat OpenShift provides the infrastructure and application layer key to supporting operations at scale across any cloud environment, with Tech Mahindra's netOps.ai offering a unified view to manage infrastructure and automate applications with low touch provisioning. Plus, we look at how Red Hat Advanced Cluster Management for Kubernetes enables full cloud lifecycle management to automate Day 0 and Day 1 configurations and orchestrate workloads across Red Hat OpenShift clusters on-premises and on AWS. Red Hat and NTT Show IOWN Ready for Real-time Edge AI Data Analysis. As part of the Innovative Optical and Wireless Network (or IOWN) initiative, Red Hat and NTT in collaboration with NVIDIA and Fujitsu, have jointly developed a solution targeted at enhancing and extending the potential for real-time AI data analysis at the edge. Using technologies developed by the IOWN Global Forum and built on the foundation of Red Hat OpenShift this solution has received an IOWN Global Forum's Proof of Concept (PoC) recognition for its real world viability and use cases. The PoC evaluated a real-time AI analysis platform4 with Yokosuka City as the sensor installation base and Musashino City as the remote data center, both connected through the IOWN All-Photonics Network. We assess why this is a breakthrough for AI edge applications since even when many cameras were accommodated, the latency required to aggregate sensor data for AI analysis was reduced by 60% compared to conventional AI inference workloads.   Telkomsel Selects Google Cloud to Boost Operations and Products with GenAI. Telkomsel announced a strategic collaboration with Google Cloud to integrate enterprise-grade generative AI (gen AI) into its operations and core product offerings for consumers and businesses. This latest collaboration builds on Telkomsel's ongoing use of Google's AI-powered advertising tools, such as Performance Max, with the aim of transforming its employee and customer interactions, augmenting overall user satisfaction, and improving business outcomes. Moreover, Nokia is running AVA Data Suite on Google Cloud to facilitate AI/ML development. We examine why such moves are further validating the overall Google Cloud for Telecommunications proposition.   VMware Looks to Assure DISH Wireless Open RAN Build. At MWC24, VMware, recently acquired by Broadcom Inc, unveiled that DISH Wireless has deployed VMware Telco Cloud Service Assurance across the Boost Wireless Network in a pilot production environment to deliver real-time network monitoring, assurance and automation, with the goal of providing a better 5G network and subscriber experience. We assess why the VMware Telco Cloud Service Assurance remote data collector service allows DISH Wireless the Network Operations Center (NOC) team to collect and analyze data from 20,000-plus cell sites. From our view, this is a critically important development for DISH Wireless to efficiently assure and scale its breakthrough Open RAN 5G network that is getting closer to offering more than 240 million Americans access to the latest in 5G connectivity technology and innovation. TELUS Enlists HPE Servers to Complete Open RAN Mission. During MWC24, HPE announced it is working with TELUS, which is building Canada's first 5G Open RAN, by providing infrastructure across 3,000 sites. Once completed, the new TELUS Open RAN 5G network can provide instantaneously responsive connectivity which can enhance the customer experience with faster connectivity and mobile access. We examine why HPE ProLiant DL110 Gen11 servers, designed specifically for telco workloads, are ready to provide an open and flexible, virtualized foundation to deliver next-generation cellular connectivity to urban and rural Canadians. The servers provide Open RAN infrastructure to assist TELUS with the interoperability it needs by providing the foundation for DU implementations, which are responsible for preparing data for transmission across the 5G network.

HRM-Podcast
Cloud Legacy: Carve Out, Merger & Cybersecurity für Unternehmen: #043 - Darum eine Cloud Landing Zone!

HRM-Podcast

Play Episode Listen Later Mar 20, 2024 17:36


Heute steht das Thema Cloud Landing Zones im Mittelpunkt-Angesichts der jüngsten Übernahme von VMware durch Broadcom stehen viele vor der Frage, ob ihre VMware-Infrastruktur noch rentabel ist. Dies könnte der perfekte Zeitpunkt sein, sich mit Cloud-Infrastruktur und -Virtualisierung zu befassen.Von der Konzeption bis zum Proof of Concept (POC) ist die Cloud-Landing-Phase entscheidend, um die Funktionsweise von Virtualisierung in der Cloud zu verstehen.Erfahre mehr darüber, wie Du Deine Infrastruktur in die Cloud bringen und optimieren kannst.

HRM-Podcast
Cloud Legacy: #043 - Darum eine Cloud Landing Zone!

HRM-Podcast

Play Episode Listen Later Mar 20, 2024 17:36


Heute steht das Thema Cloud Landing Zones im Mittelpunkt-Angesichts der jüngsten Übernahme von VMware durch Broadcom stehen viele vor der Frage, ob ihre VMware-Infrastruktur noch rentabel ist. Dies könnte der perfekte Zeitpunkt sein, sich mit Cloud-Infrastruktur und -Virtualisierung zu befassen.Von der Konzeption bis zum Proof of Concept (POC) ist die Cloud-Landing-Phase entscheidend, um die Funktionsweise von Virtualisierung in der Cloud zu verstehen.Erfahre mehr darüber, wie Du Deine Infrastruktur in die Cloud bringen und optimieren kannst.

Faith & Family Filmmakers
The Power of a Proof of Concept, with Mark Stewart Iverson

Faith & Family Filmmakers

Play Episode Listen Later Mar 18, 2024 31:49 Transcription Available


Episode 20 - The Power of a Proof of Concept, with Mark Stewart Iverson In this members' episode of the Faith and Family Filmmakers Podcast, hosts Geoffrey Whitt and Jaclyn Whitt talk with filmmaker Mark Stewart Iverson, diving deeper into his work and approach to filmmaking. Mark shares insights into his upcoming film 'Prodigal Sons,' a drama set during the Vietnam war era focusing on the divergent paths of two brothers. He discusses the film's development, from a script penned by a long-time friend, funded through a personal inheritance with divine inspiration, to its production aiming for a doc-style, 16mm film aesthetic. Iverson elaborates on the Proof of Concept (PoC) production, highlighting challenges and opportunities during the SAG strike and the inclusive effort from the cast and crew who believed in the project's potential. He underscores the collaborative nature of filmmaking, from production through to casting, and the strategic use of PoCs in pitching to investors and studios.They also discuss the importance of humor in filmmaking, regardless of genre, and Iverson's approach to embedding comedy into scripts to deepen emotional impact and character relatability. He emphasizes character-driven writing as fundamental in crafting engaging narratives, offering insights into his screenwriting classes and methodologies. The episode includes:Welcome and IntroductionDiving Deep into 'Prodigal Sons'The Creative Process and CollaborationShooting Style and Production InsightsFinancial Aspects and Production ChallengesThe Power of a Proof of ConceptNavigating the Industry with a Concept FilmIndustry Relationships and CollaborationCasting for a Proof of ConceptThe Role of Comedy in ScreenwritingClosing Thoughts and Contact InformationUpon graduating from UCLA Film School, Mark Stewart Iverson co created, co wrote, and co directed Hulu's former number one web series, Dorm Life. The hit comedy show racked up three Webby Awards, two Streamy nominations, and two W3 Gold Awards. After a spiritual transformation, Mark founded MSI Films with the production of his original screenplay, the award winning For Prophet, marking his feature directorial debut. Mark currently serves as the creative producer for the sustainability docu series, Rivers Are Life, on the Weather Channel, having produced 16 episodes in 8 countries across 5 continents.For Prophet Website: https://forprophetfilm.com/For Prophet on Facebook: https://www.facebook.com/forprophetfilmFor Prophet on Instagram: https://www.instagram.com/forprophetfilm/MSI Films Website: https://msifilms.com/MSI Films on Facebook: https://www.facebook.com/msifilmsMSI Films on Instagram: https://www.instagram.com/msifilms/The Faith & Family Filmmakers podcast helps filmmakers who share a Christian worldview stay in touch, informed, and inspired. Releasing new episodes every Monday, we interview experts from varying fields of filmmaking; from screenwriters, actors, directors, and producers, to film scorers, talent agents, and distributors. It is produced and hosted by Geoffrey Whitt and Jaclyn Whitt , and is brought to you by the Faith & Family Filmmakers Association

Revenue Builders
Preparing for the EB Meeting with Anne Gary

Revenue Builders

Play Episode Listen Later Feb 11, 2024 10:08


SHOW SUMMARYIn this curated episode of the Revenue Builders Podcast, John McMahon and John Kaplan in a deep dive with industry expert Anne Gary as they explore the essential steps in preparing for the Economic Buyer meeting. Ann shares valuable insights on how salespeople can differentiate themselves, become true business partners, and align their solutions with both corporate and individual objectives.KEY TAKEAWAYS[00:00:49] Research is Key: 8 out of 10 executives feel sales meetings are wasted time. Research company objectives, risks, and competition beforehand.[00:01:46] Be a Partner: Differentiate by helping run their business. Provide insights into unconsidered business issues.[00:02:56] Align for Success: Link solutions to corporate and individual performance, focusing on revenue growth, cost reduction, and risk mitigation.[00:04:55] Articulate the Pain: Quantify the current situation, showcasing the full ramifications of the customer's process and connecting it to positive business outcomes.[00:08:14] Differentiate Effectively: Identify required capabilities, differentiating based on unique strengths addressing specific pain points for winning the Proof of Value (POV).[00:09:00] ROI Confidence: Develop a preliminary Return on Investment (ROI) confidently before entering Proof of Concept (POC) discussions.HIGHLIGHT QUOTES[00:01:25] "Be a business partner, not a salesperson. Help them run their business, inform them about business issues they haven't considered."[00:03:57] "The terms that resonate with your champion may not be the same terms that resonate with the economic buyer. Speak on their business terms."[00:07:54] "Understand how these people are measured. Highlight the business outcome that aligns most with how they're evaluated."Listen to the full episode with Anne Gary through this link:https://revenue-builders.simplecast.com/episodes/getting-to-the-economic-buyer-with-anne-garyCheck out John McMahon's book here:Amazon Link: https://a.co/d/1K7DDC4Check out Force Management's Ascender platform here: https://my.ascender.co/Ascender/

Revenue Builders
Decoding Decision Criteria, Mastering Champions: Blueprint for Sales Success with Anne Gary

Revenue Builders

Play Episode Listen Later Dec 14, 2023 48:30


In this episode of the Revenue Builders Podcast hosted by John McMahon and John Kaplan, our special guest, Anne Gary, the Managing Director at Force Management, is back again to discuss the intricacies of decision criteria while mastering the role of champions in sales success. Delving into the depths of sales strategy, they explore defining decision criteria, aligning it with customer needs, and differentiating products effectively. John McMahon, John Kaplan, and Anne Gary navigate through the risks of scope creep in Proof of Value (POV) or Proof of Concept (POC) stages, emphasizing the importance of formalizing criteria and engaging stakeholders. Discover the critical role of champions in aligning criteria with business outcomes, understanding customer pain points, shaping compelling points of view, and leveraging their influence to drive sales success. This insightful discussion equips sales teams with actionable strategies and anecdotes to secure customer engagement and ace the sales process.Tune in to this conversation with John McMahon and John Kaplan on the Revenue Builders podcast.HERE ARE SOME KEY SECTIONS TO CHECK OUT[00:03:12] Decision criteria are specific requirements and quantifiable metrics used by customers to evaluate potential solutions.[00:04:21] Aligning product differentiators with decision criteria enhances the chance of winning the validation event.[00:06:38] Differentiation strategies include unique, valuable, and comparative differentiators, but vigilance is needed as these can become targets for competition.[00:12:39] Scope creep in decision criteria introduces more risk, necessitating continuous monitoring and alignment with evolving customer needs.[00:19:06] The process of defining decision criteria begins in the discovery stage, involves scoping and champion involvement, and should be finalized with the economic buyer's approval.[00:22:28] Challenges arise when criteria change, warranting a deeper understanding of who influenced the change and why.[00:23:09] Champions need to be prepared for objections in advance to increase the chances of success in complex sales cycles.[00:26:06] Keeping champions prepared ensures successful meetings and sustains their support for the sales process.[00:27:02] Understanding and quantifying pain points during discovery and scoping stages are vital for success.[00:32:50] Summarizing and understanding customer problems helps in overcoming seller deficit disorder.[00:33:27] Constructing a pain matrix aids in prioritizing and solving identified pain points promptly.[00:37:41] Adapting to changing criteria by utilizing pain matrices enhances adaptability and customer understanding.[00:39:36] Champions play a key role in influencing stakeholders and formalizing decision criteria.[00:43:04] Champions' timely feedback is crucial for addressing challenges and managing stakeholder expectations.ADDITIONAL RESOURCESLearn more about Anne Gary: https://www.linkedin.com/in/anne-gary-a054aa96/Download our Sales Transformation Guide for Leaders: https://forc.mx/3sdtEZJHIGHLIGHT QUOTES[00:03:00] “I define the decision criteria as a specific set of requirements, standards, and real importantly, the quantifiable metrics that the customer uses to evaluate the potential solutions. And making a purchase decision with that definition, though, the importance of the decision criteria is winning in the proof of value lies in the ability of the salesperson to align to the customer's needs and expectations, you know, with their solution. So, with that, by helping to create the decision criteria with the customer, you know, salespeople can demonstrate the value and relevance of their product and increase the likelihood of a successful POV. And ultimately, you know, they're really going to close the deal for higher price points.”[00:27:22] "You really need to show up with a compelling point of view, meaning you've done your homework. You understand the customer and their use cases, you know, knowing their use cases gives you the ability to discuss it with the customer in a confident way. I just can't imagine showing up to a call and not really understanding what they do, what they're about, and you almost understand the patterns of what they're looking for."[00:46:30] "And so if you're listening and you're technically inclined, decision criteria is a great place for you to really help the sales team. What I used to, I love doing when I'd go on a forecast, I'd have the technical people on the forecast as well. I'd ask what the decision criteria is, and then I wouldn't ask the seller. I would ask the, the technical person, I would say, how do you feel about that? Number 1, is that the correct decision criteria? Number 2, can we win with that criteria?"

SaaS Metrics School
How to Track Pilot or Proof of Concept (POC) Revenue and Bookings

SaaS Metrics School

Play Episode Listen Later Dec 8, 2023 3:50


In episode #144, I address pilot and POC revenue. It's important to separate this from your “normal” customer revenue and bookings. - Bookings - Revenue - Metrics Subscribe to Ben's SaaS metrics newsletter: https://saasmetricsschool.beehiiv.com/subscribe Subscribe to Ben's SaaS monthly newsletter: https://mailchi.mp/df1db6bf8bca/the-saas-cfo-sign-up-landing-page SaaS Metrics courses here: https://www.thesaasacademy.com/ Join Ben's SaaS community here: https://www.thesaasacademy.com/offers/ivNjwYDx/checkout Follow Ben on LinkedIn: https://www.linkedin.com/in/benrmurray

Real Time with WLP
E25 - Embracing the Unknown: Navigating Ambiguity for Innovative Success

Real Time with WLP

Play Episode Listen Later Aug 25, 2023 15:18


We invite you to listen to the newest episode of Real Time with WLP, Embracing the Unknown: Navigating Ambiguity for Innovative Success, featuring @Vanessa Roknic, Director, Digital Transformation & Innovation, Novo Nordisk and Diana Veronica Ferraez, Member of the Digital Committee at WLP. Vanessa shares her insights on how leaders can create a culture that embraces ambiguity and encourages innovation. Discover practical strategies to help up-and-coming leaders navigate ambiguity successfully. ABOUT VANESSA ROKNIC Vanessa Roknic has built a solid reputation for transforming organizations by identifying customers' pain points, ideating viable solutions, and leading high-performing teams to execute. She leverages her R&D background coupled with expertise in front-end drug development and regulatory compliance to inform digital innovation and transformation from initial problem identification to creation of a total solution. Vanessa champions innovation across global enterprises through complex problem solving, strategic partner engagement, high-performance team building In her current role as Director, Digital Transformation and Innovation for Novo Nordisk, Vanessa leads the operations and expansion of the company's first internal innovation incubator: Apis Labs. She builds novel partnerships with internal groups and external academic institutions to accelerate the volume and velocity of the innovation portfolio. Throughout her 8-year tenure with Novo Nordisk, Vanessa progressed from clinical project management roles first in Australia and then in the US, to newly formed roles in business performance and commercial innovation. She met the executive team's mandate to pioneer a Proof of Concept (PoC) innovation incubator that drove rapid, incremental, and iterative experimentation to identify innovation opportunities. Vanessa holds an MBA from Colorado State University and a Bachelor's degree in Medical Microbiology / Immunology and Genetics from the University of New South Wales in Sydney, Australia. She completed Drug Development Product Management training at UC San Diego.

The Vox Markets Podcast
1420: Top 5 Most Read RNS's on Vox Markets for Monday 15th May 2023

The Vox Markets Podcast

Play Episode Listen Later May 15, 2023 3:31


Top 5 Most Read RNS's on Vox Markets for Monday 15th May 2023 1. Vast Resources #VAST - Company Update As announced on the 16 May 2022, the totality of the debt owed to Mercuria and Alpha (currently approx. £7.3m) was due to be repaid on or before Monday 15 May 2023. The Company is currently concluding documentation regarding an extension to 30 June 2023 that will allow the necessary time to finalise the settlement of the historic claims in Zimbabwe. The Company can confirm that Andrew Prelea, the Company's Chief Executive Officer, is currently in Zimbabwe as the Company finalises the recovery of the historic parcel of 129,400 rough diamonds held in safe custody at the Reserve Bank of Zimbabwe pursuant to the High Court Order in the Company's favour. 2. Premier African Minerals #PREM - Funding of Ongoing Zulu Plant Optimisation The Board of Premier African Minerals Limited ("Premier" or the "Company") is pleased to announce a placing today to raise £1,759,500 before expenses at an issue price of 0.925 pence per new ordinary share for the ongoing Zulu Lithium and Tantalum Project ("Zulu") Pilot Plant Optimisation. The Company is also pleased to report that the plant is now producing concentrate from both the spodumene and mica floatation circuits. 3. Angus Energy #ANGS - Saltfleetby Field: Production Ramp Up Angus Energy announce that, as planned, the second compressor at Saltfleetby Field was successfully commissioned in dual compressor mode on 10th May and the 3 producing wells in the field, B2, A4 and the new B7T well, have been flowing gas to the National Grid at the combined average daily rate of 9.5 mmscfd since then. This represents more than a 75% increase in production over that achieved in the first quarter of this year. As expected, the new B7T well is producing between 4-5 mmscfd through the temporary flowline with stable flow as it continues to clean-up. 4. IOG PLC #IOG - Operational Update First gas from the Blythe H2 well is still expected to commence by the end of Q2 Production from the Blythe H2 well will be initially ramped up to safely and efficiently manage the production of the resident pipeline fluids into Bacton, then expected to build up to 30-40 mmscf/d (million standard cubic feet) rate post ramp up The Blythe H1 well is initially planned to be shut in once the H2 well is fully onstream to reduce water production into the pipeline however the H1 well will remain available for production 5. BSF Enterprise #BSFA - Lab-Grown Leather Update and Innovation Award Win Following the successful expansion of its laboratory and incubator capacity, 3DBT has bio-engineered samples of animal skin tissue, measuring up to 10 by 10 cm in size and between 0.5 mm to 1 mm in thickness. BSF has engaged with a number of companies within the leather industry in the UK and abroad regarding potential Proof of Concept (PoC) engagements to establish the suitability of the skin product as a sustainable, ethical alternative to traditional leather goods.

SmallCapVoice.com, Inc.
OTC:ITOX May 3, 2023 Investor Conference Call

SmallCapVoice.com, Inc.

Play Episode Listen Later May 3, 2023 24:32


Cliff Emmons, CEO of IIOT-OXYS, Inc. (Oxys) stated, "We're pleased to announce, as promised, 2022 revenue exceeded 2021, doing so by more than seven-fold. This is the highest annual revenue since the negative impacts of the COVID pandemic. Also, as promised, revenue in the second half of 2022 exceeded that in the first half. Furthermore, fourth quarter revenue exceeded third quarter revenue, marking three consecutive quarters of increasing revenue. Our leadership team also managed costs well, lowering operating expenses by 17%, and professional expenses were reduced by 47%. There were several factors that led to this strong growth in 2022, including the following: Our Department of Transportation (DOT) Bridge Monitoring contract: We were awarded a six-figure sub-contract from a major northeast state's DOT for bridge monitoring, in addition to the extension that was given on the previous contract. This project will continue to contribute a strong revenue stream through mid-2023, and we're confident our performance will yield further extensions and expansions in the second half of the year. Our continued focus on our Smart Manufacturing vertical enabled us to secure a CNC Proof of Concept (POC) contract in December 2022. The POC successfully kicked off in January 2023, is concluding next month, and is already yielding results that are impressing our customer. We expect a Software-as-a-Service (SaaS) contract to follow which we expect to contribute to revenue by the second half of 2023. The ongoing strength of our strategic partnership with Aingura IIoT, S.L., which provides supplemental expertise, equipment and software, ensuring we continue to bring value to our customers. Our partnership with a Canadian Indoor Air Quality Sensor and IIoT Platform company continues to progress well, and our retail sales efforts are beginning to show results. Looking forward through 2023 and beyond, and as previously stated, we believe this is a transition year from "surviving" to "thriving". It is anticipated that 2023 YoY revenue growth will meet or exceed that of 2022. This will be accomplished through our partnerships, successful pilots, experienced leadership, and savvy technological talent. These capabilities will allow us to leverage our high potential growth markets: the global smart manufacturing (also known as Industry 4.0) was $97.6 B USD in 2022 and will reach $228.3 B USD by 2027 (CAGR 18.5%);[1] the worldwide Structural Health Monitoring (SHM) industry was $2.0 billion USD in 2021 and will reach $4.0 billion USD by 2027 (CAGR of 14.6%).[2] ; an Indoor Air Quality Monitors, which was estimated at $3.7 billion USD in 2020 and projected to reach $6.4 billion USD in 2027, growing at 8.2% CAGR.[3] By executing on these promises, we believe these revenue goals are achievable."

Real Estate Experiment
Proof of Concept (POC) with Ruben Kanya - Episode #232

Real Estate Experiment

Play Episode Listen Later May 1, 2023 20:42


In the latest episode of The Real Estate Experiment Show, host Ruben Kanya discusses the importance of focusing on proofs of concepts in not just the real estate industry but in overall business. He explains that proofs of concepts can come in two forms: brand new insights we've never heard before or reinforcements of beliefs we already know we need to execute. According to Ruben, experimenting is not about reinventing the wheel or seeking shortcuts, but rather about applying key fundamental principles that have already been successfully executed by those who came before us. He encourages individuals to add their own unique perspective to the table when experimenting built on the foundations of proofs of concepts. Ruben also emphasizes that one's uniqueness as an individual can lead to a successful experiments build on sound proofs of concepts. Overall, this episode provides valuable insights for individuals looking to experiment proven concepts in their respective real estate labs. Get Your Airbnb Millionaire Blueprint: https://experimentrealestate.com/#blueprint Get coached on how you can repurpose your existing home or investment property into an Airbnb with me: https://experimentrealestate.com/hospitable-hosts Guesty Unique Link: https://hosts.guesty.com/?=therealestateexperiment Hospitable Hosts book: https://amzn.to/3e4LEhE Apply for an American Express Card with this link: http://refer.amex.us/RUBENKr8et?xl=cp01&mpt=v0 #realestate #proofofconcept #realestateexperiment

@BEERISAC: CPS/ICS Security Podcast Playlist
Knocking down the legs of the industrial security triad.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 14, 2023 19:45


Podcast: Research SaturdayEpisode: Knocking down the legs of the industrial security triad.Pub date: 2023-02-11Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.In this research, they are targeting Rockwell Automation's FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.The research can be found here:GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol Learn more about your ad choices. Visit megaphone.fm/adchoicesThe podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The CyberWire
Knocking down the legs of the industrial security triad. [Research Saturday]

The CyberWire

Play Episode Listen Later Feb 11, 2023 21:45


Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process. In this research, they are targeting Rockwell Automation's FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment. The research can be found here: GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

Research Saturday
Knocking down the legs of the industrial security triad.

Research Saturday

Play Episode Listen Later Feb 11, 2023 21:45


Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process. In this research, they are targeting Rockwell Automation's FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment. The research can be found here: GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

Tales in Tech: Start-Up Diaries
S5 | Episode 6 | Aleksa Vukotic of The Start-Up Factory: How To Match An Investor's Appetite & Deliver Results

Tales in Tech: Start-Up Diaries

Play Episode Play 58 sec Highlight Listen Later Nov 29, 2022 32:01


The Start-Up Factory works with entrepreneurs, early stage startups and investors to help articulate, define and realise their vision, utilising a partial sweat equity model to help these start-ups get to the next stage of their journey, including Proof-of-Concept (PoC) and Minimum Viable Product (MVP) builds.In this episode, CTO Aleksa Vukotic discusses exactly what early stage start-ups can expect from The Start-Up Factory & what their process looks like. He then discusses crucial early-stage hires, how to know if you are making the right hire and what to look out for in a candidate during those early stages, unpicking what leaders think they want in a hire vs. what they actually need...Aleksa then dives into what he thinks can be done to bring the tech community in Manchester together and facilitate more ‘Manchester made' businesses, and how Manchester could produce more C-Suite level figures. Finally, Aleksa covers how early stage businesses can match an investors appetite, including the mistakes he often sees being made and the advice he would give to founders who are feeling the pressure for results from their investor.A really great episode with lots of tangible advice!Follow The Start-Up Diaries Podcast on LinkedIn or learn more about Burns Sheehan.

Computer America
Edgewater Wireless Interview, Spectrum Slicing and WiFi7 w/ Andrew Skafel

Computer America

Play Episode Listen Later Nov 15, 2022 51:23


Edgewater Wireless. Andrew Skafel, President/CEO.Edgewater Wireless is the industry leader in innovative Spectrum Slicing technology for residential and commercial markets. We develop advanced Wi-Fi silicon solutions, Access Points, and IP licensing designed to meet the high-density and high quality-of-service needs of service providers and their customers. With 25+ patents, Edgewater's Multi-Channel, Single Radio technology revolutionizes Wi-Fi, delivering next-generation Wi-Fi today.Edgewater's physical layer Spectrum Slicing allows a frequency band to be divided, or sliced, to enable more radios to operate in a given area. Think of Spectrum Slicing like moving from a single-lane road to a multi-lane highway — regardless of Wi-Fi technology.In a large-scale Proof of Concept (PoC) with a major Tier 1 Service Provider — looking at 6 million devices in 750,000 homes, Spectrum Slicing showed 7 to 18 times performance gains in 75% of homes. Interestingly, homes with the most devices saw the most significant improvements.For more info, interviews, reviews, news, radio, podcasts, video, and more, check out ComputerAmerica.com!

Packet Pushers - Full Podcast Feed
IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Apr 21, 2022 38:29


In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more.

Packet Pushers - Full Podcast Feed
IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Apr 21, 2022 38:29


In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more. The post IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab

Packet Pushers - Fat Pipe

Play Episode Listen Later Apr 21, 2022 38:29


In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more. The post IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab

Packet Pushers - Fat Pipe

Play Episode Listen Later Apr 21, 2022 38:29


In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more.

Packet Pushers - IPv6 Buzz
IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Apr 21, 2022 38:29


In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more. The post IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab appeared first on Packet Pushers.

Packet Pushers - IPv6 Buzz
IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Apr 21, 2022 38:29


In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more.

OMT Magazin
OMT Magazin #254 | Proof of Concept (PoC) im Digitalen Marketing (Christian Rainer & Kim Rosengarten)

OMT Magazin

Play Episode Listen Later Dec 22, 2021 44:59


Wed, 22 Dec 2021 14:50:54 +0000 https://omt-magazin.podigee.io/9038-neue-episode 0d6cbe108f0527e741edd61f895d9013 ℹ️ Christian Rainer ℹ️ Kim Rosengarten ℹ️ OMT Webinare 9038 full no Proof of Concept,OMT,Digitales Marketing,POC Mario Jung, Christian Rainer, Kim Rosengarten

Mittelstand 4.0-Kompetenzzentrum Bremen
KI - Folge 4 – Abholzeitpunkt eines Containers vorhersagen

Mittelstand 4.0-Kompetenzzentrum Bremen

Play Episode Listen Later Jul 2, 2021 34:32


Das Planen der Abholung eines Containers vom Containerterminal wäre eigentlich ganz einfach – wenn man denn wüsste, wann er zu Abholung verfügbar ist. Selbst die Ankunftszeit eines Schiffes ist hierfür jedoch nur ein grober Anhaltspunkt. Verschiedene Prozesse zwischen dem Anlegen des Schiffes und der Abholung des Containers erschweren die Vorhersage des Zeitpunktes, an dem der Container zum Abtransport freigegeben wird. In dieser Folge erfahren Sie, wie durch den Einsatz von KI die Vorhersage des Abholungszeitpunktes verbessert wird. Hierzu stellen wir eine grundsätzliche Vorgehensweise bei KI-Projekten vor und diskutieren über Begriffe wie Proof-of-Concept (PoC), Prototypen und Industrialisierung. Einige Tipps, wie ein KI-Projekt im Unternehmen die notwendige Unterstützung des Managements erhalten kann, sind in dieser Podcast-Folge ebenfalls enthalten.

Digital Transformation: Surviving the new normal
Proof of Concept (POC), a recipe for digital transformation success

Digital Transformation: Surviving the new normal

Play Episode Listen Later Mar 8, 2021 12:21


In today's world of endless promises from technology providers, a PoC or pilot represents one sure way to make sure that digitally transforming companies are investing in the right technology to improve the chance of ripping the expected returns

Tech Driven Business
SAC Journey - Getting Quick Value from SAP Analytics Cloud

Tech Driven Business

Play Episode Listen Later Dec 22, 2020 18:48


I continue my SAP Analytic Cloud (SAC) discussion with Hau Ngo of Summerline Analytics. In this episode we dive deeper into how you can get quick value from SAC. Listen in as we discuss the value of doing a Proof of Concept (POC) and understanding how different backend systems effects SAC.  Hau has built analytical applications, dashboards, and reports for many Fortune 500 companies that run on the SAP Platform. With 20 years of experience, customers often ask him for his help in delivering supply chain analytics.  Connect on LinkedIn:  Hau Ngo,  Mustansir Saifuddin,  Innovative Solution Partners. Or learn more about Innovative Solution Partners

DAM Evangelist by Ulrich Leidl
Agile DAM Evaluierung Teil 3

DAM Evangelist by Ulrich Leidl

Play Episode Listen Later Dec 17, 2020 11:36


In diesem Podcast dreht sich alles um die richtige Methode zur Auswahl eines Digital Asset Management Systems für ihr Unternehmen. Das Verfahren, das ich ihnen hier vorstelle bedient sich Methoden aus dem agilem Umfeld. Es ist schnell, effizient und sicher und kann natürlich auch auf den Evaluierungsprozess für jede andere Softwarelösung angewendet werden. Im dritten Schritt des Evaluierungsprozesses gehen sie mit ihrem favorisierten Partner in den Proof of Concept (PoC)

IOTtoday
“BleedingTooth”: a rischio PC, router e dispositivi IoT

IOTtoday

Play Episode Listen Later Dec 9, 2020 4:10


Secondo il team di sicurezza di Google, “le potenziali vulnerabilità di sicurezza nello stack Bluetooth di Linux (CVE-2020-12351, CVE-2020-12352, CVE-2020-24490) possono consentire l'escalation dei privilegi o la divulgazione di informazioni”. Buona norma è sempre rifiutare richieste di connessione BT da fonti sconosciute e mantenere disattivato il Bluetooth se non è in uso È stata nominata “BleedingTooth” la serie di vulnerabilità “zero- click” individuata nello stack Bluetooth di Linux (CVE-2020-12351, CVE-2020-12352, CVE-2020-24490) e che è risultata responsabile dell'esposizione i PC con sistema operativo Linux e una gran quantità di modelli di router e dispositivi IoT ad attacchi cyber. Al proposito, i ricercatori di sicurezza di Google hanno dichiarato che “le potenziali vulnerabilità di sicurezza in BlueZ possono consentire l'escalation dei privilegi o la divulgazione di informazioni. BlueZ sta per rilasciare correzioni del kernel Linux per affrontare queste potenziali vulnerabilità”. In cosa consiste effettivamente la minaccia “BleedingTooth”? Nel testo del comunicato emesso da Google si legge inoltre che “un utente malintenzionato remoto a breve distanza che conosce l'indirizzo BD_ADDR (Bluetooth Device Address) della vittima può inviare un pacchetto l2cap dannoso e causare la negazione del servizio o eventualmente l'esecuzione di codice arbitrario con privilegi del kernel”. Il rischio interessa il kernel Linux 4.8 e le versioni successive, ma può essere riscontrato anche nello stack del protocollo BlueZ open source comunemente in uso nei sistemi operativi Linux per PC, su alcuni dispositivi IoT e router. E anche i chip Bluetooth dannosi possono attivare la vulnerabilità. Nel recente Proof of Concept (POC), effettuato su un sistema Ubuntu 20.04 (LTS) e pubblicato su GitHub, il team di sicurezza di Google dimostra come un pacchetto Bluetooth malevolo, messo a punto appositamente, possa scatenare un “kernel panic” (analogo alla schermata di errore blu dei sistemi Windows) capace di mandare in totale caos il protocollo L2CAP (Logical link control and adaptation protocol) e la struttura dati heap. Il rischio è grave (Intel), ma tutelarsi è possibile Tra le molte individuate, la più rischiosa vulnerabilità riguarda la CVE-2020-12351 (con un punteggio CVSS di 8,3 su 10): dopo aver analizzato la documentazione raccolta Andy Nguyen, ingegnere di sicurezza, Intel ha definito “grave” il rischio legato al bug di sicurezza, invitando contestualmente tutti i gestori di sistemi Linux ad effettuare prima possibile l'aggiornamento a una diversa versione (la prima versione Linux che risulterebbe sicura è la 5.9). Chiunque nel raggio del segnale Bluetooth può ottenere, grazie alla falla, l'accesso root a qualsiasi prodotto, anche un dispositivo IoT, che esegue BlueZ. “BleedingTooth è un insieme di vulnerabilità a zero-click nel sottosistema Bluetooth di Linux- ha spiegato Nuguyen – che può permettere a un aggressore remoto non autenticato a breve distanza di eseguire codice arbitrario con privilegi del kernel su dispositivi vulnerabili”, quelli cioè che utilizzano un kernel Linux dalla versione 2.4.6 in poi. Sebbene per sfruttare la vulnerabilità sia necessario trovarsi in prossimità di un dispositivo Linux vulnerabile per sfruttare il bug BleedingTooth, e sebbene al momento non sarebbero ancora emersi attacchi informatici che hanno sfruttato tale vulnerabilità, conviene sempre rifiutare richieste di connessione BT da fonti sconosciute e mantenere disattivato il Bluetooth se non è in uso.

KREATION
#4 KREATION af en tech startup - Obital

KREATION

Play Episode Listen Later Dec 17, 2019 105:13


En startup er ofte en meget kompleks og kringlet process og derfor dykker vi helt ned og kigger på processen under en loop i dette afsnit. Vi snakker blandt andet interaktionsteknologi, Software Development Kit (SDK) og innovation. Men vigtigst af alt snakker vi iværksætteri: Fra hvordan en ide starter, til Proof of Concept (POC), til prototype, til Minimal Viable Product (MPV), til pitch konkurrencer, oprettelse af CVR nummer, pre-seed funding, VC funding, Business Angel funding…Elias og Frederik er eksempler på unge succesfulde iværksættere på deres første rejse som har oplevet både successer og pitfalls, som på 2 år er gået fra et skoleprojekt til at rejse funding i millionklassen og nu driver en startup med flere ansatte hvor fokus konstant er på vækst.Hvis du har interesse i at lære om iværksætteri helt tæt på og hvordan man kan skabe en succesfuld virksomhed, så kan jeg love dig at der er mange guldkorn at finde i denne samtale.Velkommen til KREATION. 00:20 Velkommen til Elias og Fredrik fra Obital00:50 Pitch: Hvad er Obital?03:01 Roller i en startup06:45 Starten af Obital11:10 At finde et hul i markedet12:00 Market Pull eller Technology Push14:00 Radical Innovation eller Incremental Innovation14:30 Findes der originale ideer?15:30 Hvornår beslutter man at blive fuldtidsiværksætter?20:00 Seeing is believing21:30 Fra ide til prototype til Proof of Concept24:40 Første pitfall: første investering27:20 Hvordan lander man sin første funding? Innovationsfoden’s InnoBooster32:30 Næste step: Marked validering?36:00 Hvad er et pilotprojekt?41:30 Involver brugerne hurtigst muligt43:00 Det handler ikke om ideen men om eksekveringen44:40 At sælge til det offentlige?46:55 Hvad gør man efter sin første funding på 500.000 DKK?49:00 Første ansatte51:30 Hvilke slags investeringer findes der for startups?53:00 Hvilken slags investering skal man vælge?57:00 At lande sin første rigtige investering? (pre-seed)59:00 Tilgå investering som dating01:01:00 At blive en dygtig iværksætter01:04:30 Hvor lang tid tager det at rejse penge?01:07:15 Hvad er en konvertibel note?01:09:00 Vigtigheden af at finde den helt rette første investor01:12:30 Hvordan bruger man tiden mest optimalt som early stage?01:16:00 Man må gerne sige nej til penge!01:21:10 Vær strategisk omkring timing af funding01:23:45 Hvad har gjort Obital til en succesfuld case?01:29:15 Hvornår skal man lancere sin første version af sit produkt?01:33:20 Software Development Kit (SDK) (Unity Modellen)01:34:30 Hvad kan man bruge eye tracking til?01:40:00 Fremtiden for interaktionsteknologi

Le Business Club de France des Entrepreneurs
Business Club de France TV S2019 E15 : Iliès Zaoui - Conscience Robotic

Le Business Club de France des Entrepreneurs

Play Episode Listen Later Oct 19, 2019 13:04


Notre invité cette semaine  : ILIÈS ZAOUI ​Le Président Fondateur de Conscience Robotics dont le siège est à Caen est notre invité. L'entreprise est spécialisée dans "l'optimisation" des robots. De tous les robots. Leur objectif : rendre ces machines plus intelligentes et plus "vivantes".  Comment rendre un robot plus intelligent ? Le robot peut-il devenir plus intelligent que l'humain ? Une émission très humaine et riche en information sur l'évolution des robots dans notre société.  ​MEDIATION : La "Preuve de Concept" (POC)  avec Pierre Pelouzet ​Une émission présentée par Michel PICOT

Industrial IoT Spotlight
EP042: How to Deploy Transformative IIoT Solutions at Scale – An Interview with Jeff Miller of PTC

Industrial IoT Spotlight

Play Episode Listen Later Nov 1, 2018 32:25


*This episode of the Industrial IoT Spotlight podcast is sponsored by PTC In this episode, we discuss pilot purgatory in industrial IoT deployments and how to build scalable IIoT solutions. What is the difference between proof-of-concept (POC) and proof-of-value (POV)? What are the 6 steps to IoT deployment success? What are the 3 essential components for building a successful IoT use case? Jeff Miller is the Vice President of Advisory Services at PTC. The Advisory Services practice delivers pragmatic, actionable, success-focused advice that leverages PTC's industry leadership in IoT technologies and business solutions. PTC’s leading industrial innovation platform and solutions turn Industry 4.0 possibility into reality. Learn more about how to avoid pilot purgatory with the on-demand webinar, Use Cases: The Secret to Success in IIoT   Key Takeaways: Proof of Concept (POC) is the proof that the technology will work technically in the existing organizational infrastructure and processes. Proof of Value (POV) is the conclusion that problems have been addressed and value has been created and measured. The gap between the POC and POV is the root cause of pilot purgatory scenario in which pilots fail to scale into organization-wide implementation. There are 6 steps to successfully implementing IoT, and it is important that these steps are done in order: Business strategy alignment Feasibility check, both technologically and culturally Technology alignment, the POC Use case identification Roadmap building Value measurement, the POV There are 3 critical components to successfully build a use case: Valuable: the problem that is solved has to be a real business problem Scalable and transferrable: technologies have to be crafted in a way that is meant to be scalable and transferrable from the beginning of the project Measurable: metrics should be agreed upon by all stakeholders and measure value created   Accelerating the Industrial Internet of Things. IoT ONE is an insights and advisory firm focused on helping companies manage the threats and opportunities presented by the Internet of Things.https://www.iotone.com  

CIO Talk Network Podcast
IoT : From POC to Profits

CIO Talk Network Podcast

Play Episode Listen Later Sep 13, 2017 53:36


Guest : Peter Ambs Title : CIO, City of Albuquerque The Analysts are predicting the rewards of adopting IoT to be over Trillion Dollars. But most organizations are struggling to justify investments beyond Proof of Concept (POC). Some don’t have enough use cases for monetization. Others report that the changes required to embrace IoT are too expensive and complicated. What would it take to get from POC to Profits?

Tech for Good
POC21

Tech for Good

Play Episode Listen Later Dec 23, 2016 31:03


The annual UN Climate Change Conference of Parties (COP) will be held in Paris this year, it’s the 21st UN Climate Summit and this year they (once again) hope to come to a new international agreement to minimise global warming. Feeling deluded by the failed attempts at agreeing on very much over 20 years – in which time C02 emissions have doubled – instead of a COP, OuiShare and Open State banded together to propose a different type of meeting, a Proof of Concept (POC): “a proof of concept of the disruptive impact that collaborative production, open source and the maker movement can have on mainstreaming the means of sustainable living."

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com
Podcast: SAP HANA TechEd Stories to Watch (and Skills Convo) with Vijay Vijayasankar + Harald Reiter

SAP and Enterprise Trends Podcasts from Jon Reed (@jonerp) of diginomica.com

Play Episode Listen Later Sep 6, 2011 49:36


During this 50 minute podcast, you'll hear SAP Mentors Vijay Vijayasankar and Harald Reiter give you their tips for getting the best HANA content in TechEd Las Vegas. The informal discussion then moves into the key news stories that might unfold at TechEd surrounding HANA, with the usual opinionated takes and views from the field. The last half of the podcast is an in-depth discussion of HANA skills issues based on what Harald and Vijay are learning from their work on HANA Proof of Concept (POC) projects.