Person who maintains and operates a computer system or computer network
POPULARITY
For the past 10 years Anton has been working at Booking.com - one of the leading digital travel companies based out of Amsterdam. The journey that started as System Administrator has led Anton to be an Engineering Manager for Site Reliability where over the past 3 years he led the rollout and adoption of OpenTelemetry as the standard for getting observability into new cloud native deployments.Tune in and learn how Anton saw R&D grow from 300 to 2000, why they replaced their home-grown Perl-based Observability Framework with OpenTelemetry, how they tackle adoption challenges and how they extend and contribute back to the open source communityLinks we discussed:Anton's LinkedIn Profile: https://www.linkedin.com/in/antontimofieiev/Observability & SRE Summit: https://www.iqpc.com/events-observability-sre-summit/speakers/anton-timofieievOpenTelemetry: https://opentelemetry.io/
Trecentododicesima puntata della trasmissione “Generazioni Mobili” di Radio 24, il primo “passaporto radiofonico valido per l’espatrio”.In questa puntata:- Federico Fabiani, fondatore di “Scambi Europei”, ci elenca le ultimissime e concrete opportunità di studio, stage e lavoro in Europa e nell’UE;- Simone Nava, 49enne System Administrator di stanza in Svizzera, nei pressi di Zurigo, ci spiega come approdare nella Confederazione Elvetica per lavorare nel settore IT. O, più in generale, quali sono i settori professionali più attrattivi nel Paese per profili qualificati - ospite in onda Riccardo Santoni, software engineer al lavoro negli Stati Uniti;- Alessio Romeo, Digital Innovator e HR Startup Inventor, ci porta a scoprire i trend lavorativi e le migliori offerte di impiego in Europa e nel mondo;- nella rubrica “Expats Social Club” prosegue la serie di pillole informative, dedicate a consigli pratici e di orientamento su studio-tirocinio-lavoro all’estero. Oggi con l’agenzia Erasmus Indire vi spieghiamo come approfittare delle opportunità offerte dal più importante programma di mobilità UE già prima dell’università.CONNETTITI CON "GENERAZIONI MOBILI""Studiate/lavorate/siete imprenditori all'estero? Siete junior o senior? Avete una storia da raccontare e consigli preziosi da dare per cogliere opportunità oltreconfine, sfruttando le occasioni di mobilità internazionale? Scrivete a: generazionimobili@radio24.itOppure, avete domande da porre su come studiare/fare stage/lavorare/avviare start-up all'estero? Inviatele a: generazionimobili@radio24.itInfine, avete un sito/blog all'estero, nel quale fornite consigli pratici su come trasferirsi nel vostro attuale Paese di residenza? O avete scritto un libro su questo tema? Segnalateci tutto, sempre a: generazionimobili@radio24.it
AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
Mind blowing: I used NotebookLM to generate a podcast of my resume. Check it out.This text is a resume for Etienne Noumen, a Technical Lead and Solutions Architect with extensive experience in data engineering, DevOps, and mobile app development. He holds a Bachelor of Software Engineering and has worked at various companies, including TC Energy and Alberta Transportation, taking on roles such as DevOps Engineer, System Administrator, and Software Release Engineer. His resume highlights his expertise in various technologies, including cloud platforms (AWS, Azure, GCP), databases, containerization, DevOps tools, and programming languages. He is also an active volunteer, coaching soccer and developing educational mobile apps.----For those who aren't using Google NotebookLM, you are missing out. In a nutshell it lets up upload up to 100 docs each up to 200,000 words and generate summaries, quizes, etc. You can interrogate the documents and find out key details. That alone is cool, but TODAY they released a mind blowing enhancement.Google NotebookLM can now generate podcasts (with a male and female host) from your Documents and Web Pages!Try it by going to NotebookLM.google.com uploading your resume or any other document or pointing it to a website. Then click * Notebook Guide to the right of the input field and select Generate under Audio Overview. It takes a few minutes but it will generate a podcast about your documents! It is amazing!!Source: http://notebooklm.google.com/-----Set yourself up for promotion or get a better job by Acing the AWS Certified Data Engineer Associate Exam (DEA-C01) with the book or App below:Google at https://play.google.com/store/books/details?id=lzgPEQAAQBAJApple at https://books.apple.com/ca/book/ace-the-aws-certified-data-engineer-associate/id650457218iOs App at https://apps.apple.com/ca/app/ace-the-aws-data-engineer-exam/id6566170013
SECURITY MEASURESWhat security measures do you have in place to protect your email messages?We assume our emails are secure. But what if they're not? How do we make sure our messages stay confidential?Those are a few of the topics we'll explore with our cybersecurity expert, Stephen Jordan, when we come back.What You'll Discover About Security Measures:* Why the security measures of email addresses provided by domain name providers are not enough* 5 easy protocols you can configure right now that can improve email security measures* Where to get the biggest return on investment in adding security measures to your email* How to find a cybersecurity expert you can trust* And much more.Guest: Stephen JordanStephen has spent over 33 years providing computer related products and services to small businesses, working as a Technician, System Administrator, System Engineer, and I.T. Manager, with 30 of those years running his own business.Stephen experienced the evolution of the industry as it changed from being the sales driven computer industry, to the more balanced sales and service I.T. industry, and then to the managed services industry, and has seen many new industries created, including cybersecurity.Stephen sold his I.T. and managed services business in October of 2021 so he could just focus on matters of cybersecurity for small businesses, which brought him to start his latest business venture called Sound Cybersecurity.Related Resources:If you liked this interview, you might also enjoy our other Risk Management episodes.Contact Stephen and connect with him on LinkedIn. And check out his informative blog.Join, Rate and Review:Rating and reviewing the show helps us grow our audience and allows us to bring you more of the rich information you need to succeed from our high powered guests. Leave a review at Lovethepodcast.com/BusinessConfidential.Joining the Business Confidential Now family is easy and lets you have instant access to the latest tactics, strategies and tips to make your business more successful.Follow on your favorite podcast app here as well as on Facebook, YouTube, and LinkedIn.Download ♥ Follow ♥ Listen ♥ Learn ♥ Share ♥ Review ♥ Comment ♥ Enjoy
Welcome to the Heroes of IT podcast, hosted by Automox's Ashley Smith. In this podcast, Ashley interviews IT heroes ready to share their insights, successes, challenges, and stories from the field. Join us as we talk endpoint management tips and tricks, how to overcome hurdles, and celebrate IT heroes' contributions to modern technology. Show Links:Zac's Recommendations: Sysadmin subreddit: https://www.reddit.com/r/sysadmin/John Hammond Youtube Channel: https://www.youtube.com/@_JohnHammondGerald Auger Youtube Channel: https://www.youtube.com/c/geraldauger
Join us as we explore the world of DevSecOps with seasoned expert Josh Abrahamsen as your guide. Learn about Josh's journey from System Administrator to Quality Assurance specialist and uncover the importance of atomic and autonomous testing. Dive into Josh's extensive knowledge of the Software Development Lifecycle (SDLC), including git branching and DevOps pipelines.Discover practical demonstrations as Josh dockerizes a 'hello, world' Python app and shares essential tools like Selenium. Gain insights into common DevSecOps mistakes and explore topics such as CI/CD and security testing using JFrog Artifactory.Don't miss out on learning about the intricacies of DB connections and stored procedures for test data creation. Stick around till the end to understand how vulnerabilities are identified and managed in application development. Subscribe now for valuable insights into DevSecOps!CONNECT WITH JOSH ABRAHAMSEN
Join hosts RobbieTheWagner and Charles William Carpenter III as they welcome Jeff Cronstrom, a DNS specialist with experience dating back to the 90s and the founder of CloudfloorDNS. In this episode, they dig into the ins and outs of managed DNS, the benefits it provides, and the distinguishing features of CloudfloorDNS. The hosts also engage in lively discussions about technology, touching on various topics such as PHP, Python, DevOps, and the role of DNS in web development. Alongside the tech talk, the episode features a whiskey tasting session with Fort Hamilton rye whiskey. Key Takeaways [01:45] - Whiskey Tasting and Discussion [11:00] - Hot Takes on Tech Topics [27:07] - Deep Dive into CloudFloorDNS [31:41] - Web Application Firewall and Cloudflare [32:02] - Domain Registrations and DNS [32:27] - Google's Shift from Domain Registration [33:53] - Roles in Tech: Network Engineer, System Administrator, and More [35:32] - The Rise of DevOps and DevSecOps [36:28] - The Importance of Security in Development [36:59] - Patch Tuesdays and Software Updates [39:05] - The Syntax Podcast and Sentry.io [39:49] - The Microsoft Debate [42:59] - Boating and Fishing Adventures [48:50] - The Phoenix Lights Mystery [52:11] - Homemade Drink Smoker and Carpentry Skills [54:02] - The Simulation Theory and Solar Flares [53:30] - Choose Your Own Adventure Website Idea [55:30] - Closing Remarks and CloudfloorDNS Plug Links Jeff Cronstrom Twitter Jeff Cronstrom LinkedIn CloudfloorDNS Connect with our hosts Robbie Wagner Chuck Carpenter Subscribe and stay in touch Apple Podcasts Spotify Google Podcasts Whiskey Web and Whatnot Whiskey Web and Whatnot Merch Enjoying the podcast and want us to make more? Help support us by picking up some of our fresh merch at https://whiskey.fund/. --- Send in a voice message: https://podcasters.spotify.com/pod/show/whiskey-web-and-whatnot/message
Today I am interviewing Tegora, an L3 System Administrator & Senior Technical Leader with technical responsibilities for Networking/Linux/HPC. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. While this time I had his volume level closer to mine, the music wasn't low enough in some parts. I make sure it is lower on future recordings Tegora became fascinated with computers at an early age, funded his education enlisting in the Army, pursued and obtained multiple degrees, taught and then pivoting into a career in IT. He has an excellent point of view regarding work effort, stepping out of your comfort zone and shares excellent tips on getting started on your path and interviewing. Also, I send people I interview a list of questions to answer, and Tegora did that, offering well thought and candid answers. Find the document linked on the episode page on my Github. This is a little longer than my normal format so feel free to speed it up. Thank you for listening and enjoy. https://www.twitch.tv/b7h30 https://linktr.ee/b7h30 Music by Chillhop Music: https://chillhop.ffm.to/creatorcred Help support the stream by using my Affiliate links - https://theo2612.github.io/7h30-amazon-affiliate-links/ --- Send in a voice message: https://podcasters.spotify.com/pod/show/usbog/message
The Biden administration's executive order on transforming customer experience (CX) put people at the center of everything government does. To rethink government service delivery and create lasting change, agencies must take a holistic view, spanning financial, human resources, legal, data, and technology teams; empower employees; create seamless workflows; and more. Join this session to gain variety of perspectives on CX best practices and learn how one agency built constituent trust through efficiencies and transparency using Public Sector Digital Services from ServiceNow.Featured Speakers: • Ron Vickery, Senior Sales Leader, ServiceNow • Maria Bertucci, System Administrator, National Finance Center, Department of Agriculture• Doug Freeman Director of Customer Experience & Human-Centered Design, Department of Commerce • Pamela Scruggs ePermits Program Lead, U.S. Fish and Wildlife Service See video recording here: link to YouTubeSee omnystudio.com/listener for privacy information.
The Biden administration's executive order on transforming customer experience (CX) put people at the center of everything government does. To rethink government service delivery and create lasting change, agencies must take a holistic view, spanning financial, human resources, legal, data, and technology teams; empower employees; create seamless workflows; and more. Join this session to gain variety of perspectives on CX best practices and learn how one agency built constituent trust through efficiencies and transparency using Public Sector Digital Services from ServiceNow.Featured Speakers: • Ron Vickery, Senior Sales Leader, ServiceNow • Maria Bertucci, System Administrator, National Finance Center, Department of Agriculture• Doug Freeman Director of Customer Experience & Human-Centered Design, Department of Commerce • Pamela Scruggs ePermits Program Lead, U.S. Fish and Wildlife Service See video recording here: link to YouTubeSee omnystudio.com/listener for privacy information.
Guiding international students through account payments can be tricky. With currency exchange rates constantly changing, it can be difficult for students to be confident that they are paying the correct amount. On this episode of FOCUS, Mike Pilman, System Administrator for the Account Receivables Office at Tulane University, joins us to give insight on how Tulane works with TouchNet and TransferMate to simplify payments for international students while improving administrative processes for their staff and protecting the institution against fraud. . Tulane University Tulane University was founded in 1834 in New Orleans as the Medical College of Louisiana. Today, the university is a private research institution with 14,500 students across ten undergraduate, graduate, and professional schools. Ten percent of the school's population are international, coming from 90 countries. Pilman says that the institution is looking to expand its international population, particularly in graduate degree programs. Issues with cross-border payments With so many international students from so many different countries, the common issues with international payments added up for Tulane. . Students are not only unfamiliar with U.S. banking systems, but also with calculating currency exchange rates with ever changing market rates. This led to incorrect payment amounts, delayed payments, and payments with no student account information included. The combination of issues left a lot of work for accounts receivables to manually fix. Tulane needed a solution to automate their processes and found it in TransferMate. TransferMate Tulane first began working with TransferMate 11 years ago to support cross-border payments which helped tremendously with backend reconciliation. But it wasn't until they transitioned to using the integration between TransferMate and TouchNet that they saw the biggest change. Through this integration, students are able to initiate payments with TransferMate directly in their Student Account Center. The embedded solution includes a currency exchange calculator that converts the student's payment amount from US dollars to the equivalent in their local currency. The student completes the details of the transaction within their account and then pays TransferMate according to instructions provided. TransferMate then handles all the details of the currency exchange, cash clearing, and the transmission of payment directly to Tulane. Students are able to access their account at any time to check the status of their payment and TransferMate offers 24/7 customer service. Campus adoption Using TransferMate is now the preferred payment option for international students at Tulane. The embedded solution is easily adopted by students, which Pilman attributes to the integration with TouchNet Payment Center. “Having it [TransferMate] embedded in the billing and payments portal, that really was the biggest factor,” says Pilman. Tulane also provides general advice on TransferMate on their payment options webpage, which is listed on the Student Accounts Receivable and Office of International Students websites. They also talk to students about it during orientation to make sure every international student knows about it. Helping more than just students Aside from international students, TransferMate alleviated many stressors for the accounts receivable staff. Before, staff had to manually alter accounts with any issues. Now, problems with balances and reconciliation are automatically updated with TransferMate, giving staff more time to focus on student needs. With TransferMate, the need for students to use bank wires has decreased significantly, which has strengthened Tulane's cybersecurity.. Previously, the institution had their bank wire information on their website for international students to use, leaving Tulane open to bad actors. They still offer wire transfers to students, but only need to give out their bank wire information upon request. Simplifying international payments In parting advice, Pilman recounts the benefit of going to higher education conferences and learning from other institutions who can serve as a model for your school. He believes that a more universal approach focused on making the payment process as easy as possible for students and payers is the first step in creating new paths for payments. Special Guest: Mike Pilman.
What is an Admin Assist and why we dare to talk about a topic that is not Yoga? In this podcast with Jean-Marc Libs, a System Administrator and Ambassador of Free Libre Open Source Software, we discover the similarities between Yoga which means 'Union' and the use of Open Web Communities like daniel's Tiki.org presence in this ecosystem and his use of that WIKI technology for all of his presence on the web. Is the FLOSS concept transferable from the Highly advanced Technological tool like Tiki.org versus the Yoga World? It is for you to discover. Plus, Jean-Marc expresses his thought about the exponential growth of data vis the intelligence behind it's use such as AI.
In this insightful video, we discuss the career progression in the tech industry, specifically focusing on transitioning from a system administrator role to other exciting opportunities. Our guest shares their experiences and insights, emphasizing the importance of research, networking, and staying true to one's passions. They provide valuable advice on how to navigate the tech career path, explore different roles such as cybersecurity, engineering, and development, and make informed decisions to achieve career growth and fulfillment. Join us for an engaging discussion on expanding your horizons in the tech industry.Instagram: https://www.instagram.com/heistorien/Let us know what questions you want us to ask our future tech guests and what kind of guests we should interview.Got any questions? Click Here To Check Out ALL Recommended Bootcamps, Discounts & FAQshttps://direct.me/imjustcyrusHere are the 2 bootcamps we most recommend! 1. Careerist (the bootcamp I chose) These courses are 4 weeks long, virtual and are 8pm - 10:30pm Sun- Thur (Eastern). They record their classes In case you miss any. They are not partnered with tech companies, but they fix your resume & LinkedIn to industry standards and they assist you with finding jobs to apply to - in order to help set you up on interviews. They also do interview coaching & provide really good interview cheat sheets. They're about $4k, but I have a $300 discount link that you use with their sales too! The discount Is attached to the link automatically.Careerist Discount Link: https://crst.co/cyrus2. CourseCareers is self paced. You can finish it in 3 weeks or 3 months. They offer tech sales roles only & are partnered with tech companies, so they're usually able to get you a tech career quickly or a paid internship (up to $21/hr) while you wait to get hired on. They only offer courses for people in North America. They're just $449 with my discount code that gives you $50 off! Discount Code: Cyrus50CourseCareers Website Here
Link to Blog Post This week's Cyber Security Headlines – Week in Review, July 17-21, is hosted by Rich Stroffolino with our guest, Dimitri van Zantvliet, CISO, Dutch Railways Thanks to our show sponsor, OpenVPN According to Oriel Hernan Villalba Pinzetta, a System Administrator with CEDEC's cybersecurity and IT department, “The pandemic meant we could not come to the office, and we needed to facilitate access to our local resources,” says Villalba. “Cloud Connexa was really easy and fast to set up, two things we really needed in that moment.” Read more here. All links and the video of this episode can be found on CISO Series.com
New P2PInfect worm targeting Redis servers on Linux and Windows systems Adobe releases new patches for exploited ColdFusion vulnerabilities Estée Lauder breached by two ransomware groups And now a word from our sponsor, OpenVPN According to Oriel Hernan Villalba Pinzetta, a System Administrator with CEDEC's cybersecurity and IT department, “The pandemic meant we could not come to the office, and we needed to facilitate access to our local resources,” says Villalba. “Cloud Connexa was really easy and fast to set up, two things we really needed in that moment.” Read more at the link in our show notes. For the stories behind the headlines, head to CISOseries.com.
In this episode, we delve into the importance of patience and finding your own success, especially in the social media age. Our guest, Torien Smith, a system administrator in the tech industry and a trading mentor, shares his insights and experiences. From his background at Apple to his current roles, Torien discusses the impact of patience and leveraging his tech career for financial growth. Join us for an insightful conversation and discover the path to success in today's digital world.Instagram: https://www.instagram.com/heistorien/Let us know what questions you want us to ask our future tech guests and what kind of guests we should interview.Got any questions? Click Here To Check Out ALL Recommended Bootcamps, Discounts & FAQshttps://direct.me/imjustcyrusHere are the 2 bootcamps we most recommend! 1. Careerist (the bootcamp I chose) These courses are 4 weeks long, virtual and are 8pm - 10:30pm Sun- Thur (Eastern). They record their classes In case you miss any. They are not partnered with tech companies, but they fix your resume & LinkedIn to industry standards and they assist you with finding jobs to apply to - in order to help set you up on interviews. They also do interview coaching & provide really good interview cheat sheets. They're about $4k, but I have a $300 discount link that you use with their sales too! The discount Is attached to the link automatically.Careerist Discount Link: https://crst.co/cyrus2. CourseCareers is self paced. You can finish it in 3 weeks or 3 months. They offer tech sales roles only & are partnered with tech companies, so they're usually able to get you a tech career quickly or a paid internship (up to $21/hr) while you wait to get hired on. They only offer courses for people in North America. They're just $449 with my discount code that gives you $50 off! Discount Code: Cyrus50CourseCareers Website Here
Network Administrators are the IT professionals responsible for maintaining and troubleshooting computer networks to enhance the network's security policies and meet organizational requirements. They have an essential role in maintaining and troubleshooting computer networks to enhance the network's security policies. This comprehensive blog is about the Network Administrator's roles and responsibilities in an organization. Network Administrator's responsibilities Network Administrators are responsible for various network operations, including planning, developing, installing, configuring, maintaining, optimizing, and supporting the network communication links. The responsibilities of a Network Administrator are the following: Analyze the organization's network and system requirements Research and analyze the network devices, protocols, services, and standards to support network activities Install and maintain network servers and operating systems to ensure backup copies of all files are securely stored at a specific location Troubleshoot problems with network devices and perform updates when required Install, configure, and maintain multi-user software on the servers Administer and maintain end-user accounts, authentication, and permission rights Install, configure, and maintain network communications and other networking devices such as hubs, switches, and UPS Maintain and perform the necessary needs of all network-connected devices Manage security solutions, such as anti-virus, firewall, and intrusion detection systems Install the software, hardware, and other devices to meet the organization's network requirements Guide the System Administrator in the maintenance of the VOIP system View More: Roles and Responsibilities of a Network Administrator
Business e IT: un'infinita storia di amore e odio.Quali sono gli approcci migliori per eliminare tutti gli ostacoli e creare un rapporto di collaborazione tra questi due team? Durante questo CTO Lunch ne abbiamo parlato con Alberto Marchinelli, IT Country Coordinator & System Administrator di GFT Technologies.Scopri come trovare il responsabile tecnologico perfetto che fa gli interessi della tua azienda o startup e non ti fa sentire stupido come i soliti nerd, anche se non hai competenze tecniche e al costo giusto => https://cometrovareilcto.com
Come si fa a offrire ai propri utenti un servizio perfetto? È davvero possibile o stiamo parlando di utopia? È possibile, ma non semplice!Per farlo è necessario che i team di IT, Corporate e Business si fondano in un'unica anima, collaborando e condividendo continuamente visioni sul prodotto e sui processi.Durante questo CTO Show insieme a Alberto Marchinelli, IT Country Coordinator & System Administrator di GFT Technologies, ho parlato di: ✔️ Migliorare il servizio offerto, dalla percezione alla qualità; ✔️ Come misurare il servizio offerto; ✔️ Elementi pratici da implementare.
Dual Career Ladder: come strutturarla al meglio tenendo conto di responsabilità, retribuzione, spazio e ruolo? E come evitare i principali rischi, come quello del burnout dei manager? Durante questo CTO Lunch ne abbiamo parlato con Alessandro Lai, Engineering Manager di Facile.it, che ci ha illustrato le strategie e gli strumenti utilizzati nel corso della sua esperienza. Ringraziamo della partecipazione: Alessandro Lai (Engineering Manager di Facile.it), Giovanni Paolo Scioni (Pod Lead & System Administrator di Axelerant).Scopri come trovare il responsabile tecnologico perfetto che fa gli interessi della tua azienda o startup e non ti fa sentire stupido come i soliti nerd, anche se non hai competenze tecniche e al costo giusto => https://cometrovareilcto.com
When it comes to cloud computing security, it influences four areas of governance and risk management, which are the primary cloud administrative concerns: Governance (which includes policy, process, and internal controls), Enterprise Risk Management (includes auditing part of the enterprise), Information Risk Management (managing the risk to the IT), and Information Security (rules and practice to secure information). For more details or free demo with out expert write into us at sales@infosectrain.com #cloudcomputing #cloudsystemadministrator #cloudsystemadministratorcertification #cloudsystemadministratorresponsibilities #infosectrain Subscribe to our channel to get video updates. Hit the subscribe button above. Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train LinkedIn: https://www.linkedin.com/company/infosec-train/ Instagram: https://www.instagram.com/infosectrain/ Telegram: https://t.me/infosectrains
When it comes to cloud computing security, it influences four areas of governance and risk management, which are the primary cloud administrative concerns: Governance (which includes policy, process, and internal controls), Enterprise Risk Management (includes auditing part of the enterprise), Information Risk Management (managing the risk to the IT), and Information Security (rules and practice to secure information). For more details or free demo with out expert write into us at sales@infosectrain.com Subscribe to our channel to get video updates. Hit the subscribe button above. Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train LinkedIn: https://www.linkedin.com/company/infosec-train/ Instagram: https://www.instagram.com/infosectrain/ Telegram: https://t.me/infosectrains
Identity and Access Management Administrator (IAM Admin) What do they do? You might be surprised that there is a chance you are doing some form of IAM in your job. Patrice lays out what the day in the life of an IAM Admin is like and his journey in the IT Career field. We talk about certification and some of the pros and cons that come with the I.T. job field.
Debito tecnico: un tema sempre molto caldo nel mondo della tecnologia. La metodologia dello Shape Up permette di tenerlo sempre sotto controllo attraverso le due settimane di cooldown successive a quelle di sviluppo. Durante questo CTO Lunch entriamo nel dettaglio di questa metodologia, confrontandoci anche sui migliori modi per monitorare e gestire il debito tecnico. Ne abbiamo parlato con la Community del CTO Mastermind durante questo CTO Lunch. Ospite anche Giuseppe Guglielmetti, Senior Engineering Manager di TheFork.Ringraziamo della partecipazione: Giuseppe Guglielmetti (Senior Engineering Manager di TheFork), Giovanni Paolo Scioni (Pod Lead & System Administrator di Axelerant), Roberto Luberti (AWS Cloud Architect di Overdata Sagl).Scopri come trovare il responsabile tecnologico perfetto che fa gli interessi della tua azienda o startup e non ti fa sentire stupido come i soliti nerd, anche se non hai competenze tecniche e al costo giusto => https://cometrovareilcto.com
Related Links and Guest Info can be found at https://www.augforums.com/episode103
Tre quarti (75%) delle aziende affermano di fornire servizi personalizzati buoni o eccellenti, meno della metà (48%) dei clienti è d'accordo. È necessario comunicare meglio, non di più. Come farlo? Ne abbiamo parlato con la Community del CTO Mastermind durante questo CTO Lunch. Ospite anche Giusj Longo, Senior Solution Engineer di Twilio.Ringraziamo della partecipazione: Giusj Longo (Senior Solution Engineer di Twilio), Roberto Luberti (AWS Cloud Architect di Overdata Sagl), Giovanni Paolo Scioni (Lead Developer & System Administrator di Axelerant)Sei sicuro di star utilizzando correttamente i dati nella tua azienda?Come ha detto più volte Giusj durante questa puntata, molto spesso in azienda si hanno le informazioni, ma non il metodo e la visione per elaborarle correttamente. E così perdiamo l'opportunità di avere preziosi insight di mercato che possono fare la differenza per la nostra offerta. Nei miei vent'anni di esperienza come imprenditore tecnologico mi è capitato più volte di vedere questa situazione. Finché, a un certo punto, ho deciso di costruire io stesso un osservatorio in ambito tecnologico-manageriale. Insieme al mio team di esperti di Axelerant, effettuo ricerche di mercato sulla più grande community italiana di CTO e Leader Tecnologici. Centinaia tra le migliori menti tech italiane con cui sono a diretto contatto ogni giorno, e da cui ricavavo preziosi insight di mercato che concentriamo nel servizio di "Tech Market Research" per i nostri clienti.Per saperne di più contatta un esperto di Axelerant => https://www.axelerant.it
This episode of Conversations with Tech Experts features Christopher Hippensteel, Network and System Administrator at New Resources Companies He joins Experts Exchange CEO Randy Redberg and Director of Operations Thomas Bernal to discuss his experiences at Black Hat in Las Vegas as part of a new EE pilot program. He also breaks down why connecting face-to-face with people is incredibly important for the learning process.
Cosa si intende per Digital Therapeutics e quali sono le differenze con le Life Sciences Apps? Quali sono le tecnologie di sviluppo e le modalità di gestione del team in un settore così complesso? Ne ho parlato con con la Community del CTO Mastermind. Ospite anche Lino Mari, CTO di Healthware International. Buon ascolto!
System Administrators are the heroes we need, and in today's episode of Enterprise Linux Security, we celebrate Sysadmin Day 2022 and the many people that work tirelessly to keep our servers running.
In healthcare, we focus heavily on numbers and metrics, but how do we ensure we are connecting these numbers to real patient outcomes? Goal setting is one of the best ways to make sure your metrics are tied to real results. In this week's podcast, Quint chats with Dr. Cory Robinson and Mary Finley from the Medical University of South Carolina (MUSC) in Charleston, SC, where they have collected some best practices around how to set meaningful goals, tie them to results, and ultimately achieve organizational and operational excellence.Here are some of the things you will learn from this week's podcast:Why a strong goal-setting process is the foundation for organizational excellence and why devoting some time to it is a good investment (MUSC does a goal-setting retreat.)How to make sure you are focused on the right goalsHow to pick which metrics to focus on and how to best weight goalsHow to align and cascade goals across an entire organizationHow to provide support for team members who aren't achieving goalsHow to manage an organizational goal where you might not have direct impactWhen and how you should modify goals mid-yearOrganizations and people thrive where there is clarity and prioritization. A solid goal-setting program helps us know where to focus to achieve the desired outcomes. This dynamic duo from MUSC will show you how to get everyone rowing in the same direction. Dr. Cory Robinson is the System Administrator for Performance, Health Solutions and Health & Wellness for the Medical University of South Carolina (MUSC) Health System and a Faculty Member at the Medical University of South Carolina, College of Health Professions. He is a member of the MUSC Health System and Charleston Division Executive Leadership Teams. He is responsible for the day-to-day operations of vital administrative functions of the health system.Cory completed his undergraduate degree in Biology at Erskine College (Due West, SC) and received both his Master of Health Administration (MHA) and Doctorate of Philosophy in Health and Rehabilitation Science (PhD) from the Medical University of South Carolina (Charleston, SC). He is also a certified Project Management Professional (PMP), Lean Six Sigma Professional, Fellow in the American College of Healthcare Executives (FACHE) and Malcolm Baldrige Quality Award National Examiner. Contact: robinsonco@musc.edu, 843-792-5412Mary Finley is the Director of Performance and Alignment for the Medical University of South Carolina (MUSC), a role she assumed in September 2019. In this role, she oversees the measurement and monitoring performance for the MUSC Health System, which includes goal/ target setting and benchmarking. Finley joined MUSC in June 2009 and has held positions within HR and Analytics. She received her Bachelor of Science in Psychology from Clemson University and her Master of Health Administration from the Medical University of South Carolina. Contact: whitems@musc.edu, 843-792-0317
Terez Spencer, System Administrator at Woolfson Eye Institute, and Dr. Michael Rivers, Sr. Medical Director of Ophthalmology at ModMed, share some tips on how to increase engagement and connections with your patients and discuss how automation can help your practice achieve better work-life balance and reduce burnout. This episode of EyeTalks Radio is presented by ASOA Diamond Strategic Business Partner:
Neben relationalen Datenbanken gibt es noch eine ganz andere Welt: NoSQL.Doch wofür steht eigentlich NoSQL? Kein SQL? Not Only SQL? Was ist eigentlich die Geschichte hinter dem Hype? Warum wurde diese Art von Datenbanken erfunden? Wofür sind diese gut? Folgen NoSQL Datenbank auch dem ACID-Concept? Was ist Eventual Consistency? Und was sind Neo4J, M3, Cassandra, und Memcached für Datenbanken? Eine Episode voller Buzzwords … Hoffen wir auf ein Bingo.Bonus: Warum Wolfgang keinen Manta fährt und ob Andy bald mit einem Ferrari zum einkaufen fährt.Feedback an stehtisch@engineeringkiosk.dev oder via Twitter an https://twitter.com/EngKioskLinksACID: https://de.wikipedia.org/wiki/ACIDBASE: https://db-engines.com/de/article/BASECAP-Theorem: https://de.wikipedia.org/wiki/CAP-TheoremEventual Consistency: https://de.wikipedia.org/wiki/Konsistenz_(Datenspeicherung)#Verteilte_SystemeMichael Stonebraker / The End of an Architectural Era (It's Time for a Complete Rewrite): http://nms.csail.mit.edu/~stavros/pubs/hstore.pdfMongoDB: https://www.mongodb.com/Presto: https://prestodb.io/SAP HANA: https://www.sap.com/germany/products/hana.htmlRedis: https://redis.io/Neo4J: https://neo4j.com/M3: https://m3db.io/InfluxDB: https://www.influxdata.com/VictoriaMetrics: https://victoriametrics.com/Cassandra: https://cassandra.apache.org/Memcached: https://memcached.org/MySQL: https://www.mysql.com/de/MySQL Memcached Plugin: https://dev.mysql.com/doc/refman/5.6/en/innodb-memcached.htmlSprungmarken(00:00:00) Intro(00:00:53) Wolfgangs Auto, Entlastungspaket in Deutschland(00:03:23) Heutiges Thema: NoSQL Datenbanken und CO2-Einsparung durch Datenbank-Optimierungen(00:07:20) Was ist anders zur Episode 19 (Datenbanken) und ist NoSQL überhaupt noch ein Thema?(00:08:39) Was verstehen wir unter dem Begriff NoSQL und woher kommt es eigentlich?(00:15:58) Tip: Für Side Projects besser vertikal anstatt horizontal skalieren(00:16:50) NoSQL: Speziellere Lösungen mit Fokus auf Einfachheit und Benutzerfreundlichkeit(00:18:38) Braucht man heute noch Datenbank-Administratoren (DBA)?(00:21:13) Der Job des klassischen System-Administrator ist weiterhin relevant(00:23:15) Gibt es wirklich keine Datenbank-Schemas in der NoSQL-Welt?(00:27:23) Schema-Lose Möglichkeit in relationalen Datenbanken und Arbeit in die Datenbank oder Software auslagern(00:30:53) NoSQL hat die ACID-Properties aufgeweicht und warum ACID nachteilig für die Skalierung ist(00:33:28) Das NoSQL BASE Akronym(00:36:15) Der Client muss die Datenbank ordentlich nuzten um ACID-Garantien zu bekommen(00:41:35) Was bedeutet eigentlich NoSQL? Kein SQL? Not Only SQL?(00:43:38) Haupt-Speicher Datenbanken und was SAP damit zu tun hat(00:48:02) Was ist Neo4J für eine Datenbank und welcher Use-Case kann damit abgedeckt werden?(00:50:49) Was ist M3 für eine Datenbank und welcher Use-Case kann damit abgedeckt werden?(00:53:06) Was ist Cassandra für eine Datenbank und welcher Use-Case kann damit abgedeckt werden?(00:54:20) Was ist Memcached für eine Datenbank und welcher Use-Case kann damit abgedeckt werden?(00:58:44) OutroHostsWolfgang Gassler (https://twitter.com/schafele)Andy Grunwald (https://twitter.com/andygrunwald)Engineering Kiosk Podcast: Anfragen an stehtisch@engineeringkiosk.dev oder via Twitter an https://twitter.com/EngKiosk
Scanner School - Everything you wanted to know about the Scanner Radio Hobby
What happens when a trunk system fails? Where do the radio users go? How do they communicate? In this session, we'll go over how trunk systems are supposed to work, what happens when they fail, and what can happen if an administrator plans for failure. What You Need To Know I was able to watch our new P25 system fail several months after it was populated with radios and users These users were part of the county police system and they needed to fall back to cell phone communications while the system was offline Trunk systems are a pool of frequencies with group of users called Talk Groups All radios on the system listen to the control channel, which acts as a director, and tells all users what frequencies to go to and when to go. What happens when that controller fails? If the radio fails, we would have the alternative control channels kick in and resume control of the system. The entire site could go offline or become an island site Or we can have full loss of all trunking, and this is called Failsoft in a Motorola systems When we are in fail soft mode, a system acts as a conventional repeater system Radios are assigned a home frequency based on the talk group they are currently using. The trunk system will send out a beacon to alert the radios they are supposed to fall into Failsoft mode, and all radios will beep to notify the end user they are in Failsoft. As a scanner radio user, we would need to program the trunk system's voice channels in our radios as conventioal frequencies in order to continue to hear the system once it is in Failsoft. A good System Administrator would have thought of a backup plan and would have programmed a backup zone into all the radios on the system. You might be able to find your local county's radio guides by doing some google searching for the trunk system. ====================================
Tom Gallagher serves as Dean at Missoula College and Point of Contact (POC) Director for Cybersecurity Center of Academic Excellence (CAE2Y) at Missoula College. Tom has been a professor of Information Technology and Computer Science at Missoula College, University of Montana since 2001. Prior to coming to UM, Tom served in the roles of Technology Director and System Administrator. He holds a doctoral and masters degree in Education Leadership from the University of Montana, masters degree in Computer Science from Western Washington University, and baccalaureate degree in Mathematics from Carroll College. His dissertation is entitled Baccalaureate Time-to-Degree for Montana University System Two-year College Transfer Students
There are an endless number of ways that volunteering benefits people in your communities, but you shouldn't overlook the ways volunteering can bring light to your own life. Here are our tips on where to start volunteering when you want to give back.Want more finance tips from your neighborhood experts? Follow Bank Midwest on Facebook, Twitter, Instagram, and LinkedIn!Guest: Nate Amborn, Senior Network and System Administrator at Bank MidwestBank MidwestMember FDICMusic: Cheery Monday Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 3.0 Licensehttp://creativecommons.org/licenses/by/3.0/
In this episode, hosts Prasanth, @mohannadhussain and @jaynagels discuss User Training with Dr. Ann Scherzinger. As a Professor of Radiology and Chief of the Radiological Sciences Division and the University of Colorado, Dr. Scherzinger supports informatics applications for the UCHealth system. She is currently the chair of the SIIM Education Committee. Previously she has served as the System Administrator and has managed many implementations and upgrades for RIS and PACS systems at University of Colorado Hospital. Connect with us! You can find our podcast on Apple Podcast, Google Podcasts, Stitcher, or anywhere else you subscribe to podcasts. Please help us out by leaving a review on Apple Podcasts. You can find us on Twitter: @SIIM_Tweets, and individually at @mohannadhussain, @jaynagels, @AliTejaniMD, @AAnandMD Visit us at https://siim.org/page/siimcast Special Thanks to @RandalSilvey of http://podedit.com for editing and post processing support.
Welcome to Episode 115 Main Topic How has sysadminning changed System Operator System Administrator BOFH references galore The ability to automate builds made it easier to build faster But systems were still mostly manually configured Now systems were not bound to hardware in the traditional sense VM Sprawl Meant larger fleets to manage Templating and cloning makes standing up new machines even faster/simpler Pets vs Cattle Disposable systems Containerization Infrastructure as code! On-demand functions like lambda Any predictions on what Sysadmin will look like in 10 more years? Or even 5?! Sysadmin in the classic sense Early Build Automation (such as kickstart, and ghost) Virtual Machines, and what that meant Config management and automation Cloud Deployments What's next? Watch us live on the 2nd and 4th Thursday of every month! Subscribe and hit the bell! https://www.youtube.com/IronSysadminPodcast OR https://twitch.tv/IronSysadminPodcast Discord Community: https://discord.gg/wmxvQ4c2H6 Find us on Twitter, and Facebook! https://www.facebook.com/ironsysadmin https://www.twitter.com/ironsysadmin Subscribe wherever you find podcasts! And don't forget about our patreon! https://patreon.com/ironsysadmin Intro and Outro music credit: Tri Tachyon, Digital MK 2http://freemusicarchive.org/music/Tri-Tachyon/
This episode features host Andy Syrewicze and recurring guest host Michael Bender, an author evangelist with Pluralsight and former Microsoft Cloud Advocate, to talk about how junior sysadmins can get started with PowerShell, with resources, suggestions, and why it's such an important skill to master if you want to progress in the IT industry.
Tuff Stuff Fitness chose to implement NetSuite and RF-SMART earlier this year to support their growing distribution and manufacturing business. As their implementation has progressed, they have been able to leverage the RF-SMART Knowledge Base to answer questions as they arise. For this reason, the Tuff Stuff team has been able to maintain their spot as a market leader in the fitness industry.What You'll Learn:• Why Tuff Stuff chose NetSuite and RF-SMART• How they use the Knowledge Base to answer questions• A step-by-step example of how James was able to solve an inventory problem in 45 secondsAdditional Resources: Listen to Episode: Counting Best PracticesWatch the Webinar: Best Practices for Physical InventoryVisit the Knowledge Base (for current RF-SMART NetSuite customers only): Knowledge BaseWho You'll Hear: James Newell, System Administrator, Tuff Stuff FitnessSarah Archer, Podcast & Digital Media Host, RF-SMART
https://go.dok.community/slack https://dok.community/ ABSTRACT OF THE TALK Some of the topics that may or may not be discussed on this live talk could be: - Other than Patroni and the operator, what else was needed to fully switch to Kubernetes? - What is left, what is the future going to bring to the world of Kubernetes and Postgres operators? Expect strong opinions, and facts. Live. Uncensored. Postgres. On. Kubernetes. BIO Álvaro is a passionate database and software developer. He founded and works as the Founder & CEO of OnGres (https://ongres.com). He has been dedicated to PostgreSQL and R&D in databases for two decades. An open source advocate and developer at heart, Álvaro is a well-known member of the PostgreSQL Community, to which he has contributed founding the non-profit Fundación PostgreSQL (https://postgresql.fund) and the Spanish PostgreSQL User Group. You can find him frequently speaking at PostgreSQL, database, cloud, and Java conferences. Every year, Álvaro travels approximately three-four times around the globe—in 2020 (or now more likely 2021 due to COVID-19), he will hit the milestone of having delivered 100 tech talks. AWS Data Hero (2019). ------------ During his professional career, Alexander touched PostgreSQL from all possible sides: as a Web Developer, as System Administrator, and as a Database Engineer now. Five years ago he started working on Patroni project and achieved quite a big success with it. Nowadays Patroni is used in the heart of PostgreSQL-as-a-Service on Kubernetes at Zalando to run 1000+ PostgreSQL HA clusters. Besides that, Alexander periodically reports bugs and contributes patches to PostgreSQL and some other open-source projects (usually Postgres related).
“Software telemetry is what you use to figure out what your production systems are doing. It's all about shortening that feedback loop between the user experience and the engineers who are writing the user experience." Jamie Riedesel is a Staff Engineer at Dropbox working on the HelloSign product and also the author of “Software Telemetry”. In this episode, Jamie shared an overview of software telemetry and explained why it is important for us to understand how our production systems are behaving by using those telemetry data. She also explained different software telemetry types, concepts such as observability and cardinality, and shared some software telemetry best practices. In the second part of our conversation, Jamie opened up and shared her own personal experience dealing with toxic work environments. She emphasized the importance of self-awareness and psychological safety, as well as went through the five key dynamics to a successful team based on Google's re:Work blog post. Listen out for: Career Journey - [00:05:15] Software Telemetry - [00:07:22] Knowing Your Production System - [00:12:13] Types of Software Telemetry - [00:16:45] High Cardinality - [00:22:34] Observability & Buzzwords - [00:27:08] In-House vs. SaaS - [00:30:04] Some Telemetry Best Practices - [00:32:35] Toxic Workplace - [00:38:45] Identifying Your Toxicity - [00:44:18] Psychological Safety - [00:49:02] Identifying a Person's Baggage - [00:53:52] Who is On The Team Matters Less - [00:58:09] 3 Tech Lead Wisdom - [01:01:49] _____ Jamie Riedesel's Bio Jamie Riedesel has over twenty years of experience in the tech industry, and has spent her time as a System Administrator, Systems Engineer, DevOps Engineer, and Platform Engineer. She is currently a Staff Engineer at Dropbox, working on their HelloSign product. Jamie's blog at sysadmin1138.net has been there since 2004 and survived the apocalypse of Google Reader shutting down. Jamie is the author of “Software Telemetry” through Manning Publications, and also has a deep interest in reforming team cultures to be less toxic. Follow Jamie: Blog – https://sysadmin1138.net/mt/blog/ Twitter – https://twitter.com/sysadm1138 LinkedIn – https://www.linkedin.com/in/jamie-riedesel-983773b Our Sponsor Are you looking for a new cool swag? Tech Lead Journal now offers you some swags that you can purchase online. These swags are printed on-demand based on your preference, and will be delivered safely to you all over the world where shipping is available. Check out all the cool swags by visiting https://techleadjournal.dev/shop. Like this episode? Subscribe on your favorite podcast app and submit your feedback. Follow @techleadjournal on LinkedIn, Twitter, and Instagram. Pledge your support by becoming a patron. For more info about the episode (including quotes and transcript), visit techleadjournal.dev/episodes/57.
About WillWill is recovering System Administrator with a decade's worth of experience in technology and management. He now embraces the never-ending wild and exciting world of Information Security.Links: Color Health: https://www.color.com Twitter: https://twitter.com/willgregorian TranscriptAnnouncer: Hello, and welcome to Screaming in the Cloud with your host, Chief Cloud Economist at the Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud.Corey: This episode is sponsored in part by CircleCI. CircleCI is the leading platform for software innovation at scale. With intelligent automation and delivery tools, more than 25,000 engineering organizations worldwide—including most of the ones that you've heard of—are using CircleCI to radically reduce the time from idea to execution to—if you were Google—deprecating the entire product. Check out CircleCI and stop trying to build these things yourself from scratch, when people are solving this problem better than you are internally. I promise. To learn more, visit circleci.com.Corey: Up next we've got the latest hits from Veem. Its climbing charts everywhere and soon its going to climb right into your heart. Here it is!Corey: Welcome to Screaming in the Cloud. I'm Corey Quinn. Sometimes I like to talk about my previous job being in a large regulated finance company. It's true. I was employee number 41 at a small startup that got acquired by BlackRock. I was not exactly a culture fit, as you probably can imagine by basically every word that comes out of my mouth and then imagining that juxtaposed but they're a highly regulated finance company.Today, my guest is someone who knows me from those days because we worked together back in that era. Will Gregorian is the head of Information Security at Color Health, and is entirely too used to my nonsense, to the point where he becomes sick of it, and somehow came back around. Will, thanks for joining me.Will: Hello. How are you?Corey: It's been a while, and so far, things are better now. It turns out that I don't have—well, I was going to say I don't have the same level of scrutiny around my social media usage that you do at large regulated finance companies anymore, but it turns out that when you basically spend your entire day shitposting about a $1.8 trillion company in the form of Amazon, oh, it turns out your tweets get an awful lot of scrutiny. Just, you know, not by the company that pays you.Will: That's very true. And you knew how to actually capitalize on that.Corey: No, I sort of basically figured that one out by getting it wrong as I went from step to step to step. No, it was a wild and whirlwind time because I joined the company as employee 41. I was the first non-developer ops hire, which happens at startups a fair bit, and developers try to interview you and ask you a bunch of algorithm questions you don't do very well at. And they say, “Well, I have no further questions. Do you?”And of course, there's nothing that says bad job interview like short job interview. “Yeah, just one. What are you actually working on in an ops context?” And we talked about, I think, migrating from EC2 Classic to VPC back in those days, and I started sketching on the whiteboard, “Let me guess it breaks here, here, and here.” And suddenly, there are three more people in the room watching me do the thing on the whiteboard.Long story short, I get hired and things sort of progressed from there. The acquisition comes down and then how, uh, we suddenly, it turns out, had this real pressing need for someone to do InfoSec on a full-time slash rigorous basis. Which is where you came in.Will: That's exactly where I came in. I came in a month after the acquisition, if I remember correctly. That was fun. I actually interviewed with you, didn't I?Corey: You did. You passed, clearly.Will: I did pass. That's pretty hard to pass.Corey: It was fun, to be perfectly blunt. This is the whole problem with startup FinTech in some ways, where you're dealing in regulated industries, but at what point do you start bringing security in, as someone—where that becomes its own function? And how do you build that out? You can get surprisingly far without it until right afterwards then you really can't. But for a startup in the finance space, your first breach can very much be something of a death knell for the company.Will: That's very true. And there's no really good calculation on when you bring those security people in, which is probably the reason why—brace yourself—we're talking about DevSecOps.Corey: Oh, good. Let's put more words into DevOps because goes well.Will: Yeah. It does. It really does. I love it. You should look at my Twitter feed; I do make fun of it. But the thing is, it's mostly about risk. And founders ought to know what that risk is, so maybe that's the reason why they hired me because they felt like there's existential risk around brand and reputation, which is the reason why I joined. But yeah, [sigh] fundamentally, the problem with that is that if you hire a security practitioner, especially the first one, it's kind of like dating, in a way—Corey: Oh, yes.Will: If you don't set them up correctly, then they're doomed to be failed, and there are plenty of complexities as a result. Imagine you're a scrappy FinTech startup, you have a bunch of developers, they want to start writing code, they want to do big and great things, and all of a sudden security comes in and says, “Thou shalt not do the following things.” That's where it fails. So, I think it's part culture, part awareness from a founder perspective, part DevOps because let's face it, most of the stuff happens in infra side. And that's not to slam on anybody. And delicious goes on.Corey: Yeah. Something that I developed a keen appreciation for when I went into business for myself after that and started the Duckbill Group, is that when you talk to attorneys, that was really the best way to I found to frame it because they've been doing this for 2000 years. It turns out InfoSec isn't quite that old, although occasionally it feels like some of the practices are. Like, you know, password rotation every 30 days. I digress.And lawyers will never tell you what to do, or at least anyone who's been doing this for more than six months. Instead, the answer to everything is, “It depends. Here are the risk factors to consider; here are the trade-offs.” My wife is a corporate attorney and I learned early on not to let her have any crack at my proposal documents in those days because it's fundamentally a sales document, but her point was, “Well, this exposes you to this risk, and this risk, and this risk, and this risk.” And it's, “Yes, I'm aware of all of that. If I don't know how to do what I do, effectively, I'm not going to be able to fulfill this. It's not the contract; it is the proposal and worst case I'll give them their money back with an apology and life goes on.”Because at that point, I was basically a tiny one-man band, and there was no real downside risk. Worst case, the entity gets sued into oblivion; I have to go get a real job again. Maybe Amazon's hiring, I don't know. And it's sort of progressed from there. Left to their logical conclusion and letting them decide how it's going to work, it becomes untenable, and it feels like InfoSec is something of the same story where the InfoSec practitioners I've known would not be happy and satisfied until every computer was turned off, sunken into concrete, and then dropped into Challenger Deep out in the Pacific.Will: Yep. And that's part of the issue is that InfoSec, generally speaking, hasn't kept up with the modern practices, technologies, and advancements around even methodologies and culture. They're still very much [unintelligible 00:06:32] approaching the information security conversation, militaristically speaking; everything is very much based on DOD standards. Therein lies the problem. And funny enough, you mentioned password rotation. I vividly remember we had that conversation. Do you remember that?Corey: It does sound familiar. I've picked that fight so many times in so many different places. Yeah. My current thing that drives me up a wall is, in AWS's IAM console, you get alerts for any IAM credential parents older than 90 days and it's not configurable. And it's, yes, if I get a hold of someone's IAM credentials, I'm going to be exploiting it within seconds.And there are studies; you can prove this empirically. Turns out it's super economical to mine Bitcoin in someone else's Cloud account. But the 90-day idea is just—all that does—the only good part of that to me is it enforces that you don't have those credentials stashed somewhere that they become load-bearing and you don't understand what's going on in your infrastructure. But that's not really the best-practice hill, I would expect AWS to wind up staking out.Will: Precisely. And there lies the problem is that you have basically industry standards that really haven't adopted the cloud mentality and methodologies. The 90-day rotation comes from the world of PCI as well as a few other frameworks out there. Yeah, I agree. It only takes a few seconds, and if somebody is account—for example, in this case, IAM account—has programmatic access, game over.Yeah, they're going to basically spin up a whole bunch of EC2 instances and start mining. And that's the issue is that you're basically trying to bolt on a very passe and archaic standard to this fast-moving world of cloud. It just doesn't work. So, things have gotten considerably better. I feel like our last conversation was, what, circa 2015, '16?Corey: Yeah. That was the year I left: 2016. And then it was all right, maybe this cloud thing has legs? Let's find out.Will: It does. It does. It actually really does. But it has gotten better and it has matured in dramatic ways, even on the cybersecurity side of the house. So, we're no longer having to really argue our way through, “Why do we have to rotate passwords every 90 days?”And I've been part of a few of these conversations with maybe the larger institutions to say, look, we have compensating controls—and I speak their language: ‘compensating controls'—you want to basically frame it that way and you want to basically try to rationalize why, technically speaking, that policy doesn't make sense. And if it does, well, there is a better way to do it.Corey: I feel very similarly about the idea of data being encrypted at rest in a cloud context. Yeah in an old data center story this has happened, where people will drive a pickup truck through the wall of the data center, grab a rack into the bed and peel out of there, that's not really a risk factor in a time of cloud, especially with things like S3 where it is pretty clear that your data does not all live in easily accessible format in one facility. You'd have to grab multiple drives from different places and assemble it all together however it is they're doing it—I presume—and great. I don't actually need to do any encryption at rest story there. However, every compliance regime out there winds up demanding it and it's easier for me to just check the box and get the thing encrypted—which is super easy, and no noticeable performance impact these days—than it is for me to sit here and have this argument with the auditor.It's one of the things I've learned that would arguably make me a way better employee than I was when we worked together is I've learned to pick my battles. Which fights do I really need to fight and which are, fine, whatever, click the ridiculous box. Life goes on.Will: Ah, the love of learning from mistakes. The basic model of learning.Corey: Someday I aspire to learn from mistakes of others instead of my own. But, you know, baby steps.Will: Exactly. And you know, what's funny about it is that I just tweeted about this. EA had a data breach and apparently, their data breach was caused by a Slack conversation. Now, here's my rebuttal. Why doesn't the information security community come together and actually talk about those anti-patterns to learn from one another?We all keep it in a very in a confidential mode. We locked it away, throw the keys away, and we never talk about why this thing happened. That's one problem. But, yeah, going back to what you were talking about, yeah, it's interesting. Choose your battles carefully, frankly, speaking.And I feel like there's a lesson to be learned there—and I do experience this from time to time—is that, look, our hands are tied. We are basically in the world of relevance and we still have to make money. Some of these things don't make sense. I wholeheartedly agree with my engineering counterparts where these things don't make sense. For example, the encryption at rest.Yeah, if you encrypt the EBS volume, does really get you a whole lot? No. You have to encrypt the payload in order to be able to secure and keep the data that you want confidential and that's a massive lift. But we don't ever talk about that. What we talk about and how we basically optimize our conversations, at least in the current form, is let's harp on that compliance framework that doesn't make sense.But that compliance frameworks makes us the money. We have to generate revenue in order to remain employed and we have to make sure that—let's face it, we work in startups—at least I do—and we have to basically demonstrate at least some form of efficacy. This is the only thing that we have at our disposal right now. I wish that we would get to the world where we can in fact practice the true security practices that make a fundamental difference.Corey: Absolutely. There's a bunch of companies that would more or less look all the same on the floor of the RSA Expo—Will: Yep.Corey: —and you walk up and down and they're selling what seems to be the same product, just different logos and different marketing taglines. Okay. And then AWS got into the game where they offered a bunch of native tools that help around these things, like CloudTrail logs, et cetera, and then you had GuardDuty to wind up analyzing this, and Macie to analyze this, but that's still [unintelligible 00:12:12], and they have Detective on top of that, and Security Hub that ties it all together, and a few more. And then, because I'm a cloud economist, I wind up sitting here and doing the math out on this and yes, it does turn out the data breach would be cheaper. So, at what point do you stop hurling money into the InfoSec basket on some level?Because it's similar to DR; it's a bit of a white elephant you can throw any amount of money at and still get it wrong, as well as at some point you have now gone so far toward the security side of things that you have impaired usability for folks who are building things. Obviously, you need your data to be secure, but you also need that data to be useful.Will: Yep. The short answer to that is, I would like to find anybody who can give you the straight answer for that one. There is no [unintelligible 00:13:00] to any of this. You cannot basically say, “This is a point of stop.” If you will, from an expenditure perspective.The fundamental difference right now is we're trying to basically cross that chasm. Security has traditionally been in a silo. It hasn't worked out really well. I think that security really needs to buck up and collaborate. It cannot basically remain in a control function, which is where we are right now.A lot of security practitioners have the belief that they are the master of everything and no one is right. That fundamentally needs to stop. Then we can have conversations around when we can basically stop spending the expenditure on security. I think that's where we are right now. Right now, it still feels very much disparate in a not-so-good way.It has gotten better, I think; the companies in the Valley are really trying to basically figure out how to do this correctly. I would say the larger organizations are still not there. And I want to really, sort of, sit from the sideline and watch the digital transformation thing happen. One of the larger institutions just announced that they're going to go with AWS Cloud, I think you know who I'm talking about.Corey: I do indeed.Will: Yeah. [laugh]. So, I'm waiting to see what's going to happen out of that. I think that a lot of their security practitioners are up for a moment of wake-up. [laugh].Corey: They really are. And moving to cloud has been a fascinating case study in this. Back in 2012, when I was working in FinTech, we were doing a fair bit of work on AWS, so we did a deal with a large financial partner. And their response was, “So okay, what data centers are you using?” “Oh, yeah, we're hosting in AWS.”And their response was, “No, you're not. Where are you hosting?” “Okay, then.” I checked recently and sure enough, that financial partner now is all-in on Cloud. Great. So, I said—when one of these deals was announced—that large finance companies are one of the bellwether institutions, that when they wind up publicly admitting that they can go all-in on cloud or use a cloud provider, that is a signal to a lot of companies that are no longer even finance-adjacent, but folks who look at that and say, “Okay, cloud is probably safe.”Because when someone says, “Oh, our data is too sensitive to live on the cloud.” “Really? Because your government uses it, your tax authority uses it, your bank uses it, your insurance underwriter uses it, and your auditor uses it. So, what makes your data so much more special than that?” And there aren't usually a lot of great answers other than just curmudgeonly stubbornness, which, hey, I'm as guilty of as anyone else.Will: Well, I mean, there's a bunch of risk people sitting there and trying to quantify what the risk is. That's part of the issue is that you have your business people who may actually be embracing it, but then you—and your technologists, frankly speaking. But then you have the entire risk arm, who is potentially reading some white paper that they read, and they're concluding that the cloud is insecure. I always challenge that.Corey: Yeah, it's who funded this paper, what are they trying to sell? Because no one says that without a vested interest.Will: Well, I mean, there's a bunch of server manufacturers that are going to be left out of the conversation.Corey: A recurring pattern is that a big company will acquire a startup of some sort, and say, “Okay, so you're on the cloud.” And they'll view that through a lens of, “Well, obviously of course you're on the cloud. You're a startup; you can't afford to do a data center build-out, but don't worry. We're here now. We can now finance the CapEx build-out.”And they're surprised to see pushback because the thing that they miss is, it was not an economic decision that drove companies to cloud. If it started off that way, it very quickly stopped being that way. It's a capability story, it's if I need to suddenly scale up an entire clone of the production environment to run a few tests and then shut it down, it doesn't take me eight weeks and a whole bunch of arguing with procurement to get that. It takes me changing an argument to, ideally a command line or doing some pull request or something like that does this all programmatically, waiting a few minutes and then testing it there. And—this is the part everyone forgets—McLeod economic side—and then turning it back off again so you don't pay for it in perpetuity.It really does offer a tremendous boost in terms of infrastructure, in terms of productivity, in terms of capability stories. So, we're going to move back to a data center now that you've been acquired has never been a really viable strategy in many respects. For starters, a bunch of you engineers are not going to be super happy with that, and are going to take their extremely hard-to-find skill set elsewhere as soon as that becomes a threat to what they're doing.Will: Precisely. I have seen that pattern. And the second part to that pattern, [laugh] which is very interesting is trying to figure out the compromise between cloud and on-prem. Meaning that you're going to try to bolt-on your on-prem solutions into the cloud solution, which equally doesn't work if not it makes it even worse. So, you end up with this quasi-hybrid model of sorts, and that doesn't work. So, it's all-in or nothing. Like I said, we've gotten to the point where the realization is cloud is the way to do it.Corey: This episode is sponsored by our friends at Oracle HeatWave is a new high-performance accelerator for the Oracle MySQL Database Service. Although I insist on calling it “my squirrel.” While MySQL has long been the worlds most popular open source database, shifting from transacting to analytics required way too much overhead and, ya know, work. With HeatWave you can run your OLTP and OLAP, don't ask me to ever say those acronyms again, workloads directly from your MySQL database and eliminate the time consuming data movement and integration work, while also performing 1100X faster than Amazon Aurora, and 2.5X faster than Amazon Redshift, at a third of the cost. My thanks again to Oracle Cloud for sponsoring this ridiculous nonsense. Corey: For the most part, yes. There are occasional use cases where not being in cloud or not being in a particular cloud absolutely makes sense. And when companies come to me and talk to me that this is their perspective and that's why they do it, my default response is, “You're probably right.” When I talk about these things, I'm speaking about the general case. But companies have put actual strategic thought into things, usually.There's some merit behind that and some contexts and constraints that I'm missing. It's the old Chesterton's Fence story, where it's a logic tool to say, okay, if you come to a fence in the middle of nowhere, the naive person, “Oh, I'm going to remove this fence because it's useless.” The smarter approach is, “Why is there a fence here? I should probably understand that before I take it down.” It's one of those trying to make sure that you understand the constraints and the various strategic objectives that lend themselves to doing things in certain ways.I think that nuance gets lost, particularly in mass media, where people want these nuanced observations somehow distilled down into something that fits in a tweet. And that's hard to do.Will: Yep. How many characters are we talking about now? 280.Corey: 280 now, but you can also say a lot with gifs. So, that helps.Will: Exactly, yeah. A hundred percent.Corey: So, in your career, you've been in a lot of different places. Before you came over and did a lot of the financial-regulated stuff. You were at Omada Health where you were focusing on healthcare-regulated side of things. These days, you're in a bit of a different direction, but what have you noticed that, I guess, keeps dragging you into various forms of regulated entities? Are those generally the companies that admit that they, while still in startup stage, actually need someone to focus on security? Or is there more to it that draws you in?Will: Yeah, I know. There's probably several different personas to every company that's out there. You have your engineering-oriented companies who are wildly unregulated, and I'm talking about maybe your autonomous vehicle companies who have no regulations to follow, they have to figure it out on their own. Then you have your companies that are in highly regulated industries like healthcare and financial industry, et cetera. I have found that my particular experience is more applicable to the latter, not the former.I think when you basically end up in companies that are trying to figure it out, it's more about engineering, less about regulations or frameworks, et cetera. So, for me, it's been a blend between compliance and security and engineering. And that's where I strive. That doesn't mean that I don't know what I'm doing, it just means that I'm probably more effective in healthcare and FinTech. But I will say—you know, this is an interesting part—what used to take months to implement now is considerably shorter from an implementation timeline perspective.And that's the good news. So, you have more opportunities in healthcare and FinTech. You can do it nimbly, you can do things that you generally had to basically spend massive amounts of money and capital to implement. And it has gotten better. I find myself that, you know, I struggle less now, even in the AWS stack trying to basically implement something that gets us close to what is required, at least from a bare minimum perspective.And by the way, the bare minimum is compliance.Corey: Yes.Will: That's where it starts, but it doesn't end there.Corey: A lot of security folks start off thinking that, “Oh, it's all about red team and pentesting and the rest, and no, no, an awful lot of InfoSec is in fact compliance.” It's not just, do the right thing, but how do you demonstrate you're doing the right thing? And that is not for everyone.Will: I would caution anybody who wants to get into security to first consider how many different colors there are to the rainbow in the security side of the house, and then figure out what they really want to do. But there is a misconception around when you call security often, to your point, people kind of default to, “Oh, it's red teaming.” Or, “It's basically trying to break or zero-days.” Those happens seldom, although seems they're happening far more often than they should.Corey: They just have better marketing now.Will: Yeah. [laugh].Corey: They get names and websites and a marketing campaign. And who knows, probably a Google Ad buy somewhere.Will: Yep, exactly. So, you have to start with compliance. I also would caution my DevOps and my engineering counterparts and colleagues to, maybe, rethink the approach. When you approach a practitioner from a security side, it's not all about compliance, and if you ask them, “Well, you only do compliance,” they're going to may laugh at you. Think of it as it's all-inclusive.It is compliance mixed with security, but in order for us to be able to demonstrate success, we have to start somewhere, and that's where compliance is—that's the starting point. That becomes sort of your northern light in a referential perspective. Then you figure out, okay, how do we up our game? How do we refine this thing that we just implemented? So, it becomes evolving; it becomes a living entity within the company. That's how I usually approach it.Corey: I think that's the only sensible way to go about these things. Starting from a company of one to, at the time is recording, I believe we're nine people but don't quote me on that. I don't want to count noses. One of the watershed moments for us when we started hiring people who—gasp, shock—did not have backgrounds as engineers themselves—it turns out that you can't generally run most companies with only people who have been spending the last 15 years staring at computers. Who knew?—and it's a different mindset; it's a different approach to these things.And because again, it's that same tension, you don't want to be the Department of No. You don't want to make it difficult for people to do their jobs. There's some low bar stuff such as you don't want people using a password of ‘kitty' everywhere and then having it on a post-it note on the back of their laptop in an airport lounge, but you also don't want them to have to sit there and go through years of InfoSec training to make this stuff makes sense. So, building up processes like we have here, like security awareness training, about half of it is garbage; I got to be perfectly honest. It doesn't apply to how any of us do business. It has a whole bunch of stuff that presupposes that we have an office. We don't. We're full remote with no plans to change that. And it's a lot of frankly, terrible advice, like, “Never click a link in email.” It's yeah, in theory, that makes sense from a security perspective, but have you met humans?Will: Yeah, exactly.Corey: It's this understanding of what you want to be doing idealistically versus what you can do with people trying to get jobs done because they are hired to serve a purpose for the company that is not security. “Security is everyone's job,” is a great slogan and I understand where it's going, but it's not realistic.Will: Nope, it's not. It's funny it's you mentioned that. I'm going through a similar experience from a security awareness training perspective and I have been cycling through several vendors—one prominent one that has a Chief Hacking Officer of sorts—and amazingly enough, their content is so very badly written and so very badly optimized on the fact that we're still in this world of going to a office or doing things that don't make sense. “Don't click the link?” You're right. Who doesn't click the link? [laugh].Corey: Right. Oh, yeah. It's a constant ongoing thing where you continually keep running into folks who just don't get it, on some level. We all have that security practitioner friend who only ever sends you email that is GPG encrypted. And what do they say in those emails?I don't know. Who has the time to sit there and decrypt it? I'm not running anything that requires disclosure. I just don't understand the mindset behind some of these things. The folks living off the grid as best they can, they don't participate in society, they never have a smartphone, et cetera, et cetera. Having seen some things I've seen, I get it, but at some point, it's one of those you… you don't have to like it, but accepting that we live in a society sort of becomes non-optional.Will: Exactly. There lies the issue with security is that you have your wonks who are overly paranoid, they're effectively like the your talented engineer types: they know what they're talking about and obviously, they use open-source projects like GPG, et cetera. And that's all great, but they don't necessarily fit into the contemporary context of the business world and they're seen as outliers who are basically relied on to do things that aren't part of the normal day-to-day business operations. Then you have your folks who are just getting into it and they're reading your CISSP guides, and they're saying, “This is the way we do things.” And then you have people who are basically trying to cross that chasm in between. [laugh].And that's where the security is right now. And it's a cornucopia of different personalities, et cetera. It is getting better, but what we all have to collectively realize is that it is not perfect. To your point, there is no one true way of practicing security. It's all based on how the business perceived security and what their needs are, first and foremost, and then trying to map the generalities of security into the business context.Corey: That's always the hardest part is so many engineering-focused solutions don't take business context into account. I feel very aligned with this from the cost perspective. The reason I picked cost instead of something like security—because frankly, me doing basically what I'm doing now with a different position of, “Oh, I will come in and absolutely clear up the mistakes you have made in your IAM policies.” And, “Oh, we haven't made any mistakes in our IAM policies.” You ever met someone for who not only is that true, but also is confident enough to say that? Because, “Great. We'll do an audit. You want to bet? If we don't find anything, we'll give you a refund.” [laugh]. And it's fun, but are people going to call you with that in the middle of the night and wake you up? The cloud economics thing, it is strictly a business hours problem.Will: Yeah, yeah. It's funny that you mention that. So, somebody makes a mistake in that IAM cloud policy. They say, “Everybody gets admin.” Next thing you know, yes, that ends up causing an auth event, you have a bunch of EC2 instances that were basically spun up by some bad actor, and now you have a $1 million bill that you have to pay.Corey: Right. And you can get adjustments to your bill by talking to AWS support and bending the knee. And you're going to have to get yelled at, and they will make you clean up your security policies, which you really shut it down anyway, and that's the end of it. For the most part.Will: I remember I spun up a Macie when it had just came out.Corey: Oh, no.Will: Oh, yeah.Corey: That was $5 per gigabyte of data ingested, which is right around the breakeven point of hire a bunch of college interns to do it instead, by hand.Will: Yeah, I remember the experience. It ended up costing $24,000 in a span of 24 hours.Corey: Yep.Will: [laugh].Corey: And it was one of the most blindsidingly obvious things, to the point where they wound up releasing something like a 90% pay cut with the second generation of billing. And the billing's still not great on something like that. I was working with a client when that came out, and their account manager immediately starts pushing it to them and they turn to me almost in unison, and, “Should we do it?”—good. We have them trained well, and I, “Hang on,”—envelope math—“Great. Running this on the data you have an S3 right now would cost for the first month, $76 million, so I vote we go with Option B, which is literally anything that isn't that, up to and including we fund our own startup that will do this ourselves, have them go through your data, then declare failure on Medium with a slash success post of our incredible journey has come to an end; here's what's next. And then you pocket the difference and use it for something good.”And then—this is at the table with the AWS account manager. Their response, “So, you're saying we have a pricing problem with Macie?” It's like well, “Whether it's a problem or not really depends on what side of that transaction [laugh] you're on, but I will say I'll never use the thing.” And only four short years later, they fixed the pricing model.Will: Finally. And that was the problem is that you want to do good; you end up doing bad as a result. And that was my learning experience. And then I had to obviously talk to them and beg, borrow, and steal and try to explain to them why I made that mistake. [laugh]. And then finally, you know [crosstalk 00:29:52]—Corey: Oh, yeah. It's rare that you can make an honest, well-intentioned mistake and not get that taken care of. But that is not broadly well known. And they of course can't make guarantees around it because as soon as you do that you're going to open the door for all kinds of bad actors. But it's something where, this is the whole problem with their billing model is they have made it feel dangerous to experiment with it. “Oh, you just released a new service. I'm not going to play with that yet.”Not because you don't trust the service and not because you don't trust the results you're going to get from it, but because there's this haunting fear of a bill surprise. And after you've gone through that once or twice, the scars stick with you.Will: Yep. PTSD. I actually learned from that mistake, and let's face it, it was a mistake and you learn from that. And I feel like I sort of honed in on the fact that I need to pay attention to your Twitter feed because you talk about this stuff. And that was really, like, the first and last mistake that I made with a AWS service stack.Corey: Following on my Twitter feed? Yeah, first and last mistake a lot of people make.Will: Oh, I mean, it was—that's too, but you know, that's a good mistake to make. [laugh]. But yeah, it was really enlightening in a good way. And I actually—you know, what's funny about it is if you start with a AWS service that has just basically been released, be cautious and be very calculated around what you're implementing and how you're implementing it. And I'll give you one example: AWS Shield, for example.Corey: Oh, yeah. The free version or the $3,000 per month with a one-year commitment?Will: [unintelligible 00:31:15] version. Yeah, you start there, and then you quickly realize the web application firewall rules, et cetera, they're just not there yet. And that needs to be refined. But would I pay $3,000 for AWS Shield Advanced or something else? I probably will go with something else.There lies the issue is that AWS is very quick to release new features and to corner that market, but they just aren't fast enough to, like, at least in the current form—you know, from a security perspective, when you look at those services, they're just not fast enough to refine. And there is, maybe, an issue with that, at least from my experience perspective. I would want them to pay a little bit more attention to, not so much your developers, but your security practitioners because they know what they're looking for. But AWS is nowhere to be found on that side of the house.Corey: Yeah. It's a hard problem. And I'm not entirely sure the best way to solve for it, yet.Will: Yeah, yeah. And there lies a comment where I said that we're crossing that chasm right now…. We're just not there yet.Corey: Yeah. One of these days. If people want to hear more about what you're up to and how you view these things, where can they find you?Will: Twitter.Corey: Always a good decision. What's your username? And we will, of course, throw a link to it in the [show notes 00:32:33].Will: Yeah, @willgregorian. Don't go to LinkedIn. [laugh].Corey: No. No one likes—LinkedIn is trying to be a social network, but not anywhere near getting there. Thank you so much for taking the time to basically reminisce with me if nothing else.Will: This was awesome.Corey: Really was. Will Gregorian, head of information security at Color Health. I'm Cloud Economist Corey Quinn and this is Screaming in the Cloud. If you've enjoyed this podcast, please leave a five-star review on your podcast platform of choice, whereas if you've hated this podcast, please leave a five-star review on your podcast platform of choice along with an ignorant comment telling me why I'm wrong about rotating passwords every 60 days.Corey: If your AWS bill keeps rising and your blood pressure is doing the same, then you need the Duckbill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duckbill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com to get started.Announcer: This has been a HumblePod production. Stay humble.
Farhan Haider & Kal Rathod | Cloud ComputingFarhan Haider: I've served in many roles from a Retail Sales Rep, System Administrator, Senior Technical Architect, Site Reliability Engineer to Director. My goal has always been simple – to empower the people around me because, I believe, that is the only way to grow. Today, I work with thought leaders and help them to differentiate themselves and drive results through innovative technology. I'm a passionate entrepreneur who is curious about business needs and enjoy deep diving in to technology. And with that comes an obsession with devising technical solutions to solve problems that helps businesses get to the next level.Kal Rathod: Kal is an experienced professional who has significant expertise in Business Development, Technical Sales, Program Management, Regional/National/Global Sales, and Marketing. Mastering the art of building long term relationships with high value stakeholders, but also is critical in pipeline generation and management which in-turn results in strong performance and consistent revenue streams. Communicating with all levels of clientele has allowed for a broad range of experience in being able to close deals and contracts.Support the show (https://www.patreon.com/back2basicsmode?fan_landing=true)
Eric and Brandon put on their System Administrator hats and dive into the world of open source virtual desktop infrastructure (VDI). Stay tuned as we announce some upcoming new elements for the Sudo-verse! Destination Linux Network (https://destinationlinux.network) Sudo Show Website (https://sudo.show) Sponsor: Bitwarden (https://bitwarden.com/dln) Sponsor: Digital Ocean (https://do.co/dln) Sudo Show Swag (https://sudo.show/swag) UPDATED! Contact Us: DLN Discourse (https://sudo.show/discuss) Email Us! (mailto:contact@sudo.show) Matrix: +sudoshow:destinationlinux.network Hypervisors: Red Hat Virtualizaiton (https://www.redhat.com/en/technologies/virtualization/enterprise-virtualization) oVirt (https://www.ovirt.org/) Protocols: Spice (https://www.spice-space.org/) VDI Orchestrators: - Ravada (https://ravada.upc.edu/) FlexVDI (https://flexvdi.com/en/index) UDS Enterprise (https://www.udsenterprise.com/en/) Github: OpenUDS (https://github.com/dkmstr/openuds) YouTube: Full Open Source VDI stack UDS Enterprise + XCP ng + Xen Orchestra (https://youtu.be/Lq8UudzwL5s) Shells.Com (https://www.shells.com/l/en-US/) Destination Linux: Interview with Shells (https://destinationlinux.org/episode-227/) Application Streaming: WinApps (https://github.com/Fmstrat/winapps) (Poor Man's Application Stream) X2Go (https://wiki.x2go.org/doku.php) Sudo Verse: Sudo Hangouts (https://sudo.show/hangout) Sudo Labs (https://sudo.show/labs) - Sudo Show 18: Managing Multi-Cloud with Chris Psaltis (https://sudo.show/18) - Walk Through of Mist.io with Brandon Johnson (https://youtu.be/7w1byZe4ohg) Chapters 00:00 Intro 00:42 Welcome 01:30 Sponsor - Digital Ocean 03:27 Our Home Environments 08:40 What is VDI? 18:15 Ravada VDI 21:54 FlexVDI 24:46 OpenUDS 27:58 Shells.com 29:52 Our VDI Picks 32:51 Application Streaming 39:20 Sponsor - Bitwarden 41:10 The Sudoverse Grows! 51:49 Wrap Up
Learn more: https://packetpushers.net/podcast/tech-bytes-auto-dealer-takes-network-control-with-fortinet-sponsored/?doing_wp_cron=1620672553.4123060703277587890625 Today's Tech Bytes conversation is about SD-WAN and SD-Branch deployment with an auto dealership that has 19 locations across the United States. Frustrated by poor service from a managed service provider, the business needed a more efficient way to connect locations while ensuring high performance for critical applications. It also needed strong security to meet regulatory requirements and protect customers' financial information. The company went all-in on Fortinet for its network and security equipment. Our guest is Shane Williams, Director of IT; and Paul Provorse, System Administrator, both of White Family Dealerships. Besides SD-WAN we'll talk about how and why the company is using Fortinet APs, switches, and other gear at its locations. We also discuss the visibility and uptime benefits that company has gotten from bringing operations in-house.
Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show.
Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show.
Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show.
Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show. The post Tech Bytes: Auto Dealer Takes Network Control With Fortinet (Sponsored) appeared first on Packet Pushers.
Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show. The post Tech Bytes: Auto Dealer Takes Network Control With Fortinet (Sponsored) appeared first on Packet Pushers.
Frustrated by poor service from an MSP, the IT team at White Family auto dealers needed a more efficient way to connect locations while ensuring high performance and strong security to meet regulatory requirements. The company chose Fortinet for its network and security equipment. Fortinet is our sponsor, and we talk with Shane Williams, Director of IT; and Paul Provorse, System Administrator about going all-in with Fortinet to run their own show. The post Tech Bytes: Auto Dealer Takes Network Control With Fortinet (Sponsored) appeared first on Packet Pushers.
¿Quieres iniciarte en el código abierto pero no sabes por dónde empezar? ¿Ya eres colaborador y no entiendes por qué solo se aceptan algunas solicitudes de extracción? ¿Eres mantenedor y te sientes abrumado? En este episodio analizamos lo que implica el compromiso con un proyecto de código abierto. Acompañamos a nuestros héroes a medida que avanzan en su papel de colaboradores del código abierto: desde encontrar proyectos y contribuir a ellos, hasta desarrollar y mantener comunidades prósperas. Shannon Crabill nos cuenta cómo se inició en el código abierto en Hacktoberfest 2017. Existen muchas maneras de contribuir al código abierto. Vamos a verlas juntos.
Kieron Kitson-Walters - Senior System Administrator at Under Armour [Customer Service] Kieron talks about: · The importance of blending both empathy and technology · How to empower your agents to provide empathy · How to set clear expectations · The importance of innovation at Under Armour His note to all customer service professionals: “Listen.” Transcript and show notes can be found here JOIN THE PRESS 1 FOR NICK COMMUNITY: LinkedIn Website Connect with Nick BOOK RECOMMENDATIONS: Learn about all the guests book recommendations here BROUGHT TO YOU BY: VDS: They are a client-first consulting firm focused on strategy, business outcomes, and technology. They provide holistic consulting services to optimize your customer contact center, inspiring and designing transformational change to modernize and prepare your business for the future. Learn more here This podcast is under the umbrella of CX of M Radio SUPPORT: Want to support this show? Click here to buy me a coffee SPONSORING OPPORTUNITIES: Interested in partnering with the Press 1 For Nick podcast? Click here
In this episode, you'll hear Sierra Langston, marketing manager, and Hannah Trum, marketing specialist, give their top takeaways from Paubox Spring Summit, Secure Communication During a Pandemic. Panelists from this event include:Hoala Greevy, Founder CEO, PauboxAnshul Pande, Vice President, and Chief Technology Officer, Stanford Children's HealthChris Lindley, Chief Population Health Officer, Vail HealthJulie Jackson, Director Applications and Informatics, Vail HealthSusan Ibáñez, Chief Information Officer, Vail HealthPaddy Padmanabhan, CEO, Damo Consulting, Inc.Aaron Collins, System Administrator, Developmental Center of the OzarkBrian Kline, Principal, Webb AdamsDan Dorszynski, Software Engineer, PauboxHoward Rosen, MBA, CEO & Founder, LifeWIREMatthew Wallace, Vice President of Strategic Initiatives and Partnerships, Easterseals LouisianaMichael Mead, BCPA, Chief Operating Officer, The Medical Cost Savings SolutionMichael Parisi, Vice President, Business Development & Adoption, HITRUSTNick Wong, Email API Specialist, PauboxTony UcedaVélez, CEO & Founder, VerSpriteFor a full recap of Paubox Spring Summit, click here. For more information about Paubox Spring Summit, click here.
System administrator adalah profesi yang bertanggung jawab dalam pemeliharaan jaringan komputer perusahaan Profesi yang satu ini memang cukup mirip dengan network administrator. Bahkan, di beberapa perusahaan kedua profesi ini ada yang sampai menjalankan tanggung jawab yang sama Oleh karena itu untuk menjalankan profesi ini dibutuhkan sejumlah kualifikasi khusus yang harus dimiliki System administrator adalah salah satu profesi yang cukup populer bagi lulusan IT. Jadi, jika Sahabat ingin menjadikannya sebagai tujuan karier, tentu harus lebih semangat untuk meningkatkan skill yang dibutuhkan Nah, biar makin mantep nih tontonin yuk RASYID "Ramadan Syahdu di IDwebhost" bersama Ardan Ari Tri Wibowo selaku Senior Sys Admin bisa di IG Tv, Youtube IDwebhost, ataupun di Spotify IDweb Talks ya! #RASYID #RamadanSyahdudiIDwebhost #UMKM #Profesional #StartUp #Pebisnis #TipsBisnis #Teknologi #Ramadan #GoOnline #SysAdmin #KerjaIT #WebHosting #Webdeveloper #Hosting #Domain
CEO Podcasts: CEO Chat Podcast + I AM CEO Podcast Powered by Blue 16 Media & CBNation.co
Oscar Diaz has 20 years of experience in the IT industry. Oscar studied Information Technology Engineering at UNITEC (http://www.unitec.edu.ve/). During his five year program, he worked as a Coding Instructor and participated in several university programs to attract new students to the faculty. After graduating, Oscar started working in the Telecommunication Industry at Digitel Corp (www.digitel.com.ve). His first position at Digitel was as a System Administrator, where he had several servers under his responsibility, including the email system that supported 3000 users. In the next five years, Oscar demonstrated he was willing to take on new challenges and responsibilities; this allowed him to climb the organizational ladder and earn a management position where he was in charge of the server infrastructure running on Microsoft products (200+ servers and 10+ engineers on his team under his direction). After that, Oscar moved to the position of Application Manager, where he was in charge of (a) Business Intelligence, (b) Web Application Development, and (c) Customer Liaison Units (where he had 20+ engineers, business analysts and team leads working under his supervision). After ten years working in the Enterprise world and seeing the opportunity of bringing Enterprise IT practices to small and medium-sized businesses, Oscar founded Tecbound Technology in 2011. The goal of the company was to bring quality IT service to business owners and help them navigate the challenges of using IT in their business. Tecbound has grown ever since and now has a presence in Calgary, Vancouver, and Latin America. Oscar sponsors several children through not-for-profit organizations like World Vision and Christians Children’s Fund, and has a passion for helping kids to get involved in sports activities to promote family values, respect for others and encourage them to become the best they can be. Website: https://www.tecbound.com/ LinkedIn: https://www.linkedin.com/company/tecbound-technology/Facebook: https://www.facebook.com/tecboundInstagram: https://www.instagram.com/tecboundTwitter: https://twitter.com/Tecboundtech
Have you ever wondered how you may be leaving yourself open for a data breach? Well, in this episode, that is what we will be covering. We’re going to give you an overview of the biggest threats in Healthcare right now and provide examples of how you may be vulnerable to a threat actor. Aaron Collins, System Administrator for the Developmental Center of the Ozarks, will discuss these topics in greater detail.
Sam Munakl serves as the owner of Cytek, a cybersecurity firm located in Tulsa, Oklahoma. He received his bachelor’s degree in computer engineering at Damascus University and continued his professional training by earning several Microsoft certifications including Microsoft Certified System Engineer and System Administrator. Sam is HIPAA Security Certified and earned his Master’s degree of Science in Cybersecurity from the University of Maryland. Cybersecurity is his passion.
TGIF! That means it’s time for some knowledge sharing! Yap, you’re guessing – it’s Podcast time!Ever wondered about the role of a system engineer in a software development company, or about a system engineer’s role in general? Well if so, you’re in the right place. In the new episode of the AP Podcast we discuss what roles and responsibilities a system engineer has and how does he/she fit into Authority Partners environment and culture. Our guest is Dino Buljubasic who is Lead System Engineer at AP and with our host Asja, he will discuss on how a system engineer fits in a software development world, what is the difference between System Administrator or SysAdmin and system engineer, about greatest challenge in this role and much more!Pick up your favorite platform, tune in and grow with us! Disclaimer: The views expressed in this podcast are the speaker’s own and do not reflect the view of Authority Partners.
NEWLY RELEASED, this powerful and timely episode of the Fintech Hunting Podcast where we discuss the broker movement, wholesale lending priorities, how COVID has changed outreach, the importance of building relationships, state of industry conferences and so much more with the incredible Leora Ruzin CMB, SVP of Equity Prime Mortgage and Editor of Mortgage Women Magazine. She is a proven leader in the mortgage industry, with specialized skills in the areas of: Closing, Funding, Shipping, Post-Closing, Secondary Marketing, Capital Markets, Rate Risk Analysis, Investor Relations, Operations, Underwriting, Product Development, Managing Teams Consisting of Between 2-15 Staff, System Administrator for a wide variety of mortgage related software solutions. Advocacy and education in the mortgage industry is crucial to future success, and she has made it a point to get involved. Whether it is through the committees she serves on within the Mortgage Bankers Association, the articles she writes for Mortgage Women's Magazine and Housing Wire, or the various speaking engagements she has done, she actively keeps my finger on the pulse of the industry.
// Abstract: PostgreSQL is a powerful, open-source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance, but a production-grade deployment requires many complementary technologies to the database core: high availability and automated failover, backup and recovery, monitoring and alerting, centralized access control and logging, connection pooling, and so on. Being not initially accustomed for running stateful workloads, Kubernetes with its infrastructure as a code paradigm, CustomResourceDefinition, and Operator pattern turned out to be extremely convenient for deploying and running PostgreSQL at scale. I will talk about a few open-source project developed and maintained by database team at Zalando which anybody could use to build own PgaaS: 1. https://github.com/zalando/patroni - Tool for PostgreSQL high availability and cluster management. Integrates with K8s API and makes PostgreSQL cloud-native. 2. https://github.com/zalando/spilo - The Docker image that packages Patroni, multiple versions of PostgreSQL, and tools for backup and recovery. 3. https://github.com/zalando/postgres-operator - Implements Kubernetes operator pattern, orchestrates hundreds and thousands deployments of Patroni/Spilo clusters. Aforementioned projects would never get to the current state without an effort of dozens of external contributors. // Bio: During his professional career, Alexander touched PostgreSQL from all possible sides: as a Web Developer, as System Administrator, and as a Database Engineer now. Five years ago he started working on Patroni project and achieved quite a big success with it. Nowadays Patroni is used in the heart of PostgreSQL-as-a-Service on Kubernetes at Zalando to run 1000+ PostgreSQL HA clusters. Besides that, Alexander periodically reports bugs and contributes patches to PostgreSQL and some other open-source projects (usually Postgres related). ▬▬▬▬▬▬ Show Notes ▬▬▬▬▬▬ Remember to put your toys away: https://twitter.com/braddwyer/status/1303751133765283840 Getting Write happy and burning out your SSDs https://blog.okmeter.io/real-world-ssd-wearout-a3396a35c663 GitLab Postmortem https://about.gitlab.com/blog/2017/02/10/postmortem-of-database-outage-of-january-31/ ▬▬▬▬▬▬ Connect with us
“You can start with a catchy tagline but you can’t stop there.” Margie Agin helps B2B technology companies discover what makes them unique and find the words to say it. She is the founder and chief strategist of Centerboard Marketing, a DC-based marketing agency, and author of Brand Breakthrough: How to Go Beyond a Catchy Tagline to Build an Authentic, Influential and Sustainable Brand Personality. We discussed all of this and more on this week’s On Brand podcast. About Margie Again Award-winning marketer Margie Agin helps B2B technology companies discover what makes them unique and find the words to say it. She is the founder and chief strategist of Centerboard Marketing, a marketing agency based in the Washington, DC area, and author of Brand Breakthrough: How to Go Beyond a Catchy Tagline to Build an Authentic, Influential and Sustainable Brand Personality. As both an external strategist and an in-house marketing leader, Margie has helped companies in the cybersecurity, communications, EdTech, and software industries distill complex topics into content and campaigns that drive action. She has built and led teams through times of rapid change, launched and relaunched brands, and created sustainable marketing programs that prioritize the customer experience. Before founding Centerboard Marketing, Margie led demand generation efforts for the education technology company Blackboard and digital marketing for video conferencing leaders Tandberg and Cisco. She also taught content marketing and web writing at Johns Hopkins University. Margie completed her undergraduate work at Tufts University and earned a Master’s degree from American University. Episode Highlights “You can start with a catchy tagline but you can’t stop there.” Just as we tend to fixate on logos, branding often gets boiled down to “coming up with a catchy tagline.” Which, as Margie notes, is fine. Provided you build onto it with authenticity and sustainable systems. “I’ve seen a brand delivered to an organization from above,” says Margie. “This often created a gap between the umbrella statement from on high to the boots-on-the-ground people who are actually building the brand.” How do you fill that gap? “It’s getting everyone on the same page. You have to get people involved early—including sales, customer service.” You also need to provide these key individuals with tools. What’s the secret to useful brand messaging and editorial guides? “Show examples,” Margie says. A document can say a brand should have a “friendly, open tone” but that can be interpreted lots of different ways. “That way people don’t have to start from scratch or guess.” What brand has made Margie smile recently? Being a tech marketer, Margie pointed us to Thycotic, a software company that celebrates System Administrator’s Day in a very unique way. To learn more, go to the Centerboard Marketing website, check out Margie’s book Brand Breakthrough, and get a free action guide. As We Wrap … Did you hear something you liked on this episode or another? Do you have a question you’d like our guests to answer? Let me know on Twitter using the hashtag #OnBrandPodcast and you may just hear your thoughts here on the show. On Brand is sponsored by my book Brand Now. Discover the seven dynamics to help your brand stand out in our crowded, distracted world. Order now and get special digital extras. Learn more. Subscribe to the podcast – You can subscribe to the show via Apple Podcasts, Spotify, Google Play, Stitcher, TuneIn, and RSS. Rate and review the show – If you like what you’re hearing, head over to Apple Podcasts and click that 5-star button to rate the show. And, if you have a few extra seconds, write a couple of sentences and submit a review. This helps others find the podcast. OK. How do you rate and review a podcast? Need a quick tutorial on leaving a rating/review in iTunes? Check this out. Until next week, I’ll see you on the Internet!
This episode kicks off the Implementer Series. Over the next couple of weeks, I sit down with different folks from in the identity industry and ask them what they think it takes to be a good IAM implementer, and also what it takes to have a successful IAM implementation. The series kicks off with a good friend of mine Mr. Jom John. Meet JomI've been in the Identity & Access Management Industry now for 15+ years. A great deal has changed over the years but one constant that I've seen is the underestimation of what it takes to precisely deliver a robust IAM Program. Make no mistake, it is a Program that requires dedicated resources from Human Resources, Platform Owners, Stakeholders, Subject Matter Experts, Security, and Compliance. I started my career as a System Administrator performing the day to day grunt work of maintaining a Global IAM deployment with 250,000+ identities in over 73 countries. Since then I've worked with a variety of products in our industry (SailPoint, Oracle, Courion, IBM, RSA, Legacy Sun, NetIQ, Ping, CyberArk, etc...). My responsibilities varied from architecture, design, coding, testing, and deploying these solutions. By getting my hands dirty, I've been able to understand how these products resolve business challenges effectively.
Contrary to popular belief, our customer's like to play in more than one cloud (say it isn't so, coach; say it isn't so!) They even like to keep some of their workloads on-prem. Never fear, however, because Microsoft has one platform to rule them all: Azure Arc. Listen in as Vlad "Not the Impaler" Tomsa lets us in on the secret.BIO: Vlad is a Cloud Architect with a passion for technology and its ability to transform the world around us. He has extensive experience on the Cloud Infrastructure, Datacenter Migration, Applications, Identity and Networking. Before joining Microsoft in 2008, he worked as a System Administrator at several firms. At Microsoft, he was first responsible for supporting Enterprise Customers with design reviews and solving complex problem. Then he moved to a Consulting role, designing and implementing Identity, Security and Messaging projects with EMEA customers, after which he became a Cloud Solution Architect working with Belux and now US customers on their digital transformation and journey to the cloud.LINKS: Azure Arc, Welcome to Azure Arc, Azure Arc | Bring Windows Server and SQL Server into Azure Arc management (2020)CREDITS: Louis Berman (Host); Vlad Tomsa (Guest); Dan Phillipson / PremiumBeat (Music); Anne Lamb (Intro/Outro); East Coast Studio (Editing)MORE: visit https://azure-success.com for additional episodes, plus transcripts, and more ways to listen to the show. As to your comments and suggestions, please feel free to email your host, Louis Berman, at lberman@microsoft.com
Show Notes Buffer Overflow: Merchandising! Merchandising! Merchandising! Episode 170 WFH is The Pits, AI-based creative writing, Streaming Deep Dive Hosts Chris Hayner, Delivery Manager https://www.linkedin.com/in/chrismhayner Kimberly DeFilippi, Project Manager, Business Analyst https://www.linkedin.com/in/kimberly-defilippi-77b3986/ Brenda Heisler, ISG Operations https://www.linkedin.com/in/brenda-heisler-b5431989/ Hank Yee, Delivery Manager https://www.linkedin.com/in/hankyee/ Longer Topics The COVID of All Things Streaming https://variety.com/2020/digital/news/quibi-free-trial-converted-paying-customers-8-percent-1234702116/ https://www.forbes.com/sites/danrunkevicius/2020/07/08/disney-master-plan-with-disney-plus-that-no-one-is-talking-about/#2d6fb49d49d3 https://www.forbes.com/sites/scottmendelson/2020/07/06/hamilton-disney-plus-subscriptions-cant-compete-with-a-global-theatrical-release-for-soul-mulan-black-widow/#25fa05025915 https://www.vox.com/culture/2020/5/29/21263715/hbo-max-peacock-netflix-hulu-disney-plus-amazon-apple-cbs-all-access-streaming-service-guide https://techcrunch.com/2020/07/23/hbo-max-reached-4-1m-subscribers-in-first-month-despite-lack-of-distribution-on-roku-and-fire-tv/ https://deadline.com/2020/07/netflix-the-gray-man-ryan-gosling-chris-evans-joe-russo-anthony-russo-directing-1202987267/ Lightning Round Mini-Meow Update July 31st is System Administrator's Day! The EU is implementing a carbon border tax Constantly working from home is starting to take a measurable psychological toll, says everyone Airbus plane successfully completes entire flight procedure on autopilot Latest version of AI-based creative writing is actually getting good Dell iDRAC vulnerability announced that non-administrative users to turn your servers fans off Music Credits Intro: Jason Shaw - Tech Talk Outro: Jason Shaw – Feels Good 2 B
Scheduling in NetBSD, ZFS vs. RAID on Ironwolf disks, OpenBSD on Microsoft Surface Go 2, FreeBSD for Linux sysadmins, FreeBSD on Lenovo T480, and more. NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/) Headlines Scheduling in NetBSD – Part 1 (https://manikishan.wordpress.com/2020/05/10/scheduling-in-netbsd-part-1/) In this blog, we will discuss about the 4.4BSD Thread scheduler one of the two schedulers in NetBSD and a few OS APIs that can be used to control the schedulers and get information while executing. ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner (https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/) This has been a long while in the making—it's test results time. To truly understand the fundamentals of computer storage, it's important to explore the impact of various conventional RAID (Redundant Array of Inexpensive Disks) topologies on performance. It's also important to understand what ZFS is and how it works. But at some point, people (particularly computer enthusiasts on the Internet) want numbers. If you want to hear more from Jim, he has a new bi-weekly podcast with Allan and Joe Ressington over at 2.5admins.com (https://2.5admins.com/) News Roundup OpenBSD on the Microsoft Surface Go 2 (https://jcs.org/2020/05/15/surface_go2) I used OpenBSD on the original Surface Go back in 2018 and many things worked with the big exception of the internal Atheros WiFi. This meant I had to keep it tethered to a USB-C dock for Ethernet or use a small USB-A WiFi dongle plugged into a less-than-small USB-A-to-USB-C adapter. FreeBSD UNIX for Linux sysadmins (https://triosdevelopers.com/jason.eckert/blog/Entries/2020/5/2_FreeBSD_UNIX_for_Linux_sysadmins.html) If you’ve ever installed and explored another Linux distro (what Linux sysadmin hasn’t?!?), then exploring FreeBSD is going be somewhat similar with a few key differences. While there is no graphical installation, the installation process is straightforward and similar to installing a server-based Linux distro. Just make sure you choose the local_unbound package when prompted if you want to cache DNS lookups locally, as FreeBSD doesn’t have a built-in local DNS resolver that does this. Following installation, the directory structure is almost identical to Linux. Of course, you’ll notice some small differences here and there (e.g. regular user home directories are located under /usr/home instead of /home). Standard UNIX commands such as ls, chmod, find, which, ps, nice, ifconfig, netstat, sockstat (the ss command in Linux) are exactly as you’d expect, but with some different options here and there that you’ll see in the man pages. And yes, reboot and poweroff are there too. FreeBSD on the Lenovo Thinkpad T480 (https://www.davidschlachter.com/misc/t480-freebsd) Recently I replaced my 2014 MacBook Air with a Lenovo Thinkpad T480, on which I've installed FreeBSD, currently 12.1-RELEASE. This page documents my set-up along with various configuration tweaks and fixes. Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Benjamin - ZFS Question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/353/feedback/Benjamin%20-%20ZFS%20Question.md) Brad - swappagergetswapspace errors (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/353/feedback/Brad%20-%20swap_pager_getswapspace%20errors.md) Brandon - gaming (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/353/feedback/Brandon%20-%20gaming.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
In another virtual-cast, host Trish Adams speaks with staff in the Appalachian Regional Healthcare's (ARH) system of hospitals about their response to the COVID-19 pandemic and what that could mean for the future of health care in the region. ARH Chief Medical Officer Dr. Maria Braman, System Administrator of Ambulatory Services Roy Milwee, CCEO of ARH Highlands in Prestonsburg Tim Hatfield, and VP of Human Resources Sonya Bergman call in to talk about the changes being made at their hospitals to help deal with the novel coronavirus and if any of those changes are here to stay. This episode was recorded via Zoom conference call on Tuesday, May 12 due to the state and federal regulations regarding social distancing during the current COVID-19 pandemic.To learn more about EKCEP's mission to prepare, advance, and expand the workforce of Eastern Kentucky, log on to https://www.ekcep.org.Intro music from https://filmmusic.io"Sweeter Vermouth" by Kevin MacLeod (https://incompetech.com)License: CC BY (http://creativecommons.org/licenses/by/4.0/)
Brent sits down with Elizabeth K. Joseph, Developer Advocate at IBM Z, former Ubuntu Community Council member, and contributor to Ubuntu, Debian, Xubuntu, and others. We discuss her new passion for mainframes, her early contributions to open source projects, the niche opportunities in Z DevOps on mainframes, and more. Special Guest: Elizabeth K. Joseph.
Kiara Bickers- author of the book "Bitcoin Clarity" - joins me in this episode to share her fascinating journey into the rabbit hole of Bitcoin. Kiara is an open-minded auto-didact-learner of Austrian Economics and many other fields of knowledge. She is a System Administrator at Blockstream and with her holistic technical & economical knowledge, she is able to educate Bitcoin-beginners with fresh perspectives and differently unique approach of explaining things. We talked about many topics in connection with Bitcoin & outside the box: -Austrian Economics & Market Forces -Kiara´s Epiphany -Emergent Properties of the Bitcoin System -Bitcoin-noobs being overwhelmed -The Future of Human Civilization on Bitcoin´s Monetary Root -Layering Links of Kiara Bickers: twitter: @kiarabickers Website: getbitcoinclarity.com youtube: Kiara Bickers Amazon: Kiara Bickers / "Bitcoin Clarity" Let me know your thoughts, suggestions, questions, and ideas in the future. If you like listening to my content, you can support me by liking, sharing, following, and subscribing to my Podcast-Show on many platforms&YouTube-Channel (youtube.com/c/keyvandavani). I would appreciate a positive rating & review on anchor.fm/keyvandavani or any of these platforms: Subscribe to my Podcast-Show on: Apple Podcast: https://apple.co/2IA2dhV Google Podcast: https://bit.ly/31rSymq Spotify: https://spoti.fi/2wOfq1k Breaker: https://bit.ly/2IzhiQO Overcast: https://bit.ly/2R4nnbJ Castbox: https://bit.ly/34DbM97 Pocket-Casts: https://bit.ly/2XElbKv Radio Public: https://bit.ly/2I86iuH twitter: @keyvandavani Website: keyvandavani.com (TheTotalConnector.com) Ethical (Bitcoin-) sponsors are welcome! Thank you for listening and your support! Keyvan --- Send in a voice message: https://anchor.fm/keyvandavani/message
Sa Sibinom Grašićem smo pričali o tome kako postati uspešan freelancer, system administrator i WordPress developer. Takođe smo pokrili teme kao što su: Kako naplatiti posao i odrediti cenu rada, kako doći do klijenata i zadržati ih, kako napraviti dobar sajt koji kida, trikovi i fore za sajt, i na kraju par reči o uspehu i hostingu. Intervju je snimljen u prostorijama hotela City Savoy (Cetinjska 3, Stari Grad, 11000 Beograd, Srbija) http://www.hotelcitysavoy.com ____________ Autori: Sagovornik: Marko Pajić Video produkcija: Aleksandar Sretković ____________ Sibin Grašić biografija Sibin Grašić je WordPress Bog, Sistem Administrator i Freelancer. Poslovnu karijeru započinje 2010. godine kao WordPress developer. Sa preko 600 završenih projekata, specijalizovao se za namenska WordPress rešenja visokih performansi. Pored WordPressa, bavi se Web Hostingom, sistem administracjiom, kao i personalizovanim cloud rešenjima. ____________ Sibin Grašić linkovi FB: https://www.facebook.com/SeeBeen IG: https://www.instagram.com/see_been/ LI: https://www.linkedin.com/in/seebeen/ Sajt / blog: http://etfovac.com ____________ Stepenicama Uspeha Linkovi: Sajt: https://stepenicamauspeha.rs/ FB: https://www.facebook.com/stepenicamauspeha TW: https://twitter.com/SUspeha IG: https://www.instagram.com/stepenicamauspeha Pratite nas na društvenim mrežama i obavezno SUBSCRIBE! #StepenicamaUspeha #WordPress #Freelance #Hosting
This is it #accidentaladmins and #accidentalmarketers! The fifth episode of the five-part *Salesforce Object Series.Jennifer Lynn Schneider explains the Campaign Influence Object from its definition to the steps for enablement. She provides ideas for reporting, process, and of course, some Pardot Life Hacks to consider along the way.*Episode 1 of 5 of the Salesforce Object Series: The Lead Object for Marketing Admins - https://www.pardotlifehacks.com/e/salesforce-object-series-episode-1-of-5-the-lead-object-for-marketing-admins-pardot-life-hacks-08/ TakeawaysCampaign influence helps you to understand how your campaigns are affecting your opportunity pipeline.For campaign influence to show up on an opportunity, a contact must be on the contact role of the opportunity, under related lists. Salesforce campaigns take the contact as the connection between the campaigns involved and the opportunity.If you see something in your org setting that is different, talk to your Salesforce Admin and ask questions. Build that relationship and trust with them. Don’t be complacent, challenge the status quo, but do it in a helpful way.Campaign influence is retroactive, when enabled, it will start running calculations on all opportunities that have the contact role completed.There are four model settings to choose from for customizable campaign influence: the original primary campaign source model, first touch, last touch, and even distribution. Create custom report types for each influence model, so that your team can compare what the data looks like with first touch and what the data looks like with last touch. The team can then decide what model works best for your business. #PardotLifeHacksConsider using vocabulary like project instead of campaign when referring to your goal initiative. - This is because the word campaign is overused and has multiple definitions to it.If you do not have Pardot yet or have not yet enabled connected campaigns you can still enable the campaign influence 1.0 setting in salesforce.Don’t be scared of enabling campaign influence. - It simply aggregates existing data which you can change with the auto association settings or by improving your internal processes as a company.If you have other models and another one is default, stop. - Talk to your Salesforce Admin, and your sales, operations, and marketing teams to discuss before moving forward.Don’t set campaign influence up and forget it. - This is a living object that should change as your business process does and should reflect what your business needs are at the time.In order to add any of these related lists to the page layouts, the System Administrator also needs to have the Permission Set with Enable Access to Customizable Campaign Influence. Useful Links:Campaign Influence - Understand how your campaigns are affecting your opportunity pipeline.https://help.salesforce.com/articleView?id=campaign_influence_parent.htm&type=5How is Campaign influence different from ROI reports?https://help.salesforce.com/articleView?id=faq_campaigns_how_is_campaign_influence.htm&type=5Set Up Customizable Campaign Influencehttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_setup_parent.htm&type=5Configure Customizable Campaign Influencehttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_setup.htm&type=5Enable Users for Customizable Campaign Influencehttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_setup_parent.htm&type=5Add Customizable Campaign Influence to Page Layoutshttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_add_to_layouts.htm&type=5Designate a Default Campaign Influence Modelhttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_set_primary_model.htm&type=5Lock a Campaign Influence Modelhttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_lock_model.htm&type=5Manage Customizable Campaign Influencehttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_manage_parent.htm&type=5Add Influential Campaigns to an Opportunityhttps://help.salesforce.com/articleView?id=campaigns_influence_customizable_add_to_opp.htm&type=5 Shout Out:0:37 Everyone Jennifer met at Dreamforce and OpsStars #Social#PardotLifeHackers#TrailblazerTalk#accidentalmarketer#accidentaladmin
Au menu de ce cinquième chapitre : Avec le Contrôle Parental devenez Big Brother pour vos enfants. Nous allons aborder toutes les solutions pour contrôler l'addiction aux écrans de vos enfants. Après l'écoute de ce podcast vous saurez comment contrôler les heures d'usage d'Internet, bloquer ordinateurs, tablettes, smartphones, consoles de jeux et même haut parleurs connectés, sélectionner les applications accessibles, filtrer les sites web, ... bref vous n'aurez plus aucun prétexte pour vous plaindre de l'impact des écrans sur l'harmonie familiale ! Avec Maurizio Pedriale, Technical Consultant et Pierre-Yves Dehon, System Administrator chez Emakina.BE. Liens des produits et services cités : Disney Circle, Circle on Netgear, Netgear Orbi, Apple Parental Control, Microsoft Family Safety et Microsoft Launcher pour Android, Google Family Link, Playstation Parental Control, Xbox Parental Control, Nintendo Parental Control Le gadget geek de Brice : SevenHugs Smart Remote, IFTTT
Saverio Miroddi joins Charles Max Wood on this week's My Ruby Story. Saverio is a systems engineer and a backend programmer at Ticketsolve. He is originally from Italy and currently lives in Germany. Saverio shares his journey as a Ruby developer and also his passions outside of work such as bouldering. Saverio fell in love with programming when he was 7 years old with COmmodere 64. He didn't follow up on it however until later when he was working as a consultant working as a System Administrator where he taught himself JavaScript. Later he taught himself Ruby on the job when he was working in London. Saverio has written several articles such as Saverio Miroddi’s article, “An overview of Desktop Ruby GUI Development in 2018” and Debugging a live/stuck Ruby process. Host: Charles Max Wood Joined by Special Guest: Saverio Miroddi Sponsors Sentry use the code “devchat” for 2 months free on Sentry small plan React Native Radio My Angular Story CacheFly Links RR 381: “Ruby GUI Development” with Saverio Miroddi saveriomiroddi (Saverio Miroddi) · GitHub https://saveriomiroddi.github.io Saverio's Twitter Savario's Blog Ticketsolve Saverio Miroddi’s article, “An overview of Desktop Ruby GUI Development in 2018” Picks Saverio Miroddi Terraform Providers - GitHub saveriomiroddi (Saverio Miroddi) · GitHub goby-lang/goby Charles Max Wood Superfans by Pat Flynn Reach out to Charles Max Wood at https://meetings.hubspot.com/chuck27/15-minute-listener-call RR 428: Arming the Rebels with Rails 6 Featuring David Heinemeier Hansson Running with the right running gear
Saverio Miroddi joins Charles Max Wood on this week's My Ruby Story. Saverio is a systems engineer and a backend programmer at Ticketsolve. He is originally from Italy and currently lives in Germany. Saverio shares his journey as a Ruby developer and also his passions outside of work such as bouldering. Saverio fell in love with programming when he was 7 years old with COmmodere 64. He didn't follow up on it however until later when he was working as a consultant working as a System Administrator where he taught himself JavaScript. Later he taught himself Ruby on the job when he was working in London. Saverio has written several articles such as Saverio Miroddi’s article, “An overview of Desktop Ruby GUI Development in 2018” and Debugging a live/stuck Ruby process. Host: Charles Max Wood Joined by Special Guest: Saverio Miroddi Sponsors Sentry use the code “devchat” for 2 months free on Sentry small plan React Native Radio My Angular Story CacheFly Links RR 381: “Ruby GUI Development” with Saverio Miroddi saveriomiroddi (Saverio Miroddi) · GitHub https://saveriomiroddi.github.io Saverio's Twitter Savario's Blog Ticketsolve Saverio Miroddi’s article, “An overview of Desktop Ruby GUI Development in 2018” Picks Saverio Miroddi Terraform Providers - GitHub saveriomiroddi (Saverio Miroddi) · GitHub goby-lang/goby Charles Max Wood Superfans by Pat Flynn Reach out to Charles Max Wood at https://meetings.hubspot.com/chuck27/15-minute-listener-call RR 428: Arming the Rebels with Rails 6 Featuring David Heinemeier Hansson Running with the right running gear
Saverio Miroddi joins Charles Max Wood on this week's My Ruby Story. Saverio is a systems engineer and a backend programmer at Ticketsolve. He is originally from Italy and currently lives in Germany. Saverio shares his journey as a Ruby developer and also his passions outside of work such as bouldering. Saverio fell in love with programming when he was 7 years old with COmmodere 64. He didn't follow up on it however until later when he was working as a consultant working as a System Administrator where he taught himself JavaScript. Later he taught himself Ruby on the job when he was working in London. Saverio has written several articles such as Saverio Miroddi’s article, “An overview of Desktop Ruby GUI Development in 2018” and Debugging a live/stuck Ruby process. Host: Charles Max Wood Joined by Special Guest: Saverio Miroddi Sponsors Sentry use the code “devchat” for 2 months free on Sentry small plan React Native Radio My Angular Story CacheFly Links RR 381: “Ruby GUI Development” with Saverio Miroddi saveriomiroddi (Saverio Miroddi) · GitHub https://saveriomiroddi.github.io Saverio's Twitter Savario's Blog Ticketsolve Saverio Miroddi’s article, “An overview of Desktop Ruby GUI Development in 2018” Picks Saverio Miroddi Terraform Providers - GitHub saveriomiroddi (Saverio Miroddi) · GitHub goby-lang/goby Charles Max Wood Superfans by Pat Flynn Reach out to Charles Max Wood at https://meetings.hubspot.com/chuck27/15-minute-listener-call RR 428: Arming the Rebels with Rails 6 Featuring David Heinemeier Hansson Running with the right running gear
In this episode, we hear from System Administrator, Samuel Udoh, and Software Engineer, Simeron Taak, about how they got into the technology industry after attending a technology academy. They talk openly about their experiences of the academy route they chose, how to stay resilient when job hunting, and offer advice to anyone who’s looking to get into the industry but doesn’t know where to start.
Policy Research Associates is committed to the well-being and wellness of individuals with behavioral health conditions. To help spread information about the importance of the Eight Dimensions of Wellness in recovery, we created a podcast series to address each pillar of wellness. In this podcast, you’ll hear PRA employees discuss how social wellness plays an integral role in their lives and overall wellness. Featured in the podcast are Michael Foley, System Administrator; along with Senior Project Associates Abigail Kirkman, Ashley Krider, and Dazara Ware. Nicole Vincent-Roller, Communications Specialist at PRA, moderates the episode. In this episode, the presenters discuss different activities they take part in to enhance their social wellness, how those activities enhance other wellness dimensions, strategies they have used to connect with others, and much more! To learn more about PRA’s work on well-being and wellness, contact us at wellbeing@prainc.com.
In this episode I talk about why System Administrator is my favorite IT role. Today’s Show This following is highly influenced by my own opinions and experiences The System Administrator role is my favorite in the IT field Education & Experience requirements 4+ years with 4 year degree 8+ years without degree Responsibilities Wide range … Continue reading "SAS 015 – Why I Love Being A System Administrator"
In this episode, Dave and Jamison answer these questions: I’m working for minimum wage as a full Systems Administrator at a State University while I’m taking classes. I really like working here, but I need to make at LEAST 40K /year to justify this level of effort for much longer. I just got offered a job two hours away for 80 - 100K as a System Administrator at a smallish ISP. The same day my boss told me he got approval to hire me on at 45K in 3 - 4 months. If I wait and stay I’m not making what I feel I’m worth, but if I leave I’ll make WAY more money and probably won’t finish my bachelor’s degree. I already have 5 years of experience as a ““system admin”” but I want to move over to technical project management in the next 10 years. I think I should stay, make less money, continue growing my relationships in the Scholastic Network, and finish getting my Bachelor’s degree. That way I can get past HR checks to become a Project Manager somewhere else. What should I do? I’ve recently become the technical lead at my company. I need to build my team more but am struggling with one thing. How do I overcome the fear of hiring someone better than me who could potentially overtake me as the team lead? Is this a common fear among leaders? I want to build an effective team of high caliber developers. But I can’t do that if I let my ego and insecurity get in the way.
Looking to get into open source but not sure where to start? Are you a contributor trying to understand why only some pull requests get accepted? Or are you a maintainer who’s feeling overwhelmed? This episode looks at what it means to commit to an open source project. We follow our heroes as they progress through the roles of open source contributors: from finding projects and contributing to them, to building and maintaining thriving communities. Shannon Crabill shares how she got her start in open source at Hacktoberfest 2017, and Corinne Warnshuis describes how important it is to include people from all backgrounds to create good software. There are many ways to contribute to open source. Let’s walk through this together. For more about the characters, history, and stories of this episode, visit redhat.com/commandlineheroes. While there, check out how you can contribute to hero-engine and Command Line Heroes: The Game — all levels welcome.
Aaron Bendickson — system administrator, saint — talks about how he runs...
Mi gozo en un pozo... El bug que os comenté que tenía mi MacbookPro Retina 13" de 2015 con OS HighSierra 13.3.3, parecía que se había solucionado, pero no... No sé si el soporte técnico de Apple hará algo al respecto o finalmente me tocará restaurar el sistema...
On This Episode of The Beautiful Butterfly Radio Show We Welcome Special Guest Motivational Speaker Kyle A. Greene! Meet Out Guest: Kyle A. Greene was born in Savannah, Georgia and raised in a small town located on the outskirts of Jasper County. He is a class of 2004 graduate of Benedict College, where he received his Bachelor’s degree in Computer Information Science. He is currently employed at Blue Cross Blue Shield of South Carolina where he works as a System Administrator. He holds 3 CompTia certifications in A+, Network+ and Security+. He also has a Certificate of Completion with an Apprenticeship as a Network Support Technician from the United States Department of Labor.Kyle has been speaking to middle schools, high schools, charter schools, colleges, non-profit organizations, and churches throughout the Southeast spreading his message of hope, love, and purpose.
In this episode we discuss what it is like being a System Administrator. Host: Paul Joyner Email: paul@sysadmintoday.com Facebook: https://www.facebook.com/sysadmintoday Twitter: https://twitter.com/SysadminToday IT Pro TV https://itpro.tv/ PluralSight https://www.pluralsight.com/ Altaro Backup Solution http://www.altaro.com/ AirServer https://www.airserver.com/ Synology https://www.synology.com/ Please Support the Channel https://www.patreon.com/sysadmintoday/ Download and subscribe to this show at http://sysadmintoday.com
This 1 hour course is designed to provide basic and advanced knowledge in the use of social media during investigations. Social media can be a gold mine of information for investigators who know how to properly access and explore cyber space for information. This course is designed for commissioned private investigators or non-commissioned investigators required to gather information for court presentations. Additional material has been added and updates have been made to the original presentation. In addition, attendees will be provided with a host of tool and resources to assist them with their investigations. JJ Goulbourne is currently the IT Manager for the Barry Lawrence Regional Library and has been with the Lawrence County Sheriff’s Office for the past 10 years. Prior to that, he was with the Christian County Prosecutor’s Office as an Investigator and System Administrator. He previously worked for the Greene County Prosecutor’s Office for 5 years as System Administrator and 1 of 3 Investigators, and a Reserve Deputy with the Greene County Sheriff’s Office assigned to the Training Division as a Firearms Instructor. He spent 4 years as an IT Technician with the Greene County Information Systems Department. He has a total of 23 years law enforcement experience. He is a Military Veteran with 16 years Military experience.
As a self-described unconventional CEO and driven entrepreneur, Mike Tatar is Founder and Chief Executive Officer of VyonCloud, headquartered in Phoenix, Arizona. But don’t call him CEO. Mike much prefers keeping things on a first name basis. Mike oversees corporate operations to ensure quality service and support for VyonCloud’s small to mid-sized business customers. VyonCloud offers custom cloud solutions and support services including: Application Hosting, Virtual Desktop Infrastructure, Office 365, Business Class Email and Virtual Private Servers. Before starting VyonCloud, Mike was co-owner and Sr. System Administrator of Invision Technology Solutions. Mike holds a BS in Information Systems from Western International University and an MBA in Technology Management from the University of Phoenix. http://vyoncloud.com/ https://www.facebook.com/Vyon-Cloud-1523754441205792/ https://twitter.com/vyoncloud
Sitting in a sometimes noisy coffee shop on a unusually cold Brisbane day, Craig sits down for a chat with Justin Hennessy, a Scrum Master, Devops and System Administrator all rolled into one! “An Agile Team Reset” article on the Scrum Alliance The High Performance Tree by Lyssa Adkins resetting awesome early Agile experience shaped by … Continue reading →
Many people in the OWASP community don't know Dennis Groves... and that's a surprise since he is one of the co-founders of the movement. I was able to catch up with Dennis at AppSec USA in New York City (November 19, 2013) and we had an interesting discussion about the beginnings of OWASP and what he sees in the future. Highlights of our Discussion * The event that triggered the inspiration for OWASP * The original purpose of OWASP * The use of OWASP as a de facto standard * Future vision for OWASP * The dilemma of community obligation About Dennis Groves Dennis Groves's work focuses on a multidisciplinary approach to risk management. He is particularly interested in risk, randomness, and uncertainty. He holds an MSc in Information Security from the University of Royal Holloway where his thesis received a distinction. He is currently a UK expert for the UK mirror of ISO subcommittee 27, IT Security Techniques, working group 4, Security Controls and Services at the British Standards Institute. He is most well known for co-founding OWASP. His contributions to OWASP include the ‘OWASP Guide (v1)’ downloaded over 2 million times; now a reference document in the PCI DSS standard, and the de-facto standard for securing web applications. He is a thought leader in the web application security space, where he has spent the last decade of his career. Dennis Groves has been an Security Architect, Ethical Hacker, Web Application Security Consultant, IT Security Consultant, System Administrator, Network Administrator, and a Software Engineer. He has taught various courses on information security and is best known for his ability to bring fresh insight to difficult security problems. Specialties:Risk Management, Threat Modeling, Security Architecture, Application Security, and "the big picture".
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
After three years of community development, the Open Web Application Security Project (OWASP) is proud to introduce the next generation of web application security standards at BlackHat USA 2005. The Guide to Securing Web Applications and Services 2.0 is a major new release - written from the ground up, with many new sections covering common and emerging risks, including: * How to design more secure software * How to conduct a security review using the Guide * How to perform the most difficult web application processes correctly: processing credit cards, interacting with payment gateways (such as PayPayl), and anti-phishing controls * Reorganized and easily navigated chapters on web application controls including: web services, comprehensive authentication and authorization controls, session management, data validation, interpreter injection, and many new controls within existing chapters * Secure configuration and deployment * And software quality assurance. The Guide has adopted and extended the popular OWASP Top 10 approach - security objectives, how to identify if you are at risk, with recommended remediations in three popular frameworks, and further reading. The Guide is platform neutral, and has examples in J2EE, ASP.NET and PHP. The Guide 2.0 is on the conference materials CD-ROM in its entirety. As it is free (as in beer as well as in freedom), you can redistribute or print it as often as you wish. To demonstrate the incredible versatility of the Guide and its pragmatic approach, we will be conducting a live security review of software selected at random by the audience. To perform the review demonstration, we will be using just a few off-the-shelf web development tools with Firefox to demonstrate how easy it is to subvert the average application, and how simple it is to fix issues properly by using the Guide. We expect this talk will be useful to all attendees, but those who set secure coding standards within their organization, manage risk from custom software, manage software development or are software architects or developers will benefit the most from attending this session. Andrew van der Stock is among the many contributors to the OWASP project over the years. Andrew has presented at many conferences, including BlackHat USA, linux.conf.au, and AusCERT, and is a leading Australian web application researcher. He helps run the OWASP Melbourne chapter, started the OWASP Sydney chapter, and is ex-President of SAGE-AU, the System Administrator's Guild of Australia. You can read more about OWASP, the Open Web Application Security Project at http://www.owasp.org/ and you can read more about Andrew at http://www.greebo.net/>
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
After three years of community development, the Open Web Application Security Project (OWASP) is proud to introduce the next generation of web application security standards at BlackHat USA 2005. The Guide to Securing Web Applications and Services 2.0 is a major new release - written from the ground up, with many new sections covering common and emerging risks, including: * How to design more secure software * How to conduct a security review using the Guide * How to perform the most difficult web application processes correctly: processing credit cards, interacting with payment gateways (such as PayPayl), and anti-phishing controls * Reorganized and easily navigated chapters on web application controls including: web services, comprehensive authentication and authorization controls, session management, data validation, interpreter injection, and many new controls within existing chapters * Secure configuration and deployment * And software quality assurance. The Guide has adopted and extended the popular OWASP Top 10 approach - security objectives, how to identify if you are at risk, with recommended remediations in three popular frameworks, and further reading. The Guide is platform neutral, and has examples in J2EE, ASP.NET and PHP. The Guide 2.0 is on the conference materials CD-ROM in its entirety. As it is free (as in beer as well as in freedom), you can redistribute or print it as often as you wish. To demonstrate the incredible versatility of the Guide and its pragmatic approach, we will be conducting a live security review of software selected at random by the audience. To perform the review demonstration, we will be using just a few off-the-shelf web development tools with Firefox to demonstrate how easy it is to subvert the average application, and how simple it is to fix issues properly by using the Guide. We expect this talk will be useful to all attendees, but those who set secure coding standards within their organization, manage risk from custom software, manage software development or are software architects or developers will benefit the most from attending this session. Andrew van der Stock is among the many contributors to the OWASP project over the years. Andrew has presented at many conferences, including BlackHat USA, linux.conf.au, and AusCERT, and is a leading Australian web application researcher. He helps run the OWASP Melbourne chapter, started the OWASP Sydney chapter, and is ex-President of SAGE-AU, the System Administrator's Guild of Australia. You can read more about OWASP, the Open Web Application Security Project at http://www.owasp.org/ and you can read more about Andrew at http://www.greebo.net/>