SlideShare une entreprise Scribd logo
1  sur  72
Télécharger pour lire hors ligne
Jessica	DeVita
Technical	Evangelist
Chef	Software
@ubergeekgirl
Baking Safety Into
Infrastructure Testing
What the heck is an
evangelist?
• Software
• Safety
• Common ground
• Compliance as code
Software is everywhere!
Motorcycles
Medical Devices
Pre-DevOps
DevOps to the rescue!
Why does safety matter?
What about Security?
Dev
QA
Security	Review
Staging
Prod
Patching
I love	working	with	our	security	team,	
Said	no one	ever
Regulations!
OFAC USA	PATRIOT	Act Gramm-Leach-Bliley	Act Red	Flags	Rule
Bank	Secrecy	Act Sarbanes-Oxley Regulation	E Dodd-Frank
False	Claims	Act HIPAA
European	Central	Bank	
regulations
Prudential	Regulation	
Authority
Financial	Conduct	
Authority
HITECH PCI	DSS
"Society's ability to regulate industries
effectively is limited by it's ability to access
and understand code, as we saw with the
VW emissions scandal." @richardjpope
Fear-based culture
Safety can be predicted by
organizational culture
RonWestrum
Psychological Safety is the most powerful
predictor of successful teams
John
Allspaw
PDF Club
Common Ground
and Coordination
in Joint Activity
Intention
• Phases
• Signaling
• Coordination
devices &
costs
• Interpredictability
• Common Ground
• Directability
Common	Ground	in	Joint	Activity
• Intention
• Signals	and	cues
• Conversation,	effective	Coordination
• Inter-predictability
• Common	Ground
• Who	knows	what
• Taskwork vs.	teamwork
• Joint	action	ladder
Intention
Interdependence
Common ground is
Not a "thing"
Not a state
Instead, it is a process
an ongoing action: grounding
http://www.stefanomastrogiacomo.info/wp-content/uploads/2012/11/Common-Ground.png
Choreography
Choreography
Communication
proceeds on
two tracks:
Task
Work
Team
Work
Signaling
Signaling carries a responsibility
to judge the interrupt-ability of
the other person
http://corgibytes.com/blog/2016/04/15/inception-layers/
ChatOps?
All communication
is done through the board
Coordination: managing dependencies
between activities
Coordination cannot be
manufactured through procedures
and explicit guidelines.
Common Ground is Not:
everyone having the same knowledge
Interpredictability
Common Ground
Pertinent Mutual Knowledge,
Beliefs, and Assumptions
roles and functions
routines
skills and competencies
goals and commitment
stance:
perceptions of time pressure
fatigue
competing priorities
Most important types:
Pertinent Mutual Knowledge,
Beliefs, and Assumptions
common ground is created or
lost during handoffs.
https://www.flickr.com/photos/53370644@N06/4976497160
Why	do	teams	lose	common	
ground?
• No experience working together
• Access to different data
• No clear rationale for the directives
• Ignorance of different stances
• Unexpected loss of communications and unskilled
at repairing the disruption
• Failure to monitor confirmation of messages
• Confusion over who knows what – fundamental
common ground breakdown
3.	Understand
Understanding
Acting
The Joint Action Ladder
4.	Act
2.	Perceive
1.	Attend
Fundamental Common
Ground Breakdown:
Common ground is not binary!
Teams engage in activities to support common
ground
• structuring preparations(establish routines)
• sustaining (clarifications, reminders)
• updating others about changes
• monitoring other team members
• detecting (anomalies, signals of loss of ground)
repairing the loss
"No matter how much care is taken,
breakdowns in common ground are
inevitable. No amount of procedure
or documentation can totally
prevent them."
High reliability organizations are marked by a
continual mindfulness, a continual searching for
indications of a loss of common ground
Safety	is	conveyed	through	actions
• actions	can	be	code
• actions	can	be	conversations
Making automation a team player
https://tctechcrunch2011.files.wordpress.com/2015/06/robotdap-e1433960740130.jpg
InSpec is compliance as code – a
human-readable language for
automating the continuous testing and
compliance auditing of your entire
infrastructure.
SSH	Control
SSH	supports	two	different	protocol	
versions.	The	original	version,	SSHv1,	
was	subject	to	a	number	of	security	
issues.	Please	use	SSHv2	instead	to	
avoid	these.
Mapping	Compliance	to	InSpec
control 'ssh-6.2.1' do
title 'Set SSH Protocol to 2'
end
Mapping	Compliance	to	InSpec
control 'ssh-6.2.1' do
title 'Set SSH Protocol to 2'
desc "
SSH supports two different ...
"
end
Mapping	Compliance	to	InSpec
control 'ssh-6.2.1' do
title 'Set SSH Protocol to 2'
desc "
SSH supports two different ...
"
describe sshd_config do
its('Protocol') { should cmp('2')
}
end
end
Mapping	Compliance	to	InSpec
control 'ssh-6.2.1' do
impact 1.0
title 'Set SSH Protocol to 2'
desc "
SSH supports two different ...
"
describe sshd_config do
its('Protocol') { should cmp('2')
}
end
end
Test Any Target
inspec exec test.rb
inspec exec test.rb -i ~/.aws/mandi_eu.pem -t ssh://ec2-
user@54.152.7.203
inspec exec test.rb -t winrm://Admin@192.168.1.2 --password
super
inspec exec test.rb -t docker://3dda08e75838
its.... should...
•it { should exist }
•it { should be_installed }
•it { should be_enabled }
•its('max_log_file') { should cmp 6 }
•its('exit_status') { should eq 0 }
•its('gid') { should eq 0 }
InSpec Profiles
include_controls 'os-hardening' do
skip_control 'os-06'
control 'os-02' do
impact 0.7
end
end
include_controls 'ssh-hardening'
describe security_policy do
its('PasswordComplexity') { should eq 1 }
end
describe sshd_config do
its('Port') { should eq('22') }
End
describe iis_site('Default Web Site') do
it { should
have_app_pool('DefaultAppPool') }
it { should have_binding('http *:80:') }
end
67
Truth can only be
found in one place:
the code.
Only the code can
truly tell you what it
does. It is the only
source of truly
accurate
information.
jessica@chef.io
@UberGeekGirl

Contenu connexe

Tendances

Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
 

Tendances (20)

Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
 
Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility Infrastructure
 
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersIntroduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology Selection
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident response
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Maturing your threat hunting program
Maturing your threat hunting programMaturing your threat hunting program
Maturing your threat hunting program
 
The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?The attack lifecycle. Cybereason can help you answer: Are you under attack?
The attack lifecycle. Cybereason can help you answer: Are you under attack?
 
The Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityThe Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial Security
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 

En vedette

L 7 Eggs Incubation and Chicks Brooding
L 7 Eggs Incubation and Chicks BroodingL 7 Eggs Incubation and Chicks Brooding
L 7 Eggs Incubation and Chicks Brooding
Osama Zahid
 
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...
Carlos Sanchez
 

En vedette (20)

DOES14 - Jessica DeVita - Microsoft - No Whiteboards Allowed
DOES14 - Jessica DeVita - Microsoft - No Whiteboards AllowedDOES14 - Jessica DeVita - Microsoft - No Whiteboards Allowed
DOES14 - Jessica DeVita - Microsoft - No Whiteboards Allowed
 
TechEd North America Speaker Idol Heat Presentation
TechEd North America Speaker Idol Heat PresentationTechEd North America Speaker Idol Heat Presentation
TechEd North America Speaker Idol Heat Presentation
 
L 7 Eggs Incubation and Chicks Brooding
L 7 Eggs Incubation and Chicks BroodingL 7 Eggs Incubation and Chicks Brooding
L 7 Eggs Incubation and Chicks Brooding
 
Force feeding
Force feedingForce feeding
Force feeding
 
Poultry equipment for broilers
Poultry equipment for broilersPoultry equipment for broilers
Poultry equipment for broilers
 
Essential_oils_peppermint oil and NDV vaccination
Essential_oils_peppermint oil and NDV vaccination Essential_oils_peppermint oil and NDV vaccination
Essential_oils_peppermint oil and NDV vaccination
 
Environmental concers associated with poultry manure and it's management .
Environmental concers associated with poultry manure and it's management .Environmental concers associated with poultry manure and it's management .
Environmental concers associated with poultry manure and it's management .
 
Transporting refrigerated vaccine
Transporting refrigerated vaccineTransporting refrigerated vaccine
Transporting refrigerated vaccine
 
Water_Soluble_Vtamines_for_Poultry
Water_Soluble_Vtamines_for_PoultryWater_Soluble_Vtamines_for_Poultry
Water_Soluble_Vtamines_for_Poultry
 
Prevention and control of Mycoplasma sinoviae without vaccination
Prevention and control of Mycoplasma sinoviae without vaccinationPrevention and control of Mycoplasma sinoviae without vaccination
Prevention and control of Mycoplasma sinoviae without vaccination
 
Antimycotoxin_Mycotoxin_Binders
Antimycotoxin_Mycotoxin_BindersAntimycotoxin_Mycotoxin_Binders
Antimycotoxin_Mycotoxin_Binders
 
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...
 
VMWare Lab For Training, Testing or Proof of Concept
VMWare Lab For Training, Testing or Proof of ConceptVMWare Lab For Training, Testing or Proof of Concept
VMWare Lab For Training, Testing or Proof of Concept
 
Antibiotics Groups - Streptogramins
Antibiotics Groups - StreptograminsAntibiotics Groups - Streptogramins
Antibiotics Groups - Streptogramins
 
Poultry production in Ethiopia: An overview
Poultry production in Ethiopia: An overviewPoultry production in Ethiopia: An overview
Poultry production in Ethiopia: An overview
 
Intestinal Parasites of Poultry
Intestinal Parasites of PoultryIntestinal Parasites of Poultry
Intestinal Parasites of Poultry
 
Antibiotic Groups - β-lactams
Antibiotic Groups - β-lactamsAntibiotic Groups - β-lactams
Antibiotic Groups - β-lactams
 
Poultry drinking water vaccination
Poultry drinking water vaccinationPoultry drinking water vaccination
Poultry drinking water vaccination
 
Preventive Maintenance for Mechanized Poultry Operations - Knowledge Day 2016
Preventive Maintenance for Mechanized Poultry Operations - Knowledge Day 2016Preventive Maintenance for Mechanized Poultry Operations - Knowledge Day 2016
Preventive Maintenance for Mechanized Poultry Operations - Knowledge Day 2016
 
Control of feed and water intake in poultry
Control of feed and water intake in poultryControl of feed and water intake in poultry
Control of feed and water intake in poultry
 

Similaire à Baking Safety into Infrastructure Testing

Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
Tim Wright
 

Similaire à Baking Safety into Infrastructure Testing (20)

The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibility
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsTechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Information Security 201
Information Security 201Information Security 201
Information Security 201
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 

Plus de Jessica DeVita

Plus de Jessica DeVita (8)

Retrospecting our Retrospectives
Retrospecting our RetrospectivesRetrospecting our Retrospectives
Retrospecting our Retrospectives
 
Unreachable Code
Unreachable CodeUnreachable Code
Unreachable Code
 
Bay Area Chef Meetup February
Bay Area Chef Meetup FebruaryBay Area Chef Meetup February
Bay Area Chef Meetup February
 
DevOps LA Meetup Intro to Habitat
DevOps LA Meetup Intro to HabitatDevOps LA Meetup Intro to Habitat
DevOps LA Meetup Intro to Habitat
 
Code Blue - DevOps Days SCV
Code Blue - DevOps Days SCVCode Blue - DevOps Days SCV
Code Blue - DevOps Days SCV
 
No Whiteboards Allowed - #DevOpsRSAC
No Whiteboards Allowed - #DevOpsRSACNo Whiteboards Allowed - #DevOpsRSAC
No Whiteboards Allowed - #DevOpsRSAC
 
An API Between US - LeanUX15 NYC
An API Between US - LeanUX15 NYCAn API Between US - LeanUX15 NYC
An API Between US - LeanUX15 NYC
 
Automate what you can, document what you can't and have the wisdom to know th...
Automate what you can, document what you can't and have the wisdom to know th...Automate what you can, document what you can't and have the wisdom to know th...
Automate what you can, document what you can't and have the wisdom to know th...
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Baking Safety into Infrastructure Testing