Session Presentation

Total Page:16

File Type:pdf, Size:1020Kb

Session Presentation Secure Your Enterprise Apps! A journey in automating application security and deploying policy control in a cloud world Scott Ryan – Global Technical Solution Architect @saryan210 BRKCLD-2431 #CLUS Agenda • The Changing Landscape and Security Threats • The Journey to Automating Policy to Securely Deploy Applications and Services • Application and Service Deployment Rationalization • Operational Shifts “People, Process, and Tools” • Securing the Application Development Lifecycle • Automating Policy to Securely Deploy Applications and Services • Conclusion #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Live Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot# BRKCLD-2431 by the speaker until June 16, 2019. #CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Security Threats and Changing Landscape The Changing Landscape Devices / Users Devices Network NetworK Users Anywhere / Anything As-a-Service Model Identity-as-a-Service Software Defined Unmanaged IOT Devices As-Code Storage Applications Storage Applications Anywhere Data Protection Secure SDLC Regulations (GDPR) Cloud Native & Data Virtualization Microservice Storage-as-a-Service Compute Architecture Compute Serverless Compute Containers #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Cost of Data Breaches • Average total cost of a data breach: $3.86M • Average cost per lost or stolen record: $148 • The mean time to identify (MTTI) was 197 days • The mean time to contain (MTTC) was 69 days • Average cost of a breach with Automation $2.88M • Without automation, estimated cost is $4.43M • $1.55M Net Difference #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Application Security Trends Application Microservices Devices Vulnerabilities NetworK Vulnerabilities Serious application security Users More vulnerabilities per line of vulnerabilities continues to code than traditional applications increase at a rate that makes remediation nearly impossible Reusable Software Mobile Applications Vulnerabilities Storage Applications Vulnerabilities 70% of applications comprised 85% of mobile apps of reusable software (3rd party, violated one or more of Open Source) that inherit these the OWASP Mobile Top 10 vulnerabilities Compute Embed Security Testing Embed security within the SDLC process with monitoring to achieve significantly better application security and **Reference – “2018 Application Security Statistics Report” compliance #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Top Application Security Challenges • Manual and complex identity and access management for users/devices and applications from anywhere • Limited Realtime Visibility, Monitoring, and Enforcement consistency • Mapping Business Policy to Application Deployment Policy • Not all applications are equal “Cloud Enabled vs. Cloud Native” • Lack of automating security testing and embedding security into the Application Development Lifecycle • Changing the Operational organization, process, and culture #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Journey to Securing Enterprise Applications in a Cloud World Journey to Securing Enterprise Applications in a Cloud World Current State Future State • Manual and complex identity and access management for • Deploy segmentation and automate Identity and users/devices and applications from anywhere Access Control • Limited Security Visibility, Monitoring, and Enforcement • Automate realtime visibility and monitoring tools consistency into the Application Development Lifecycle • Automating security into the Application Development • Automate security enforcement into the Lifecycle Application Development Lifecycle • Mapping Business Policy to Application Deployment • Integrate ITSM tools to automated business policy Security Policy into security enforcement policies • Not all applications require the same security “Cloud • Deploy the proper security architecture and Enabled vs. Cloud Native” enforcement for your cloud applications • Complex SECOPS and NETOPS process and culture • Align your operational Process, People and Tools to provide the agility and security needed to support a DevOps and SecDevOps environment for cloud applications. #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 The Journey to the • Static Future State • Scripting/Templates • Automation The beginning of the Journey is different for • Orchestration many • Intent / Policy BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 • Increase agility to deploy The Journey to the applications while increasing security and Future State compliance. • Driving consistency in securing applications deployed anywhere and Benefits and Drivers accessed from anywhere • Securing Enterprise Cloud Applications with an Intent Driven Process and Architecture BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Align your The Journey Organizations and Culture Automate Visibility and Application Automate Monitoring Tools & Services Segmentation Deployment Rationalization Automate Policy Enforcement Automate Identity and Access Control Deploy consistent Application & Security Architectures #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 The Journey to the Future State • Simplify • Rationalization • Define Classification • Define Policy • Define Policy Enforcement • Automate within the How do you get there!!! Deployment Lifecycle • Align Organization and Culture to an Intent Based process and architecture BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Application and Service Deployment Rationalization Application and Service Deployment Options As-a-Service Multicloud Cloud Enabled Cloud Native Data Center Edge Branch Enterprise IOT Mobile Office Campus #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Cloud Enabled Cloud Native Application Architecture Application Architecture HTTP HTTP API Gateway Presentation Layer RPC HTTP AMQP HTTP Service Service Service Service Database Access AMQP Monolith Microservice Policy Enforcement “Cloud Enabled” “Cloud Native” #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Application and Service Deployment Rationalization Automating Application and Service Lifecycle for NetOPS and SecOPS SecDevOps Approach - Continuous Integration and Delivery Pipeline (CI/CD) Build Deploy Operate Component Commit/ Integration E2E Acceptance Design Code Unit Test Deploy Test Merge Test Test Sanity Test TLP Security Security Secure Secure Security Secure Security Vulnerability Integration Solution Deploy Design Coding Test Case Pipeline Sanity Tests Check Tests Tests DevOps + Security Model = SecDevOps #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 Application and Service Deployment Rationalization Application and Service Deployment Multicloud Where? Data Center Edge Branch Enterprise IOT Mobile Office Campus #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 Application and Service Deployment Rationalization Application and Service Deployment Secure Coding App Vulnerability Checking Multicloud Segmentation What? Realtime Visibility and Analytics Identity and Access Control Data Center Edge Branch Enterprise IOT Mobile Office Campus #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 Application and Service Deployment Rationalization Application and Service Deployment – Policy Enforcement Multicloud Policy Enforcement Data Center Edge Branch Enterprise IOT Mobile Office Campus #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Application and Service Deployment Rationalization Evolution of Security for SecOps and DevOps teams Identity and Segmentation Realtime Access Control Visibility and Analytics Application Secure Vulnerability Coding Checking and Programming #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 Operational Shifts “People, Process, and Tools” Security is beyond architecture and technology BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 People Security is beyond Tools & architecture and technology Technology Process BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 Business People Development Roles & Responsibility Operations Security BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 Innovation Acceleration and Individual Priorities Business Developers Operations Team Security Team Speed to Market Freedom to access One consistent Visibility and control while while retaining the best platforms environment to across one hybrid brand trust and and tools for eliminate silos and environment without compliance increased agility drive efficiency slowing innovation #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved.
Recommended publications
  • Detecting and Exploiting Misexposed Components of Android Applications
    POLITECNICO DI TORINO Corso di Laurea in Ingegneria Informatica Tesi di Laurea Magistrale Detecting and exploiting misexposed components of Android applications Relatori prof. Antonio Lioy prof. Ugo Buy Francesco Pinci December 2018 To my parents, my sister, and my relatives, who have been my supporters throughout my entire journey, always believing in me, and providing me with continous encouragement. This accomplishment would not have been possible without them. Thank you. Summary Smartphones and tablets have become an essential element in our everyday lives. Everyone use these devices to send messages, make phone calls, make payments, manage appointments and surf the web. All these use cases imply that they have access to and collect user sensitive information at every moment. This has attracted the attention of attackers, who started targetting them. The attraction is demon- strated by the continuous increase in the sophistication and number of malware that has mobile devices as the target [1][2]. The Android project is an open-source software which can be downloaded and studied by anyone. Its openness has allowed, during the years, an intensive in- spection and testing by developers and researches. This led Google to constantly updating its product with new functionalities as well as with bug fixes. Various types of attacks have targetted the Android software but all of them have been mitigated with the introduction of new security mechanisms and extra prevention methods. Starting from September 2018, 16 major versions of the OS have been realized, reducing incredibly the attack surface exposed by the system. The application ecosystem developed by the Android project is a key factor for the incredible popularity of the mobile devices manufactured and sold with the OS.
    [Show full text]
  • The Book of Apigee Edge Antipatterns V2.0
    The Book of Apigee Edge Antipatterns Avoid common pitfalls, maximize the power of your APIs Version 2.0 Google Cloud ​Privileged and confidential. ​apigee 1 Contents Introduction to Antipatterns 3 What is this book about? 4 Why did we write it? 5 Antipattern Context 5 Target Audience 5 Authors 6 Acknowledgements 6 Edge Antipatterns 1. Policy Antipatterns 8 1.1. Use waitForComplete() in JavaScript code 8 1.2. Set Long Expiration time for OAuth Access and Refresh Token 13 1.3. Use Greedy Quantifiers in RegularExpressionProtection policy​ 16 1.4. Cache Error Responses 19 1.5. Store data greater than 512kb size in Cache ​24 1.6. Log data to third party servers using JavaScript policy 27 1.7. Invoke the MessageLogging policy multiple times in an API proxy​ 29 1.8. Configure a Non Distributed Quota 36 1.9. Re-use a Quota policy 38 1.10. Use the RaiseFault policy under inappropriate conditions​ 44 1.11. Access multi-value HTTP Headers incorrectly in an API proxy​ 49 1.12. Use Service Callout policy to invoke a backend service in a No Target API proxy 54 Google Cloud ​Privileged and confidential. ​apigee 2 2. Performance Antipatterns 58 2.1. Leave unused NodeJS API Proxies deployed 58 3. Generic Antipatterns 60 3.1. Invoke Management API calls from an API proxy 60 3.2. Invoke a Proxy within Proxy using custom code or as a Target 65 3.3. Manage Edge Resources without using Source Control Management 69 3.4. Define multiple virtual hosts with same host alias and port number​ 73 3.5.
    [Show full text]
  • Comparative Analysis of NLP Models for Google Meet Transcript Summarization
    EasyChair Preprint № 5404 Comparative Analysis of NLP models for Google Meet Transcript Summarization Yash Agrawal, Atul Thakre, Tejas Tapas, Ayush Kedia, Yash Telkhade and Vasundhara Rathod EasyChair preprints are intended for rapid dissemination of research results and are integrated with the rest of EasyChair. April 28, 2021 Comparative Analysis of NLP models for Google Meet Transcript Summarization Yash Agrawal1,a) Atul Thakre1,b) Tejas Tapas1,c) Ayush Kedia1,d) Yash Telkhade1,e) Vasundhara Rathod1,f) 1) Computer Science & Engineering, Shri Ramdeobaba College of Engineering and Management, Nagpur, India a) [email protected] , +91 7083645470 b) [email protected] , +91 8956758226 c) [email protected] , +918380073925 d) [email protected] , +91 8459811323 e) [email protected] , +91 9021067230 f) [email protected], +918055225407 Abstract. Manual transcription and summarization is a cumbersome process necessitating the development of an efficient automatic text summarization technique. In this study, a Chrome extension is used for making the process of transcription hassle- free. It uses the text summarization technique to generate concise and succinct matter. Also, the tool is accessorized using Google Translation, to convert the processed text into users' desired language. This paper illustrates, how captions can be traced from the online meetings, corresponding to which, meeting transcript is sent to the backend where it is summarized using an NLP model. It also walks through three different NLP models and presents a comparative study among them. The NLTK model utilizes the sentence ranking technique for extractive summarization. Word Embedding model uses pre-trained Glove Embeddings for extractive summarization. The T5 model performs abstractive summarization using transformer architecture.
    [Show full text]
  • Are3na Crabbé Et Al
    ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA ISA Action 1.17: A Reusable INSPIRE Reference Platform (ARE3NA) Authentication, Authorization & Accounting for Data and Services in EU Public Administrations D1.1.2 & D1.2.2– Analysing standards and technologies for AAA Ann Crabbé Danny Vandenbroucke Andreas Matheus Dirk Frigne Frank Maes Reijer Copier 0 ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA This publication is a Deliverable of Action 1.17 of the Interoperability Solutions for European Public Admin- istrations (ISA) Programme of the European Union, A Reusable INSPIRE Reference Platform (ARE3NA), managed by the Joint Research Centre, the European Commission’s in-house science service. Disclaimer The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. Copyright notice © European Union, 2014. Reuse is authorised, provided the source is acknowledged. The reuse policy of the European Commission is implemented by the Decision on the reuse of Commission documents of 12 December 2011. Bibliographic Information: Ann Crabbé, Danny Vandenbroucke, Andreas Matheus, Dirk Frigne, Frank Maes and Reijer Copier Authenti- cation, Authorization and Accounting for Data and Services in EU Public Administrations: D1.1.2 & D1.2.2 – Analysing standards and technologies for AAA. European Commission; 2014. JRC92555 1 ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA Contents 1.
    [Show full text]
  • Sankei Digital Enabled Data-Driven Decision Making to Assess Website
    Case Study Sankei Digital enabled data-driven decision Partnership making to assess website engagement, user The Japanese newspaper industry is facing a decline in readership due to digitization, an consumption, and pave the path to subscriptions aging print readership, the rise of emerging media, and global economic changes. Print Google, in cooperation with e-Agency, a Google Analytics 360 authorized reseller, newspaper sales in Japan witnessed a more worked with Sankei Digital to match audience segments to different revenue streams than 20-percent decline between 2008 and such as ads and paid content. This enabled them to adopt a set of strategies to engage 2018, indicating that digital transformation with different audiences. is crucial for the continued survival of newspapers. (Source: Nihon Shinbun Kyokai.) The Project Sankei Digital Inc. has been using Google’s ad monetization products since 2004. They Google News Initiative, in cooperation with e-Agency, a Google Analytics 360 authorized reseller, currently use both Google Ad Manager 360 and worked with Sankei Digital to match audience segments to different revenue streams such as Google Analytics 360 to maximize ad revenue. ads and paid content. This enabled them to adopt a set of strategies to engage with different audiences. This collaboration resulted in two key outcomes: Overview 1. Dashboard-based data visualization Sankei Digital provides an array of digital Google and e-Agency built a dashboard to help Sankei Digital analyze their performance for services for Sankei Shimbun Co., Ltd., subscriptions, ad revenue, and user engagement. It was built by using the data framework including an online newspaper.
    [Show full text]
  • Quick Deployment Guide for Enabling Remote Working with Hangouts Meet
    Enabling Remote Working with Hangouts Meet and Hangouts Chat: A quick deployment guide Work Transformation: Productivity & Collaboration Contents About this guide 2 1. Requirements 4 1.1 General requirements 4 1.2 Network requirements 4 1.3 Optimize Meet traffic for remote workers 5 2. Set up G Suite 7 2.1 Enroll in G Suite 7 2.2 Verify your domain 12 2.3 Provision your users 14 Step 1: Open the user management interface 14 Step 2: Download the CSV template file 15 Step 3: Add your users to the CSV template 16 Step 4: Upload the CSV file and provision your users 17 Troubleshooting upload errors 17 2.4 Distribute user credentials 18 2.5 Disable out-of-scope G Suite applications 19 2.6 Configure Meet 20 2.7 Configure Chat 22 2.8 Securing your setup 22 3. Appendix: User guide 22 3.1 Documentation hub 22 3.2 Meet/Calendar integrations 23 Schedule your meetings with Google Calendar 23 Deploy the Microsoft Outlook Meet plug-in 24 1 About this guide Highlights To provide companies with a deployment plan and guide to quickly Purpose enable remote working using Google Meet and Google Chat. Intended IT administrators audience Key That the audience has the required access and rights documented in the assumptions general requirements​. This document provides guidance for quickly bootstrapping your company with the adoption of Hangouts Meet (for video conferencing) and Hangouts Chat (for instant messaging). Since Hangouts Meet and Hangouts Chat are part of the G Suite offering, this guide will walk you through the steps required to create a G Suite account, configure the billing, create the users, secure your setup, and teach your users how to use the communication suite.
    [Show full text]
  • Free Download
    2021 TREND STUDY DIGITAL ANALYTICS & MARKETING ACTIVATION Trakken GmbH Zirkusweg 1 20359 Hamburg Germany [email protected] www.trkkn.com www.analytics-trends.com Contents 1 Preface 3 2 Analysis approach 4 3 Overview of results & respondents‘ self-assessment 36 4 Results in detail 4.1 First party data collection 11 4.2 Reporting & steering 17 4.3 Data storage 20 4.4 Data enrichment 22 4.5 Activation 25 4.6 Outlook 2021 28 2 3 1 - PREFACE MOIN For the sixth time now, we are publishing the trend study, in which we analyze the current and now established to- pics of digital analytics. For the past four years, we have been analyzing the trends in conversion optimization as well. And because we don‘t stagnate, we have expanded the concept again this year and are now looking at the entire field of digital analytics and marketing activation. This study is intended to identify industry trends, which is why we consider it important to ask the same ques- tions about digital analytics and conversion optimization on an annual basis. In addition, we also aim to reflect the changes in our fast-moving industry and to integrate as comprehensively as possible all related areas that are clo- sely connected with digital analytics and conversion op- timization. The result, a completely new structure of the study with a handful of new questions, while retaining the previous core questions. The chapters now cover all rele- vant areas from data collection, monitoring, data storage and enrichment to activation. In addition to the answers to previous and new questions, which we always present in year-on-year comparisons where possible, we surveyed self-assessments in the respective areas.
    [Show full text]
  • Google for Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair
    Google For Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair Learn how tools built for teaching and learning, Discover the hidden worlds of our Take a field trip to virtually anywhere (even Explore works of art and stories from around Teach learners the fundamentals of digital Make the connection between coding and Learn the basics of Computer Science using the Create projects that show how Science, like Classroom, G Suite for Education, and National Parks on ranger-guided trips places school buses can’t go) using immersive the world with 360° tours of exhibits in over 70 safety and citizenship so they can be safe, creativity, empowering girls to engage with block-based programming language, Scratch. Technology, Engineering, and Math can be used Chromebooks, can increase engagement through virtual reality. AR and VR technology. different countries. confident explorers of the online world. technology and bring their ideas to life. to impact the world around us. and inspire curiosity. Google for National Google Google Arts Education Parks VR Expeditions & Culture Discover the hidden worlds of Explore works of art and stories Tools built for teaching and learning. Field trips to virtually anywhere. our National Parks. from around the world. Over 80 million teachers and students around the world Take a ranger-guided journey through the glaciers of What if you could journey to the surface of Mars or From The Metropolitan Museum of Art to Nairobi’s communicate and collaborate using Classroom and Alaska’s Kenai Fjords or get up close with active climb to the top of Machu Picchu without ever leaving Kenya National Archives, Google Arts & Culture offers G Suite for Education, while Chromebooks are the most volcanoes in Hawai’i.
    [Show full text]
  • Duo Access Gateway (SAML): Cisco ASA Only
    #CLMEL Duo Security: Journey toward Zero Trust Karl Lewis, Solutions Engineer - APJC BRKSEC-2718 #CLMEL BRK-2718 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space cs.co/ciscolivebot#BRKSEC-2718 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Agenda • Introduction • Where did Zero-Trust come from? • Why are traditional approaches Failing? • How does Zero-Trust address these new challenges? • What does the journey look like? Where do I get value? • Use Cases and Architecture– How does it really work? • Live Demo and Integrations discussion. • Q&A BRK-2718 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Different Words, Similar Ideas John Kindervag at Forrester describes a “Zero Trust model” 2009 2003-ish 2013 The Jericho Forum Google talks about their first discusses “de- implementation, called perimeterization” “BeyondCorp” #CLMEL © 2019BRK Cisco-2718 and/or its affiliates. All rights reserved. Cisco Public Don’t trust something just because it’s on the “inside” of your firewall. It doesn’t mean you don’t need a firewall. #CLMEL BRK-2718 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public BRK-2718 Traditional approaches to security are falling short. A Castle Wall only works when everything you need to protect is: INSIDE And the attackers are: OUTSIDE © 2019 Cisco and/or its affiliates.
    [Show full text]
  • Code Girl Tracey Acosta Santa Clara University
    Santa Clara University Scholar Commons Computer Engineering Senior Theses Engineering Senior Theses 6-1-2015 Code girl Tracey Acosta Santa Clara University Amanda Holl Santa Clara University Paige Rogalski Santa Clara University Follow this and additional works at: https://scholarcommons.scu.edu/cseng_senior Part of the Computer Engineering Commons Recommended Citation Acosta, Tracey; Holl, Amanda; and Rogalski, Paige, "Code girl" (2015). Computer Engineering Senior Theses. 43. https://scholarcommons.scu.edu/cseng_senior/43 This Thesis is brought to you for free and open access by the Engineering Senior Theses at Scholar Commons. It has been accepted for inclusion in Computer Engineering Senior Theses by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. Code Girl by Tracey Acosta Amanda Holl Paige Rogalski Submitted in partial fulfillment of the requirements for the degrees of Bachelor of Science Computer Science and Engineering Bachelor of Science in Web Design and Engineering School of Engineering Santa Clara University Santa Clara, California June 1, 2015 Code Girl Tracey Acosta Amanda Holl Paige Rogalski Computer Science and Engineering Web Design and Engineering Santa Clara University June 1, 2015 ABSTRACT Despite the growing importance of technology and computing, fewer than 1% of women in college today choose to major in computer science.[1] Educational programs and games created to interest girls in computing, such as Girls Who Code and Made With Code, have been successful in engaging girls with interactive and creative learning environments, but they are too advanced for young girls to benefit from. To address the lack of educational, computer science games designed specifically for young girls, we developed a web-based application called Code Girl for girls age five to eight to customize their own avatar using Blockly, an open-source visual coding editor developed by Google.
    [Show full text]
  • W Shekatkar Committee Report W Atmanirbhar Bharat Abhiyan W
    MONTHLY MAGAZINE FOR TNPSC EXAMS MAY–2020 w Atmanirbhar Bharat Abhiyan w Cleanest City List w Shekatkar Committee Report w Konark Sun Temple w Char Dham Project w Samagra Shiksha Abhiyan VETRII IAS STUDY CIRCLE TNPSC CURRENT AFFAIRS MAY - 2020 An ISO 9001 : 2015 Institution | Providing Excellence Since 2011 Head Office Old No.52, New No.1, 9th Street, F Block, 1st Avenue Main Road, (Near Istha siddhi Vinayakar Temple), Anna Nagar East – 600102. Phone: 044-2626 5326 | 98844 72636 | 98844 21666 | 98844 32666 Branches SALEM KOVAI No.189/1, Meyanoor Road, Near ARRS Multiplex, (Near Salem New No.347, D.S.Complex (3rd floor), Nehru Street,Near Gandhipuram bus Stand), Opp. Venkateshwara Complex, Salem - 636004. Central Bus Stand, Ramnagar, Kovai - 9 0427-2330307 | 95001 22022 75021 65390 Educarreerr Location Vivekanandha Educational Institutions for Women, Elayampalayam, Tiruchengode - TK Namakkal District - 637 205. 04288 - 234670 | 91 94437 34670 Patrician College of Arts and Science, 3, Canal Bank Rd, Gandhi Nagar, Opposite to Kotturpuram Railway Station, Adyar, Chennai - 600020. 044 - 24401362 | 044 - 24426913 Sree Saraswathi Thyagaraja College Palani Road, Thippampatti, Pollachi - 642 107 73737 66550 | 94432 66008 | 90951 66009 www.vetriias.com My Dear Aspirants, Greetings to all of you! “What we think we become” Gautama Buddha. We all have dreams. To make dreams come into reality it takes a lot of determination, dedication, self discipline and continuous effort. We at VETRII IAS Study Circle are committed to provide the right guidance, quality coaching and help every aspirants to achieve his or her life’s cherished goal of becoming a civil servant.
    [Show full text]
  • Google Suite's Top Features for Maximizing Analytics
    Google Suite’s Top Features for Maximizing Analytics Lydia Killian GOOGLE SUITE’S TOP FEATURES FOR MAXIMIZING ANALYTICS |2 Google Analytics is an indispensable tool for any business to better serve its customers, achieve business goals, and build successful marketing campaigns. Since Google Analytics launching in 2005, it has undergone many updates with added features. By integrating additional elements of the Google suite, one can optimize the data collected via Google Analytics. Organizations that are not taking advantage of these features are missing out on the full power of Google Analytics and forsaking valuable information that can help to better understand its customers. Google Analytics is specifically useful in the arts to track customer’s interactions with online collections, ticket sales, event registrations, or donation pathways. Yet, in 2015 Capacity International stated that over “90% of arts organizations indicated on a recent survey that they are not using Google Analytics to its potential.” This is likely due to limited time and resources in the sector. In organizations with limited resources, however, investing in efficient data collection through Google Analytics is even more important so that the crucial decision-making can be better informed with less room for error. Organizations with limited resources can improve their data collection methods by integrating other components from the Google Suite to better utilize their Google Analytics capabilities. Below is a list of seven useful tools to integrate with a Google Analytics account. Each feature includes a description of why it is beneficial and how to go about integrating it into a Google Analytics account.
    [Show full text]