-
From OEP-60: https://open-edx-proposals.readthedocs.io/en/latest/processes/oep-0060-proc-sec-group.html#focus-on-proactive-security-improvements
Example of problems: outdated or deprecated dependenci…
-
## Objective
Ensure the network can manage permissionless gateways, applications, services and other types of demand.
## Origin Document
- Related to living ticket: #621
- Related to supply …
-
I hope this is in the correct section
With the rise of importance and visibility of supply chain security, would kaniko support the generation of provenance when building docker images?
Similar …
-
## 📚 Context
### Problem:
Currently, there is a lack of visibility into the build process and contents of Docker images used in the project. This makes it challenging to assess the security ris…
-
SAP IBP ( Integrated business planning) is a process for translating desired business
outcomes into financial and operational resource requirements, with the overarching
the objective of maximizing …
-
* **Title**: Mr
* **Speaker**: Jonathan Campbell
* **Type**: (Presentation 30-45 mins | Lightning Talk 5-10 mins) Presentation / Discussion
* **Level**: (basic | standard | advanced) TBC
* **Tags…
-
To make best project, I think It's better to invastigate other similar courier exchange platforms.
Invastigation report can be showed like below and something.
- https://courierexchange.co.uk
…
-
Rough demo for policy execution against a dpp graph, automated based on one or more workflow(s) and policy definition(s).
-
Elevator Pitch:
To Prototype the utility of Helium Network based LongFi Protocol and Smart-Contract based Ethirium Blockchain Technology for quality tea production and systematic supply-chain t…
-
You all do a wonderful job identifying licenses and comparing them against a per-configured policy. Given the visibility you have into project components, would you please consider adding support for …