SlideShare a Scribd company logo
1 of 32
The Big Bang! Upgrading to Banner 8.1 Presented by: TJ Rains, PMP Associate CIO, Enterprise Systems Emporia State University April 12, 2010 Session ID 0042
Session Rules of Etiquette ,[object Object],[object Object],[object Object],Thank you for your cooperation! Session ID 0042
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
ESU’s Banner Environment  UDC Vision Realized at ESU
ESU’s Banner Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Supporting Software  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Session ID 0042
Enterprise Systems Team Structure
Enterprise Systems Team  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Enterprise Systems Team (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Banner 8.1 Project Management  Scope, Resources, Schedule
Project Management  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Project Scope (In Scope) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Project Timeline Session ID 0042
Project Schedule ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Project Schedule (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Project Schedule (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Business Process Analysis – Student
Business Process Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Output: Business Process Diagram Session ID 0042
Output: Testing Checklist Session ID 0042
Test Plans
Test Plan Development ,[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Issues Encountered
Issues Encountered ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Lessons Learned
Lessons Learned ,[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Presentation Supplements
Presentation Supplements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session ID 0042
Questions and Answers
Thank You! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SunGard, the SunGard logo,  the Open Digital Campus, Banner,  Luminis, and PowerCAMPUS are trademarks or registered trademarks of SunGard Data Systems Inc. or its subsidiaries in the U.S. and other countries. © 2009 SunGard. All rights reserved. © 2010 SunGard.  All rights reserved. Session ID 0042

More Related Content

What's hot

Solo Requisitos 2008 - 07 Upc
Solo Requisitos 2008 - 07 UpcSolo Requisitos 2008 - 07 Upc
Solo Requisitos 2008 - 07 UpcPepe
 
Software tester_6+ yrs of experience
Software tester_6+ yrs of experienceSoftware tester_6+ yrs of experience
Software tester_6+ yrs of experiencePramod dussa
 
Introduction To Software Engineering
 Introduction To Software Engineering Introduction To Software Engineering
Introduction To Software EngineeringMohsinAli773
 
Term 1 exam assessment task brief ITMM
Term 1 exam assessment task brief ITMMTerm 1 exam assessment task brief ITMM
Term 1 exam assessment task brief ITMMKelly Bauer
 
Section 508 Artifacts in the systems engineering life cycle 20100307 2030
Section 508 Artifacts in the systems engineering life cycle 20100307 2030Section 508 Artifacts in the systems engineering life cycle 20100307 2030
Section 508 Artifacts in the systems engineering life cycle 20100307 2030Norman Robinson
 
Defence engineering collage
Defence engineering collageDefence engineering collage
Defence engineering collageCharlton Inao
 

What's hot (8)

Solo Requisitos 2008 - 07 Upc
Solo Requisitos 2008 - 07 UpcSolo Requisitos 2008 - 07 Upc
Solo Requisitos 2008 - 07 Upc
 
Software tester_6+ yrs of experience
Software tester_6+ yrs of experienceSoftware tester_6+ yrs of experience
Software tester_6+ yrs of experience
 
PROPOSAL_FINAL
PROPOSAL_FINALPROPOSAL_FINAL
PROPOSAL_FINAL
 
Introduction To Software Engineering
 Introduction To Software Engineering Introduction To Software Engineering
Introduction To Software Engineering
 
Term 1 exam assessment task brief ITMM
Term 1 exam assessment task brief ITMMTerm 1 exam assessment task brief ITMM
Term 1 exam assessment task brief ITMM
 
Section 508 Artifacts in the systems engineering life cycle 20100307 2030
Section 508 Artifacts in the systems engineering life cycle 20100307 2030Section 508 Artifacts in the systems engineering life cycle 20100307 2030
Section 508 Artifacts in the systems engineering life cycle 20100307 2030
 
Defence engineering collage
Defence engineering collageDefence engineering collage
Defence engineering collage
 
0273710133 pp01v2
0273710133 pp01v20273710133 pp01v2
0273710133 pp01v2
 

Viewers also liked

Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesfarhanah
 
Prevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsPrevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsSmartBear
 
Banner XE CAUSE 2013 Part 2
Banner XE CAUSE 2013 Part 2Banner XE CAUSE 2013 Part 2
Banner XE CAUSE 2013 Part 2Jim Kane
 
Banner XE CAUSE 2013 part 1
Banner XE CAUSE 2013 part 1Banner XE CAUSE 2013 part 1
Banner XE CAUSE 2013 part 1Jim Kane
 
Riding the Overflow - Then and Now
Riding the Overflow - Then and NowRiding the Overflow - Then and Now
Riding the Overflow - Then and NowMiroslav Stampar
 
Data Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection AttacksData Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection AttacksMiroslav Stampar
 
2014 – Year of Broken Name Generator(s)
2014 – Year of Broken Name Generator(s)2014 – Year of Broken Name Generator(s)
2014 – Year of Broken Name Generator(s)Miroslav Stampar
 
Non-Esoteric XSS Tips & Tricks
Non-Esoteric XSS Tips & TricksNon-Esoteric XSS Tips & Tricks
Non-Esoteric XSS Tips & TricksMiroslav Stampar
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-VirusesAyman Hussein
 
SQL injection exploitation internals
SQL injection exploitation internalsSQL injection exploitation internals
SQL injection exploitation internalsBernardo Damele A. G.
 
Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...
Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...
Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...Bryan L. Mack
 
Banner 8 Upgrade at Higher Colleges of Technology
Banner 8 Upgrade at Higher Colleges of TechnologyBanner 8 Upgrade at Higher Colleges of Technology
Banner 8 Upgrade at Higher Colleges of TechnologyKhalid Tariq
 
sqlmap - why (not how) it works?
sqlmap - why (not how) it works?sqlmap - why (not how) it works?
sqlmap - why (not how) it works?Miroslav Stampar
 
Implementation of Oracle ExaData and OFM 11g with Banner in HCT
Implementation of Oracle ExaData and OFM 11g with Banner in HCTImplementation of Oracle ExaData and OFM 11g with Banner in HCT
Implementation of Oracle ExaData and OFM 11g with Banner in HCTKhalid Tariq
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Bernardo Damele A. G.
 
Expanding the control over the operating system from the database
Expanding the control over the operating system from the databaseExpanding the control over the operating system from the database
Expanding the control over the operating system from the databaseBernardo Damele A. G.
 
Got database access? Own the network!
Got database access? Own the network!Got database access? Own the network!
Got database access? Own the network!Bernardo Damele A. G.
 

Viewers also liked (20)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Prevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsPrevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIs
 
Banner XE CAUSE 2013 Part 2
Banner XE CAUSE 2013 Part 2Banner XE CAUSE 2013 Part 2
Banner XE CAUSE 2013 Part 2
 
Banner XE CAUSE 2013 part 1
Banner XE CAUSE 2013 part 1Banner XE CAUSE 2013 part 1
Banner XE CAUSE 2013 part 1
 
Curious Case of SQLi
Curious Case of SQLiCurious Case of SQLi
Curious Case of SQLi
 
Riding the Overflow - Then and Now
Riding the Overflow - Then and NowRiding the Overflow - Then and Now
Riding the Overflow - Then and Now
 
Data Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection AttacksData Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection Attacks
 
2014 – Year of Broken Name Generator(s)
2014 – Year of Broken Name Generator(s)2014 – Year of Broken Name Generator(s)
2014 – Year of Broken Name Generator(s)
 
Non-Esoteric XSS Tips & Tricks
Non-Esoteric XSS Tips & TricksNon-Esoteric XSS Tips & Tricks
Non-Esoteric XSS Tips & Tricks
 
Smashing the Buffer
Smashing the BufferSmashing the Buffer
Smashing the Buffer
 
Hash DoS Attack
Hash DoS AttackHash DoS Attack
Hash DoS Attack
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
SQL injection exploitation internals
SQL injection exploitation internalsSQL injection exploitation internals
SQL injection exploitation internals
 
Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...
Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...
Extending the Admin UI: Proactively Preventing Poor BPRA Load/Refresh Perform...
 
Banner 8 Upgrade at Higher Colleges of Technology
Banner 8 Upgrade at Higher Colleges of TechnologyBanner 8 Upgrade at Higher Colleges of Technology
Banner 8 Upgrade at Higher Colleges of Technology
 
sqlmap - why (not how) it works?
sqlmap - why (not how) it works?sqlmap - why (not how) it works?
sqlmap - why (not how) it works?
 
Implementation of Oracle ExaData and OFM 11g with Banner in HCT
Implementation of Oracle ExaData and OFM 11g with Banner in HCTImplementation of Oracle ExaData and OFM 11g with Banner in HCT
Implementation of Oracle ExaData and OFM 11g with Banner in HCT
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)
 
Expanding the control over the operating system from the database
Expanding the control over the operating system from the databaseExpanding the control over the operating system from the database
Expanding the control over the operating system from the database
 
Got database access? Own the network!
Got database access? Own the network!Got database access? Own the network!
Got database access? Own the network!
 

Similar to The Big Bang - Upgrading to Banner 8.1

Upgrading To Banner 8
Upgrading To Banner 8Upgrading To Banner 8
Upgrading To Banner 8TJ Rains
 
Anna De Michele CV TW v1.0 (Final) November 2014
Anna De Michele CV TW v1.0 (Final) November 2014Anna De Michele CV TW v1.0 (Final) November 2014
Anna De Michele CV TW v1.0 (Final) November 2014Anna De Michele
 
Tn 100504 T Cermak Rev V2
Tn 100504 T Cermak Rev V2Tn 100504 T Cermak Rev V2
Tn 100504 T Cermak Rev V2TimCermak
 
Good IT Project Management
Good IT Project Management Good IT Project Management
Good IT Project Management William Francis
 
Resume_Vaibhav_Bhargava_New
Resume_Vaibhav_Bhargava_NewResume_Vaibhav_Bhargava_New
Resume_Vaibhav_Bhargava_NewVaibhav Bhargava
 
Suresh_OSI PI Consultant
Suresh_OSI PI ConsultantSuresh_OSI PI Consultant
Suresh_OSI PI ConsultantSuresh Kumar
 
Resume_Amjed Noolvi
Resume_Amjed NoolviResume_Amjed Noolvi
Resume_Amjed NoolviAmjed Noolvi
 
Taming the Beast: Test/QA on Large-scale Projects
Taming the Beast: Test/QA on Large-scale ProjectsTaming the Beast: Test/QA on Large-scale Projects
Taming the Beast: Test/QA on Large-scale ProjectsTechWell
 
Tn 100517 T Cermak Rev2
Tn 100517 T Cermak Rev2Tn 100517 T Cermak Rev2
Tn 100517 T Cermak Rev2TimCermak
 
SOFGEN CV_YU Michael_0715 (1)
SOFGEN CV_YU Michael_0715 (1)SOFGEN CV_YU Michael_0715 (1)
SOFGEN CV_YU Michael_0715 (1)Michael Yu
 
Services Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process AutomationServices Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process AutomationNathaniel Palmer
 
Lee Wei Yann Resume 2016
Lee Wei Yann Resume 2016Lee Wei Yann Resume 2016
Lee Wei Yann Resume 2016WEI YANN LEE
 

Similar to The Big Bang - Upgrading to Banner 8.1 (20)

Upgrading To Banner 8
Upgrading To Banner 8Upgrading To Banner 8
Upgrading To Banner 8
 
Anna De Michele CV TW v1.0 (Final) November 2014
Anna De Michele CV TW v1.0 (Final) November 2014Anna De Michele CV TW v1.0 (Final) November 2014
Anna De Michele CV TW v1.0 (Final) November 2014
 
Puvvati_Resume
Puvvati_ResumePuvvati_Resume
Puvvati_Resume
 
Tn 100504 T Cermak Rev V2
Tn 100504 T Cermak Rev V2Tn 100504 T Cermak Rev V2
Tn 100504 T Cermak Rev V2
 
Good IT Project Management
Good IT Project Management Good IT Project Management
Good IT Project Management
 
Resume_Vaibhav_Bhargava_New
Resume_Vaibhav_Bhargava_NewResume_Vaibhav_Bhargava_New
Resume_Vaibhav_Bhargava_New
 
SAP sample
SAP sampleSAP sample
SAP sample
 
Maximize ROI with UPK
Maximize ROI with UPKMaximize ROI with UPK
Maximize ROI with UPK
 
Vijay-Samuael-CV
Vijay-Samuael-CVVijay-Samuael-CV
Vijay-Samuael-CV
 
prasanna250315
prasanna250315prasanna250315
prasanna250315
 
Suresh_OSI PI Consultant
Suresh_OSI PI ConsultantSuresh_OSI PI Consultant
Suresh_OSI PI Consultant
 
Resume_Amjed Noolvi
Resume_Amjed NoolviResume_Amjed Noolvi
Resume_Amjed Noolvi
 
W7
W7W7
W7
 
Taming the Beast: Test/QA on Large-scale Projects
Taming the Beast: Test/QA on Large-scale ProjectsTaming the Beast: Test/QA on Large-scale Projects
Taming the Beast: Test/QA on Large-scale Projects
 
CV Coral
CV CoralCV Coral
CV Coral
 
Tn 100517 T Cermak Rev2
Tn 100517 T Cermak Rev2Tn 100517 T Cermak Rev2
Tn 100517 T Cermak Rev2
 
Partha_CV_New
Partha_CV_NewPartha_CV_New
Partha_CV_New
 
SOFGEN CV_YU Michael_0715 (1)
SOFGEN CV_YU Michael_0715 (1)SOFGEN CV_YU Michael_0715 (1)
SOFGEN CV_YU Michael_0715 (1)
 
Services Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process AutomationServices Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process Automation
 
Lee Wei Yann Resume 2016
Lee Wei Yann Resume 2016Lee Wei Yann Resume 2016
Lee Wei Yann Resume 2016
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

The Big Bang - Upgrading to Banner 8.1