SlideShare a Scribd company logo
1 of 41
Download to read offline
GABRIELLA DAVIS - ENGAGE UG
AD05. Where Do You Go From Here ?
ADOMINOADMIN’SADVENTURES
LET’SGETTHISOUTOFTHEWAY
BEINGADOMINOADMINIWORKWITHALOTOFTECHNOLOGIES
SODOYOU
DOMINOCAREERS
The skills you have that many admins don’t
How to move your career forwards using what you already know
Choosing where to focus
Think about the skills you use every day and how they can be utilised
ORHOWTOEARNMOREBYBARELYTRYING
HORIZONTAL
EXPAND YOUR CAREER TO ENCOMPASS NEW TECHNOLOGIES
TECHNOLOGY SKILLS-ANYMAILSYSTEM
- passing mail between servers
- MX routing
- DNS importance and behaviour
- cluster and failover routing
- the relationship between threads, resources and network performance
- the di
ff
erence between delivery and transfer threads
- how threads handle load and take resources
- TLS / SMTP routing inbound and outbound
- securing ports
- working with certi
fi
cates
-
fi
rewall rules
MAILROUTING
- Proprietary mail formats
- MIME behaviour and how it can be controlled by server settings
MAILFORMATS
- Inbox sizes, mailbox sizes, archiving, multiple folders
- Searching
- Online vs o
ffl
ine this morning f
MAILBOXBEHAVIOUR
- Understanding how directories are used by servers
- lookup vs trusted
- LDAP con
fi
guration, behaviour and searches
- User identities and security
- Multiple directories consolidated together
DIRECTORIES
TECHNOLOGYSKILLS-ENTERPRISEDATABASES
- Domino gives you an understanding of both no SQL and SQL structure
- Traveler uses SQL structure as does Connections
- no SQL (Domino, MongoDB etc) documents, views, unstructured and exible
- SQL records, structured, de
fi
ning records and tables
- data storage of di
ff
erent data types and management of rich text
DATABASESTRUCTURE
- database sizing and impact on performance
- database maintenance and defragmentation
- search indexes and SQL queries
- table rebuilds
- backups
DATABASEMAINTENANCE
- Database synchronisation
- which sync options are available for the technology
- what needs to be synced
- scheduling for synchronisation
- impact of user activity on sychronisation
REPLICATION
- Servers instances
- Server versions and upgrades
- Admin roles and access
- Location or isolation of servers
- Network topology
DESIGN&DEPLOYMENT
- What monitoring is available
- Daily, Weekly , Monthly maintenance tasks
- QoS metrics
- Monitoring plan and review
MONITORING
TECHNOLOGYSKILLS-SECURITY
- Database security levels, what is needed
- The impact of multiple security assignments
- Priority of di
ff
erent identities (group vs user)
GRANULARSECURITYFORDATABASES
- Document level security
- Field level security
- Field visibility based on document status (hide / when)
- Encryption - the use of secret keys
USERANDDOCUMENTSECURITY
- Understanding the concept of encryption and how keys work
- database encryption and secret keys
- How encrypting data impacts user access as well as server activity
- DAOS NLOs
- Server to server replication
- Creating and managing encryption keys
- generating key requests, applying keys
- Encrypting entire databases vs documents vs elds
- Encryption and backups
- backing up and restoring encrypted data
- virus scanning of encrypted data
DATAENCRYPTION
- Access Levels and what they can do
- Administration vs Edit vs Author vs Depositor
- Designing user access by understanding what is needed and what is available
- Access through di
ff
erent clients
- Identifying who is accessing a database or trying to access
- Locking out accounts
USERACCESS
TECHNOLOGYSKILLS-MOBILEDEVICES
- Phone and Tablet app deployment
- Mobile security settings
- managed via Traveler device settings
- Mobile Device Management tools
- understanding how to push applications
- Risks and limitations of deploying applications to personal devices
DEPLOYINGMOBILEAPPLICATIONS
- Device settings and options
- Understanding iOS and iPadOS native mail and calendar applications
- Con
fi
guring VPN connections
- Operating system updates
USERSUPPORTONMOBILEDEVICES
- What are available
- Deciding what features are needed
- Choosing an MDM solution
- Installing, con
fi
guring , managing, supporting an MDM
MOBILEDEVICEMANAGEMENTTOOLS
- Scaling resources
- understanding server requirements
- what services will the server need
- what else runs on that server
- how is disk attached and monitored
- setting performance alerts at an OS level
OSRESOURCES
- How to do a database search
- using operators, constructing queries
- How to search the operating system for
fi
les
- searching by modi
fi
ed date and by size
- Finding large temporary
fi
les on the
fi
le system via the OS
FINDINGFILES/MANAGINGDISKSPACE
- Evaluating the impact of an OS patch
- Preparing for a patch
- having a plan and a rollback
- Will an operation system upgrade be supported by all applications on the server?
- will there be any other dependencies that will be needed or lost
UPGRADINGANDPATCHINGOS
- Working with and understanding containers
- Working with container management
- Working with container orchestration
CONTAINERDEPLOYMENTANDSUPPORT
VERTICAL
MOVING UP INTO LEADERSHIP OR MANAGEMENT ROLES
MANAGEMENTSKILLS
- Reviewing upgrades
- The impact of backup and virus scanning software
- Being aware of upcoming technology, how it might bene t
- Beta testing
PLANNING
- Working with larger operational teams
- Training helpdesk
- Reporting to departments and management
- Prioritising needs and issues
- Communicating to users
TEAMLEAD
- When should a deployment happen
- Planning for minimal user and system impact
- Deployment plans with rollback criteria
- Presenting plans to non tech teams
- Planned staged rollouts
- Minimising downtime and loss of service
PROJECTMANAGEMENT
CHECKLISTAPPENDICES
QUESTIONS?
GABRIELLA@TURTLEPARTNERSHIP.COM

More Related Content

Similar to A Domino Admins Adventures (Engage 2024)

Make your first CloudStack Cloud successful
Make your first CloudStack Cloud successfulMake your first CloudStack Cloud successful
Make your first CloudStack Cloud successfulTim Mackey
 
A Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionA Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionLori Mitchell
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentationGraeme Spice
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Understanding_the_Cloud
Understanding_the_CloudUnderstanding_the_Cloud
Understanding_the_CloudMelissa Kattke
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinJavier Guillermo, MBA, MSc, PMP
 
Adopting Microservices - Around25
Adopting Microservices - Around25 Adopting Microservices - Around25
Adopting Microservices - Around25 Cosmin Harangus
 
MySQL Web Reference Architecture
MySQL Web Reference Architecture MySQL Web Reference Architecture
MySQL Web Reference Architecture Ricky Setyawan
 
Metadata Modeling Best Practices with IBM Cognos Framework Manager
Metadata Modeling Best Practices with IBM Cognos Framework ManagerMetadata Modeling Best Practices with IBM Cognos Framework Manager
Metadata Modeling Best Practices with IBM Cognos Framework ManagerSenturus
 
A sdn based application aware and network provisioning
A sdn based application aware and network provisioningA sdn based application aware and network provisioning
A sdn based application aware and network provisioningStanley Wang
 
Paa sing a java ee 6 application kshitiz saxena
Paa sing a java ee 6 application   kshitiz saxenaPaa sing a java ee 6 application   kshitiz saxena
Paa sing a java ee 6 application kshitiz saxenaIndicThreads
 
Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...
Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...
Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...Microsoft Technet France
 
LogisticsWired Offering from MavenWire
LogisticsWired Offering from MavenWireLogisticsWired Offering from MavenWire
LogisticsWired Offering from MavenWireMavenWire
 
An Introduction to MongoDB Ops Manager
An Introduction to MongoDB Ops ManagerAn Introduction to MongoDB Ops Manager
An Introduction to MongoDB Ops ManagerMongoDB
 

Similar to A Domino Admins Adventures (Engage 2024) (20)

sankalp
sankalpsankalp
sankalp
 
Make your first CloudStack Cloud successful
Make your first CloudStack Cloud successfulMake your first CloudStack Cloud successful
Make your first CloudStack Cloud successful
 
Data
DataData
Data
 
A Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionA Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With Distribution
 
Adopting the Cloud
Adopting the CloudAdopting the Cloud
Adopting the Cloud
 
Hitendra K Panchal
Hitendra K PanchalHitendra K Panchal
Hitendra K Panchal
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentation
 
Gopu_CV_2016
Gopu_CV_2016Gopu_CV_2016
Gopu_CV_2016
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Understanding_the_Cloud
Understanding_the_CloudUnderstanding_the_Cloud
Understanding_the_Cloud
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 
Adopting Microservices - Around25
Adopting Microservices - Around25 Adopting Microservices - Around25
Adopting Microservices - Around25
 
MySQL Web Reference Architecture
MySQL Web Reference Architecture MySQL Web Reference Architecture
MySQL Web Reference Architecture
 
Metadata Modeling Best Practices with IBM Cognos Framework Manager
Metadata Modeling Best Practices with IBM Cognos Framework ManagerMetadata Modeling Best Practices with IBM Cognos Framework Manager
Metadata Modeling Best Practices with IBM Cognos Framework Manager
 
A sdn based application aware and network provisioning
A sdn based application aware and network provisioningA sdn based application aware and network provisioning
A sdn based application aware and network provisioning
 
Paa sing a java ee 6 application kshitiz saxena
Paa sing a java ee 6 application   kshitiz saxenaPaa sing a java ee 6 application   kshitiz saxena
Paa sing a java ee 6 application kshitiz saxena
 
Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...
Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...
Exchange 2013 Haute disponibilité et tolérance aux sinistres (Session 1/2 pre...
 
CV_Mohammad-Y-Assaf1
CV_Mohammad-Y-Assaf1CV_Mohammad-Y-Assaf1
CV_Mohammad-Y-Assaf1
 
LogisticsWired Offering from MavenWire
LogisticsWired Offering from MavenWireLogisticsWired Offering from MavenWire
LogisticsWired Offering from MavenWire
 
An Introduction to MongoDB Ops Manager
An Introduction to MongoDB Ops ManagerAn Introduction to MongoDB Ops Manager
An Introduction to MongoDB Ops Manager
 

More from Gabriella Davis

Engage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsEngage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsGabriella Davis
 
. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience ProjectGabriella Davis
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and ManagingGabriella Davis
 
Face Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesFace Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesGabriella Davis
 
Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Gabriella Davis
 
An Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerAn Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerGabriella Davis
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
 
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...Gabriella Davis
 
An introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerAn introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerGabriella Davis
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryGabriella Davis
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsGabriella Davis
 
What's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesWhat's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesGabriella Davis
 
An Introduction To Docker
An Introduction To DockerAn Introduction To Docker
An Introduction To DockerGabriella Davis
 
An Introduction To Docker
An Introduction To  DockerAn Introduction To  Docker
An Introduction To DockerGabriella Davis
 
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudSetting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudGabriella Davis
 

More from Gabriella Davis (20)

Engage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsEngage2022 - Domino Admin Tips
Engage2022 - Domino Admin Tips
 
. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and Managing
 
Face Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesFace Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On Premises
 
60 Admin Tips
60 Admin Tips60 Admin Tips
60 Admin Tips
 
Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10
 
An Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerAn Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for Docker
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation Requirements
 
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
 
An introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerAn introduction to configuring Domino for Docker
An introduction to configuring Domino for Docker
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & Discovery
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation Requirements
 
Brand Yourself
Brand YourselfBrand Yourself
Brand Yourself
 
Home Working
Home WorkingHome Working
Home Working
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
 
The Imposter Syndrome
The Imposter SyndromeThe Imposter Syndrome
The Imposter Syndrome
 
What's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesWhat's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-Premises
 
An Introduction To Docker
An Introduction To DockerAn Introduction To Docker
An Introduction To Docker
 
An Introduction To Docker
An Introduction To  DockerAn Introduction To  Docker
An Introduction To Docker
 
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudSetting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
 

Recently uploaded

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligencePrecisely
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 

A Domino Admins Adventures (Engage 2024)

  • 1. GABRIELLA DAVIS - ENGAGE UG AD05. Where Do You Go From Here ? ADOMINOADMIN’SADVENTURES
  • 4. DOMINOCAREERS The skills you have that many admins don’t How to move your career forwards using what you already know Choosing where to focus Think about the skills you use every day and how they can be utilised ORHOWTOEARNMOREBYBARELYTRYING
  • 5. HORIZONTAL EXPAND YOUR CAREER TO ENCOMPASS NEW TECHNOLOGIES
  • 7. - passing mail between servers - MX routing - DNS importance and behaviour - cluster and failover routing - the relationship between threads, resources and network performance - the di ff erence between delivery and transfer threads - how threads handle load and take resources - TLS / SMTP routing inbound and outbound - securing ports - working with certi fi cates - fi rewall rules MAILROUTING
  • 8. - Proprietary mail formats - MIME behaviour and how it can be controlled by server settings MAILFORMATS
  • 9. - Inbox sizes, mailbox sizes, archiving, multiple folders - Searching - Online vs o ffl ine this morning f MAILBOXBEHAVIOUR
  • 10. - Understanding how directories are used by servers - lookup vs trusted - LDAP con fi guration, behaviour and searches - User identities and security - Multiple directories consolidated together DIRECTORIES
  • 12. - Domino gives you an understanding of both no SQL and SQL structure - Traveler uses SQL structure as does Connections - no SQL (Domino, MongoDB etc) documents, views, unstructured and exible - SQL records, structured, de fi ning records and tables - data storage of di ff erent data types and management of rich text DATABASESTRUCTURE
  • 13. - database sizing and impact on performance - database maintenance and defragmentation - search indexes and SQL queries - table rebuilds - backups DATABASEMAINTENANCE
  • 14. - Database synchronisation - which sync options are available for the technology - what needs to be synced - scheduling for synchronisation - impact of user activity on sychronisation REPLICATION
  • 15. - Servers instances - Server versions and upgrades - Admin roles and access - Location or isolation of servers - Network topology DESIGN&DEPLOYMENT
  • 16. - What monitoring is available - Daily, Weekly , Monthly maintenance tasks - QoS metrics - Monitoring plan and review MONITORING
  • 18. - Database security levels, what is needed - The impact of multiple security assignments - Priority of di ff erent identities (group vs user) GRANULARSECURITYFORDATABASES
  • 19. - Document level security - Field level security - Field visibility based on document status (hide / when) - Encryption - the use of secret keys USERANDDOCUMENTSECURITY
  • 20. - Understanding the concept of encryption and how keys work - database encryption and secret keys - How encrypting data impacts user access as well as server activity - DAOS NLOs - Server to server replication - Creating and managing encryption keys - generating key requests, applying keys - Encrypting entire databases vs documents vs elds - Encryption and backups - backing up and restoring encrypted data - virus scanning of encrypted data DATAENCRYPTION
  • 21. - Access Levels and what they can do - Administration vs Edit vs Author vs Depositor - Designing user access by understanding what is needed and what is available - Access through di ff erent clients - Identifying who is accessing a database or trying to access - Locking out accounts USERACCESS
  • 23. - Phone and Tablet app deployment - Mobile security settings - managed via Traveler device settings - Mobile Device Management tools - understanding how to push applications - Risks and limitations of deploying applications to personal devices DEPLOYINGMOBILEAPPLICATIONS
  • 24. - Device settings and options - Understanding iOS and iPadOS native mail and calendar applications - Con fi guring VPN connections - Operating system updates USERSUPPORTONMOBILEDEVICES
  • 25. - What are available - Deciding what features are needed - Choosing an MDM solution - Installing, con fi guring , managing, supporting an MDM MOBILEDEVICEMANAGEMENTTOOLS
  • 26. - Scaling resources - understanding server requirements - what services will the server need - what else runs on that server - how is disk attached and monitored - setting performance alerts at an OS level OSRESOURCES
  • 27. - How to do a database search - using operators, constructing queries - How to search the operating system for fi les - searching by modi fi ed date and by size - Finding large temporary fi les on the fi le system via the OS FINDINGFILES/MANAGINGDISKSPACE
  • 28. - Evaluating the impact of an OS patch - Preparing for a patch - having a plan and a rollback - Will an operation system upgrade be supported by all applications on the server? - will there be any other dependencies that will be needed or lost UPGRADINGANDPATCHINGOS
  • 29. - Working with and understanding containers - Working with container management - Working with container orchestration CONTAINERDEPLOYMENTANDSUPPORT
  • 30. VERTICAL MOVING UP INTO LEADERSHIP OR MANAGEMENT ROLES
  • 32. - Reviewing upgrades - The impact of backup and virus scanning software - Being aware of upcoming technology, how it might bene t - Beta testing PLANNING
  • 33. - Working with larger operational teams - Training helpdesk - Reporting to departments and management - Prioritising needs and issues - Communicating to users TEAMLEAD
  • 34. - When should a deployment happen - Planning for minimal user and system impact - Deployment plans with rollback criteria - Presenting plans to non tech teams - Planned staged rollouts - Minimising downtime and loss of service PROJECTMANAGEMENT
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.