How can you get your Atlassian products to use the same authentication and sign-on as the rest of your enterprise apps? We'll show you strategies for accomplishing this with the minimum amount of pain.
Mark Lassau, JIRA Developer
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...Eric Shupps
This document discusses OAuth authentication in SharePoint 2013. It provides an overview of OAuth and how it manages identity and handles requests for trusted identity claims. It also covers how OAuth is used for on-premise apps and cloud apps to authorize access between servers, farms, and apps. The document includes an agenda that outlines key concepts like security token services, access tokens, realms, certificates and metadata configuration needed to implement OAuth authentication.
This document provides an overview of patterns and practices for customizing the SharePoint user interface using JavaScript. It discusses how to customize common UI elements like the suite bar, user menu, site settings menu, and ribbon. It also provides code samples for adding a custom action to the ribbon using JavaScript.
Creating cloud ready enterprise applications with the sharepoint 2013 app modelInnoTech
This document discusses authorization and APIs for SharePoint. It covers OAuth authorization flows, REST APIs for accessing SharePoint data from remote clients, and options for deploying and distributing SharePoint apps and solutions such as through the App Catalog, Office Store, or private packages. It also compares .NET, JavaScript, and REST approaches and covers high and low trust authorization models.
The document compares the Office 365 API and SharePoint app models. It provides an overview of developing apps that consume the Office 365 API, including registering apps in Azure AD, authentication and authorization flows, and using the .NET and JavaScript client libraries. It also demonstrates how to use the API to access Exchange, SharePoint, and Azure AD services through code examples for sending emails, managing contacts, working with files, and more.
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...Eric Shupps
This document discusses authorization methods in SharePoint including OAuth and access tokens. It also summarizes differences between .NET and JavaScript for developing SharePoint solutions. REST APIs are covered as well as options for deploying SharePoint apps such as the App Catalog, Office Store, and private packages. Trust models like high trust using certificates and low trust with Azure ACS are also summarized.
Getting Started with your User Pools in Amazon Cognito - AWS June 2016 Webina...Amazon Web Services
You can now use Amazon Cognito to easily add user sign-up and sign-in to your mobile and web apps instead of worrying about user management, authentication, and sync across platforms and devices. With the User Pools feature, you can create your own user directory that can scale to hundreds of millions of users, and is fully managed so you don’t have to worry about building, securing, and scaling authentication to your apps. In this webinar, we will walk your through adding the process of adding user sign-up and sign-in to your mobile and web apps.
Learning Objectives: • Learn to add user sign-up and sign-in to your mobile and web apps quickly and easily • Authenticate users through social identity providers such as Facebook, Twitter, or Amazon and provide secure access to AWS resources
(MBL401) Social Logins for Mobile Apps with Amazon Cognito | AWS re:Invent 2014Amazon Web Services
Streamline your mobile app sign-up experience with Amazon Cognito. In this session, we demonstrate how to use Cognito to build secure mobile apps without storing keys in them. Learn how to apply policies to existing Facebook, Google, or Amazon identities to secure access to AWS resources, such as personnel files stored in Amazon S3. Finally, we show how to handle anonymous access to AWS from mobile apps when there is no user logged in.
In May's Microsoft identity platform call, Navya Canumalla went into detail on MSAL Java and Python, including an overview, supported scenarios and calling patterns. Quickstart demo, token cache and ADAL to MSAL migration.
View recording https://youtu.be/yCCjNqFva9w
Resources:
MSAL Java https://aka.ms/msaljavadocs
MSAL Python https://aka.ms/msalpythondocs
Stay connected
Twitter https://twitter.com/microsoft365dev
YouTube https://aka.ms/M365DevYouTube
Blogs https://aka.ms/M365DevBlog
SPTECHCON - Who are You and What Do You Want - Working with OAuth in SharePoi...Eric Shupps
This document discusses OAuth authentication in SharePoint 2013. It provides an overview of OAuth and how it manages identity and handles requests for trusted identity claims. It also covers how OAuth is used for on-premise apps and cloud apps to authorize access between servers, farms, and apps. The document includes an agenda that outlines key concepts like security token services, access tokens, realms, certificates and metadata configuration needed to implement OAuth authentication.
This document provides an overview of patterns and practices for customizing the SharePoint user interface using JavaScript. It discusses how to customize common UI elements like the suite bar, user menu, site settings menu, and ribbon. It also provides code samples for adding a custom action to the ribbon using JavaScript.
Creating cloud ready enterprise applications with the sharepoint 2013 app modelInnoTech
This document discusses authorization and APIs for SharePoint. It covers OAuth authorization flows, REST APIs for accessing SharePoint data from remote clients, and options for deploying and distributing SharePoint apps and solutions such as through the App Catalog, Office Store, or private packages. It also compares .NET, JavaScript, and REST approaches and covers high and low trust authorization models.
The document compares the Office 365 API and SharePoint app models. It provides an overview of developing apps that consume the Office 365 API, including registering apps in Azure AD, authentication and authorization flows, and using the .NET and JavaScript client libraries. It also demonstrates how to use the API to access Exchange, SharePoint, and Azure AD services through code examples for sending emails, managing contacts, working with files, and more.
Creating Cloud-Ready Enterprise Applications with the SharePoint 2013 Add-In ...Eric Shupps
This document discusses authorization methods in SharePoint including OAuth and access tokens. It also summarizes differences between .NET and JavaScript for developing SharePoint solutions. REST APIs are covered as well as options for deploying SharePoint apps such as the App Catalog, Office Store, and private packages. Trust models like high trust using certificates and low trust with Azure ACS are also summarized.
Getting Started with your User Pools in Amazon Cognito - AWS June 2016 Webina...Amazon Web Services
You can now use Amazon Cognito to easily add user sign-up and sign-in to your mobile and web apps instead of worrying about user management, authentication, and sync across platforms and devices. With the User Pools feature, you can create your own user directory that can scale to hundreds of millions of users, and is fully managed so you don’t have to worry about building, securing, and scaling authentication to your apps. In this webinar, we will walk your through adding the process of adding user sign-up and sign-in to your mobile and web apps.
Learning Objectives: • Learn to add user sign-up and sign-in to your mobile and web apps quickly and easily • Authenticate users through social identity providers such as Facebook, Twitter, or Amazon and provide secure access to AWS resources
(MBL401) Social Logins for Mobile Apps with Amazon Cognito | AWS re:Invent 2014Amazon Web Services
Streamline your mobile app sign-up experience with Amazon Cognito. In this session, we demonstrate how to use Cognito to build secure mobile apps without storing keys in them. Learn how to apply policies to existing Facebook, Google, or Amazon identities to secure access to AWS resources, such as personnel files stored in Amazon S3. Finally, we show how to handle anonymous access to AWS from mobile apps when there is no user logged in.
In May's Microsoft identity platform call, Navya Canumalla went into detail on MSAL Java and Python, including an overview, supported scenarios and calling patterns. Quickstart demo, token cache and ADAL to MSAL migration.
View recording https://youtu.be/yCCjNqFva9w
Resources:
MSAL Java https://aka.ms/msaljavadocs
MSAL Python https://aka.ms/msalpythondocs
Stay connected
Twitter https://twitter.com/microsoft365dev
YouTube https://aka.ms/M365DevYouTube
Blogs https://aka.ms/M365DevBlog
This document summarizes new features being added to LINE's messaging API for bots, including:
1) Group/room bot functionality that allows bots to send and receive messages in group chats and rooms.
2) New message types like buttons, carousels, and imagemaps that provide richer interactive messages.
3) Ability for bots to reply to and push messages to users, rather than just receive messages.
The document provides examples of how businesses and organizations in Taiwan are using LINE bots and encourages developers to build bots using the new API features.
This document discusses SharePoint versions from 2007 to 2013 and describes two types of apps - SharePoint hosted apps, which store resources on the SharePoint server, and cloud hosted apps, which store resources remotely. It also shows how cloud hosted apps authenticate users through Windows Azure Access Control Service.
O365Con18 - External Collaboration with Azure B2B - Sjoukje ZaalNCCOMMS
This document discusses Azure Active Directory B2B collaboration, which allows organizations to securely share resources and applications with external users. It provides an overview of Azure B2B capabilities, including inviting guest users via email, setting conditional access policies, and customizing the user onboarding experience. The document demonstrates configuring Azure B2B through the Azure portal and PowerShell, and compares external sharing options in Azure B2B and Office 365 applications like SharePoint.
Implement Authorization in your Apps with Microsoft identity platform-June 2020Microsoft 365 Developer
Kalyan Krishna from Microsoft hosted a community call on implementing authorization in applications using features of the Microsoft Identity Platform like app roles, security groups, scopes, and directory roles. The call covered:
- Defining and assigning app roles to users and other apps to control permissions.
- Using security groups assigned to users to manage access and optionally returning group details in tokens.
- Configuring application groups to filter tokens to only include groups relevant to an application.
- Providing scopes or delegated permissions for public client applications to request access to resources.
- Directories roles for administering access in Azure AD tenants.
To integrate Mule with LinkedIn, developers must create an app in LinkedIn Developer, which generates client ID and secret keys to authenticate with LinkedIn APIs. The Mule flow first authorizes with LinkedIn to get an access token, then uses it to call the GetProfileByURL operation and return a user's details by LinkedIn URL.
Amazon Cognito is a user directory service that allows for user registration, authentication, and account management. It provides features like user pools for storing user data, identity federation, and syncing user data across devices. Cognito user pools allow for customizing user attributes and verification methods, managing user access to applications, and configuring triggers for custom authentication workflows. The service aims to reduce development time by handling common user management tasks.
Community call: Develop multi tenant apps with the Microsoft identity platformMicrosoft 365 Developer
Building an application that can be provisioned and used in multiple Azure AD tenants goes far beyond just flipping a switch in your app configuration. The developer has to undertake application provisioning, decide on a provisioning strategy, push changes to customers, manage identities flowing from multiple tenants, collect essential information from authentication signals, learn to differentiate the different types of users they will encounter and understand the key differences from the B2B scenarios. In this community call, Kalyan Krishnan reviews the steps and considerations required to develop, configure, provision, and manage multi-tenant applications.
For more information, visit https://aka.ms/identityplatform
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Amazon Web Services
Ed Lima, a Solutions Architect at AWS, discusses adding user sign-in, user management, and security to mobile and web applications using Amazon Cognito. The presentation covers Amazon Cognito Identity for user authentication and authorization, Cognito User Pools for user management, and how applications can integrate with Cognito. It also demonstrates how Cognito can federate with identity providers and provides sample use cases for business to consumer, business to business, and IoT applications.
Authentication & Authorization for Connected Mobile & Web Applications using ...Amazon Web Services
Authentication and Authorization for Connected Mobile & Web Applications using Amazon Cognito and AWS AppSync
One of the key challenges for mobile applications is managing users and their identities in order to support monetization strategies, provide differentiated services, and manage fine grained access and data controls. In this session, you’ll learn how Amazon Cognito provides user sign-up and sign-in as part of your onboarding workflow and advanced capabilities for data access/feature management and security.
Level: Intermediate
Speaker: Brice Pelle - Enterprise Support Lead, AWS
Creating a Sign On with Open id connectDerek Binkley
The document discusses OpenID Connect, which is a standard for identity authentication built on OAuth 2.0. It describes the basic steps in OpenID Connect including the client requesting authentication, the authorization server authenticating the user and obtaining consent, returning an authorization code to the client, the client exchanging the code for an ID token and access token, and validating the ID token. It also addresses challenges with maintaining session state across a distributed architecture and strategies for addressing those challenges like embedding an iframe to check login status with the authorization server.
by Fritz Kunstler, Sr. AWS Security Consultant AWS
Join us for four days of security and compliance sessions and hands-on labs led by our AWS security pros during AWS Security Week at the San Francisco Loft. Join us for all four days, or pick just the days that are most relevant to you. We'll open on Monday with Security 101 day, followed by sessions Tuesday on Identity and Access Management, our popular Threat Detection and Remediation day Wednesday will feature an updated GuardDuty lab, and we'll end Thursday with Incident Response sessions, labs, and a talk by Netflix on their new open source IR tool. This week will also feature Dome9 as a sponsor, and you can hear them speak and present a hands-on workshop Monday during Security 101 day.
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...Amazon Web Services
By leveraging "serverless architectures", startups and enterprises are building and running modern applications and services with increased agility and simplified scalability—all without managing a single server. Many applications need to manage user identities and support sign-in/sign-up. In this session, we dive deep on how to support millions of user identities, as well as how to integrate with social identity providers (such as Google and Facebook) and existing corporate directories. You learn the real-world design patterns that AWS customers use to implement authentication and authorization. By combining Amazon Cognito identity pools and user pools with API Gateway, AWS Lambda, and AWS IAM, you can add security without adding servers.
Certificate transparency helps secure mobile apps by ensuring clients only accept publicly logged certificates. It involves certificate authorities submitting certificates to public logs, which clients can check. However, it does not prevent rogue certificates that were publicly logged. SSL pinning provides additional validation by having the app check certificates against ones hardcoded in the app bundle. This ensures connections even if an unauthorized but logged certificate is issued for the domain. Public key pinning is more flexible than certificate pinning but requires extracting the public key from certificates.
Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...Xamarin
This document discusses how to create a uniform login experience across applications using federated identity. It describes using an Access Control Service (ACS) to integrate authentication with multiple identity providers like Facebook, Google, and Microsoft accounts. The ACS handles authentication with the identity providers and provides tokens containing user claims that applications can use to identify and authorize the user. Examples are provided of calling services using Simple Web Tokens or SAML tokens from both web and mobile applications configured to use ACS. Code samples will be published on CodePlex to demonstrate implementing this approach.
This document discusses OAuth, which is an authorization protocol that allows third-party applications to access user data without requiring username and passwords. It explains key OAuth concepts like clients, resource owners, authorization servers, and resource servers. The document also covers the different grant types in OAuth like authorization code, implicit, resource owner password credentials, and client credentials. It emphasizes that OAuth tokens should be encrypted, random, and signed to ensure security.
This document provides an overview and agenda for a session on developing universal Windows apps that integrate with Office 365 APIs. The session will cover what universal apps are, how to set up a universal app project template, and how to add connected services and authenticate with Office 365 to access data through client objects. There will be a demonstration of building a universal app that integrates with Office 365. The session is presented by Senthamil Selvan and sponsored by Cloud Era.
Managing Identity and Securing Your Mobile and Web Applications with Amazon C...Amazon Web Services
Amazon Cognito lets you easily add user sign-up and sign-in to your mobile and web apps. Finding the right identity solution can often be challenging. In this session, we will look at how Cognito can support a wide range of authentication scenarios including customers, employees and systems to help you make the right choices.
Speaker: Stephen Liedig. Solutions Architect. Amazon Web Services
Level: 300
Tutorial: Building Apps for SharePoint 2013 Inside and Outside of the Firewal...SPTechCon
This document provides an overview and agenda for a presentation on building apps for SharePoint 2013 both inside and outside the firewall. The presentation covers the SharePoint app model, app identity, authentication, authorization, OAuth, and client-side development. It also discusses SharePoint deployment options, the app architecture for SharePoint-hosted and cloud-hosted apps, creating app identities and permissions, and programming the client-side object model.
In this session Tomasso will explain what Web APIs are, why do we need them and how to implement them in Azure with API Apps. He is going to show in several demos how you can create a custom API App, test and deploy it, but also more advanced topics like how to add authentication to an API App.
This document summarizes new features being added to LINE's messaging API for bots, including:
1) Group/room bot functionality that allows bots to send and receive messages in group chats and rooms.
2) New message types like buttons, carousels, and imagemaps that provide richer interactive messages.
3) Ability for bots to reply to and push messages to users, rather than just receive messages.
The document provides examples of how businesses and organizations in Taiwan are using LINE bots and encourages developers to build bots using the new API features.
This document discusses SharePoint versions from 2007 to 2013 and describes two types of apps - SharePoint hosted apps, which store resources on the SharePoint server, and cloud hosted apps, which store resources remotely. It also shows how cloud hosted apps authenticate users through Windows Azure Access Control Service.
O365Con18 - External Collaboration with Azure B2B - Sjoukje ZaalNCCOMMS
This document discusses Azure Active Directory B2B collaboration, which allows organizations to securely share resources and applications with external users. It provides an overview of Azure B2B capabilities, including inviting guest users via email, setting conditional access policies, and customizing the user onboarding experience. The document demonstrates configuring Azure B2B through the Azure portal and PowerShell, and compares external sharing options in Azure B2B and Office 365 applications like SharePoint.
Implement Authorization in your Apps with Microsoft identity platform-June 2020Microsoft 365 Developer
Kalyan Krishna from Microsoft hosted a community call on implementing authorization in applications using features of the Microsoft Identity Platform like app roles, security groups, scopes, and directory roles. The call covered:
- Defining and assigning app roles to users and other apps to control permissions.
- Using security groups assigned to users to manage access and optionally returning group details in tokens.
- Configuring application groups to filter tokens to only include groups relevant to an application.
- Providing scopes or delegated permissions for public client applications to request access to resources.
- Directories roles for administering access in Azure AD tenants.
To integrate Mule with LinkedIn, developers must create an app in LinkedIn Developer, which generates client ID and secret keys to authenticate with LinkedIn APIs. The Mule flow first authorizes with LinkedIn to get an access token, then uses it to call the GetProfileByURL operation and return a user's details by LinkedIn URL.
Amazon Cognito is a user directory service that allows for user registration, authentication, and account management. It provides features like user pools for storing user data, identity federation, and syncing user data across devices. Cognito user pools allow for customizing user attributes and verification methods, managing user access to applications, and configuring triggers for custom authentication workflows. The service aims to reduce development time by handling common user management tasks.
Community call: Develop multi tenant apps with the Microsoft identity platformMicrosoft 365 Developer
Building an application that can be provisioned and used in multiple Azure AD tenants goes far beyond just flipping a switch in your app configuration. The developer has to undertake application provisioning, decide on a provisioning strategy, push changes to customers, manage identities flowing from multiple tenants, collect essential information from authentication signals, learn to differentiate the different types of users they will encounter and understand the key differences from the B2B scenarios. In this community call, Kalyan Krishnan reviews the steps and considerations required to develop, configure, provision, and manage multi-tenant applications.
For more information, visit https://aka.ms/identityplatform
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Amazon Web Services
Ed Lima, a Solutions Architect at AWS, discusses adding user sign-in, user management, and security to mobile and web applications using Amazon Cognito. The presentation covers Amazon Cognito Identity for user authentication and authorization, Cognito User Pools for user management, and how applications can integrate with Cognito. It also demonstrates how Cognito can federate with identity providers and provides sample use cases for business to consumer, business to business, and IoT applications.
Authentication & Authorization for Connected Mobile & Web Applications using ...Amazon Web Services
Authentication and Authorization for Connected Mobile & Web Applications using Amazon Cognito and AWS AppSync
One of the key challenges for mobile applications is managing users and their identities in order to support monetization strategies, provide differentiated services, and manage fine grained access and data controls. In this session, you’ll learn how Amazon Cognito provides user sign-up and sign-in as part of your onboarding workflow and advanced capabilities for data access/feature management and security.
Level: Intermediate
Speaker: Brice Pelle - Enterprise Support Lead, AWS
Creating a Sign On with Open id connectDerek Binkley
The document discusses OpenID Connect, which is a standard for identity authentication built on OAuth 2.0. It describes the basic steps in OpenID Connect including the client requesting authentication, the authorization server authenticating the user and obtaining consent, returning an authorization code to the client, the client exchanging the code for an ID token and access token, and validating the ID token. It also addresses challenges with maintaining session state across a distributed architecture and strategies for addressing those challenges like embedding an iframe to check login status with the authorization server.
by Fritz Kunstler, Sr. AWS Security Consultant AWS
Join us for four days of security and compliance sessions and hands-on labs led by our AWS security pros during AWS Security Week at the San Francisco Loft. Join us for all four days, or pick just the days that are most relevant to you. We'll open on Monday with Security 101 day, followed by sessions Tuesday on Identity and Access Management, our popular Threat Detection and Remediation day Wednesday will feature an updated GuardDuty lab, and we'll end Thursday with Incident Response sessions, labs, and a talk by Netflix on their new open source IR tool. This week will also feature Dome9 as a sponsor, and you can hear them speak and present a hands-on workshop Monday during Security 101 day.
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Man...Amazon Web Services
By leveraging "serverless architectures", startups and enterprises are building and running modern applications and services with increased agility and simplified scalability—all without managing a single server. Many applications need to manage user identities and support sign-in/sign-up. In this session, we dive deep on how to support millions of user identities, as well as how to integrate with social identity providers (such as Google and Facebook) and existing corporate directories. You learn the real-world design patterns that AWS customers use to implement authentication and authorization. By combining Amazon Cognito identity pools and user pools with API Gateway, AWS Lambda, and AWS IAM, you can add security without adding servers.
Certificate transparency helps secure mobile apps by ensuring clients only accept publicly logged certificates. It involves certificate authorities submitting certificates to public logs, which clients can check. However, it does not prevent rogue certificates that were publicly logged. SSL pinning provides additional validation by having the app check certificates against ones hardcoded in the app bundle. This ensures connections even if an unauthorized but logged certificate is issued for the domain. Public key pinning is more flexible than certificate pinning but requires extracting the public key from certificates.
Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...Xamarin
This document discusses how to create a uniform login experience across applications using federated identity. It describes using an Access Control Service (ACS) to integrate authentication with multiple identity providers like Facebook, Google, and Microsoft accounts. The ACS handles authentication with the identity providers and provides tokens containing user claims that applications can use to identify and authorize the user. Examples are provided of calling services using Simple Web Tokens or SAML tokens from both web and mobile applications configured to use ACS. Code samples will be published on CodePlex to demonstrate implementing this approach.
This document discusses OAuth, which is an authorization protocol that allows third-party applications to access user data without requiring username and passwords. It explains key OAuth concepts like clients, resource owners, authorization servers, and resource servers. The document also covers the different grant types in OAuth like authorization code, implicit, resource owner password credentials, and client credentials. It emphasizes that OAuth tokens should be encrypted, random, and signed to ensure security.
This document provides an overview and agenda for a session on developing universal Windows apps that integrate with Office 365 APIs. The session will cover what universal apps are, how to set up a universal app project template, and how to add connected services and authenticate with Office 365 to access data through client objects. There will be a demonstration of building a universal app that integrates with Office 365. The session is presented by Senthamil Selvan and sponsored by Cloud Era.
Managing Identity and Securing Your Mobile and Web Applications with Amazon C...Amazon Web Services
Amazon Cognito lets you easily add user sign-up and sign-in to your mobile and web apps. Finding the right identity solution can often be challenging. In this session, we will look at how Cognito can support a wide range of authentication scenarios including customers, employees and systems to help you make the right choices.
Speaker: Stephen Liedig. Solutions Architect. Amazon Web Services
Level: 300
Tutorial: Building Apps for SharePoint 2013 Inside and Outside of the Firewal...SPTechCon
This document provides an overview and agenda for a presentation on building apps for SharePoint 2013 both inside and outside the firewall. The presentation covers the SharePoint app model, app identity, authentication, authorization, OAuth, and client-side development. It also discusses SharePoint deployment options, the app architecture for SharePoint-hosted and cloud-hosted apps, creating app identities and permissions, and programming the client-side object model.
In this session Tomasso will explain what Web APIs are, why do we need them and how to implement them in Azure with API Apps. He is going to show in several demos how you can create a custom API App, test and deploy it, but also more advanced topics like how to add authentication to an API App.
OAuth with AngularJS and WebAPI - SoCal Code Camp 2015Stuart
This document provides an overview of OAuth and describes how to implement OAuth authorization in an AngularJS single page application using ASP.NET Web API as the resource server. It discusses OAuth flows, access and refresh tokens, and setting up an OAuth authorization server using OWIN middleware. The demo application uses the resource owner password credentials flow to authenticate users and obtain an access token to call the Web API, with refresh tokens to obtain new access tokens when they expire.
Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...Amazon Web Services
This document outlines a presentation on serverless OAuth and authorizing third-party applications to access a serverless API. The presentation discusses OAuth standards and flows, Amazon Cognito user pools for authentication, and Amazon API Gateway usage plans for metering and limiting third-party API usage. It provides an overview of these topics to help build a platform where third-party developers can build applications that integrate with serverless APIs.
Why your next serverless project should use AWS AppSyncYan Cui
In this webinar, Yan Cui and Lumigo Software Engineer Guy Moses will discuss some of the power of GraphQL and AppSync and why AppSync + Lambda + DynamoDB should be your stack of choice in 2021 and beyond!
1. The implicit grant type is used for mobile apps and web applications where client secret confidentiality cannot be guaranteed. It returns the access token directly to the client instead of an authorization code.
2. The user is redirected to the authorization server to log in and authorize access. If approved, the access token is encoded in the redirect URI returned to the client.
3. The client extracts the token and can use it to access protected resources, without having to make a separate request to exchange an authorization code for a token. However, the token is exposed in the redirect URI, so it has a short lifetime.
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...Amazon Web Services
Learn how to set up an end-user directory, secure sign-up and sign-in, manage user profiles, authenticate and authorize your APIs, federate from enterprise and social identity providers, and use OAuth to integrate with your app—all without any server setup or code. With clear blueprints, we show you how to leverage Amazon Cognito to administer and secure your end users and enable identity for the applied patterns of mobile, web, and enterprise apps.
OAuth 2.0 is an open standard for authorization that enables apps to securely access APIs on behalf of users. It has become widely adopted for consumer apps but presents challenges for enterprise use cases. The presentation discusses adapting OAuth 2.0 for enterprises by supporting administrative authorization, mobile SSO federation, and server-to-server flows that exchange credentials or assertions for API tokens to enable API federation and password-less access across clouds. Future directions include further standardizing assertion flows and mobile app federation.
Scaling your Mobile App Development in the Cloud - DevNexusTara Walker
The presentation done for DevNexus about Mobile Cloud Services. Presentation explores and demos services that help you scale your Mobile development to new heights by including Cloud as an integrated part of mobile development.
Authentication is the process of verifying a user's identity, while authorization determines what permissions and access levels a user has. Common authentication methods for APIs include basic authentication, bearer tokens, API keys, OAuth 2.0, and OpenID Connect. OAuth 2.0 allows users to grant third party applications access to their account without sharing their credentials. It involves the issuance of tokens that applications use to make API calls. OpenID Connect builds upon OAuth 2.0 to provide authentication for APIs as well by exchanging tokens that contain user identity claims.
.NET Core, ASP.NET Core Course, Session 19aminmesbahi
The document provides an introduction to ASP.NET Core Identity and OAuth 2.0 authorization. It discusses Identity topics like user registration, sign in, the database schema, and dependencies. It also covers OAuth concepts like roles, tokens, registering as a client, authorization flows, and security vulnerabilities. The document is an introduction and overview of key Identity and OAuth concepts for a .NET Core training course.
Create mobile apps quickly and easily. We manage the back end, so you don’t have to provision, scale, or monitor servers – just upload code and you’re done. Onboard new users and synchronize their data, such as app preferences, across multiple devices. Engage users by sending push notifications, track usage patterns and optimize your business with in-app analytics. Deliver high quality apps by testing them against a large collection of real phones and tablets. Start simple and add more services at any time.
Build Your Mobile App Faster with AWS Mobile Services (Cognito, Lambda, SNS, ...Amazon Web Services
Build powerful mobile applications using AWS Mobile Services. For the first time, we will discuss how mobile developers can leverage the new cross-platform AWS Mobile Services that we announced today. How they can authenticate and authorize their users using Amazon Cognito, user identity and data synchronization service. We will discuss how Amazon Mobile Analytics service collects, visualizes and understand your mobile app usage at scale, All this is available as a single unified and mobile-optimized easy-to-use SDK so developers can access these new services (and other services like S3, DynamoDB) with just a few lines of code on the client and without the need of owning backend servers. - http://aws.amazon.com/mobile
Creating Rich Server API’s for your Mobile Apps - Best Practices and GuidelinesJonathan Guthrie
Jono discusses practical design-led thinking approaches to creating scalable and agile server-side API’s for your mobile applications, from initial planning through to execution and documentation. While targeted at Swift as the language, you’ll be able to apply these techniques to creating API’s in almost any server-side language.
This document provides an overview of Windows Azure AppFabric. It discusses the identity and access control, service bus, and caching services that AppFabric provides. The identity service implements claims-based authentication and uses the Access Control service to integrate single sign-on with multiple identity providers. The service bus enables hybrid cloud applications through a relay that provides secure messaging. Caching improves performance by storing data in memory for low-latency access.
The document discusses stateless authorization using OAuth2 and JSON Web Tokens (JWT). It begins with an introduction to authentication, authorization, and single sign-on (SSO). It then provides an in-depth explanation of OAuth2 actors, flows, and grant types. The Authorization Code Grant flow and Implicit Grant flow are explained in detail. Finally, it introduces JWT and why it is a suitable standard for representing OAuth2 access tokens since it meets the requirements and libraries are available.
This document provides an overview of OAuth 2.0. It discusses what OAuth is, its history and terminology. It then covers the main authorization flows in OAuth 2.0 including server-side web applications, client-side web applications, resource owner passwords, and client credentials. Considerations for using OAuth in mobile apps are also outlined. The document concludes with information about tools, libraries and a demo for implementing OAuth.
This document discusses building cloud-powered mobile apps using Amazon Web Services (AWS). It provides an overview of AWS services that can be used to build mobile backend functionality such as user authentication with Amazon Cognito, data storage with DynamoDB, media delivery with S3 and CloudFront, push notifications with SNS, and analytics tracking with Mobile Analytics. The document also discusses how the AWS Mobile SDK provides an integrated way to access these services and handles issues like intermittent network connections. Specific services are then discussed in more detail, including how Cognito can be used for user identity management and data synchronization across devices.
Similar to Authentication across the Atlassian Ecosystem - AtlasCamp 2011 (20)
We aim to celebrate women every day, but we’re taking today to give special recognition to womxn at Atlassian continue who inspire and lead.
For #InternationalWomensDay, we asked Atlassians to nominate and recognize amazing womxn at Atlassian who inspire them, challenge them, and truly represent Atlassian values.
Ever wondered what Atlassian engineers do in their 20% time? Join Forge engineering lead Tim Pettersen on a lightning tour of how Forge is being used inside Atlassian. Attendees will get a rare view into some of the apps, tools, and tweaks we’ve built internally on top of Forge in the spirit of dogfooding and innovation. Come along and be inspired with some great ideas for improving and automating your own teams' workflows!
Let's Build an Editor Macro with Forge UIAtlassian
Race out of the gate with Forge UI: a new way of building UI extensions for Atlassian products. In this session, Forge UI Developer Experience lead Peter Gleeson will demonstrate how build an Editor macro from scratch! Attendees will learn about Forge foundational concepts such as the FaaS dev loop, Forge CLI, and how to construct UIs from Forge UI components.
This session provides a great introduction to the Forge platform for any developer looking to get productive with editor apps and Forge UI.
In the words of Jeff Atwood: “JavaScript is the lingua franca of the web”. It’s also the first language we’ve chosen to support in Forge. In this session, Forge engineer Shorya Raj will walk through the Node.js isolate based runtime you’ll be using to write apps for Forge.
Attendees will learn about the unique features of the Forge JavaScript Runtime, such as automatic authentication and tenant context management. Shorya will also cover the differences between the Runtime, conventional browser, and Node.js APIs.
Developers or attendees with some programming experience will get the most out of this session.
Forge UI: A New Way to Customize the Atlassian User ExperienceAtlassian
UI extensibility is an integral part of Atlassian's ecosystem story. In cloud, traditionally this has been accomplished with the humble iframe. In this session you will learn about Forge UI, an additional and innovative way to build visual apps for Atlassian products.
Join Product Manager Simon Kubica and Senior Developer Michael Oates from the Forge team in exploring the underlying concepts and technology powering Forge UI, and learn how it will unlock exciting new opportunities in our ecosystem.
This document discusses using triggers to automate actions in Forge apps. It begins with an overview of triggers and then discusses:
- Product triggers that are triggered by events in Atlassian products like Jira, Confluence etc.
- Web triggers that are triggered by HTTP requests to a Forge function.
- How to authenticate and make requests to external services like Opsgenie from Forge functions in response to triggers.
- Demos of building a Forge app that responds to Jira issue creation by assigning the issue and notifying Opsgenie.
The document provides details on the event payload formats, making authenticated requests, and deploying/managing the Forge app lif
Observability and Troubleshooting in ForgeAtlassian
The document discusses the evolution of software development from bare metal servers to virtualization, containers, and serverless functions. It notes how debugging and observability have become more difficult as software moves to remote "somebody else's computer" environments. The author introduces Forge as Atlassian's solution for providing developers a declarative language and best-in-class experience for building user interfaces on serverless infrastructure, including features for debugging, monitoring, and security.
Trusted by Default: The Forge Security & Privacy ModelAtlassian
Security and trust have become increasingly important requirements for our customers in Cloud. We’re working to make it easier for you to build and maintain secure apps for Atlassian products.
In this session, Engineering Team Lead Dugald Morrow and Principal Product Manager Joël Kalmanowicz will explain how security and trust have been baked into the Forge framework and the benefits the platform can offer you and your users. Learn how much less work it can be to build trusted apps customers will love on Forge by going deep on the safeguards we’re putting in place.
Developers or attendees with some software security experience will get the most out of this session.
Designing Forge UI: A Story of Designing an App UI SystemAtlassian
Creating apps with Forge and its UI frontend components is now easier than ever. Join Senior Designer Allard van Helbergen and Product Manager Josephine Lee as they walk through the story of designing Forge UI.
What is a declarative UI and why did we choose this paradigm? What are all the considerations that go into defining the set of components to build apps with? And how do you make ‘creating apps’ simple? Walk away understanding the foundations of Forge, how all the different components work together, and where Forge UI is headed in the future.
After a day of learning about the exciting features of Forge, get ready for a peek under the hood to discover how it’s all implemented. Join Forge Architect Patrick Streule as he goes deep on topics such as Forge FaaS infrastructure, the internal workings of tenant isolation, and automatic authentication.
Attendees will also get a glimpse of some features we’re looking at building into the future of Forge, such as a serverless data store for apps and more!
Access to User Activities - Activity Platform APIsAtlassian
How do you stay on top of your work when it is scattered across multiple Atlassian products?
"If only there was a single place where I could see all my activity..." - sounds familiar?
We are going to provide you an insight into what lead to the creation of a new Activity API. Following last year’s Atlas Camp announcement from our CTO Sri Viswanath, Atlassian is moving onto GraphQL - new Activity API is one the first pieces of the GraphQL Atlassian Platform and is the technology behind start.atlassian.com.
Join Sergey Meshkov, Senior Developer, who will provide you a sneak peek of the new GraphQL Activity API as it will soon be available to our vendors.
Design Your Next App with the Atlassian Vendor Sketch PluginAtlassian
Our designers work 3x quicker with the Atlassian Vendor Sketch Plugin — and now we’re unleashing these superpowers to the Atlassian Ecosystem. If you mockup screens for code or marketing, we’ll help you drag and drop your way to an Atlaskit design in less than 10 minutes. And if you’re a designer, you’ll want to hear about our pixel-perfect component library and suite of seamless Sketch integrations.
Join Atlassian’s resident Sketch aficionado, Huw Evans, to learn about:
Sketch Components: If it’s in Atlaskit, it’s now in Sketch. And introducing the Symbol Palette, the quickest way to find the right component for the job.
Product Templates: Spark inspiration by building your designs inside realistic screens from Jira & Confluence — or craft hero images for your Marketplace listing!
Color and Text Styles: Heard of N75? H400? If those mean nothing to you, we’ll run through how to make your users feel at home by using Atlassian colors & typography, right inside Sketch.
Data Suppliers: Say goodbye to Lorem Ipsum. Learn how to use Sketch Data Suppliers to generate realistic copy using live data from Jira, Confluence and Bitbucket. Bonus: How we used AI to create people who don’t exist!
♀️ It's All Open Source: How we made it really easy to customise the Atlassian Vendor Sketch Plugin for your team's needs.
Tear Up Your Roadmap and Get Out of the BuildingAtlassian
The document discusses conducting customer research by tearing up existing roadmaps and getting out of the building. It recommends running a research spike with the team to define what needs to be learned. Tips are provided for recruiting participants through support, community, and sales teams. Conducting customer interviews is discussed, including roles for scribes and interviewers. Analyzing interviews by consolidating themes from transcripts is also covered. An example analysis identified themes around customer journeys, collaboration as a team sport, and overwhelming demand for participation. The document encourages being honest about whether a research spike could be run and why or why not.
Nailing Measurement: a Framework for Measuring Metrics that MatterAtlassian
When it comes to designing apps and new features, we just can't get enough of metrics. In an age where we can collect data from almost anything, how can we cut through the noise and focus on the right metrics to measure the success and failures of the apps that we’re building?
Join Atlassian Product Manager Josephine Lee as she delves through what exactly makes a good metric. Throughout the talk, we’ll walk through real Atlassian examples of good and bad metrics. By exploring a framework for measurement, we’ll cover detailed features that showcase how best to measure and choose the right set of success, supportive, and counter metrics.
You'll walk away with tips and learnings from Atlassian’s approach to measuring success, and learn how to use data and metrics to inspire action in your apps.
Building Apps With Color Blind Users in MindAtlassian
Color-blind people are using your apps. 1 in 12 men is color blind. And for women, this is 1 in 200.
Building apps that work well for color blind people is not difficult. Some simple techniques help us with the design of our interface. And some tools help us see what color blind people see.
In this talk, Maarten Arts of Avisi will look at common varieties of color blindness. We will look at apps through the eyes of a color-blind person. And we will discover what color-blind people struggle with.
Regardless of whether you're a designer or developer, this talk will equip you with the skills and the tools you need to make sure that your app works for color-blind people.
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...Atlassian
The words we choose have the power to include or alienate our users. The reality is that for many, English is spoken as a second language. And unless you're going to localize your product for those major non-English speaking markets, you'll need to thoughtfully create content that is accessible to a larger audience.
But how do we create products that maintain a sense of personality without isolating a wide audience of non-native speakers?
Join Atlassian Content Designer, Roana Bilia, as she walks you through why thoughtful, inclusive content, is key to creating well-designed user experiences. You'll walk away with foundational principles for good UX copy when optimizing your product UI, a few quick wins that you as creators and developers can incorporate into your next products, as well as a set of mistakes to avoid that companies—including Atlassian—have made, which prioritized native speakers but isolated non-native speakers.
Beyond Diversity: A Guide to Building Balanced TeamsAtlassian
We hear it all the time, and we get it. Diversity and inclusion are important! But isn't it an HR problem? HR may be able to help with diversity but inclusion or creating an inclusive environment is everyone's responsibility. So how do we create an inclusive environment that celebrates diversity and engages and supports everyone? Isabel Nyo will be sharing best practices and lessons she has learned along the way. She will also be sharing her experience as a minority, a female technical leader, in the technology industry.
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed TeamAtlassian
In September 2018, K15t took its mission to go self-managed to the next-level when the entire company worked together to decide on the Next Big Thing™ to build for Atlassian users and present it at Summit in Las Vegas.
In this session, Anshuman Dash, an intern turned software engineer, turned product manager, shares his journey of professional self-discovery. In under five months, he joins a freshly assembled, self-managed team in building a new Atlassian Marketplace app.
Dash will give a quick intro to what it means for a team to be self-managed. Then, he'll share his observations and experiences on the team, as well as the best-practices, patterns, and processes K15t has discovered along the way.
Whether you are a new team with a kick-ass product idea or a big company figuring out ways to scale, this talk will provide you with practical tips and ideas your team can try out!
Designing for the enterprise comes with a unique set of challenges; ensuring readability and accessibility at scale, meeting the needs of multi-layered organizations, and building a trust when your software - used by dozens of thousands of employees - is considered mission-critical.
At Atlassian, we've spent countless hours digging deep into our enterprise customer's needs and we've gathered a vast repository of insights.
In this talk, Pawel Wodkowski, a senior designer on Jira Server, will share all that we've learned from our research (while not being shy about busting some of those wild admin myths!). You'll get a crash course in what it means to design for scale the Atlassian way.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.