Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 1#3 | Part 26#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the Exchange infrastructure is - Exchange on-Premises and, the Autodiscover Endpoint is located in a non-Active Directory based environment.
This is the first article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-exchange-on-premises-environment-non-active-directory-environment-part-1-of-3-part-26-of-36
Eyal Doron | o365info.com
Exchange 2013 coexistence | Autodiscover infrastructure | Part 2/2 | 12#23
http://o365info.com/exchange-2013-coexistence-environment-autodiscover-infrastructure-part-22/
Reviewing the subject of - Autodiscover infrastructure in an Exchange 2013 coexistence environment (this is the second article, in a series of two articles).
Eyal Doron | o365info.com
MongoDB .local Paris 2020: Les bonnes pratiques pour sécuriser MongoDBMongoDB
Chaque entreprise devient une entreprise de logiciels, fournissant des solutions client pour accéder à une variété de services et d'informations. Les entreprises commencent maintenant à valoriser leurs données et à obtenir de meilleures informations pour l'entreprise. Un défi crucial consiste à s'assurer que ces données sont toujours disponibles et sécurisées pour être conformes aux objectifs commerciaux de l'entreprise et aux contraintes réglementaires des pays. MongoDB fournit la couche de sécurité dont vous avez besoin, venez découvrir comment sécuriser vos données avec MongoDB.
A well designed API has to be discoverable. MuleSoft anypoint platform API portal provides a centralized place for discovering all the tools (API Documentation, Mock API testing etc) that anybody can use to successfully discover an API.
MuleSoft anypoint platform API portal provides API Notebook, a web-based tool to explore the API in JavaScript scripting workspace. API Notebook generates API client from API RAML specification to understand API’s resources, methods, required arguments etc and allow user to make live call to API for personalized testing.
NodeJS: the good parts? A skeptic’s view (jax jax2013)Chris Richardson
JavaScript used to be confined to the browser. But these days, it's becoming increasingly popular in server-side applications in the form of Node.js. Node.js provides event-driven, non-blocking I/O model that supposedly makes it easy to build scalable network application. In this talk you will learn about the consequences of combining the event-driven programming model with a prototype-based, weakly typed, dynamic language. We will share our perspective as a server-side Java developer who wasn’t entirely happy about JavaScript in the browser, let alone on the server. You will learn how to use Node.js effectively in modern, polyglot applications.
Watch the video: http://www.youtube.com/watch?v=CN0jTnSROsk&feature=youtu.be
Gluecon: Using sagas to maintain data consistency in a microservice architectureChris Richardson
The document discusses using sagas to maintain data consistency in a microservices architecture. It explains that traditional ACID transactions are not an option for microservices due to loose coupling of data and services. Sagas provide an alternative by executing a series of local transactions with compensating transactions to rollback any completed steps if errors occur. The document covers how sagas are coordinated either through a centralized orchestrator or by asynchronous messaging to sequence transaction steps reliably across services.
ArchSummit Shenzhen - Using sagas to maintain data consistency in a microserv...Chris Richardson
This is a talk I gave at QCON ArchSummit in Shenzhen.
The microservice architecture structures an application as a set of loosely coupled, collaborating services. Maintaining data consistency is challenging since each service has its own database to ensure loose coupling. To make matters worse, for a variety of reasons distributed transactions using JTA are not an option for modern applications.
In this talk we describe an alternative transaction model known as a saga. You will learn about the benefits and drawbacks of using sagas. We describe how sagas are eventually consistent rather than ACID and what this means for developers. You will learn how to design and implement sagas in a Java application.
#JaxLondon keynote: Developing applications with a microservice architectureChris Richardson
The document summarizes Chris Richardson's presentation on developing applications with a microservice architecture. The presentation discusses how decomposing monolithic applications into microservices improves deployability, scalability, and simplifies adopting new technologies. It covers the benefits of microservices, including improved fault isolation, reduced commitment to technology stacks, and easier scaling of development. It also discusses challenges like complexity in developing, testing, and operating distributed systems.
Exchange 2013 coexistence | Autodiscover infrastructure | Part 2/2 | 12#23
http://o365info.com/exchange-2013-coexistence-environment-autodiscover-infrastructure-part-22/
Reviewing the subject of - Autodiscover infrastructure in an Exchange 2013 coexistence environment (this is the second article, in a series of two articles).
Eyal Doron | o365info.com
MongoDB .local Paris 2020: Les bonnes pratiques pour sécuriser MongoDBMongoDB
Chaque entreprise devient une entreprise de logiciels, fournissant des solutions client pour accéder à une variété de services et d'informations. Les entreprises commencent maintenant à valoriser leurs données et à obtenir de meilleures informations pour l'entreprise. Un défi crucial consiste à s'assurer que ces données sont toujours disponibles et sécurisées pour être conformes aux objectifs commerciaux de l'entreprise et aux contraintes réglementaires des pays. MongoDB fournit la couche de sécurité dont vous avez besoin, venez découvrir comment sécuriser vos données avec MongoDB.
A well designed API has to be discoverable. MuleSoft anypoint platform API portal provides a centralized place for discovering all the tools (API Documentation, Mock API testing etc) that anybody can use to successfully discover an API.
MuleSoft anypoint platform API portal provides API Notebook, a web-based tool to explore the API in JavaScript scripting workspace. API Notebook generates API client from API RAML specification to understand API’s resources, methods, required arguments etc and allow user to make live call to API for personalized testing.
NodeJS: the good parts? A skeptic’s view (jax jax2013)Chris Richardson
JavaScript used to be confined to the browser. But these days, it's becoming increasingly popular in server-side applications in the form of Node.js. Node.js provides event-driven, non-blocking I/O model that supposedly makes it easy to build scalable network application. In this talk you will learn about the consequences of combining the event-driven programming model with a prototype-based, weakly typed, dynamic language. We will share our perspective as a server-side Java developer who wasn’t entirely happy about JavaScript in the browser, let alone on the server. You will learn how to use Node.js effectively in modern, polyglot applications.
Watch the video: http://www.youtube.com/watch?v=CN0jTnSROsk&feature=youtu.be
Gluecon: Using sagas to maintain data consistency in a microservice architectureChris Richardson
The document discusses using sagas to maintain data consistency in a microservices architecture. It explains that traditional ACID transactions are not an option for microservices due to loose coupling of data and services. Sagas provide an alternative by executing a series of local transactions with compensating transactions to rollback any completed steps if errors occur. The document covers how sagas are coordinated either through a centralized orchestrator or by asynchronous messaging to sequence transaction steps reliably across services.
ArchSummit Shenzhen - Using sagas to maintain data consistency in a microserv...Chris Richardson
This is a talk I gave at QCON ArchSummit in Shenzhen.
The microservice architecture structures an application as a set of loosely coupled, collaborating services. Maintaining data consistency is challenging since each service has its own database to ensure loose coupling. To make matters worse, for a variety of reasons distributed transactions using JTA are not an option for modern applications.
In this talk we describe an alternative transaction model known as a saga. You will learn about the benefits and drawbacks of using sagas. We describe how sagas are eventually consistent rather than ACID and what this means for developers. You will learn how to design and implement sagas in a Java application.
#JaxLondon keynote: Developing applications with a microservice architectureChris Richardson
The document summarizes Chris Richardson's presentation on developing applications with a microservice architecture. The presentation discusses how decomposing monolithic applications into microservices improves deployability, scalability, and simplifies adopting new technologies. It covers the benefits of microservices, including improved fault isolation, reduced commitment to technology stacks, and easier scaling of development. It also discusses challenges like complexity in developing, testing, and operating distributed systems.
Map, Flatmap and Reduce are Your New Best Friends: Simpler Collections, Concu...Chris Richardson
Higher-order functions such as map(), flatmap(), filter() and reduce() have their origins in mathematics and ancient functional programming languages such as Lisp. But today they have entered the mainstream and are available in languages such as JavaScript, Scala and Java 8. They are well on their way to becoming an essential part of every developer’s toolbox.
In this talk you will learn how these and other higher-order functions enable you to write simple, expressive and concise code that solve problems in a diverse set of domains. We will describe how you use them to process collections in Java and Scala. You will learn how functional Futures and Rx (Reactive Extensions) Observables simplify concurrent code. We will even talk about how to write big data applications in a functional style using libraries such as Scalding.
Microservices are an essential enabler of agility but developing and deploying them is a challenge. In order for microservices to be loosely coupled,each service must have its own datastore. This makes it difficult to maintain data consistency across services.
Deploying microservices is also a complex problem since an application typically consists of 10s or 100s of services, written in a variety of languages and frameworks. In this presentation, you will learn how to solve these problems by using an event-driven architecture to maintain data consistency and by using Docker to simplify deployment.
JavaOne2017: ACID Is So Yesterday: Maintaining Data Consistency with SagasChris Richardson
The services in a microservice architecture must be loosely coupled and so cannot share database tables. What’s more, two-phase commit (aka a distributed transaction) is not a viable option for modern applications. Consequently, a microservice-based application must use so-called sagas to maintain data consistency between services. In this presentation, you will learn how sagas work and how they differ from traditional ACID transactions. You will also learn how to design and implement sagas for your applications.
Developing microservices with aggregates (melbourne)Chris Richardson
The document discusses using domain-driven design aggregates and event sourcing to develop microservices architectures. It presents an example of using aggregates to partition a customer and order domain across microservices. It also discusses using event-driven sagas to maintain consistency between aggregates instead of two-phase commit transactions. Maintaining state as events allows reconstructing state from history and reliably publishing events.
Events on the outside, on the inside and at the core (jfokus jfokus2016)Chris Richardson
This is the talk I gave at JFokus 2016 on event-driven microservices.
This presentation looks at the importance of events and the role that they play in applications. We describe how events are a key application integration mechanism and how they are used by applications to communicate with the outside world. You will learn how the microservices inside a system can use events to maintain data consistency. We discuss how easy it is to implement both of these mechanisms by developing your core business logic using an event-centric approach known as event sourcing.
Building and deploying microservices with event sourcing, CQRS and Docker (Be...Chris Richardson
This document discusses building and deploying microservices using event sourcing, CQRS and Docker. It covers an overview of event sourcing and how it solves data consistency issues in microservice architectures. CQRS is used to implement materialized views for queries. Spring Boot is recommended for building microservices and Docker is used to package the microservices. A continuous integration pipeline is used to build, test, publish Docker images and deploy updates.
OReilly SACON2018 - Events on the outside, on the inside, and at the coreChris Richardson
Events are very much on the edge of traditional applications, which use them as an application integration mechanism. The classic example is an ecommerce system. When a customer places an order, the order management application publishes an event, which triggers the fulfillment application to action. But today, microservices and DDD—which is a great foundation for microservices—are at the core of the application.
Events play an essential role in modern applications. Chris Richardson explains why events are a key application integration mechanism and how they are used by applications to communicate with the outside world. You’ll learn how the microservices inside an application use events to maintain data consistency and discover how to go one step further and make events an integral part of your domain logic.
Developing microservices with aggregates (SpringOne platform, #s1p)Chris Richardson
The Domain Model pattern is a great way to develop complex business logic. Unfortunately, a typical domain model is a tangled, birds nest of classes. It can’t be decomposed into microservices. Moreover, business logic often relies on ACID transactions to maintain consistency.
Fortunately, there is a solution to this problem: aggregates. An aggregate is an often overlooked modeling concept from the must read book Domain Driven Design. In this talk you will learn how aggregates enable you to develop business logic for the modern world of microservices and NoSQL. We will describe how to use aggregates to design modular business logic that can be partitioned into microservices. You will learn how aggregates enable you to use eventual consistency instead of ACID. We will describe the design of a microservice that is built using aggregates, and Spring Cloud.
Futures and Rx Observables: powerful abstractions for consuming web services ...Chris Richardson
A modular, polyglot architecture has many advantages but it also adds complexity since each incoming request typically fans out to multiple distributed services. For example, in an online store application the information on a product details page - description, price, recommendations, etc - comes from numerous services. To minimize response time and improve scalability, these services must be invoked concurrently. However, traditional concurrency mechanisms are low-level, painful to use and error-prone.
In this talk you will learn about some powerful yet easy to use abstractions for consuming web services asynchronously. We will compare the various implementations of futures that are available in Java, Scala and JavaScript. You will learn how to use reactive observables, which are asynchronous data streams, to access web services from both Java and JavaScript. We will describe how these mechanisms let you write asynchronous code in a very straightforward, declarative fashion.
Building and deploying microservices with event sourcing, CQRS and Docker (Ha...Chris Richardson
In this talk we share our experiences developing and deploying a microservices-based application. You will learn about the distributed data management challenges that arise in a microservices architecture. We will describe how we solved them using event sourcing to reliably publish events that drive eventually consistent workflows and pdate CQRS-based views. You will also learn how we build and deploy the application using a Jenkins-based deployment pipeline that creates Docker images that run on Amazon EC2.
MongoDB.local Berlin: App development in a Serverless WorldMongoDB
The document provides an overview of serverless application development using MongoDB Stitch. It describes how traditional applications require developers to manage infrastructure like servers and databases, while serverless architectures allow developers to focus on building features by leveraging platform services for infrastructure concerns. The document demonstrates a concert finder app built with Stitch that uses services for user authentication, data storage, and external APIs, without requiring management of servers or databases.
This is a keynote talk that I gave at RedisConf 2016.
It answers three questions:
What are microservices?
Why should you use them?
Where does Redis fit into a microservices architecture?
You can find the example code here: https://github.com/eventuate-examples/eventuate-examples-restaurant-management
Handling Eventual Consistency in JVM Microservices with Event Sourcing (javao...Chris Richardson
This is the talk that the Kenny Bastani and I gave at JavaOne 2016.
When you’re building JVM applications in a microservice architecture, managing state becomes a distributed systems problem. Instead of being able to manage state as transactions inside the boundaries of a single monolithic application, a microservice must be able to manage consistency by using transactions that are distributed across a network of many different applications and databases. This session explores the problems of data consistency and high availability in JVM-based microservices and how to use event sourcing to solve these problems.
The never-ending REST API design debate -- Devoxx France 2016Restlet
The document discusses best practices for REST API design, including:
1) Using nouns instead of verbs for endpoints, and plural resource names instead of singular. It also recommends snake_case formatting.
2) Properly using HTTP status codes like 201 Created, 202 Accepted, 204 No Content, and providing helpful error responses.
3) Supporting features like pagination, filtering, sorting, searching, and caching responses with headers like ETag and Last-Modified.
4) Discussing approaches for API versioning in the URL, custom headers, or accept headers. The importance of hypermedia and discoverability is also emphasized.
There is no such thing as a microservice! (oracle code nyc)Chris Richardson
This is a keynote I gave at Oracle Code 2017 in New York:
https://developer.oracle.com/code/newyork
The microservice architecture is becoming increasingly popular. However, frequent references to using “a microservice to solve a problem” suggest that the concept is not universally well understood.
In this talk we define the microservice architecture as an architectural style and explain what that actually means. You will learn why the architecture that you pick for your application matters. We describe how the primary goal of the microservice architecture is to enable continuous delivery/deployment and how it achieves that.
You will learn how to solve key challenges with decomposing an application into microservices. We describe why there is no such thing as a microservice!
Securing your apps with OAuth2 and OpenID Connect - Roland Guijt - Codemotion...Codemotion
The document discusses OAuth2 and OpenId Connect protocols for securing web applications. It provides an overview of how OAuth2 is used to get tokens in exchange for secrets to allow software access to resources without revealing the secret. OpenId Connect extends OAuth2 to provide authentication by using OAuth tokens to identify users. The document outlines common scenarios and actors in the protocols, describes different token types and flows, and demonstrates how to implement OAuth2 and OpenId Connect.
Polaris presentation ioc - code conferenceSteven Contos
This document discusses an introduction to dependency injection (DI) and inversion of control (IOC) using a console application example in C#. It will progressively introduce these concepts through examples, exploring how to transform a simple program into a more complex one while applying DI and IOC. The learning objectives are to understand what DI and IOC are, whether they are always used together, and see how they work in a simple scenario. Examples will be provided on GitHub and various DI containers like StructureMap and Autofac may be explored.
Microservices pattern language (microxchg microxchg2016)Chris Richardson
My talk from http://microxchg.io/2016/index.html.
Here is the video - https://www.youtube.com/watch?v=1mcVQhbkA2U
When architecting an enterprise Java application, you need to choose between the traditional monolithic architecture consisting of a single large WAR file, or the more fashionable microservices architecture consisting of many smaller services. But rather than blindly picking the familiar or the fashionable, it’s important to remember what Fred Books said almost 30 years ago: there are no silver bullets in software. Every architectural decision has both benefits and drawbacks. Whether the benefits of one approach outweigh the drawbacks greatly depends upon the context of your particular project. Moreover, even if you adopt the microservices architecture, you must still make numerous other design decisions, each with their own trade-offs.
A software pattern is an ideal way of describing a solution to a problem in a given context along with its tradeoffs. In this presentation, we describe a pattern language for microservices. You will learn about patterns that will help you decide when and how to use microservices vs. a monolithic architecture. We will also describe patterns that solve various problems in a microservice architecture including inter-service communication, service registration and service discovery.
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...MongoDB
aux Core Data, appréciée par des centaines de milliers de développeurs. Apprenez ce qui rend Realm spécial et comment il peut être utilisé pour créer de meilleures applications plus rapidement.
MongoDB .local Toronto 2019: MongoDB Atlas JumpstartMongoDB
Join this talk and test session with MongoDB Support where you'll go over the configuration and deployment of an Atlas environment. Setup a service that you can take back in a production-ready state and prepare to unleash your inner genius.
Map, Flatmap and Reduce are Your New Best Friends: Simpler Collections, Concu...Chris Richardson
Higher-order functions such as map(), flatmap(), filter() and reduce() have their origins in mathematics and ancient functional programming languages such as Lisp. But today they have entered the mainstream and are available in languages such as JavaScript, Scala and Java 8. They are well on their way to becoming an essential part of every developer’s toolbox.
In this talk you will learn how these and other higher-order functions enable you to write simple, expressive and concise code that solve problems in a diverse set of domains. We will describe how you use them to process collections in Java and Scala. You will learn how functional Futures and Rx (Reactive Extensions) Observables simplify concurrent code. We will even talk about how to write big data applications in a functional style using libraries such as Scalding.
Microservices are an essential enabler of agility but developing and deploying them is a challenge. In order for microservices to be loosely coupled,each service must have its own datastore. This makes it difficult to maintain data consistency across services.
Deploying microservices is also a complex problem since an application typically consists of 10s or 100s of services, written in a variety of languages and frameworks. In this presentation, you will learn how to solve these problems by using an event-driven architecture to maintain data consistency and by using Docker to simplify deployment.
JavaOne2017: ACID Is So Yesterday: Maintaining Data Consistency with SagasChris Richardson
The services in a microservice architecture must be loosely coupled and so cannot share database tables. What’s more, two-phase commit (aka a distributed transaction) is not a viable option for modern applications. Consequently, a microservice-based application must use so-called sagas to maintain data consistency between services. In this presentation, you will learn how sagas work and how they differ from traditional ACID transactions. You will also learn how to design and implement sagas for your applications.
Developing microservices with aggregates (melbourne)Chris Richardson
The document discusses using domain-driven design aggregates and event sourcing to develop microservices architectures. It presents an example of using aggregates to partition a customer and order domain across microservices. It also discusses using event-driven sagas to maintain consistency between aggregates instead of two-phase commit transactions. Maintaining state as events allows reconstructing state from history and reliably publishing events.
Events on the outside, on the inside and at the core (jfokus jfokus2016)Chris Richardson
This is the talk I gave at JFokus 2016 on event-driven microservices.
This presentation looks at the importance of events and the role that they play in applications. We describe how events are a key application integration mechanism and how they are used by applications to communicate with the outside world. You will learn how the microservices inside a system can use events to maintain data consistency. We discuss how easy it is to implement both of these mechanisms by developing your core business logic using an event-centric approach known as event sourcing.
Building and deploying microservices with event sourcing, CQRS and Docker (Be...Chris Richardson
This document discusses building and deploying microservices using event sourcing, CQRS and Docker. It covers an overview of event sourcing and how it solves data consistency issues in microservice architectures. CQRS is used to implement materialized views for queries. Spring Boot is recommended for building microservices and Docker is used to package the microservices. A continuous integration pipeline is used to build, test, publish Docker images and deploy updates.
OReilly SACON2018 - Events on the outside, on the inside, and at the coreChris Richardson
Events are very much on the edge of traditional applications, which use them as an application integration mechanism. The classic example is an ecommerce system. When a customer places an order, the order management application publishes an event, which triggers the fulfillment application to action. But today, microservices and DDD—which is a great foundation for microservices—are at the core of the application.
Events play an essential role in modern applications. Chris Richardson explains why events are a key application integration mechanism and how they are used by applications to communicate with the outside world. You’ll learn how the microservices inside an application use events to maintain data consistency and discover how to go one step further and make events an integral part of your domain logic.
Developing microservices with aggregates (SpringOne platform, #s1p)Chris Richardson
The Domain Model pattern is a great way to develop complex business logic. Unfortunately, a typical domain model is a tangled, birds nest of classes. It can’t be decomposed into microservices. Moreover, business logic often relies on ACID transactions to maintain consistency.
Fortunately, there is a solution to this problem: aggregates. An aggregate is an often overlooked modeling concept from the must read book Domain Driven Design. In this talk you will learn how aggregates enable you to develop business logic for the modern world of microservices and NoSQL. We will describe how to use aggregates to design modular business logic that can be partitioned into microservices. You will learn how aggregates enable you to use eventual consistency instead of ACID. We will describe the design of a microservice that is built using aggregates, and Spring Cloud.
Futures and Rx Observables: powerful abstractions for consuming web services ...Chris Richardson
A modular, polyglot architecture has many advantages but it also adds complexity since each incoming request typically fans out to multiple distributed services. For example, in an online store application the information on a product details page - description, price, recommendations, etc - comes from numerous services. To minimize response time and improve scalability, these services must be invoked concurrently. However, traditional concurrency mechanisms are low-level, painful to use and error-prone.
In this talk you will learn about some powerful yet easy to use abstractions for consuming web services asynchronously. We will compare the various implementations of futures that are available in Java, Scala and JavaScript. You will learn how to use reactive observables, which are asynchronous data streams, to access web services from both Java and JavaScript. We will describe how these mechanisms let you write asynchronous code in a very straightforward, declarative fashion.
Building and deploying microservices with event sourcing, CQRS and Docker (Ha...Chris Richardson
In this talk we share our experiences developing and deploying a microservices-based application. You will learn about the distributed data management challenges that arise in a microservices architecture. We will describe how we solved them using event sourcing to reliably publish events that drive eventually consistent workflows and pdate CQRS-based views. You will also learn how we build and deploy the application using a Jenkins-based deployment pipeline that creates Docker images that run on Amazon EC2.
MongoDB.local Berlin: App development in a Serverless WorldMongoDB
The document provides an overview of serverless application development using MongoDB Stitch. It describes how traditional applications require developers to manage infrastructure like servers and databases, while serverless architectures allow developers to focus on building features by leveraging platform services for infrastructure concerns. The document demonstrates a concert finder app built with Stitch that uses services for user authentication, data storage, and external APIs, without requiring management of servers or databases.
This is a keynote talk that I gave at RedisConf 2016.
It answers three questions:
What are microservices?
Why should you use them?
Where does Redis fit into a microservices architecture?
You can find the example code here: https://github.com/eventuate-examples/eventuate-examples-restaurant-management
Handling Eventual Consistency in JVM Microservices with Event Sourcing (javao...Chris Richardson
This is the talk that the Kenny Bastani and I gave at JavaOne 2016.
When you’re building JVM applications in a microservice architecture, managing state becomes a distributed systems problem. Instead of being able to manage state as transactions inside the boundaries of a single monolithic application, a microservice must be able to manage consistency by using transactions that are distributed across a network of many different applications and databases. This session explores the problems of data consistency and high availability in JVM-based microservices and how to use event sourcing to solve these problems.
The never-ending REST API design debate -- Devoxx France 2016Restlet
The document discusses best practices for REST API design, including:
1) Using nouns instead of verbs for endpoints, and plural resource names instead of singular. It also recommends snake_case formatting.
2) Properly using HTTP status codes like 201 Created, 202 Accepted, 204 No Content, and providing helpful error responses.
3) Supporting features like pagination, filtering, sorting, searching, and caching responses with headers like ETag and Last-Modified.
4) Discussing approaches for API versioning in the URL, custom headers, or accept headers. The importance of hypermedia and discoverability is also emphasized.
There is no such thing as a microservice! (oracle code nyc)Chris Richardson
This is a keynote I gave at Oracle Code 2017 in New York:
https://developer.oracle.com/code/newyork
The microservice architecture is becoming increasingly popular. However, frequent references to using “a microservice to solve a problem” suggest that the concept is not universally well understood.
In this talk we define the microservice architecture as an architectural style and explain what that actually means. You will learn why the architecture that you pick for your application matters. We describe how the primary goal of the microservice architecture is to enable continuous delivery/deployment and how it achieves that.
You will learn how to solve key challenges with decomposing an application into microservices. We describe why there is no such thing as a microservice!
Securing your apps with OAuth2 and OpenID Connect - Roland Guijt - Codemotion...Codemotion
The document discusses OAuth2 and OpenId Connect protocols for securing web applications. It provides an overview of how OAuth2 is used to get tokens in exchange for secrets to allow software access to resources without revealing the secret. OpenId Connect extends OAuth2 to provide authentication by using OAuth tokens to identify users. The document outlines common scenarios and actors in the protocols, describes different token types and flows, and demonstrates how to implement OAuth2 and OpenId Connect.
Polaris presentation ioc - code conferenceSteven Contos
This document discusses an introduction to dependency injection (DI) and inversion of control (IOC) using a console application example in C#. It will progressively introduce these concepts through examples, exploring how to transform a simple program into a more complex one while applying DI and IOC. The learning objectives are to understand what DI and IOC are, whether they are always used together, and see how they work in a simple scenario. Examples will be provided on GitHub and various DI containers like StructureMap and Autofac may be explored.
Microservices pattern language (microxchg microxchg2016)Chris Richardson
My talk from http://microxchg.io/2016/index.html.
Here is the video - https://www.youtube.com/watch?v=1mcVQhbkA2U
When architecting an enterprise Java application, you need to choose between the traditional monolithic architecture consisting of a single large WAR file, or the more fashionable microservices architecture consisting of many smaller services. But rather than blindly picking the familiar or the fashionable, it’s important to remember what Fred Books said almost 30 years ago: there are no silver bullets in software. Every architectural decision has both benefits and drawbacks. Whether the benefits of one approach outweigh the drawbacks greatly depends upon the context of your particular project. Moreover, even if you adopt the microservices architecture, you must still make numerous other design decisions, each with their own trade-offs.
A software pattern is an ideal way of describing a solution to a problem in a given context along with its tradeoffs. In this presentation, we describe a pattern language for microservices. You will learn about patterns that will help you decide when and how to use microservices vs. a monolithic architecture. We will also describe patterns that solve various problems in a microservice architecture including inter-service communication, service registration and service discovery.
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...MongoDB
aux Core Data, appréciée par des centaines de milliers de développeurs. Apprenez ce qui rend Realm spécial et comment il peut être utilisé pour créer de meilleures applications plus rapidement.
MongoDB .local Toronto 2019: MongoDB Atlas JumpstartMongoDB
Join this talk and test session with MongoDB Support where you'll go over the configuration and deployment of an Atlas environment. Setup a service that you can take back in a production-ready state and prepare to unleash your inner genius.
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
The process of “sender verification”, enables us to distinguish between a legitimate sender versus an attacker who spoof his identity.
In the current article, we will review in details the five available methods that we can use for fighting the phenomena of Spoof mail attack.
http://o365info.com/how-does-sender-verification-work-how-we-identify-spoof-mail-the-five-heros-spf-dkim-dmarc-exchange-and-exchange-online-protection-part-9-of-9
O documento resume as atividades realizadas nas bibliotecas escolares do Agrupamento de Escolas Dr. Júlio Martins no mês de janeiro de 2016, incluindo uma ação de formação sobre leitura em voz alta, visitas dos alunos do 1o ano à biblioteca municipal, sessões de saúde oral para alunos e pais, e a primeira fase do Concurso Nacional de Leitura.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness and well-being.
De-list your organization from a blacklist | My E-mail appears as spam | Part...Eyal Doron
De-list your organization from a blacklist | My E-mail appears as spam | Part 16#17
http://o365info.com/de-list-your-organization-from-a-blacklist-my-e-mail-appears-as-spam-part-16-17
Review the charters of a scenario in which your organization appears as blacklisted. The steps and the operations that need to be implemented, for de-list your organization from a blacklist.
Eyal Doron | o365info.com
(1) The document describes a project by some children to help underprivileged people in their community who lacked access to healthcare. (2) They heard a story of a young girl who died after a dog attack because her parents could not afford a simple jaw surgery. (3) The children visited social workers and a doctor to help a girl with a deformed leg get an urgently needed surgery, and a boy receive physiotherapy to prevent his legs from becoming deformed, raising funds through newspaper recycling and presentations to service groups.
A digital id or digital certificate consists of a public and private key pair that can be used to encrypt documents and files so that only the intended recipient can read them, and to digitally sign documents to verify the sender and ensure the document hasn't been altered. The document discusses how public and private keys work, with the public key used to encrypt and the private key needed to decrypt. It states that a digital signature guarantees the identity of the sender and confirms the document hasn't been modified during transmission.
Here are the key changes to ESEpaths described in the document:
- ESEpaths has been extended to include informativeness scores, normalized dates from <dc:date> field, vocabulary terms for tag clouds, event information, sentiment information at item level, typed related items, title and sentiment of background links.
- For easier ingestion and production, the data will now be separated into different ESEpaths files, with a single item having several ESE and ESEpaths files holding complementary information.
- A proposal for EDMpaths is presented, which would represent the enrichment done in ESEpaths but using the Europeana Data Model (EDM) format instead of ESE.
- ESE
PATHS Final state of art monitoring report v0_4pathsproject
This document provides an update on the state of the art in several areas relevant to the PATHS project, including educational informatics, information retrieval, semantic similarity, and wikification. In educational informatics, the document discusses different approaches to evaluating cognitive styles and selects Riding's Cognitive Style Analysis as most appropriate for PATHS. In information retrieval, a paper outlines long-term research objectives, including moving beyond ranked lists and helping users. The document also discusses recent advances in measuring semantic textual similarity using new datasets, as well as improved accuracy in wikification and detecting related articles. New sections cover crowdsourcing, including its use for cultural heritage tasks, and the mobile web, focusing on responsive design principles.
SemEval-2012 Task 6: A Pilot on Semantic Textual Similaritypathsproject
This document describes the SemEval-2012 Task 6 on semantic textual similarity. The task involved measuring the semantic equivalence of sentence pairs on a scale from 0 to 5. The training data consisted of 2000 sentence pairs from existing paraphrase and machine translation datasets. The test data also had 2000 sentence pairs from these datasets as well as surprise datasets. Systems were evaluated based on their Pearson correlation with human annotations. 35 teams participated and the best systems achieved a Pearson correlation over 80%. This pilot task established semantic textual similarity as an area for further exploration.
1) A group of children noticed a large rubbish dump near their neighborhood that had become a health hazard and tried to get the elders to resolve the problem.
2) When the elders did not act, the children came up with a plan to make reusable bags from milk pouches to reduce plastic waste and help clean up the dump.
3) After several iterations, the children created reusable bags that were a success and sold out quickly. They plan to continue their work and teach others to make bags as well.
The document discusses mapping ontologies and rules expressed in OWL2 and SWRL to EMF metamodels and well-formedness constraints expressed in Ecore and IQPL. This allows formalized requirements to be automatically transformed into a domain-specific modeling language for prototyping and validation. Key aspects covered include the translation of concepts, properties, and rules between the ontology languages and modeling language specifications.
PATHSenrich: A Web Service Prototype for Automatic Cultural Heritage Item Enr...pathsproject
PATHSenrich: A Web Service Prototype for Automatic Cultural Heritage Item Enrichment, Eneko Agirre, Ander Barrena, Kike Fernandez, Esther Miranda, Arantxa Otegi, and Aitor Soroa, paper presented the international conference on Theory and Practice in Digital Libraries, TPDL 2013
Large amounts of cultural heritage material are nowadays available through online digital library portals. Most of these cultural items have short descriptions and lack rich contextual information. The PATHS project has developed experimental enrichment services. As a proof of concept, this paper presents a web service prototype which allows independent content providers to enrich cultural heritage items with a subset of the full functionality: links to related items in the collection and links to related Wikipedia articles. In the future we plan to provide more advanced functionality, as available offline for PATHS.
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 2#3 | Part 27#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the Exchange infrastructure is - Exchange on-Premises and, the Autodiscover Endpoint is located in a non-Active Directory based environment.
This is the second article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-exchange-on-premises-environment-non-active-directory-environment-part-2-of-3-part-27-of-36
Eyal Doron | o365info.com
The autodiscover algorithm for locating the source of information part 05#36Eyal Doron
The Autodiscover algorithm for locating the “source of information" | Part 05#36
High-level review of the - The Autodiscover algorithm for locating the “source of information”.
http://o365info.com/the-autodiscover-algorithm-for-locating-the-source-of-information-part-05-of-36
Eyal Doron | o365info.com
Autodiscover flow in active directory based environment part 15#36Eyal Doron
Autodiscover flow in Active Directory based environment | Part 15#36
Reviewing the Autodiscover flow that is implemented by Outlook client on the internal network that enable the client to access the On-Premise Active Directory.
http://o365info.com/autodiscover-flow-active-directory-based-environment-part-15-of-36
Eyal Doron | o365info.com
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
Autodiscover flow in an Exchange on-Premises environment | non-Active Directory environment| Part 3#3 | Part 28#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the Exchange infrastructure is - Exchange on-Premises and, the Autodiscover Endpoint is located in a non-Active Directory based environment.
This is the third article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-exchange-on-premises-environment-non-active-directory-environment-part-3-of-3-part-28-of-36
Eyal Doron | o365info.com
Outlook autodiscover decision process choosing the right autodiscover method ...Eyal Doron
Outlook Autodiscover decision process |Choosing the right Autodiscover method | Part 14#36
Managing the default Outlook Autodiscover flow by using a registry keys such as ExcludeSCPlookup and ExcludeHttpsRootDomain.
http://o365info.com/outlook-autodiscover-decision-process-choosing-the-right-autodiscover-method-part-14-of-36
Eyal Doron | o365info.com
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36Eyal Doron
The document discusses the Autodiscover process in an Exchange hybrid environment between an on-premises Exchange server and Exchange Online. It explains that the Autodiscover journey is more complex because it involves two different environments. For users whose mailboxes have been migrated to Exchange Online, the Autodiscover client will first contact the on-premises Exchange server, which will provide the user's Exchange Online email address to start the Autodiscover process in the cloud. The document is the first of a three-part series that will use the Microsoft Remote Connectivity Analyzer tool to analyze the Autodiscover flow.
My E-mail appears as spam - Troubleshooting path | Part 11#17Eyal Doron
My E-mail appears as spam - Troubleshooting path | Part 11#17
http://o365info.com/my-e-mail-appears-as-spam-troubleshooting-path-part-11-17
Troubleshooting scenario of internal \ outbound spam in Office 365 and Exchange Online environment.
Verifying if our domain name is blacklisted, verifying if the problem is related to E-mail content, verifying if the problem is related to specific organization user E-mail address, Moving the troubleshooting process to the “other side.
Eyal Doron | o365info.com
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
Autodiscover flow in an Office 365 environment | Part 3#3 | Part 31#36
Detailed description of the Autodiscover flow that is implemented between Autodiscover client and his Autodiscover Endpoint (Exchange server) in a scenario, in which the mail infrastructure is an Office 365 environment (Exchange Online).
This is the third article, in a series of three articles.
http://o365info.com/autodiscover-flow-in-an-office-365-environment-part-3-of-3-part-31-of-36
Eyal Doron | o365info.com
Exchange clients and their public facing exchange server part 13#36Eyal Doron
Exchange clients and their Public facing Exchange server | Part 13#36
The characters of the communication channel that is implemented between Exchange client and Exchange server in a public network environment.
http://o365info.com/exchange-clients-public-facing-exchange-server-part-13-of-36
Eyal Doron | o365info.com
Exchange CAS server | Proxy versus redirection | 4#23Eyal Doron
The document discusses the Exchange CAS server's use of proxying versus redirecting client requests. The CAS server's purpose is to "deliver" information or services to clients. It does this either by proxying requests to additional Exchange servers, or by redirecting clients to other elements that can provide the required information or service. The CAS server prefers to use proxying over redirection whenever possible, as proxying is transparent to clients. In some scenarios involving legacy Exchange servers, the CAS server may redirect clients to the appropriate legacy server.
The document discusses architecting applications for the cloud using Microsoft technologies. It provides an overview of Microsoft's Azure platform, including hosting applications on Azure infrastructure as a service (IaaS) or platform as a service (PaaS). It also discusses using Azure storage services like tables, queues and blobs to build scalable cloud applications.
Exchange Public infrastructure | Public versus non-Public facing Exchange sit...Eyal Doron
Exchange Public infrastructure | Public versus non-Public facing Exchange site | 5#23
http://o365info.com/exchange-public-infrastructure-public-versus-non-public-facing-exchange-site/
Reviewing the concept of - Public versus non Public facing Exchange.
Eyal Doron | o365info.com
Cloud Sobriety for Life Science IT Leadership (2018 Edition)Chris Dagdigian
Chris Dagdigian provides practical tips for life science IT leadership based on his experience working in bioinformatics. Some key points include:
1) Cloud adoption in life sciences is driven by the need for flexible capabilities and collaboration rather than cost savings alone.
2) Common mistakes include lack of planning, bypassing security reviews, and forcing legacy patterns onto cloud infrastructure.
3) AWS is the leader in cloud capabilities but all providers oversimplify challenges in their marketing. Real-world requirements around networking, security and provisioning need to be considered.
The Unintended Risks of Trusting Active DirectoryWill Schroeder
This presentation was given at Sp4rkCon 2018. It covers the combination of Active Directory and host-based security descriptor backdooring and the associated security implications.
5 Anti-Patterns in API Design - DDD East Anglia 2015Ali Kheyrollahi
This document discusses 5 anti-patterns to avoid when designing APIs:
1. Transparent Server - Exposing internal implementation details in the public API.
2. Chauvinist Server - Designing the API from the server's perspective and pushing the client to conform.
3. Demanding Client - Enforcing special client needs or limitations onto the API signature.
4. Assuming Server - Making assumptions about the client experience that should be client-defined.
5. Presumptuous Client - Taking on responsibilities inherently meant for the server.
The Best of Both Worlds: Implementing Hybrid IT with AWS (ENT218) | AWS re:In...Amazon Web Services
(Presented by RightScale)
With the increased use of cloud services, organizations are faced with finding the most efficient way to leverage existing IT infrastructure alongside cloud-based compute, storage, and networking resources. This has resulted in the rise of hybrid infrastructure so IT teams can deliver agility and performance with visibility and control.
At RightScale, we’ve implemented some of the world’s largest hybrid IT deployments. In this session, we share implementation approaches, architecture design considerations, and steps for a successful hybrid IT model.
This session covers:
-How to develop a strategy and framework for a successful path to hybrid IT
-How to prioritize applications for public cloud versus on-premises
-How to manage multiple compute resource pools through a unified management framework
-Implementation and continuous improvement of a hybrid IT environment
Examples of enterprise hybrid IT implementations include cloudbursting, high availability, and disaster recovery.
This document discusses various tools for managing MySQL high availability and replication topologies, including Orchestrator, Consul, ProxySQL, and Percona Monitoring and Management (PMM). It provides information on setting up Consul for service discovery and configuration, using Consul Template to manage templates and notifications, and leveraging tools like Envoy and Vault for additional functionality. The document also outlines demonstrations of Consul clusters, Orchestrator and ProxySQL for replication, and using PMM and Prometheus/Grafana for monitoring MySQL, ProxySQL and other services.
This document discusses the 12 Factor App methodology for logging and whether it is still valid. It begins by summarizing the 12 Factor App guidelines for logging, which state that apps should write logs to stdout and let the execution environment handle routing and storage. It then discusses tools like Fluentd that can be used to aggregate logs from multiple sources and process them. The document considers different deployment approaches for Fluentd and how to address challenges of distributed systems. It concludes that the 12 Factor App guidelines around logging are still largely valid but should not be taken literally, and modern logging frameworks can help address challenges not envisioned when 12 Factor Apps were described.
This talks elaborates on the Client-Server tenet of REST which focuses on separation of concerns between the client and the server. In the first third of the talk, I will talk about what the ideal client and servers are and examples of how their responsibilities. I will touch on how the word Server has lost its meaning of "serving" and the client has been overshadowed by the focus to the API. I will also compare the API to a restaurant and how its menu is the API's REST resources.
In the rest of the talk, I look at some important anti-patterns commonly seen in the industry (each with at least one example):
1) Chauvinist Server: designing the API from server's perspective failing to hide its complexity behind its API (API designed from the server's perspective)
2) Demanding client: client enforcing its special need onto the signature of the API (certain client's limitation becomes server's default behaviour)
3) Transparent Server: server exposing its internal implementation to its clients (server's underlying or private domain bleeds into the public API)
4) Presumptuous Client: The client assuming the role of a server and engage in taking responsibilities that cannot guarantee
5) Assuming Server: Server that assumes the responsibility of tailoring the response based on what it assumes client is (e.g. browser sniffing)
Red Hat Forum Poland 2019 - 3 Pitfalls Everyone Should Avoid with Hybrid Mult...Eric D. Schabell
The daily hype is all around you. From cloud, hybrid cloud, to hybrid multicloud, you’re told this is the way to ensure a digital future for your business. These choices you’ve got to make don’t preclude the daily work of enhancing your customer's experience and agile delivery of those applications. Let us take you on a journey, looking closely at what hybrid multicloud means for your business, the decisions being made about delivering applications, and dealing with legacy applications, likely the most important resources to your business. Join us for an hour of power, where real customer experiences are used to highlight the three top lessons learned as they transitioned into hybrid multicloud environments.
Note: The speakers have spent years working with customers making their digital journeys a reality and speak first hand about the top lessons learned deploying new and existing applications.
(Internal original slides: https://docs.google.com/presentation/d/1SExOxL2y_LKPOe9xmDCgFSlqQKCUHiAw9bnutLNoQMc)
Similar to Autodiscover flow in an exchange on premises environment non-active directory environment part 1#3 part 26#36 (20)
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
In the current article, we will demonstrate how to simulate Spoof E-mail attack, that will bypass existing SPF sender verification implementation.
The current article series include two articles.
The former article is – How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack.
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
The document discusses why organizations are vulnerable to spoof and phishing email attacks. It notes that most organizations do not have effective defenses against these attacks and will likely experience them at some point. It also examines common misconceptions that cause the threats to be ignored, such as thinking an attack won't happen, being too busy with other issues, and believing defenses are already adequate. The document explores weaknesses that attackers exploit, such as flaws in the SMTP protocol and human factors. It outlines additional obstacles to addressing these threats, such as fears of impacting email flow or business activities. The document concludes there are no simple solutions due to the sophistication of phishing attacks and complexity of email infrastructure defenses.
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...Eyal Doron
In the current article, we will continue our journey to the land of “mail threats and dangers,” and this time; our main focus will be on one of the most dangerous and deadly types of mail attack – the Phishing mail attack!
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
The special character of the spoofing attack is – that the “spoof action”, serves as a spearhead for most of the other mail attacks.
In other words – the Spoof mail attack is accompanied by an additional type of mail attacks such as Phishing mail attack or spam mail.
What is so special about Spoof mail attack? |Part 3#9
http://o365info.com/what-is-so-special-spoof-mail-attack-part-3-of-9/
What are the possible damages of phishing and spoofing mail attacks part 2#...Eyal Doron
We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and to us.
In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail attacks are realized.
http://o365info.com/what-is-the-possible-damages-of-phishing-spoofing-mail-attacks-part-2-of-9/
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which the attacker manages to successfully execute a Phishing mail attack.
The reaction of the involved persons is known in advance, and the sad end of the story is known in advance.
The main goal of the story is - to serve as a wakeup call, so you do not have to be a character in the play of – Phishing mail attack!
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
http://o365info.com/exchange-in-place-ediscovery-hold-introduction-part-5-7
The Exchange In-Place Hold & eDiscovery, is a very powerful tool that can help us to accomplish three main tasks.
1. Search for information (mail items) in single or multiple mailboxes
2. Put specific information on “hold” (enable to save the information for an unlimited time period)
3. Recover deleted mail items
In this article, we will review the logic and the concepts of the Exchange In-Place Hold & eDiscovery toll.
In the next article xx, we will demonstrate how to use the Exchange In-Place Hold & eDiscovery toll for recovering deleted mail items.
Eyal Doron | o365info.com
Mail migration to office 365 measure and estimate mail migration throughput...Eyal Doron
The document discusses mail migration throughput when migrating to Office 365. It provides data on expected throughput rates for different migration methods like cutover, staged, and hybrid migrations. The throughput is higher for hybrid migration, which uses EWS, compared to cutover and staged migrations, which use MAPI/RPC. Throughput is also higher for migrating multiple mailboxes concurrently compared to a single mailbox. The document uses this data to calculate estimated migration times for sample scenarios migrating mailboxes of different sizes, either as single mailboxes or in batches. It concludes by describing a mail migration calculator tool created based on the provided throughput data.
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
The document discusses factors that impact the throughput (transfer rate) of mail migration to Office 365. It identifies several factors including network infrastructure like communication line bandwidth and load, geographic distance between on-premises and cloud locations, and network devices. It also discusses factors related to the on-premises Exchange infrastructure such as server performance, number of sites, and throttling policies. Finally, it covers Office 365 throttling policies and how the number of mail items in a mailbox can significantly impact migration time for smaller mailboxes. Optimizing these various factors can help improve mail migration throughput.
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
This document provides recommendations for optimizing the throughput of migrating email from an on-premises Exchange server to Office 365. It discusses factors like available bandwidth, network infrastructure tuning, Exchange server performance, and using multiple Exchange sites in parallel. Specific tips include using non-work hours for migration, checking for bottlenecks, adjusting the MRSProxy resource allocation, and taking advantage of hybrid migration methods to reduce migrated data size. The overall goal is to understand limitations and make adjustments to complete large-scale email migrations within tight windows.
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
Mail migration to Office 365 | Mail Migration methods | Part 1/4
http://o365info.com/mail-migration-office-365-mail-migration-methods-part-14
Reviewing the different mail migration options that are available to us for migrating existing mail infrastructure to Office 365 (Exchange Online). We will focus on the features and the characters of the different mail migration methods (this is the first article on a series of four articles).
Eyal Doron | o365info.com
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
This document discusses troubleshooting SMTP relay issues when sending mail from an on-premises server to Office 365. It describes simulating mail flow using a Telnet client to test connectivity and permissions. The first test, where the source and destination addresses matched the relay credentials, succeeded. The second test, using a different source address, failed due to lack of "Send As" permission, which was revealed by examining log files on the relay server. Proper permissions need to be configured to allow the relay to send on behalf of other client addresses.
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
Stage migration, Exchange and Autodiscover infrastructure | Part 1#2 | Part 35#36
Description of the subject of using Exchange stage migration from the perspective of configuring a new Outlook mail profile.
We will learn about the Challenges that we are facing when trying to create a new Outlook mail profile for users which their mailbox was migrated to Exchange Online.
This is the first article, in a series of two articles.
http://o365info.com/stage-migration-exchange-and-autodiscover-infrastructure-part-1-of-2-part-35-of-36
Eyal Doron | o365info.com
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
Outlook Test E-mail AutoConfiguration | Autodiscover troubleshooting tools | Part 1#4 | Part 21#36
Review the use to the use of the Outlook built-in tool named - Outlook Test E-mail AutoConfiguration for - viewing the content of the Autodiscover session between a client and a server.
This is the first article for a series of Three articles, in which we review different tools for “Autodiscover Troubleshooting scenarios”.
http://o365info.com/outlook-test-e-mail-autoconfiguration-autodiscover-troubleshooting-tools-part-1-of-4-part-21-of-36
Eyal Doron | o365info.com
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...Eyal Doron
The document discusses the Microsoft Remote Connectivity Analyzer (ExRCA) tool, which is used for testing connectivity between Exchange clients and servers. It describes how to use the tool to run an Outlook Autodiscover test by providing user credentials and analyzing the test results. The tool simulates communication from an external client and helps troubleshoot Autodiscover issues when clients are accessing a public-facing Exchange server.
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...Eyal Doron
The document discusses the Microsoft Connectivity Analyzer (MCA) tool, which is used to test the Autodiscover process from within an organization's network or from a specific user's desktop. It provides instructions on downloading, installing, and using the MCA tool to test Autodiscover and Outlook Anywhere configurations. The MCA combines Autodiscover and Outlook Anywhere tests into a single wizard-based interface, while the Remote Connectivity Analyzer (ExRCA) allows testing them separately. The MCA has limitations compared to ExRCA, such as an inability to test Active Directory-based Autodiscover configurations.
Outlook test e mail auto configuration autodiscover troubleshooting tools p...Eyal Doron
Review the use to the use of the Outlook built-in tool named - Outlook Test E-mail AutoConfiguration for - viewing the content of the Autodiscover session between a client and a server.
This is the first article for a series of Three articles, in which we review different tools for “Autodiscover Troubleshooting scenarios”.
http://o365info.com/outlook-test-e-mail-autoconfiguration-autodiscover-troubleshooting-tools-part-1-of-4-part-21-of-36
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...Eyal Doron
In this article, we will review the use of the Microsoft Troubleshooting web tool named - Microsoft Remote Connectivity Analyzer (ExRCA) for - viewing the content of the Autodiscover session between a client and a server.
This is the second article on a series of four articles, which we review different tools for “Autodiscover Troubleshooting scenarios”.
http://o365info.com/microsoft-remote-connectivity-analyzer-exrca-autodiscover-troubleshooting-tools-part-2-of-4-part-22-of-36
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...Eyal Doron
In this article, we will review the use of the Microsoft Troubleshooting web tool named - Microsoft Connectivity Analyzer (MCA) for viewing the content of the Autodiscover session between a client and a server.
This is the third article for a series of four articles, which we review different tools for “Autodiscover Troubleshooting scenarios”.
http://o365info.com/microsoft-connectivity-analyzer-mca-autodiscover-troubleshooting-tools-part-3-of-4-part-23-of-36
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.