This document provides an overview and agenda for a presentation on building business applications using Business Connectivity Services (BCS) and SharePoint Designer 2010. The presentation covers BCS features and tooling support, how to build BCS solutions using SharePoint Designer 2010, BCS authentication methods, using workflows with BCS, and BCS limitations. It also references related breakout sessions that provide more in-depth information on specific BCS topics.
Code for the .Net Assembly Connector can be found at: http://sbrickey.com/Tech/Blog/Post/SharePoint_BCS_-_Sample_Net_Assembly_Connector
Code for the Custom Connector (SPList) will be posted at: http://sdssharepointlibrary.codeplex.com
Code for the .Net Assembly Connector can be found at: http://sbrickey.com/Tech/Blog/Post/SharePoint_BCS_-_Sample_Net_Assembly_Connector
Code for the Custom Connector (SPList) will be posted at: http://sdssharepointlibrary.codeplex.com
Are you looking for a better strategy to implement Office 365 but already have an on premise SharePoint 2013 or SharePoint 2010 implementation? If so this session is for you to understand how both systems can help solve distinct business problems that your organization might want to leverage SharePoint to address.
Office 365 brings SharePoint to the cloud to allow for the best of both the worlds together to simplify and enhance the SharePoint experience while significantly reducing costs. Office 365 allows more flexibility and greater business agility. It helps leveraging familiar tools for simple deployment, and user experiences as well as a leaner, controlled model for enterprises.
Topics covered include
• An overview of Office 365 & SharePoint 2013 On Premise: Better together!
• Use cases to consider for each environment?
• Impact to your Infrastructure
• Key Considerations
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to the Cloud. With Azure Active Directory (AAD) driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, Identity Federation, Directory Synchronization and most importantly Azure and its impacts on user experience and access of Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experiences.
Sharepoint and office 365 hybrid configuration from A to Z #spstoronto 2015Nicolas Georgeault
Slideck of our session with @Ju_stro.
Full step by step demo of #SharePoint and #Office365 Hybrid setup from domain registration to Hybrid Picker scenarios.
User Access Manager for IBM Connections (UAM)TIMETOACT GROUP
The User Access Manager (UAM) features management of
- External (Guest) Users for IBM Connections
- Internal Users “Terms of Use” Acceptance
and much more
Are you looking for a better strategy to implement Office 365 but already have an on premise SharePoint 2013 or SharePoint 2010 implementation? If so this session is for you to understand how both systems can help solve distinct business problems that your organization might want to leverage SharePoint to address.
Office 365 brings SharePoint to the cloud to allow for the best of both the worlds together to simplify and enhance the SharePoint experience while significantly reducing costs. Office 365 allows more flexibility and greater business agility. It helps leveraging familiar tools for simple deployment, and user experiences as well as a leaner, controlled model for enterprises.
Topics covered include
• An overview of Office 365 & SharePoint 2013 On Premise: Better together!
• Use cases to consider for each environment?
• Impact to your Infrastructure
• Key Considerations
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
Office 365 brings a host of productivity options, but one of the most overlooked components is how we'll authenticate to the Cloud. With Azure Active Directory (AAD) driving access and authentication to our Office 365 tenants, it is important to understand how we can interact with it. Join us as we explore Cloud Identity, Identity Federation, Directory Synchronization and most importantly Azure and its impacts on user experience and access of Office 365. Throughout this session, we'll answer the questions that impact you and how your decisions around identity shape your Office 365 experiences.
Sharepoint and office 365 hybrid configuration from A to Z #spstoronto 2015Nicolas Georgeault
Slideck of our session with @Ju_stro.
Full step by step demo of #SharePoint and #Office365 Hybrid setup from domain registration to Hybrid Picker scenarios.
User Access Manager for IBM Connections (UAM)TIMETOACT GROUP
The User Access Manager (UAM) features management of
- External (Guest) Users for IBM Connections
- Internal Users “Terms of Use” Acceptance
and much more
This is the MSMF schedule for August 1 - 17, 2009.
International Promotion of Sustainable Engineering Initiative (IPOSE)
The International Promotion of Sustainable Engineering initiative is a project developed by the Michael Scott Mater Foundation that brings together representatives from academia, government, industry, capacity builders, and program managers/NGOs to discuss new technologies and processes being developed and their practical application at the national and community levels.
SharePoint 2010 is a multifunctional product that can respond to a wide arrey of business needs. This presentation shows the highlights of this new product.
TSPUG: Content Management in SharePoint 2010Eli Robillard
This presentation was delivered at the Toronto SharePoint User Group's December 2009 meeting. Note that all slides containing graphics were aggregated from Microsoft decks presented during SPC 2009, corrections and text-only slides are original.
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
Looking to reduce the number of post-it notes you see stuck around the office? Seeking to automate your user creation processes for Office 365? Or maybe you're interested in single sign-on for everything you host in the cloud? Are you questioning what a cloud identity is?
This session will take you through the basics of identity in the Microsoft Cloud and show you to how to set up and configure Office 365 with Azure Active Directory using the Azure Active Directory Synchronization Connect tools.
Learn how SharePoint client side web parts are being developed and deployed, what kind of tooling will be initially available for developers around SharePoint Framework and how the development cycle will work with offline and online development.
With the release of the Office 365 APIs Preview and the Android SDK, the future of Mobile business applications that leverage the Office 365 services is very bright! This session will deep dive into how to build an app that can be delivered to iOS, Android and Windows Phone leveraging cross platform application templates in Visual Studio and Office 365 APIs.
SharePoint 2010 opens up a wide range of options for developers, and this session will take you through the new SharePoint list Data Model Capabilities; LINQ to SharePoint; Client Object Model and RESTful Data Service Interface for SharePoint.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Building business applications using business connectivity services using share point designer 2010 (part 1)
1.
2. SESSION CODE: OFS203
Building Business
Applications using BCS &
SharePoint Designer 2010
Chakkaradeep Chandran (Chaks)
Solutions Specialist
Intergen
3. Agenda
Overview of Business Connectivity Services (BCS)
Building BCS Solutions using SharePoint Designer 2010
BCS Authentication
Workflows and BCS
BCS Limitations
More demos…
3 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
4. What is BCS
A set of features that provide the capability to connect
SharePoint 2010 and Office 2010 applications to any
external system:
Line-of-Business system (Microsoft Dynamics, Oracle, or Siebel)
Web 2.0 service
Custom home-grown application
Provides read/write capabilities to those external systems
It provides out-of-box features, services and tools that
streamline development to deeply integrate external data
and services
4 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
5. What about Business Data Catalog (BDC)
Introduced in Microsoft Office SharePoint 2007
Read/Write Support
Read is nice
Write back would be even more powerful
Tooling Support
Need an easier way to create, debug and maintain appdef XML
files
I wish it was baked into the Platform
Wouldn’t it be nice to take it offline?
5 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
6. BCS Features
Write-back to External Systems
Familiar UI
More Connectivity Options
Extensible Provider Model
Batch and Bulk Operation Support
Read BLOBs
Read and Write-back of Complex Types
Life Cycle Management
Rich Client Integration
6 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
7. BCS Tooling Support
SharePoint Designer 2010 Visual Studio 2010
7 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
9. External Content Types
Describes the schema and data access
BCS Client capabilities of an external data source Customer
and its behavior within Office and FirstName
SharePoint LastName
Email
(WebService, DB, .Net
object, LOB system, Web GetCustomer()
2.0 service, etc.) GetCustomers()
UpdateCustomer()
DeleteCustomer()
BCS
11 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
10. Presentation Features
External Lists
External Data Columns
Business Data Web Parts
External Content Type Picker
External Item Picker
Profile Pages
Presentation Features in Office 2010
12 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
11. External Lists
Expose external data as a native SharePoint list
Full CRUD capability
Familiar UI and navigation
Sort, Filter, Group
Programmatic access via SPList OM
Profile page available for each item in the list
Form
Auto-generated OOB
Upsize to InfoPath
Offline-able
13 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
12. Surfacing External Data
External Data Columns
Add data from external content types to standard SharePoint lists
Can be made available as Content Controls in Word
Web Parts (SharePoint Server 2010)
Business Data List
Business Data Item
Business Data Item Builder
Business Data Related List
Business Data Connectivity Filter
Chart Web Part
External Data Search (SharePoint Server 2010)
Integrate External Data into search results
14 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
13. Solution Types
• Surface data in External Lists
• Connect those lists to Outlook,
SPW Create reusable components
(UI parts, ECTs, actions)
Simple Intermediate Advanced
15 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
15. Authentication in BCS
OOB Support for:
Windows Authentication
Forms Based Authentication
Claims based Authentication
Authentication modes
Revert-to-Self (process account)
Pass-through (logged on user)
Single Sign On (Secure Store)
Secure Store Service
Can store windows credentials or non-windows credentials
A credentials page available to gather credentials from a user & store it in SSS
Extensibility to plug in another SSO
17 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
16. Authentication in BCS
SharePoint Server
Process Account
Credentials
External List Ticket
Delegation Token
BCS Other
Web Part
Runtime
Logged-on Application Secure Store
Service
user
SAML Token Credentials
Application
Delegated Token PassThrough (Uses logged-on user)
RevertToSelf (Uses process account)
SSO Authentication (Credentials, etc. from Secure Store)
Claims Aware Service Legacy LOB
Web 2.0
17. Permissions in BCS
Method Instance
Metadata Catalog
Method Parameter Type Descriptor
Model Association Group Filter Descriptor
External Content
External System Type
Identifier
(LobSystem) External System
Instance
Action Action Parameter
Can be assigned via UI & set on the object itself
Can be set on the object itself Takes it permission from Parent
19 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
18. Using Secure Store Service with BCS
20 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
19. BCS Associations
Sales Order Table
Customers Table
Sales Order External List
Sales Order External List
21 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
20. BCS Associations
Supported Associations
One-to-many Associations - based on a foreign key
A foreign key must be present in the External system
Un-Supported Associations
Many-to-Many Associations – no foreign key
Users will have to develop these Associations in the XML of the
BDC Model files manually using an XML editor or through
another External Content Type designer such as Visual Studio
2010.
Associations with Multiple Related External Content Types
22 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
22. Searching External Data
Create Search Content Source
Ensure Permissions are set
Create ProfilePage Site
Enable ProfilePages in BCS Central Admin
Crawl
24 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
23. Searching External Data using BCS Demo
25 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
24. External Lists and Workflows
Workflows cannot be associated with an External List
This does not mean that workflow does not work with external
lists
You can create a site workflow or list workflow and have it read or
update from an external list
Workflows accessing BCS will always run as service account,
even under impersonation step
Only supported with Secure Store Service (SSS) or
RevertToSelf authentication modes
26 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
25. Workflows and BCS
27 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
27. BCS Limitations
Workflows cannot be configured on External List
Item level Permissions cannot be given on items in External
List interface
Export to Excel feature is not available on External Lists
Versioning cannot be configured on items in External Lists
Item History is not available in External Lists
29 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
28. BCS Limitations
Datasheet View cannot be used in External Lists
RSS Feed cannot be configured on External Lists
Ratings are not supported on in External Lists
ListData.svc can’t be used for providing REST based access
to External List data
External Data Columns cannot be used as Site Level
columns (can’t be consumed in Site Level Content types)
30 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
29. Related Content
Breakout sessions - Wednesday, September 1 16:15 - 17:15
OFS401 Business Connectivity Solutions Runtime and Object Model Deep Dive
Breakout sessions - Monday, August 30 17:25 - 18:25
OFS209 The new world of SharePoint 2010 Architecture & Administration
Breakout sessions - Wednesday, September 1 10:40 - 11:40
OFS307 Office 2010 and SharePoint 2010: The whole is greater…
Breakout sessions - Tuesday, August 31 14:55 - 15:55
OFS303 Claims based authentication in SharePoint 2010
31 www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources
30. What is Included in BCS
BCS Feature SharePoint Foundation Standard Edition Enterprise Edition
External List
External Data column
BDC Service
Connector Framework
Secure Store Service
External Data Search
Profile Pages
Business Data Web Parts
Rich Client Integration
www.chakkaradeep.com || chaks@intergen.co.nz || http://bit.ly/bcs-resources