Building the 'Perfect' SharePoint 2010 Farm; Best Practices from the Field. Compilation of best practice infrastructure guidance for SharePoint 2010 from Michael Noel, author of SharePoint 2010 Unleashed.
SharePoint 2010 best practices for infrastructure deployments SharePoint Sat...Knowledge Cue
This session cover best practices for ensuring that your core SharePoint infrastructure layer has been deployed correctly. The session is geared towards SharePoint infrastructure administrators and architects who will be managing a SharePoint deployment.
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...Markus Michalewicz
This is the latest version of the Oracle RAC 12c (12.1.0.2) Operational Best Practices presentation as shown during IOUG / Collaborate15. As best practices are a result of true collaboration this will probably be the last version before OOW 2015.
Preparing for Upgrade to SharePoint 2010 with Joel Oleson Quest Software WebcastJoel Oleson
As we ramp up to SharePoint 2010, most still haven't done the basic things to get their systems and clients ready for the bits when they arrive. There is a lot that can be done today, and tools that have been shipped in SP2 to get us ready. Here's quick practical ways to use these tools with a quick rundown to getting prepared for SharePoint 2010
SharePoint 2010 best practices for infrastructure deployments SharePoint Sat...Knowledge Cue
This session cover best practices for ensuring that your core SharePoint infrastructure layer has been deployed correctly. The session is geared towards SharePoint infrastructure administrators and architects who will be managing a SharePoint deployment.
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...Markus Michalewicz
This is the latest version of the Oracle RAC 12c (12.1.0.2) Operational Best Practices presentation as shown during IOUG / Collaborate15. As best practices are a result of true collaboration this will probably be the last version before OOW 2015.
Preparing for Upgrade to SharePoint 2010 with Joel Oleson Quest Software WebcastJoel Oleson
As we ramp up to SharePoint 2010, most still haven't done the basic things to get their systems and clients ready for the bits when they arrive. There is a lot that can be done today, and tools that have been shipped in SP2 to get us ready. Here's quick practical ways to use these tools with a quick rundown to getting prepared for SharePoint 2010
Oracle 21c: New Features and Enhancements of Data Pump & TTSChristian Gohmann
At the end of the year 2020, Oracle released 21c on its Cloud infrastructure. The on-premises version will follow later this year. As with every new Oracle version, the Data Pump utility gets new features or enhancements for existing features.
This presentation gives an overview of the enhancements of Data Pump and Transportable Tablespaces. The following list is an excerpt of the points I will talk about
- Simultaneous use of EXCLUDE and INCLUDE
- Parallelized import of metadata during a TTS import operation
- Checksum support for dump files
- Direct access to Oracle Cloud Object Store for exports and imports
Here's a brief hands-on to get started with MySQL Server performance tuning. I'll show basic options to get started and have the right basics settings. Hope you'll enjoy!
With MySQL being the most popular open source DBMS in the world and with an estimated growth of 16 percent anually until 2020,we can assume that sooner or later an Oracle DBA will be handling a MySQL database in their shop. This beginner/intermediate-level session will take you through my journey of an Oracle DBA and my first 100 days of starting to administer a MySQL database, show several demos and all the roadblocks and the success I had along this path.
SQL Server Alwayson for SharePoint HA/DR Step by Step GuideLars Platzdasch
SQL Server Alwayson for Sharepoint HA/DR SQL Konferenz 2017
-What is SQL Server AlwaysOn?
-AlwaysOn Failover Clustering
-AlwaysOn Availability Groups
-Why AlwaysOn Availability Groups for SharePoint?
-Requirements and Prerequisites
-Step by Step guide to implementing AlwaysOn Availability Groups
Demonstration
lessons learned
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Joel Oleson
Advanced Administration the 2nd part in a 2 part series on Administration topics for SharePoint Server by Joel Oleson. SharePoint Connections Spring 2007 in Orlando,
Attendees in this session will enhance their skills and job relevancy by gaining new knowledge and skills using the Oracle Public Cloud within their job role through actual use cases .
Will detail how backup to the cloud can be used to meet different needs of their organization and how to justify use of new technology within their business. Learn how to create a storage container, setup OS secure authentication and configure RMAN to use the Oracle Cloud. Perform a backup to the Oracle Cloud and recover from it back to your on-premise server. Learn how to migrate from an on-premise Oracle Database 12c to a pluggable Oracle Database 12c (PDB) in the Oracle Cloud. Then move a PDB in which Developers have completed their work in the Oracle Cloud back on-premise and into production
With MySQL being the most popular open source DBMS in the world and with an estimated growth of 16 percent anually until 2020,we can assume that sooner or later an Oracle DBA will be handling a MySQL database in their shop. This beginner/intermediate-level session will take you through my journey of an Oracle DBA and my first 100 days of starting to administer a MySQL database, show several demos and all the roadblocks and the success I had along this path.
Oracle 21c: New Features and Enhancements of Data Pump & TTSChristian Gohmann
At the end of the year 2020, Oracle released 21c on its Cloud infrastructure. The on-premises version will follow later this year. As with every new Oracle version, the Data Pump utility gets new features or enhancements for existing features.
This presentation gives an overview of the enhancements of Data Pump and Transportable Tablespaces. The following list is an excerpt of the points I will talk about
- Simultaneous use of EXCLUDE and INCLUDE
- Parallelized import of metadata during a TTS import operation
- Checksum support for dump files
- Direct access to Oracle Cloud Object Store for exports and imports
Here's a brief hands-on to get started with MySQL Server performance tuning. I'll show basic options to get started and have the right basics settings. Hope you'll enjoy!
With MySQL being the most popular open source DBMS in the world and with an estimated growth of 16 percent anually until 2020,we can assume that sooner or later an Oracle DBA will be handling a MySQL database in their shop. This beginner/intermediate-level session will take you through my journey of an Oracle DBA and my first 100 days of starting to administer a MySQL database, show several demos and all the roadblocks and the success I had along this path.
SQL Server Alwayson for SharePoint HA/DR Step by Step GuideLars Platzdasch
SQL Server Alwayson for Sharepoint HA/DR SQL Konferenz 2017
-What is SQL Server AlwaysOn?
-AlwaysOn Failover Clustering
-AlwaysOn Availability Groups
-Why AlwaysOn Availability Groups for SharePoint?
-Requirements and Prerequisites
-Step by Step guide to implementing AlwaysOn Availability Groups
Demonstration
lessons learned
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Joel Oleson
Advanced Administration the 2nd part in a 2 part series on Administration topics for SharePoint Server by Joel Oleson. SharePoint Connections Spring 2007 in Orlando,
Attendees in this session will enhance their skills and job relevancy by gaining new knowledge and skills using the Oracle Public Cloud within their job role through actual use cases .
Will detail how backup to the cloud can be used to meet different needs of their organization and how to justify use of new technology within their business. Learn how to create a storage container, setup OS secure authentication and configure RMAN to use the Oracle Cloud. Perform a backup to the Oracle Cloud and recover from it back to your on-premise server. Learn how to migrate from an on-premise Oracle Database 12c to a pluggable Oracle Database 12c (PDB) in the Oracle Cloud. Then move a PDB in which Developers have completed their work in the Oracle Cloud back on-premise and into production
With MySQL being the most popular open source DBMS in the world and with an estimated growth of 16 percent anually until 2020,we can assume that sooner or later an Oracle DBA will be handling a MySQL database in their shop. This beginner/intermediate-level session will take you through my journey of an Oracle DBA and my first 100 days of starting to administer a MySQL database, show several demos and all the roadblocks and the success I had along this path.
Building the Perfect SharePoint 2010 Farm - SPS SacramentoMichael Noel
Slide deck from Michael Noel's session on Best Practices SharePoint 2010 infrastructure, as presented at SharePoint Saturday Sacramento, 18 June, 2011.
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011Michael Noel
SharePoint 2010 has matured over the past year, with improvements in scalability, enterprise search, and administration. Best practices from SharePoint 2007 are no longer relevant, and new guidance has emerged from the last year worth of SharePoint deployments. In addition, new features such as SharePoint FAST Search capabilities can have a significant effect on how an environment is architected. In addition, the popularity of server virtualization technologies have created new design options for SharePoint administrators, allowing for new and unique high availability and provisioning options. This session goes right to the heart of the matter, providing for physical and virtual architecture guidelines and specific configuration settings that can immediately be used to construct SharePoint 2010 environments that can be used to replace existing SharePoint 2007 farms. Architectural specifics are based on best practices obtained from existing SharePoint 2010 environments of multiple sizes and performance metrics gathered from both physical and virtual SQL Server and SharePoint environments will help you to build the ‘perfect’ SharePoint 2010 farm for your organization.
Unity Connect - Getting SQL Spinning with SharePoint - Best Practices for the...Knut Relbe-Moe [MVP, MCT]
Performance problems in SharePoint are most commonly caused by a poorly configured or ineffectively optimized SQL Server back end. More often than not, the SQL Server is not installed following Best Practice guidelines. In this fast-paced session, Chief Technical Architect and International speaker Knut Relbe-Moe will walk you through his top 13 tips for ensuring your SQL back end is perfectly configured and performing well for SharePoint. If you want to ensure that your SharePoint environment is great whether it's in Azure or on premises, this is the session for you to join.
TechEd Africa 2011 - OFC307: Architecting a Disaster Tolerant and Highly Avai...Michael Noel
Many organizations are finding that their SharePoint environments are becoming as or more mission-critical as email or phone currently are. They are subsequently expecting that SharePoint be both highly available and disaster tolerant at all times. Because the Service Application architecture model in SharePoint 2010 is relatively complex, it’s not surprising that there is confusion about how to architect a SharePoint environment to be able to survive hardware, software, and site outages. This session focuses on a deep dive into the specifics of how to architect the web, data, and service application tiers of SharePoint 2010 to be both highly available and disaster tolerant. Topics such as SQL Database mirroring, clustering, Network Load Balancing, Virtualization HA and Service Application failover are discussed. In addition, real world models of various farm failover techniques for environments of all different sizes are presented and compared. • Learn how to build in high availability and disaster tolerance into the web, data, and service application tiers of SharePoint 2010 Architecture. • Examine real world designs for SharePoint 2010 that are built to allow for full functionality in the event of various failure scenarios. • Examine how to take advantage of several ‘out of the box’ technologies with SharePoint, SQL, and Windows to provide for HA, as well as understanding when a third-party option may be required.
SharePoint Intelligence Real World Business Workflow With Share Point Designe...Ivan Sanders
This session introduces the basics of SharePoint Designer 2010 workflows. When you understand the building blocks of workflow actions, conditions, and steps you can quickly add workflows to automate processes and help improve your organization’s productivity and efficiency.
Back to the Basics: SharePoint Fundamentals by Joel OlesonJoel Oleson
SharePoint Fundamentals is a look back at the core information architecture and core physical infrastructure. It focuses on the core fundamentals to deployment and operations.
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Michael Noel
As presented at CollabDays Finland, Helsinki, 2023-09-09
The dramatic rise in the number and severity of cyber-threats faced by organizations today has led to a proliferation of countermeasure IT security tool-sets. In many cases, these security tools operate independently from each other and can lead to siloed alerting and monitoring making it difficult for IT staff to effectively identify threats and mitigate them before they become major issues.
Microsoft Defender 365 suite of cloud security tools consolidates multiple security tool-sets under a single management interface and provides for end-to-end security, allowing administrators to quickly identify and contain threats. Rather than constantly being on the defensive, Defender 365 provides for the ability to proactively hunt for vulnerabilities and potential bad actors while they are still making lateral moves within your environment, allowing IT cybersecurity the ability to stay one step ahead of increasingly sophisticated hackers.
This session takes an in-depth look at the tools that are part of the Microsoft Defender 365 suite, including Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, Microsoft Defender for Identity and more. Discover how to better control, audit, and manage your organization’s data in both the cloud and on-premises infrastructure.
• Explore the various tool-sets and capabilities built into Microsoft 365 Defender, including Cloud Access Security Broker (CASB) functionality, endpoint threat detection and management, and sophisticated on-premises real-time threat prevention tools.
• Examine how real-time threats can overwhelm more traditional threat management systems and how an intuitive ‘single pane of glass’ view of threat detection and management can greatly improve the odds of stopping sophisticated cyberattacks.
• Understand how Microsoft licensing for Microsoft Defender 365 is structured and how you can take advantage of these security tools for little or even no cost in some scenarios.
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
Organizations today are vastly unprepared for the threat of modern cyber-attacks. At the same time, the attackers are becoming more sophisticated and the amount of resources at their disposal is increasing. It has become a lucrative business to hack, disrupt, and steal intellectual property from organizations of all sizes and in all business sectors.
While the attackers are becoming more sophisticated, organizations have their IT security positioned for threats from the past century, with poor password management techniques, simple ACL based file permissions, and basic firewall and zone-based containment techniques. This makes it easier for attackers to obtain access to critical intellectual property and makes career-ruining disruptions all the more common.
This session focuses on understanding what is currently wrong with IT security practices and how your organization can change processes, techniques, and tools to provide for a significantly higher level of IT security without necessarily having to implement expensive tools or obtrusive processes.
• Understand the pitfalls of current IT Security practices, including myths around password change policies, allowing logins without providing multiple factors, and the proliferation of ‘always-on’ admin rights.
• Examine how simple changes in IT strategy can greatly improve your overall IT posture, including providing for up to a 99% improvement in the likelihood of a data credential theft.
• Determine which easy to deploy tools and features which you may already be licensed for can be used to tighten up IT security within an environment, including solutions such as Microsoft Defender for Identity, Azure Sentinel, Microsoft Cloud App Security, next-generation firewalls, and more.
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
Organizations today are facing unprecedented and sophisticated attacks to their internal Information Technology infrastructure. These evolving attacks include spear phishing, ransomware, credential hijacking, and more and can result in significant data loss and/or theft of confidential and valuable intellectual property. In response to these threats, Microsoft has released an array of tools such as Azure Sentinel, Cloud App Security, Microsoft Defender for Identity, and more which can help to secure and protect against these threats. These tools work with both on-premises and cloud-based infrastructure to provide for comprehensive protection of hybrid environments.
This session breaks down each of these Microsoft tools and provides for an understanding of their value for specific security scenarios. A simple, no-marketing approach is taken to evaluating each individual tool, and a simple breakdown of what is provided with each Microsoft licensing model is outlined. Attendees will gain a better appreciation to which tools to utilize and how to better protect their Information Technology investments from the type of career-ending attacks which are unfortunately common today.
• Understand how modern threats such as spear phishing, ransomware, credential hijacking, and more are commonly faced in today’s IT environments and what tools and techniques can be used to mitigate the risk faced by these modern threats
• Examine Microsoft security tools such as Azure Sentinel, Microsoft Defender for Identity, Azure Security Center, Cloud App Security, Azure AD Privileged Identity Management, Azure AD Identity Protection, Azure Information Protection, and more
• Understand which tools are available for each licensing model in the Microsoft world and when it may make sense to ‘upgrade’ existing licenses to support specific toolsets as opposed to investment in third-party tools
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Michael Noel
As presented at the New Zealand Digital Workplace Conference in Auckland, May 1st, 2018
Microsoft’s Office 365 has experienced massive growth, with reduced overhead costs and reliability acting as driving factors for many organisations. While popular services such as Exchange Online and SharePoint Online may be responsible for much of the interest in Office 365, there are other less well-known tools such as Power BI, Microsoft Teams, Microsoft Flow, Delve, Stream, MyAnalytics and many more which are added on a continual basis.
This session breaks down the various service offerings of Office 365, providing for easy to understand description of each of the tools provided and how they can be used to improve productivity and reduce costs. It examines the overall Office 365 licensing options and compares the internal tools with other common industry tools to help business decision makers to get the most out of their licensing.
Understand key features and functionality of each of the service offerings within Office 365, including Exchange Online, SharePoint Online, OneDrive for Business, Groups, Power BI, Microsoft Teams, and much more
Determine what type of license is required for your organisation based on the level of functionality required and the type of information workers that will use the platform
Compare Office 365 native tools with other similar industry tools to better understand what type of cost savings can be realized through the platform.
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...Michael Noel
SQL Server 2016 provides for unprecedented high availability and disaster recovery options for SharePoint farms in the form of AlwaysOn Availability Groups. Using this new technology, SharePoint architects can provide for near-instant failover at the data tier, without the risk of any data loss. In addition, the latest version of this technology, available with SQL Server 2016, allows for replicas of SharePoint databases to be stored in the cloud in Microsoft’s Azure cloud offering. This technology, which will be demonstrated live, completely changes the data tier design options for SharePoint and revolutionises high availability options for a farm. This session covers in step-by-step detail the exact configuration required to enable this functionality for a SharePoint 2013 farm, based on the best practices, tips and tricks, and real-world experience of the presenter in deploying this technology in production.
Understand the differences between SQL AlwaysOn options, and determine the requirements to deploy the technologies
Examine how SQL Server 2016 AlwaysOn Availability Groups can provide aggressive Service Level Agreements (SLAs) with a Recovery Point Objective (RPO) of zero and a Recovery Time Objective (RTO) of a few seconds.
See the exact steps required to enable SQL Server 2016 AlwaysOn Availability Groups for a SharePoint 2013 On-Premises environment, including options for storing replicas in Microsoft’s Azure cloud service.
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Michael Noel
Version of the presentation given at Office365 Saturday Sydney on 12 June, 2015. Contains licensing info in AUD.
Microsoft’s Office 365 has experienced massive growth in recent months, with reduced overhead costs and reliability acting as driving factors for many organizations. While popular services such as Exchange Online and SharePoint Online may be responsible for much of the interest in Office 365, there are other less well known services such as OneDrive for Business and Skype for Business that make Microsoft’s cloud offering even more tempting for IT decision makers.
This session breaks down the various service offerings of Office 365, providing for easy to understand description of each of the tools provided and how they can be used to improve productivity and reduce costs.
• Understand key features and functionality of each of the service offerings within Office 365, including Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, Office Web App, and the Office 2013 client suite
• Determine what type of license is required for your organization based on the level of functionality required and the type of information workers that will use the platform
• Review key decision points to make when considering an Office 365 deployment such as whether or not to provide Single Sign On to the platform with an internal Active Directory environment, data retention decisions, and migration options
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Building the Perfect SharePoint 2010 Farm
1. Building the ‘Perfect’ SharePoint 2010 FarmBest Practices from the Field Michael Noel Convergent Computing (CCO.com) @MichaelTNoel
2. Michael Noel Author of SAMS Publishing titles “SharePoint 2010 Unleashed,” “SharePoint 2007 Unleashed,” “SharePoint 2003 Unleashed”, “Teach Yourself SharePoint 2003 in 10 Minutes,” “Windows Server 2008 R2 Unleashed,” “Exchange Server 2010 Unleashed”, “ISA Server 2006 Unleashed”, and many other titles . Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San Francisco Bay Area based Infrastructure/Security specialists for SharePoint, AD, Exchange, Security
3. What we will cover Examine various SharePoint 2010 farm architecture best practices that have developed over the past year Examine SharePoint Best Practice Farm Architecture Understand SharePoint Virtualization Options Explore SharePoint DR and HA strategies using Database Mirroring Explore other common best practices (RBS, SSL, NLB) Learn how to Enable Kerberos for Best Practice Security A large amount of best practices covered (i.e. Drinking through a fire hose), expectation is that you can take away 2-3 useful pieces of information that can be used in your environment
6. SharePoint 2010 Architecture“Smallest Highly Available Farm” 2 SharePoint Servers running Web and Service Apps 2 Database Servers (Clustered or Mirrored) 1 or 2 Index Partitions with equivalent query components Smallest farm size that is fully highly available
7. SharePoint 2010 Architecture“The Six Server Farm” 2 Dedicated Web Servers (NLB) 2 Service Application Servers 2 Database Servers (Clustered or Mirrored) 1 or 2 Index Partitions with equivalent query components
8. SharePoint 2010 ArchitectureLarge Farms Multiple Dedicated Web Servers Multiple Dedicated Service App Servers Multiple Dedicated Query Servers Multiple Dedicated Crawl Servers, with multiple Crawl DBs to increase parallelization of the crawl process Multiple distributed Index partitions (max of 10 million items per index partition) Two query components for each Index partition, spread among servers
17. Content Database and Site Collection Planning Start with a distributed architecture of content databases from the beginning, within reason (more than 50 per SQL instance is not recommended) Distribute content across Site Collections from the beginning as well, it is very difficult to extract content after the face Allow your environment to scale and your users to ‘grow into’ their SharePoint site collections
18.
19. Remote BLOB Storage (RBS) First version was known as EBS, now RBS SQL level technology that moves the BLOBs to different storage location, thus reducing Content DB size by 80-90%. Note this is primarily a Data Management tech, not so much a performance technology. Typically used with third-party product, though MS does provide for limited native FILESTREAM options
22. SQL Database OptimizationContent Databases Distributed Between Multiple Volumes Break Content Databases and TempDB into multiple files (MDF, NDF), total should equal number of physical processors (not cores) on SQL server. Pre-size Content DBs and TempDB to avoid fragmentation Separate files onto different drive spindles for best IO perf. Example: 100GB total Content DB on Four-way SQL Server would have four database files distributed across four sets of drive spindles = 25GB pre-sized for each file.
23. SQL Database OptimizationTempDB Tips TempDB is critical for performance Pre-size to 20% of the size of the largest content database. Break into multiple files across spindles as noted Note there is a separate TempDB for each physical instance Note that if using SQL Transparent Data Encryption (TDE) for any databases in an instance, the tempDB is encrypted.
25. Single Site HA Mirrored Farm Single Site Synchronous Replication Uses a SQL Witness Server to Failover Automatically Mirror all SharePoint DBs in the Farm Use a SQL Alias to switch to Mirror Instance
26. Cross-Site Mirrored HA Farm Two Sites 1 ms Latency 1GB Bandwidth Farm Servers in each location Auto Failover
27. Two Farm / Mirrored Content DBs Two Sites Two Farms Mirror only Content DBs Failover is Manual Must Re-index
31. Hardware Planning ConsiderationsDisk, Memory, and Processor SQL Database role requires a great deal of space, especially if versioning is turned on in Document Libraries. Don’t underestimate! Servers running the Search Service Application Index or Query need hard drive space to store the Index files, which can be 5%-30% of the size of the items being indexed. The more memory and processor cores that can be given to SharePoint the better, in the following priority: Database Role Search Service Application Role Other Service Application Roles Web Role
32. Operating System Best practicesVersions Highly recommended: Windows Server 2008 R2 (with SP1) for security, performance (client/server traffic improvements), and ease of setup. Windows Server 2008 RTM is also possible, but requires some custom configuration (Kerberos, etc.) Enterprise Edition of Windows only required for very large SQL instances (More than two cluster nodes, high transaction volume, etc.) Standard edition of Windows is adequate in nearly all other cases.
33. Operating System Best practicesSQL Server SQL Server 2008 R2 Recommended, particularly if you have high security requirements, as it allows for transparent encryption of databases and PowerPivot (R2 only) SQL Server 2005 x64 also supported Enterprise edition of SQL only required for more than two nodes in a cluster, Asynchronous database mirror replication, TDE, RBS with non-local BLOB storage, or other advanced scenarios Separate Reporting Services server may be required for intensive reporting Separate Analysis Services server may be required for PowerPivot Create exception in Windows Firewall policy for port 1433
36. SharePoint InstallationInstallation Process For most flexibility, choose ‘Complete’ Installation, even if not installing all of the roles on the server. This will allow for the addition of roles in the future as needed. Be sure not to select ‘Stand-Alone’, unless you plan on having a very small farm with a limited database (SQL Server Express)
37. SharePoint InstallationInstallation Process Highly recommended to choose the final destination for the Index/Query to live (i.e. if it’s on a different drive, enter that during installation). It’s difficult to change index location later. Remember, after installing the binaries, the server is not a farm member yet…it can be added to any farm. Good concept to use to pre-stage servers.
38. SharePoint InstallationCommand-line Installation of SharePoint Good to understand how to install SharePoint from the command-line, especially if setting up multiple servers. Allows for options not available in the GUI, such as the option to rename databases to something easier to understand. User PowerShell
40. SharePoint InstallationSome Manual Service Apps Still Required Due to bugs in SharePoint, certain Service Apps will need to be manually configured, they won’t work in PowerShell yet, hopefully fixed in later versions This includes the following: PerformancePoint Service Application User Profile Service Application Web Analytics Service Application
42. Configuring the FarmRunning the Config Wizard to Install Servers (If used) Consider using an easy to remember port for the Central Admin service (i.e. 8888). Change to 443 later. You are welcome to change the Config Database name to match a common naming convention Your database access account is the SP Service account, which only needs DBCreator and Security Admin rights on SQL. Don’t give it more! Run the wizard on additional servers as necessary
43. Configuring the FarmSQL Alias A SQL Alias will help you if you need to change your DB location. For example, if your SQL server name is ‘SQL1’, use something like ‘SPSQL’ to connect, and have DNS point to the proper server location. This makes it MUCH more flexible. Use the SQL Native Client 10.0 Configuration (32bit) node to create the alias
44. Install SQL Client Tools, including the Backwards Compatibility Client Tools. Launch the SQL Server Configuration Manager and create three SQL aliases using the 32bit Alias section: spdbcontent.companyabc.com spdbsearch.companyabc.com spdbservices.companyabc.com Point all to the SQL server name, port 1433. Launch the SQL Server Client Network Utility (ystem32liconfg.exe) and create the same 3 aliases as above using TCP/IP and port 1433. Make sure to map the alias to the SQL netbios name (or cluster netbios name) as above Configuring the FarmSQL Alias
45. Configuring the FarmNetwork Load Balancing Hardware Based Load Balancing (F5, Cisco, Citrix NetScaler – Best performance and scalability Software Windows Network Load Balancing fully supported If using Unicast, use two NICs on the server, one for communications between nodes. If using Multicast, be sure to configure routers appropriately Set Affinity to Single (Sticky Sessions) If using VMware, note fix to NLB RARP issue (http://tinyurl.com/vmwarenlbfix)
46. Configuring the FarmNetwork Load Balancing Best Practice – Create Multiple Web Apps with Load-balanced VIPs (Sample below) Web Role Servers sp1.companyabc.com (10.0.0.101) – Web Role Server #1 sp2.companyabc.com (10.0.0.102) – Web Role Server #2 Clustered VIPs shared between SP1 and SP2 (Create A records in DNS) spnlb.companyabc.com (10.0.0.103) - Cluster spca.companyabc.com (10.0.0.104) – SP Central Admin spsmtp.companyabc.com (10.0.0.105) – Inbound Email VIP home.companyabc.com (10.0.0.106) – Main SP Web App (can be multiple) mysite.companyabc.com (10.0.0.107) – Main MySites Web App
47. Configuring the FarmSecurity Considerations Infrastructure Security and Best Practices Best Practice Service Account Setup Kerberos Authentication Data Security SharePoint Security ACLs and Role Based Access Control (RBAC) Transparent Data Encryption (TDE) of SQL Databases Transport Security Secure Sockets Layer (SSL) from Server to Client IPSec from Server to Server Inbound Internet Security (Forefront UAG/TMG) / Certs Rights Management
48. Configuring the FarmSSL Certificates External or Internal Certs highly recommended Protects Transport of content 20% overhead on Web Servers Can be offloaded via SSL offloaders if needed Don’t forget for SPCA as well!
49. Configuring the FarmUser Profile Sync (UPS) Setup Most complex part of a SharePoint installation Uses the Forefront Identity Manager (FIM) subcomponent on the server to synch My Site Profiles with external directory source such Active Directory Would take an entire session to describe the process, but best blog on the topic is SharePoint MVP Spencer Harbar’s (harbar.net)
50. Configuring the FarmEnabling Diagnostic Logging and Usage and Health Data Collection To configure diagnostic logging On the Central Administration Home page, click Monitoring. In the Reporting section, click Configure diagnostic logging. On the Diagnostic Logging page, verify that Enable Event Log Flood Protection is selected. If not, click the corresponding check box to enable this feature. Leave default values for other items Click OK to save your changes. To configure usage and health data collection: On the Central Administration Monitoring page, click Configure usage and health data collection. Click the check box to Enable Usage Data Collection. Click the check box to Enable Health Data Collection. Name database Leave all other settings at default Click OK.
51. Configuring the FarmBest Practices For Email enabled content, create a dedicated OU for Email enabled contacts and distribution lists and give the SP Admin account rights to create and modify contacts and groups in that OU. Don’t forget Alternate Access Mappings if connecting to the content in more than one way (i.e. https://home.companyabc.com vs. just http://home) If using SSL on a web app, it must have a dedicated IP address, not just a host header Don’t forget to install Antivirus (MS Forefront Protection for SharePoint recommended) Don’t forget a comprehensive backup solution (MS System Center Data Protection Manager (DPM) 2010 or 3rd party)
53. KerberosBest practice: Enable Kerberos! When creating any Web Applications for Content, USE KERBEROS. It is much more secure and also faster with heavy loads as the SP server doesn’t have to keep asking for auth requests from AD. Kerberos auth does require extra steps, which makes people shy away from it, but once configured, it improves security considerably and can improve performance on high-load sites.
54. KerberosStep 1: Create the Service Principal Names Use the setspn utility to create Service Principle Names in AD, the following syntax for example: Setspn.exe -A HTTP/mysite.companyabc.com DOMAINNAMEYSiteAppAccount Setspn.exe -A HTTP/mysite DOMAINNAMEYSITEAppAccount Setspn.exe -A HTTP/home.companyabc.com DOMAINNAMEOMEAppAccount Setspn.exe -A HTTP/sp DOMAINNAMEOMEAppAccount
55. KerberosStep 2: Enable Kerberos from SP Servers to SQL Use setspn to create SPNs for SQL Service Account SPNs need to match the name that SharePoint uses to connect to SQL (Ideally SQL Alias, more on this later) Syntax similar to following: Setspn.exe -A MSSQLSvc/spsql:1433 COMPANYABCRV-SQL-DB Setspn.exe –A MSSQLSvc/spsql.companyabc.com:1433 COMPANYABCRV-SQL-DB MSSQLSvc = Default instance, if named instance, specify the name instead In this example, SRV-SQL-DB is the SQL Admin account
56. Kerberos Step 3: Allow User and Computer Accounts to Delegate (Optional) Required for Excel Services and other impersonation applications. On all SP Computer accounts and on the Application Identity accounts, check the box in ADUC to allow for delegation. In ADUC, navigate to the computer or user account, right-click and choose Properties. Go to the Delegation tab Choose Trust this user/computer for delegation to any service (Kerberos)
57. KerberosStep 4: Enable Kerberos on Web Application Go to Application Management – Authentication Providers Choose the appropriate Web Application Click on the link for ‘Default’ under Zone Change to Integrated Windows Authentication - Kerberos (Negotiate) Run iisreset /noforce from the command prompt If creating Web App from scratch, this step may be unnecessary if you choose Negotiate from the beginning
58. Logon to SharePoint Web Front-End as the setup account Launch the SQL Management Studio At the Connect to Server screen, connect to one of the alias names (spdbcontent, sbdbservices, spdbsearch) Make sure you are able to connect to the SQL server instance Login to the SQL server as SQL Admin account Launch Server Manager View Security event log under Diagnostics Look for Event ID 4624/Logon Open the event and look under the Detailed Authentication Information section which should read Kerberos for both Logon Process and Authentication Package for the Setup account KerberosStep 5: Validate Kerberos Functionality
59. KerberosBonuses for SPCA – Kerberos, NLB, SSL, and Default Port Bonus #1: Enable Kerberos Add the SPNs for SPCA HTTP/spca.companyabc.com, HTTP/spca (Add to App Pool Identity Account for SPCA) Configure Kerberos as defined in this presentation Bonus #2: Configure for SSL Encrypts traffic and Admin passwords Create and install Web certs for spca.companyabc.com Bonus #3: Load Balance SPCA Install SPCA on multiple web role servers Enable either Hardware NLB or Software Windows Network Load Balancing Requires DNS A record (spca.companyabc.com), registry key and AAM modification (below) Bonus #4: Setup SPCA on port 443/80 Delete default IIS Web Site Assign dedicated IP (VIP if load balancing) to SPCA Web App Change Port to 80 and 443 in IIS, Assign Cert (if using SSL) Modify SPCA URL on SP Servers - “HKLMOFTWAREicrosofthared Toolseb Server Extensions4.0SSentralAdministrationURL” (REG_SZ) = https://spca.companyabc.com/ Change your default AAM to https://spca.companyabc.com
60. Session Takeaways Use multiple service accounts, definitely don’t mix Application Pool identity accounts with the farm admin accounts Use Kerberos when at all possible Use a SQL DB Alias for greatest flexibility with a SP Farm Consider DB Mirroring as a DR option A four server farm is the smallest that is highly available Contact us at cco.com for help
61. Your Feedback is Important Please fill out a session evaluation form drop it off at the conference registration desk. Thank you!