Simplify the administration of IBM Connections with this easy to install and easy to use web interface tool. Complex multilevel administration commands can be done with just a single click, even by administrators without WebSphere background.
Easily accelerate and automate administrative tasks and enhance the maintenance tasks for IBM Connections. Benefit from extremely lowered effort for training and maintenance.
Interfacing Banner BEIS With Identity Management - Summit 2012joelavery
These are the slides from the Sungard / Ellucian Summit 2012 Conference for Session 1756 (Mandalay Bay Convention Center, Las Vegas). There have been slight modifications for clarity in some of the diagrams.
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...ServiceVirtualization.Com
CA CTO, inventor of SV and author John Michelsen's presentation at Oracle OpenWorld #OOW 2012. To truly achieve Agile development, enterprises need a "virtual world" to avoid constraints in software development. Service Virtualization is a new technology and practice of simulating and modeling any service or system dependency needed by teams throughout development, integration, functional and performance testing activities. Other industries from avionics to pharma already understand the power of simulation and virtual "wind tunnels" throughout design and development, and now it's time for software and IT innovation to follow this route to more consistent quality and innovation speed with SV. For more info, visit CA.com or see the community at http://servicevirtualization.com.
Interfacing Banner BEIS With Identity Management - Summit 2012joelavery
These are the slides from the Sungard / Ellucian Summit 2012 Conference for Session 1756 (Mandalay Bay Convention Center, Las Vegas). There have been slight modifications for clarity in some of the diagrams.
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...ServiceVirtualization.Com
CA CTO, inventor of SV and author John Michelsen's presentation at Oracle OpenWorld #OOW 2012. To truly achieve Agile development, enterprises need a "virtual world" to avoid constraints in software development. Service Virtualization is a new technology and practice of simulating and modeling any service or system dependency needed by teams throughout development, integration, functional and performance testing activities. Other industries from avionics to pharma already understand the power of simulation and virtual "wind tunnels" throughout design and development, and now it's time for software and IT innovation to follow this route to more consistent quality and innovation speed with SV. For more info, visit CA.com or see the community at http://servicevirtualization.com.
Identity and Request Management Using Novell Identity Manager: Identity Manag...Novell
To support regulatory compliance, audit requirements and its strategic direction, St. Vincent Health joined with Novell to design, develop and implement a Novell Identity Manager system in its 18 hospitals to provide role-based access control and audit capabilities that exceed auditor requirements. This session will provide an overview of the business case, benefits, phased approach and technical solution for role-based access at St. Vincent Health in support of HIPAA compliance. This session will provide a demonstration of Novell Identity Manager based workflow customization, role-based access control entitlements and provisioning. It will also demonstrate how Identity Manager can be used to manage other processes other than identity and access management. You will see a complete demonstration of St. Vincent’s Identity Manager solution and how Novell Sentinel reporting is providing answers to auditor and management questions.
Integrating Novell Collaboration Products with SugarCRM, Salesforce.com and S...Novell
Third-party application support for products like Novell GroupWise and Novell Teaming is among the top customer enhancement requests—and critical to user productivity. In this session, we'll show you how we've done it with our upcoming data synchronization product, Novell Data Synchronizer. We'll introduce you to the product and take a detailed look at the way it enables integration between Novell collaboration products and SugarCRM, Salesforce.com and Microsoft SharePoint.
Objectives:
- Getting an understanding of what SharePoint is.
- Getting familiar with the features SharePoint offers as a development Platform.
-Comprehend the different Development options.
- SharePoint Workflow Development.
- SharePoint Application Lifecycle Management.
A quick overview of a large application integration project I just wrapped up where we use a service approach to integrate 50 interfaces from 23 applications.
At least check out the diagrams and lessons learned at the end.
WebSphere Application Server support and monitoring tools presentation by Royal Cyber, tuning methodology, installation, migration, clustering, troubleshooting, deployment, automation scripts and much more.
(ATS4-APP03) Top 10 things every Notebook administrator should knowBIOVIA
Attend this session to learn Symyx Notebook administrator tips and tricks provided by Accelrys testing and support teams. Time will be provided for questions and to share customer tips and tricks.
Identity and Request Management Using Novell Identity Manager: Identity Manag...Novell
To support regulatory compliance, audit requirements and its strategic direction, St. Vincent Health joined with Novell to design, develop and implement a Novell Identity Manager system in its 18 hospitals to provide role-based access control and audit capabilities that exceed auditor requirements. This session will provide an overview of the business case, benefits, phased approach and technical solution for role-based access at St. Vincent Health in support of HIPAA compliance. This session will provide a demonstration of Novell Identity Manager based workflow customization, role-based access control entitlements and provisioning. It will also demonstrate how Identity Manager can be used to manage other processes other than identity and access management. You will see a complete demonstration of St. Vincent’s Identity Manager solution and how Novell Sentinel reporting is providing answers to auditor and management questions.
Integrating Novell Collaboration Products with SugarCRM, Salesforce.com and S...Novell
Third-party application support for products like Novell GroupWise and Novell Teaming is among the top customer enhancement requests—and critical to user productivity. In this session, we'll show you how we've done it with our upcoming data synchronization product, Novell Data Synchronizer. We'll introduce you to the product and take a detailed look at the way it enables integration between Novell collaboration products and SugarCRM, Salesforce.com and Microsoft SharePoint.
Objectives:
- Getting an understanding of what SharePoint is.
- Getting familiar with the features SharePoint offers as a development Platform.
-Comprehend the different Development options.
- SharePoint Workflow Development.
- SharePoint Application Lifecycle Management.
A quick overview of a large application integration project I just wrapped up where we use a service approach to integrate 50 interfaces from 23 applications.
At least check out the diagrams and lessons learned at the end.
WebSphere Application Server support and monitoring tools presentation by Royal Cyber, tuning methodology, installation, migration, clustering, troubleshooting, deployment, automation scripts and much more.
(ATS4-APP03) Top 10 things every Notebook administrator should knowBIOVIA
Attend this session to learn Symyx Notebook administrator tips and tricks provided by Accelrys testing and support teams. Time will be provided for questions and to share customer tips and tricks.
IT QUIZ(KOZHIKODE SUB DISTRICT UP LEVEL)ihsankallai
THIS PRESENTATION INCLUDES THE QUESTIONS OF IT QUIZ OF KOZHIKODE SUB DISTRICT LEVEL IT FAIR. ITS FOR THE UP SECTION, CONTAINS BOTH SWEET AND BITTER QUESTIONS. A WHOLE 15 QUESTIONS IS PRESENT IN THIS PRESENTATION.
QUIZIUQ 2016 - OPEN QUIZ (FINALS - ROUND 4 - CONNECTION ROUND)
THE INQUIZITIVE CLUB (JIAGANJ) ORGANISED 'QUIZIUQ-2016', AN OPEN QUIZ ON THE 5TH DAY OF JUNE, 2016 AT JIAGANJ, MURSHIDABAD, WEST BENGAL.
This amazing ppt is about movies and general knowledge. You will have lot of fun watching this. By watching this you can improve your general knowledge
a quiz with sound effects,personalities, famous people quiz,personality quiz,...mehboobanik
A visual quiz on personalities, a good quiz where audience is shown the 1st 2 slides and then they are given one minute to write them on paper.later the other slides are shown
Soccnx III - Connections Administration: Understand the challenge ... and fin...LetsConnect
Speakers: Otto Foerg Felix Binsack
Connections administration is not easy. The administrator has to work from the WebSphere "wsadmin" command-line interface where he has to enter a lot of commands to accomplish one simple task. Everything is case-sensitive, temporary variables must be used to transfer values between commands. It can take some time to find out which combination of commands solves a certain problem. People responsible for Connections administration often are not familiar to do their job this way. This session gives an overview of how Connections administration works and the challenges an administrator is facing. We will show some typical examples and how they are solved using the out-of-the-box Connections administration techniques. Additionally we will introduce the "Connections Administration Toolkit (CAT)", a web-based application offering a graphical interface instead of a command-line. CAT reduces dramatically the complexity of Connections administration and the time needed to perform administrative tasks .
Alfresco CMS is leading open source Enterprise Content Management System. Businessware Technologies is the leading open source solution provider in gulf region.
http://businessware-tech.com/product/alfresco-cms-and-intranet
Configuration management benefits for everyone - Rudder @ FLOSSUK Spring Conf...RUDDER
Sharing and reusing configurations, rolling out upgrades, ensuring a security policy is correctly applied, automating repetitive tasks, preparing for disaster recovery... these are all missions for configuration management tools.
Rudder is a new, open source approach to this domain, built on existing and reliable components. By allowing experts and power-users to create reusable templates and configurations based on best practices, it enables other actors in the IT department to benefit from the advantages of configuration management: using a web-based interface, junior sysadmins can quickly setup new servers while learning and respecting best practices and company policy, while service managers and security officers can get instant reports on their policies compliance level.
This talk introduces Rudder and show some illustrative use cases before describing the architecture of it's main components and how they interact (a web interface written in Scala, the CFEngine 3 infrastructure used to manage hosts, OpenLDAP as an inventory and configuration data store...), including how to write your own techniques and extend existing ones.
End-to-End Integrated Management with System Center 2012wwwally
Want to see hands-on how all the Microsoft System Center 2012 products work together to manage the common Windows platform? In this session full of demonstrations, Walter Eikenboom, shows you System Center 2012 for the Optimized Datacenter. See Service Manager 2012, Virtual Machine Manager 2012, Operations Manager 2012, Data Protection Manager 2012 and Orchestrator 2012!
Accelrys Enterprise Platform scales from laptops to grids, but can how does it do that and how can it scale to meet the demands of an Enterprise Application? Enterprise Architects and Developers will get a detailed view of how Pipeline Pilot handles job management, job queuing, job pooling, security, memory management, process isolation and more. This session provides background information that will support later presentations in the platform and developers tracks.
Rudder - Configuration management benefits for everyone (FOSDEM 2012)RUDDER
Rudder is a new open source tool in the configuration management domain. Its aim is not to reinvent the technical wheel, but to provide a new way to drive our infrastructure.
Specifically aimed at drift assessment, it addresses automation, ongoing verification and repairs, centralizing information and knowledge about your infrastructure, compliance reporting... thus helping to keep drift from nominal behavior low. Built upon a standard CFEngine architecture (and other open source components).
This talk will show how Rudder's approach enables everyone in the IT department to benefit from the advantages of configuration management, without necessarily needing to learn a complex tool, or even get their hands dirty. We'll describe and demonstrate how this is possible, and dive into the technical architecture that makes it work.
In a nutshell, clearly separated tasks permit technical experts to create configuration templates for the tools they know best, thus letting non-experts leverage this power via a modern web interface, such as: architects or security officers who implement policy, junior sysadmins who use and reuse such policies to setup services, and pretty much anyone who digs into real-time compliance reports and error logs.
See http://www.rudder-project.org for more info.
Cloud Intelligence - Build a Private Cloud in a 1,000 Easy StepsHarold Wong
Cloud Intelligence Conference Presentation: Guidance on what it really takes to build a Private Cloud using Microsoft technologies. The main focus is on getting started with a lab and providing next steps to really get going.
System Center 2012: Delivering a Private Cloud EnvironmentIntergen
Presentation at Intergen's event: Delivering IT Performance across Devices, Data Centres and Clouds.
Learn how System Center allows organisations to deliver on the promise of commodity computing while leveraging existing hardware and server software. See a System Center 2012 Private Cloud in action and understand the pathfrom current IT environments to the private cloud.
TIMETOACT GROUP - Der vernetzte und adaptive VersichererTIMETOACT GROUP
Das Marktumfeld von Versicherungen hat sich verändert. Kaufverhalten, Marktbedingungen, Wettbewerb und Technologische Möglichkeiten erzeugen einen enormen Druck. Versicherer sind gezwungen ihre Prozesse anzupassen. TIMETOACT GROUP hilft Kunden und Mitarbeiter zu "engagen", Prozesse zu optimieren und automatisieren und Versicherer Fit für das digitale Ökosystem zu machen.
Facilitate the scheduling in your company. The slotfinder enables digital appointment determination for all employees - like "Doodle" from Google. External employees can also be admitted.
The Slotfinder simplifies the often tedious determination of appointments, especially with external employees. Both small and large groups benefit from a clear appointment selection. The organizer suggests appointments – each participant indicates individually on which dates he has time. Then the fitting appointment can be selected and communicated to the group. Frequent rescheduling of appointments is reduced, a complicated phone coordination superfluous. Further participants can flexibly come to the vote later by direct link as well.
Bring top management and employees in contact. The abbreviation CxO summarizes the entirety of “chief title”, whereby the “x” is to be understood as a placeholder for the respective position.
CxO Connect enables a direct communication channel between the Executive Board and executives and thus serves as a voice for the Executive Board members. The motto is: Even the smallest voice is heard. CxO Connect makes the management level more accessible. Employees have the opportunity to participate directly and communication with the board is simplified.
The users post in their own name or in the form of anonymous posts on the corresponding CxO Connect page. The users have the opportunity to rate and comment on posts. The top rated entries will then be forwarded to the addressees at the end of the month for answering.
In the comments, users have the opportunity to discuss. The published answers can then be further discussed. The users themselves decide by their voting which contributions are relevant and should be answered. In other words, if an employee has something important to say and other users agree, then the board must respond.
Project Management Office (PMO) - for IBM ConnectionsTIMETOACT GROUP
Das Project Management Office (PMO) ermöglicht den Nutzern mit wenigen Clicks eine Übersicht über alle laufenden und anstehenden Projekte im Unternehmen. Alle relevanten Projektinformationen, wie beispielsweise die Übersicht über Status, Ansprechpartner, Budget, Meilensteile und die nächsten Schritte der verschiedenen Projekte, werden erfasst.
The GIS User Self Service for IBM Collaboration Solutions is a web application that allows users to register with a directory service and then manage it themselves. It provides the interface between directory services and application systems, allowing users to independently manage their user data, and gives administrators central access in the context of the entire user lifecycle.
The Digital Workplace Hub: Where Digital and Engagement Propel the Market Lea...TIMETOACT GROUP
IBM Connect 2017, Session 1434: IBM Connections + XCC (Web Content & Custom Apps) = IBM Digital Workplace Hub
Session by
Randy Frink (IBM WW Sales BUE Social Software)
Felix Binsack (TIMETOACT GROUP)
IBM Connections 6 will be release on March 28th. XCC is going to work with IBM Connections 6 Classic without any modifications! Full XCC reature compatibility with iBM Connections 6 from day 1. Have a look at first screenshots including an outlook of what will come soon.
The official booklet for the IBM Digital Workplace Hub, the smart and powerful combination of marketleading IBM Connections and TIMETOACT's XCC - Web Content & Custom Apps Extension.
Built Forms, Lists & Workflows with the IBM Forms Experience Builder (FEB) fo...TIMETOACT GROUP
Built Forms, Lists & Workflows with the IBM Forms Experience Builder (FEB) for the IBM Connections Engagement Center (ICEC) with the TIMETOACT FEB4ICEC Widgets
IBM Digital Workplace Hub with IBM Connections & TIMETOACT's XCC - Web Conten...TIMETOACT GROUP
This presentation is an overview of the problems of traditional intranets that use different platforms for communication, collaboration and applications and shows what an deeply integrated Intranet on the basis of IBM Connections & XCC - Web Content & Custom Apps Extension could look like.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
4. Technical Workshop: Connections Administration Toolkit
IBM Connections Administration Overview
General Configuration General Administration
Services User Management
Notifications Customizing
Language Selector Extending & Integration
Connectivity & SSL Troubleshooting
Feature Configuration Feature Administration
Scheduled Jobs Members
Size limits Cache & Trash
Feature Parameters Application & Widgets
Moderation Libraries & Policies
Profile Types Search Index
Object- and Filetypes Scheduled Jobs
… …
Page 4
5. Technical Workshop: Connections Administration Toolkit
How Connections Administration Works
Configuration wsadmin
XML file repository Case-sensitive command line
30+ files administering
6,000+ lines of XML Manually enter commands
425+ parameters Complex command syntax
300+ commands
Changing configurations
Many commands for 1 task
wsadmin
Variables to transfer values
Check-out / check-in procedure
between commands
Manually edit XML files
Type conversion for variables
Administration Copy & paste values from
MBeans Connections databases
Python
wsadmin commands
Page 5
6. Technical Workshop: Connections Administration Toolkit
wsadmin Example:
Add a New Member to an Activity
1. Start wsadmin command line environment:
wsadmin –lang jython –user <wasadmin> -password <password>
2. Load Activities Python Script:
execfile("activitiesAdmin.py")
3. Store the new member into a temporary variable:
newMember=ActivitiesMemberService.fetchMemberByName(“John Doe”)
4. Store the activity into a tempory variable:
act=ActivityService.fetchActivityById
*)
("FFFGc66a55370a2c423eafa5bd0a4b443a70”)
*) Additional operations required to get the UUID of the activity
5. Convert the variables from “hash” to “vector”:
from java.util import Vector
newMemberVec = Vector()
newMemberVec.add(newMember)
actVec = Vector()
ActVec.add(act)
6. Add the new member to the activity:
AccessControlService.setMembersAccess(actVec,newMemberVec)
Page 6
7. Technical Workshop: Connections Administration Toolkit
Administrative Skills Required
Using wsadmin – Your administrator has to be familiar with
Connections commands
XML configuration files
Connections administration procedures
WebSphere administration techniques
Additional skills required for
Database system
Tivoli Directory Integrator
IBM HTTP Server
Certificate management
Proxy
LDAP directory
Page 7
8. Technical Workshop: Connections Administration Toolkit
Connections Administration Toolkit CAT
Intuitive Interface for the Connections Administrator
Page 8
11. Technical Workshop: Connections Administration Toolkit
CAT Architecture
Connections XML
Files Connections
MBeans Change Configuration
Databases
Execute Commands
Get Data
REST API CAT Database
Logging, Menus,
Get and Put Data
Preferences
Page 11
12. Technical Workshop: Connections Administration Toolkit
CAT Installation Review
Create CAT database
DB2, Oracle, SQL-Server
Create CAT data source
Scope should be Cell or the WAS server CAT is installed to
Install CAT .ear
Into any WebSphere application server of your Connections cell
Map users or groups to CAT roles
Enter license key and configuration preferences
Page 12
13. Technical Workshop: Connections Administration Toolkit
CAT Preferences
REST RunAs User
MBean RunAs User
Deployment Manager
IP or Name
SOAP Port
Bootstrap Port
SMTP Configuration
Page 13
15. Technical Workshop: Connections Administration Toolkit
CAT Logging
Each action is logged
CAT is prompting for
comments
Log is stored in CAT
database
Different views
Most recent
Last day
Last week
Last month
Page 15
18. Technical Workshop: Connections Administration Toolkit
General Configuration
Connections Services
Notifications
Language Selector
Page 18
19. Technical Workshop: Connections Administration Toolkit
Connections Services
Set for each Connections
Application
Enable / Disable
SSL enable
Standard URL
SSL URL
Interservice URL
Additional CAT Features
Copy values from Defaults line
to selected features
Select / unselect all features
with 1 click
Save and restore a working
configuration
Page 19
20. Technical Workshop: Connections Administration Toolkit
Notification Configuration
Configure for each
Notification Event
Enabled
Sender address to be used
Additional CAT Features
Copy values from Defaults line
to selected events
Select / unselect all events
with 1 click
Select / unselect all events of
a Connections application
Save and restore a working
configuration
Page 20
21. Technical Workshop: Connections Administration Toolkit
Language Selector
Base Configuration
Enable
Select languages
Specify default language
Enable cookie
Specify cookie name and
domain
Additional CAT Features
Sort languages using up and
down arrows
Move a language with one
click to the top or bottom of the
list
Enable all languages with one
click
Page 21
22. Technical Workshop: Connections Administration Toolkit
Post Configuration Tasks from ISC
Synchronize all
Connections nodes
Should happen
automatically
Restart all
Connections clusters
Page 22
23. Technical Workshop: Connections Administration Toolkit
General Administration - Schedulers
Schedulers
List All Schedulers
Clear All Schedulers
Background
Solve scheduler related
problems by restarting all
schedulers
Solves many but not all
scheduler problems
Do so if Connections
documentation or IBM
instructs you to
Restart of all Connections
clusters required
Page 23
25. Technical Workshop: Connections Administration Toolkit
Activities – Configure - Schedulers
One tab for each Scheduler
of an Connections
application
Current configuration
Get current status with
Get Details
Pause or Resume a
scheduler
Change Cron configuration
Do NOT change the Scope
Page 25
26. Technical Workshop: Connections Administration Toolkit
Activities – Manage: Overview
Filter activities
Manage a list of selected activities
Manage a single activity
Page 26
27. Technical Workshop: Connections Administration Toolkit
Filter Activities By ...
Type Name
Completed Start / end date
Deleted
Orphaned
Tags
Template UUID
Open
User Result list sortable by
Author several criteria
Creator
Owner
Reader Clear filter to initiate a new
All roles search
Page 27
29. Technical Workshop: Connections Administration Toolkit
Manage a List of Activities
Export
Delete
Restore
Purge
Add Member
Remove Member
Note pagination
controls
Page 29
30. Technical Workshop: Connections Administration Toolkit
Manage a Single Activity
Info – Tab
All meta data
Member Management
Search for a member
Add member(s)
Remove member(s)
Change role assignment
Page 30
31. Technical Workshop: Connections Administration Toolkit
Members of a Community Activity
Membership and Do not change
role assignment membership or
are controlled by role assignment
the community with CAT
Page 31
33. Technical Workshop: Connections Administration Toolkit
Blogs – Configure
General
Rendering
Comment and Trackback
Upload Capability
Theme
Page 33
34. Technical Workshop: Connections Administration Toolkit
Blogs – Manage: Overview
Filter blogs
Manage a list of selected blogs
Manage a single blog
Page 34
35. Technical Workshop: Connections Administration Toolkit
Filter Blogs By ...
Name Tags
User UUID
Author Result list sortable by
Draft several criteria
Owner
All roles
Page 35
37. Technical Workshop: Connections Administration Toolkit
Manage a Single Blog
Info – Tab
Member Management
List all members
Search for a member
in the list
Add or remove of
members not yet
implemented
Page 37
39. Technical Workshop: Connections Administration Toolkit
Communities – Configure
Description summary size
Hide Start a Community
button from unauthenticated
users
Rendering parameters
Page 39
40. Technical Workshop: Connections Administration Toolkit
Communities – Manage: Overview
Filter communities
General manage communities
Manage a list of selected communities
Manage a single community
Page 40
41. Technical Workshop: Connections Administration Toolkit
Filter Communities By ...
Type User
All All Roles
Subcommunities Creator
Public Communities Member
Moderated Communities Owner
Restricted Communities Tags
Orphaned Communities
UUID
Name
Sort result list by several
criteria
Page 41
42. Technical Workshop: Connections Administration Toolkit
General Manage Communities
Create a Community
Add alternate Owner
Remove a User from all Communities
Page 42
43. Technical Workshop: Connections Administration Toolkit
Manage a List of Communities
Change Name Delete Community
Change Description
Page 43
44. Technical Workshop: Connections Administration Toolkit
Manage a Single Community (1)
Info – Tab Member Management
All meta data Search for a member in the list
Add / Remove member(s)
Refresh member(s)
Page 44
45. Technical Workshop: Connections Administration Toolkit
Manage a Single Community (2)
Tags
Add / Delete tags
Policy
See current usage
Assign different policy
Page 45
51. Technical Workshop: Connections Administration Toolkit
Filter Files Libraries
Filter libraries by Specify Sort By Parameter
Type Title
Personal Last Update
Community Size
Orphaned Created Date
Title
Library ID
Owner ID
Policy
Page 51
53. Technical Workshop: Connections Administration Toolkit
Library Meta Data
Click on magnifier icon for
library
Info Tab contains all meta
data
Page 53
54. Technical Workshop: Connections Administration Toolkit
Assign Different Policy To A Library
Select Policy Tab
Select Policy from dropbox
Page 54
55. Technical Workshop: Connections Administration Toolkit
Files – Manage – Policies
Filter policies by
Name
Policy ID
Specify Sort By parameter
Create a new policy
Delete policies from result
list
Edit a policies Maximum
Size in result list
Page 55
58. Technical Workshop: Connections Administration Toolkit
Forums – Manage: Overview
Filter Forums by Result display:
Name Sortable result list
Creator or Modifier Hierarchical tree
State
NodeUUID
Type
Page 58
59. Technical Workshop: Connections Administration Toolkit
Forums – Filter - Results
Flat View Hierarchical View
Export displayed result list as CSV file.
Delete selected forums, topics, replies
Page 59
60. Technical Workshop: Connections Administration Toolkit
Manage a Single Forum
Info – Tab : Forums Details Members overview
Type (searchable list)
State
Description
Level
…
Page 60
62. Technical Workshop: Connections Administration Toolkit
Recap: User Data Architecture
UID: - Ex LDAP
- Key between LDAP & Profiles
LDAP
- Has to be unique
E-Mail
GUID
Login
UID
- Don‘t change
DN
CN
ID
...
- Mapping configurable
GUID: - Ex LDAP
- Key between Profiles & Features
- Has to be unique
TDI
- Changes are synchronized
- Mapping configurable FEATURE
UUID: - Unique Object ID in Feature DBs
E-Mail
Name
GUID
Login
Items
UUID
State
- Different in feature databases
Login - Ex LDAP
PROFILES
Items: - Associated with the users UUID
E-Mail
Name
GUID
Login
Login
Items
UUID
- Cannot be incorporated by other
State
UID
ID
users
FEATURE
Login ID, E-Mail und UID:
E-Mail
Name
GUID
Login
Items
UUID
State
Configurable for Connections authentication
Page 62
63. Technical Workshop: Connections Administration Toolkit
User Management – By User: Overview
Filter users by
E-Mail
UID
Display Name
GUID
Login ID
Tags
Type
Manage multiple users
Manage tags
Delete users from Profiles
Manage a single user:
Open details with magnifier
Tabs for Profiles and Features
Page 63
65. Technical Workshop: Connections Administration Toolkit
User Management – By User
„Profiles“ Tab Edit User
All user meta data from Swap GUID
PROFILES db Print
Toggle Inactivate / Activate Delete User
Publish Data Change UID
Page 65
66. Technical Workshop: Connections Administration Toolkit
User Management – By User
„Features“ Tab Inactivate User
User meta data from feature Sync with Directory
db‘s Swap GUID
Activate User Check for Duplicates
Page 66
67. Technical Workshop: Connections Administration Toolkit
User Management – By User
„Tags“ Tab
Add Tags
Remove Tags
Replace Tags
Page 67
68. Technical Workshop: Connections Administration Toolkit
User Management – By Feature
Sync member data of all users in selected
feature database(s) with LDAP
Select feature(s)
Confirm update on email / login id match
Click Sync Selected with Directory
Please note: This can take a while
Page 68
72. Technical Workshop: Connections Administration Toolkit
Profiles Configuration
Statistics Object Cache
User Interface Full Reports-To Cache
Page 72
73. Technical Workshop: Connections Administration Toolkit
Profile Types Configuration
Select property Select scope
Enable / disable property for Self: Profile owner only
profile types Colleagues: Members of
profile owners network
Person: People with the
person role in the Profiles app
None
Page 73
76. Technical Workshop: Connections Administration Toolkit
Recap Moderation Roles
Global Moderation
Moderators for all Blogs, Forums, Community-Files
JEE Role global-moderator in Blogs / Foren / Communities
Plus: JEE Rolle global-moderator in Moderation
Centralized Moderation Interface
(=> On top of Connections UI)
Owner Moderation
Moderators of their Blogs, Community-Files and Forums
Must be owner
Configured in contentreview-config.xml
Owner can publish without approval
Community Actions > Moderate Community
Page 76
77. Technical Workshop: Connections Administration Toolkit
Moderation Overview
Configure Moderation Flag Categories
for
Blogs
Files
Forums
Page 77
78. Technical Workshop: Connections Administration Toolkit
Flag Categories
Categories Labels
Create Enter description in different
Edit languages
Delete Select language and click
Apply Filter
Page 78
88. Technical Workshop: Connections Administration Toolkit
Wikis – Manage - Policies
Filter policies by
Name
Policy ID
Specify Sort By parameter
Create a new policy
Delete policies from result list
Edit a policies Maximum Size from result list
Page 88
89. Technical Workshop: Connections Administration Toolkit
Assign Different Policy To A Wiki
Select Policy Tab
Select Policy from dropbox
Page 89