The document discusses different database architectures for software as a service (SaaS) applications, including multi-tenant, single tenant, and microservices models. It provides pros and cons of each model in terms of self-service capabilities, scalability, security, code complexity, customization, and other factors. The document also describes how the speaker's company Actionable implemented a multi-tenant model with some microservices elements for their learning and development platform.
This document provides tips for optimizing a website's structure and content for search engines. It discusses creating a site hierarchy with the homepage at the top and additional pages one or two clicks below. Content clusters and hub pages are recommended to group related pages and move them higher in the site structure. Deep linking individual important pages directly from the homepage can also boost their ranking. Maintaining the structure over time and using semantic outlines, keyword rich URLs, and link text are advised. Trust factors that search engines consider like site reputation and longevity are also outlined.
AWS re:Invent 2016: The Secret to SaaS (Hint: It's Identity) (GPSSI404)Amazon Web Services
Identity is a fundamental element of any SaaS environment. It must be woven into the fabric of your SaaS architecture and design, enabling you to authorize and scope access to your multi-tenant services, infrastructure, and data effectively. In this session, we pair with AWS partner Okta to examine how tenant identity is introduced into SaaS applications without undermining flexibility or developer productivity. The goal here is to highlight strategies that encapsulate tenant awareness and leverage the scale, security, and innovation enabled by AWS and its ecosystem of identity solutions. We dig into all the moving parts of the SaaS identity equation, showcasing the best practices and common considerations that will shape your approach to SaaS identity management.
Open Architecture for Developing Multitenant Software-as-a-Service ApplicationsJavier Mijail Espadas Pech
As cloud computing infrastructures are growing, in terms of usage, its requirements about software design, management and deployment are increasing as well. Software-as-a-Service (SaaS) platforms play a key role within this cloud environment. SaaS, as a part of the cloud offer, allows to the software providers to deploy and manage their own applications in the clouds in a subscription basis. The problem with the current SaaS offers is the lack of openness of in their platforms and the need for learning a whole new paradigm when trying to initiate in the SaaS market. Big players, such as: Amazon, Google or Microsoft, offer their proprietary SaaS solutions. Another consideration is the amount of current Web applications that need to be re-engineered into this cloud paradigm. This research work aims to reduce the effort required to enter into the SaaS market by presenting an architecture based on open source components for developing, deploying and managing SaaS applications.
Save Time By Manging WordPress from the Command LineShawn Hooper
WP-CLI is a command line interface tool that allows users to manage WordPress from the command line. It is useful for site administrators, plugin developers, theme designers, and anyone wanting to save time. To use WP-CLI, it must be installed on a server with SSH access and requires PHP 5.3.29 or later and WordPress 3.7 or later. Common commands are used by specifying "wp" followed by the command, sub-command, and any parameters.
Simplify Multi-Tenant Queries in ORM FrameworksYuen-Kuei Hsueh
This document discusses multi-tenant database architectures in Java applications. It presents three approaches: separate databases where each tenant gets their own database, separate schemas where tenants share a database but have unique schemas, and a discriminator column where a column indicates which tenant a record belongs to. It evaluates these approaches based on criteria like performance, manageability, scalability and cost. Finally, it discusses how Java persistence providers like JPA, Hibernate and EclipseLink support these different multi-tenant patterns.
You already know that CloudLinux OS makes your servers more stable and secure, but do you know how to configure it to perform best? In this webinar recording, Bogdan Shyshka discusses how to set and optimize CloudLinux OS limits and what they really mean. He goes over the dangers of low or high limits, defaults and starting points, and shares some tips and tricks that can help you maximize your server performance.
Video recordings: https://cloudlinux.com/cloudlinux-academy
The Workplace Climate Scale provides guidelines for creating an affirming and inclusive work environment for nurses of all sexual orientations and gender identities. It outlines several key areas that healthcare workplaces should address, including using LGBT-inclusive language in all materials, having explicit non-discrimination policies, recognizing same-sex partners and families equally, offering equal benefits to all employees, enforcing a zero-tolerance policy on harassment, holding accountability practices, designating safe spaces for LGBT employees, celebrating LGBT pride events, providing ongoing diversity education, and connecting with LGBT community organizations. The overall goal is to assess and improve how welcoming and supportive the workplace is of nurses who are LGBT.
This document provides tips for optimizing a website's structure and content for search engines. It discusses creating a site hierarchy with the homepage at the top and additional pages one or two clicks below. Content clusters and hub pages are recommended to group related pages and move them higher in the site structure. Deep linking individual important pages directly from the homepage can also boost their ranking. Maintaining the structure over time and using semantic outlines, keyword rich URLs, and link text are advised. Trust factors that search engines consider like site reputation and longevity are also outlined.
AWS re:Invent 2016: The Secret to SaaS (Hint: It's Identity) (GPSSI404)Amazon Web Services
Identity is a fundamental element of any SaaS environment. It must be woven into the fabric of your SaaS architecture and design, enabling you to authorize and scope access to your multi-tenant services, infrastructure, and data effectively. In this session, we pair with AWS partner Okta to examine how tenant identity is introduced into SaaS applications without undermining flexibility or developer productivity. The goal here is to highlight strategies that encapsulate tenant awareness and leverage the scale, security, and innovation enabled by AWS and its ecosystem of identity solutions. We dig into all the moving parts of the SaaS identity equation, showcasing the best practices and common considerations that will shape your approach to SaaS identity management.
Open Architecture for Developing Multitenant Software-as-a-Service ApplicationsJavier Mijail Espadas Pech
As cloud computing infrastructures are growing, in terms of usage, its requirements about software design, management and deployment are increasing as well. Software-as-a-Service (SaaS) platforms play a key role within this cloud environment. SaaS, as a part of the cloud offer, allows to the software providers to deploy and manage their own applications in the clouds in a subscription basis. The problem with the current SaaS offers is the lack of openness of in their platforms and the need for learning a whole new paradigm when trying to initiate in the SaaS market. Big players, such as: Amazon, Google or Microsoft, offer their proprietary SaaS solutions. Another consideration is the amount of current Web applications that need to be re-engineered into this cloud paradigm. This research work aims to reduce the effort required to enter into the SaaS market by presenting an architecture based on open source components for developing, deploying and managing SaaS applications.
Save Time By Manging WordPress from the Command LineShawn Hooper
WP-CLI is a command line interface tool that allows users to manage WordPress from the command line. It is useful for site administrators, plugin developers, theme designers, and anyone wanting to save time. To use WP-CLI, it must be installed on a server with SSH access and requires PHP 5.3.29 or later and WordPress 3.7 or later. Common commands are used by specifying "wp" followed by the command, sub-command, and any parameters.
Simplify Multi-Tenant Queries in ORM FrameworksYuen-Kuei Hsueh
This document discusses multi-tenant database architectures in Java applications. It presents three approaches: separate databases where each tenant gets their own database, separate schemas where tenants share a database but have unique schemas, and a discriminator column where a column indicates which tenant a record belongs to. It evaluates these approaches based on criteria like performance, manageability, scalability and cost. Finally, it discusses how Java persistence providers like JPA, Hibernate and EclipseLink support these different multi-tenant patterns.
You already know that CloudLinux OS makes your servers more stable and secure, but do you know how to configure it to perform best? In this webinar recording, Bogdan Shyshka discusses how to set and optimize CloudLinux OS limits and what they really mean. He goes over the dangers of low or high limits, defaults and starting points, and shares some tips and tricks that can help you maximize your server performance.
Video recordings: https://cloudlinux.com/cloudlinux-academy
The Workplace Climate Scale provides guidelines for creating an affirming and inclusive work environment for nurses of all sexual orientations and gender identities. It outlines several key areas that healthcare workplaces should address, including using LGBT-inclusive language in all materials, having explicit non-discrimination policies, recognizing same-sex partners and families equally, offering equal benefits to all employees, enforcing a zero-tolerance policy on harassment, holding accountability practices, designating safe spaces for LGBT employees, celebrating LGBT pride events, providing ongoing diversity education, and connecting with LGBT community organizations. The overall goal is to assess and improve how welcoming and supportive the workplace is of nurses who are LGBT.
El documento lista varios recitales y eventos musicales que tendrán lugar en Argentina durante marzo y mayo de 2017, incluyendo presentaciones de Metallica, The Strokes, The Weeknd, Linkin Park, Prophets Of Rage y Slayer en diferentes ciudades y lugares como Olavarría, el Hipódromo de Palermo, Tecnópolis y el Teatro Gran Rex.
Este documento contiene las respuestas a 5 preguntas de una evaluación parcial sobre gerencia. La primera pregunta justifica la necesidad de la gerencia para dirigir un grupo de personas y lograr los objetivos de una empresa. La segunda pregunta comenta las funciones de control y dirección de un gerente. La tercera pregunta define el liderazgo y sus características clave. La cuarta pregunta solicita los fundamentos de la Escuela Tradicional del pensamiento administrativo. Y la quinta pregunta resume las tendencias modernas como la globalización, competitividad e inte
This document summarizes a bachelor's thesis that examines the influence of green supply chain management (GSCM) on customers' intention to purchase. It first provides an overview of common motivations for and benefits of adopting GSCM practices. The most common motivations discussed are financial performance, regulation, consumers, competitive advantage, supplier collaboration, reputational risk, and environmental performance. The most common benefits are financial/organizational performance, reputation, employees, competitive advantage, and environmental performance. Finally, it explores the relationship between these GSCM motivations/benefits and customers' purchase intention.
El documento debate sobre la posibilidad de una democracia electrónica en la que los ciudadanos puedan votar en línea. Señala que las nuevas tecnologías podrían acercar a gobernantes y gobernados e informar mejor a los ciudadanos. Sin embargo, también plantea desafíos como asegurar la identidad de los votantes en línea y el acceso universal a la tecnología.
The impact of corporate social responsibility on investment recommendationslucahearth
This document discusses a study that investigates how corporate social responsibility (CSR) strategies impact security analysts' investment recommendations. The study finds that analysts issue more favorable recommendations for socially responsible firms now compared to earlier periods, indicating a changing view of CSR's value. Additionally, firms with greater visibility and analysts with more experience, CSR awareness or resources are more likely to view CSR strategies positively in their recommendations. In summary, the document examines how CSR can influence value creation in public markets through influencing analysts' recommendations.
El documento describe los 10 pasos de un mantenimiento preventivo básico para un equipo de escritorio, que incluyen revisar los materiales necesarios, limpiar el exterior y el interior del equipo, revisar los cables y conexiones, actualizar el software, escanear para virus y malware, verificar el estado de la batería y la memoria, ejecutar pruebas de rendimiento y probar las funciones básicas.
Multi-Tenancy is a critical component of any Software as a Service (SaaS) application, which enables one application instance to serve multiple organizations, or tenants. This presentation by Scott Crespo covers the basics of multi-tenant architectures, and how to implement multi-tenancy using Python, Django, and the open-source project known as Django Tenant Schemas.
Coffee wars : CCD taking on the global brandssampriti1991
This document discusses the coffee shop market in India and provides a comparison between Café Coffee Day (CCD) and Starbucks. Some key points:
- CCD is the current market leader in India with over 1,500 stores across the country, while Starbucks only has around 75 stores and has struggled with expansion.
- CCD targets young professionals and students and has lower prices than Starbucks, allowing it to reach more markets. Starbucks targets upper middle class customers.
- Both companies are analyzed based on their marketing mix (7Ps/8Ps) strategies and supply chains. Challenges facing each company are also discussed, such as employee retention for CCD and high real estate costs for Starbucks.
-
Apresentação de dilatação térmica volumétrica. vídeos em https://www.youtube.com/user/eloirdecarli ou todo material em http://lief.if.ufrgs.br/pub/cref/n31_DeCarli/
Whitepaper - Building a scalable & Profitable Saas BusinessTechcello
The document discusses the challenges of building a scalable and profitable software-as-a-service (SaaS) business model. It outlines key challenges around scale, revenue, infrastructure, and operations that are unique to the SaaS model. It then introduces the Cello platform as a one-stop solution that addresses these challenges through features for business management, customer service, and product engineering to help SaaS companies manage the entire lifecycle and drive growth.
Single tenant software to multi-tenant SaaS using K8SCloudLinux
This document discusses how Kubernetes can be used to convert single-tenant software applications into multi-tenant SaaS applications. Key points include:
1) Kubernetes can orchestrate each tenant as a separate pod or set of pods, providing isolation, easy scalability, and the ability to customize deployments for each tenant.
2) This approach simplifies many challenges of traditional SaaS like customer management, billing integration, high availability, upgrades and rollbacks by leveraging Kubernetes features.
3) An initial test project converted an existing PHP/MySQL billing application for 10,000+ companies into a multi-tenant SaaS deployment using Kubernetes, requiring under 40 hours of development.
The document discusses how Actionable.co, a distributed company, uses the REST API to manage their various websites and third party integrations. Some key uses of the REST API include retrieving content from WordPress to populate their learning platform, linking blogs between three websites, automating tasks like notifying managers when employees complete onboarding courses, and managing users across multiple sites without using multisite. The REST API allows them to optimize caching, avoid custom coding, and automate workflows between their sites and third party services.
Add Module Doing Business Over The Internetguest7b126e
The document discusses the importance and benefits of RSS technology. RSS allows users to receive updated news, headlines and summaries from websites without having to visit each site individually. It provides reliability in content delivery, increases website traffic, and offers valuable and relevant resources for users. Some key advantages of RSS include flexibility for users to choose what they receive, and its usefulness as a marketing tool for areas like email marketing, search engine optimization, blogging and advertising.
What are the Best Practices for developing SaaS Applications? | Calidad InfotechCalidad Infotech
In the last five years, cloud services have been rising rapidly, and because of that enterprises have started moving from traditional applications platforms to Software-as-a-Service (SaaS) platforms. End-user spending on the SaaS platform is expected to reach $600 billion by the end of 2023. SaaS platform is in one of the top trends in the… Continue reading What are the Best Practices for developing SaaS Applications?
The document discusses implementing SUSHI and COUNTER usage reporting at institutions. It provides an overview of SUSHI and COUNTER standards and explains how to choose a SUSHI client. Commercial products and open source clients are described. The basics of configuring a SUSHI client are covered, noting that details come from content providers. Activating SUSHI with different providers is demonstrated. Methods for harvesting reports and viewing XML data are shown. Simple cost per use analysis in Excel is presented as an example of working with harvested COUNTER data.
The document discusses token management using Stormpath in Mule. Stormpath is a hosted API service that allows for easy creation and management of user accounts and authentication. It provides advantages like token-based authentication, single sign-on, user authorization controls, and social login integration. When using Stormpath with Mule, a Mule connector allows for administrative functions. Mule flows can be configured to get and retrieve tokens for authentication.
Join us on this webinar where we discuss the new improvements made to our real-time social research tool MAP. We show off our brand new user interface and new software features.
Learn how to:
Easily customize your data reports with the ability to create a dashboard.
Get minute-by-minute analysis of spikes and dips in chatter with time-based search.
Run analytics against shortened URLs
Please enjoy!
Making Sense of Hypermedia APIs – Hype or Reality?Akana
The document discusses hypermedia APIs and standards. It provides examples of different hypermedia formats including OData, Collection+JSON, HAL, Siren, JSON-API, JSON-LD, Mason, and UBER. It addresses arguments for and against hypermedia APIs. It also discusses how organizations can adopt hypermedia concepts and standards over time without a complete overhaul of their existing APIs.
El documento lista varios recitales y eventos musicales que tendrán lugar en Argentina durante marzo y mayo de 2017, incluyendo presentaciones de Metallica, The Strokes, The Weeknd, Linkin Park, Prophets Of Rage y Slayer en diferentes ciudades y lugares como Olavarría, el Hipódromo de Palermo, Tecnópolis y el Teatro Gran Rex.
Este documento contiene las respuestas a 5 preguntas de una evaluación parcial sobre gerencia. La primera pregunta justifica la necesidad de la gerencia para dirigir un grupo de personas y lograr los objetivos de una empresa. La segunda pregunta comenta las funciones de control y dirección de un gerente. La tercera pregunta define el liderazgo y sus características clave. La cuarta pregunta solicita los fundamentos de la Escuela Tradicional del pensamiento administrativo. Y la quinta pregunta resume las tendencias modernas como la globalización, competitividad e inte
This document summarizes a bachelor's thesis that examines the influence of green supply chain management (GSCM) on customers' intention to purchase. It first provides an overview of common motivations for and benefits of adopting GSCM practices. The most common motivations discussed are financial performance, regulation, consumers, competitive advantage, supplier collaboration, reputational risk, and environmental performance. The most common benefits are financial/organizational performance, reputation, employees, competitive advantage, and environmental performance. Finally, it explores the relationship between these GSCM motivations/benefits and customers' purchase intention.
El documento debate sobre la posibilidad de una democracia electrónica en la que los ciudadanos puedan votar en línea. Señala que las nuevas tecnologías podrían acercar a gobernantes y gobernados e informar mejor a los ciudadanos. Sin embargo, también plantea desafíos como asegurar la identidad de los votantes en línea y el acceso universal a la tecnología.
The impact of corporate social responsibility on investment recommendationslucahearth
This document discusses a study that investigates how corporate social responsibility (CSR) strategies impact security analysts' investment recommendations. The study finds that analysts issue more favorable recommendations for socially responsible firms now compared to earlier periods, indicating a changing view of CSR's value. Additionally, firms with greater visibility and analysts with more experience, CSR awareness or resources are more likely to view CSR strategies positively in their recommendations. In summary, the document examines how CSR can influence value creation in public markets through influencing analysts' recommendations.
El documento describe los 10 pasos de un mantenimiento preventivo básico para un equipo de escritorio, que incluyen revisar los materiales necesarios, limpiar el exterior y el interior del equipo, revisar los cables y conexiones, actualizar el software, escanear para virus y malware, verificar el estado de la batería y la memoria, ejecutar pruebas de rendimiento y probar las funciones básicas.
Multi-Tenancy is a critical component of any Software as a Service (SaaS) application, which enables one application instance to serve multiple organizations, or tenants. This presentation by Scott Crespo covers the basics of multi-tenant architectures, and how to implement multi-tenancy using Python, Django, and the open-source project known as Django Tenant Schemas.
Coffee wars : CCD taking on the global brandssampriti1991
This document discusses the coffee shop market in India and provides a comparison between Café Coffee Day (CCD) and Starbucks. Some key points:
- CCD is the current market leader in India with over 1,500 stores across the country, while Starbucks only has around 75 stores and has struggled with expansion.
- CCD targets young professionals and students and has lower prices than Starbucks, allowing it to reach more markets. Starbucks targets upper middle class customers.
- Both companies are analyzed based on their marketing mix (7Ps/8Ps) strategies and supply chains. Challenges facing each company are also discussed, such as employee retention for CCD and high real estate costs for Starbucks.
-
Apresentação de dilatação térmica volumétrica. vídeos em https://www.youtube.com/user/eloirdecarli ou todo material em http://lief.if.ufrgs.br/pub/cref/n31_DeCarli/
Whitepaper - Building a scalable & Profitable Saas BusinessTechcello
The document discusses the challenges of building a scalable and profitable software-as-a-service (SaaS) business model. It outlines key challenges around scale, revenue, infrastructure, and operations that are unique to the SaaS model. It then introduces the Cello platform as a one-stop solution that addresses these challenges through features for business management, customer service, and product engineering to help SaaS companies manage the entire lifecycle and drive growth.
Single tenant software to multi-tenant SaaS using K8SCloudLinux
This document discusses how Kubernetes can be used to convert single-tenant software applications into multi-tenant SaaS applications. Key points include:
1) Kubernetes can orchestrate each tenant as a separate pod or set of pods, providing isolation, easy scalability, and the ability to customize deployments for each tenant.
2) This approach simplifies many challenges of traditional SaaS like customer management, billing integration, high availability, upgrades and rollbacks by leveraging Kubernetes features.
3) An initial test project converted an existing PHP/MySQL billing application for 10,000+ companies into a multi-tenant SaaS deployment using Kubernetes, requiring under 40 hours of development.
The document discusses how Actionable.co, a distributed company, uses the REST API to manage their various websites and third party integrations. Some key uses of the REST API include retrieving content from WordPress to populate their learning platform, linking blogs between three websites, automating tasks like notifying managers when employees complete onboarding courses, and managing users across multiple sites without using multisite. The REST API allows them to optimize caching, avoid custom coding, and automate workflows between their sites and third party services.
Add Module Doing Business Over The Internetguest7b126e
The document discusses the importance and benefits of RSS technology. RSS allows users to receive updated news, headlines and summaries from websites without having to visit each site individually. It provides reliability in content delivery, increases website traffic, and offers valuable and relevant resources for users. Some key advantages of RSS include flexibility for users to choose what they receive, and its usefulness as a marketing tool for areas like email marketing, search engine optimization, blogging and advertising.
What are the Best Practices for developing SaaS Applications? | Calidad InfotechCalidad Infotech
In the last five years, cloud services have been rising rapidly, and because of that enterprises have started moving from traditional applications platforms to Software-as-a-Service (SaaS) platforms. End-user spending on the SaaS platform is expected to reach $600 billion by the end of 2023. SaaS platform is in one of the top trends in the… Continue reading What are the Best Practices for developing SaaS Applications?
The document discusses implementing SUSHI and COUNTER usage reporting at institutions. It provides an overview of SUSHI and COUNTER standards and explains how to choose a SUSHI client. Commercial products and open source clients are described. The basics of configuring a SUSHI client are covered, noting that details come from content providers. Activating SUSHI with different providers is demonstrated. Methods for harvesting reports and viewing XML data are shown. Simple cost per use analysis in Excel is presented as an example of working with harvested COUNTER data.
The document discusses token management using Stormpath in Mule. Stormpath is a hosted API service that allows for easy creation and management of user accounts and authentication. It provides advantages like token-based authentication, single sign-on, user authorization controls, and social login integration. When using Stormpath with Mule, a Mule connector allows for administrative functions. Mule flows can be configured to get and retrieve tokens for authentication.
Join us on this webinar where we discuss the new improvements made to our real-time social research tool MAP. We show off our brand new user interface and new software features.
Learn how to:
Easily customize your data reports with the ability to create a dashboard.
Get minute-by-minute analysis of spikes and dips in chatter with time-based search.
Run analytics against shortened URLs
Please enjoy!
Making Sense of Hypermedia APIs – Hype or Reality?Akana
The document discusses hypermedia APIs and standards. It provides examples of different hypermedia formats including OData, Collection+JSON, HAL, Siren, JSON-API, JSON-LD, Mason, and UBER. It addresses arguments for and against hypermedia APIs. It also discusses how organizations can adopt hypermedia concepts and standards over time without a complete overhaul of their existing APIs.
RightScale User Conference / Fall / 2010 - Morning SessionsRightScale
The document discusses RightScale's community programs for cloud management users, including user conferences, online forums, community publishing, local user groups, and ambassador programs. It highlights RightScale's user groups where users can network, share best practices, and get support from RightScale. It also describes the ambassador program which empowers enthusiasts to share information about RightScale and clouds.
Design Strategy for Data Isolation in SaaS ModelTechcello
The document discusses database isolation strategies for software as a service (SaaS) applications. It considers whether to use a single shared database for all customers or separate isolated databases. Key factors that influence the decision include customers' willingness to share data, need for individual backups, data volume, and workload concurrency. The document recommends a hybrid approach with an option to isolate specific customers as needed. It also describes TechCello, a SaaS development framework that supports flexible database architectures.
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenNCCOMMS
The document summarizes an Office 365 & SharePoint Connect 2018 presentation by Thomas Vochten on hybrid features. It provides an overview of hybrid capabilities like OneDrive, profiles, sites, and search. It covers the architecture and setup process, including creating a server-to-server trust with Azure Access Control Services. It also discusses troubleshooting tips, like ensuring proper licensing and identity synchronization. Hybrid features require different prerequisites and have limitations compared to on-premises versions.
About the Training
With the sheer number of electronic resources that the libraries are now subscribe to, acquiring accurate and timely usage statistics is crucial in providing data for collection management assessment and decision making process. NISO developed the SUSHI protocol that allow publishers to standardize their usage statistics into a common format as well as the delivery of that information. This protocol is designed to simplify and automate the harvesting of COUNTER usage reports from various electronic resources providers.
This is a guided, step-by-step session that follows the April 29 NISO Virtual Conference, Expanding the Assessment Toolbox: Blending the Old and New Assessment Practices. The presenter will teach you the practical implementation of harvesting your COUNTER reports using the SUSHI protocol. You will learn what it takes to ensure you will get the benefit of this system for your institution.
The 90-minute training session lead by Oliver Pesch, Chief Product Strategist and Senior Vice President, EBSCO Information Services will cover:
Quick overview of SUSHI and COUNTER
What do you need to harvest a report using SUSHI
What information do I need to harvest a report?
Where do I get the information?
What other steps might be needed to successfully harvest usage?
The results of the harvest is an XML file – now what?
Data analysis and interpretation.
Microsoft Flow allows users to automate tasks and workflows between various applications and services. It provides over 70 connectors and 400+ templates. Flow provides both a no-code and a code-based experience to build workflows visually. It offers various plans including a free tier and paid tiers starting at $5 per user per month. Flow integrates with other Microsoft products like PowerApps, Power BI, and Logic Apps to enable more complex automation and workflows.
Shailen Sukul is a senior SharePoint architect who works with latest web technologies and SharePoint. He specializes in SharePoint installation, configuration, development and training. In his personal projects he prefers AWS and ASP.Net MVC. He maintains several open source SharePoint projects on CodePlex. You can follow him on Twitter or check out his blog for more information.
Proof of Concept: Adobe Analytics Live Stream on Amazon Web ServicesYASH Technologies
YASH suggested using Amazon Web Services (AWS) to pull the data from the Adobe Analytics Live Stream server, as well as developing an auto refresh dashboard using Tableau.
Presentation from Software Architect 2014, covering modern cloud backends for mobile apps with a focus on Microsoft Azure Mobile Services and Facebook Parse.
Building Multi-tenant SaaS Applications using WSO2 Private PaaSSameera Jayasoma
WSO2 Private PaaS is a multi-tenant Platform as a Service that provides core services like multi-tenancy, logging, identity management, and analytics. It allows SaaS applications to fulfill requirements from both a consumer and provider perspective such as isolation, availability, scalability, personalization, and costs. Non-Carbon applications on WSO2 Private PaaS can achieve some level of multi-tenancy by maintaining separate instances for each tenant, while Carbon-based applications can leverage APIs for identity, security, caching, and retrieving tenant context. The document recommends using WSO2 Private PaaS to develop the survey application due to its support for multi-tenancy and other capabilities required of a
SPSHOU - Upgrading and Migrating to SharePoint 2016 like a ProBrian Culver
SharePoint Saturday Houston #SPSHOU
Level: 300
Track: Administrator, Development / SharePoint App
SharePoint 2016 is finally out and it brings tons of new features that continue to make SharePoint an amazing collaboration tool for companies. Many companies are still on SharePoint 2010, maybe even earlier versions. In this session, I discuss and show you the approach for upgrading and migrating to SharePoint 2016. Its time to get with the times and upgrade your farm. I will shares best practices and lots of tips as we upgrade our sample farm. I will include some troubleshooting and custom solutions based on real world scenarios to make sure this isn’t another “simple” upgrade. Best of all, we will have fun doing this.
Attendee Takeaways:
1. Learn how to upgrade to SharePoint 2016 from various SharePoint versions.
2. Learn best practices for upgrading smoothly and properly.
3. Learn some tips and tricks to making the upgrade faster, less error prone and efficient to reduce downtime.
4. Learn how to troubleshooting and deal with upgrade issues.
The document outlines a two-day workshop on web 2.0 technologies and applications from both a client and server perspective. Day one explores various web 2.0 sites and applications, underlying technologies, trends and tools for creating multimedia content. Day two focuses on server-side technologies including content management systems, databases, and hosting services. Participants are divided into groups and tasked with developing a learning program using an assigned web 2.0 technology.
This document discusses using an event-driven microservices architecture with messaging to build applications for the Utah Department of Alcohol Control. It outlines some issues with an initial REST-based approach, such as tight coupling and lack of scalability. The document then presents an alternative event-driven approach using messaging to decouple services and allow independent scaling. It highlights benefits like resilience and reduced network costs, as well as considerations for using an event-driven style.
Similar to Database Considerations for SaaS Products (20)
The document discusses securing WordPress sites from three perspectives: a user, system administrator, and developer. For users, it recommends choosing trusted plugins/themes, keeping everything updated, backups, strong passwords, and security plugins. For administrators, it recommends server configuration hardening like HTTPS, limiting permissions. For developers, it stresses sanitization, validation, escaping and secure coding practices. Responsible vulnerability disclosure is also covered.
Writing Clean, Standards Compliant, Testable Code for WordPressShawn Hooper
This talk, delivered at WordCamp Toronto 2016, explains the WordPress Coding Standards for HTML, CSS, PHP and JavaScript, and discusses best practices for writing code that is easy to read, test, and extend.
This document discusses creating multilingual WordPress sites. It defines internationalization and localization and explains how WordPress supports over 160 languages out of the box. However, plugins are needed to support displaying multiple languages on a single site. The document reviews popular multilingual plugins like WPML, qTranslateX, and Babble. It also discusses using a multisite network or translating themes and plugins. In the end, it encourages contributing translations to WordPress and plugins.
This document summarizes a presentation about securing WordPress sites. It discusses common attacks like SQL injection, cross-site scripting, and cross-site request forgery. It provides tips for preventing these attacks through input validation, sanitization, escaping output, and using nonces. The presentation also covers general WordPress security best practices like backups, updates, file permissions, strong credentials, and the principle of least privilege.
Manage WordPress From the Command Line with WP-CLIShawn Hooper
Slides from my presentation given at WordCamp Tampa 2015. Save time performing common WordPress installation and maintenance tasks with the WP-CLI library.
Hooked on WordPress: WordCamp ColumbusShawn Hooper
- The document is a presentation about WordPress hooks given by Shawn Hooper at WordCamp Columbus in July 2015.
- It introduces the two types of hooks in WordPress - actions, which are triggered during specific events, and filters, which modify data as it passes through functions.
- Examples are given of how to add, remove, and modify hooks through themes and plugins to extend WordPress functionality.
WP-CLI is a command line interface tool that allows users to manage WordPress from the command line. It is useful for developers, theme designers, and server administrators. To use WP-CLI, one needs SSH access and a "UNIX-like" environment like Linux, OSX, or Cygwin. Installing WP-CLI involves downloading the phar file, setting permissions, and moving it to a useful location like /usr/local/bin/wp. Common commands include installing and managing plugins, interacting with the database, searching and replacing content, generating test content, and more.
Time Code: Automating Tasks in WordPress with WP-CronShawn Hooper
This document discusses how to automate tasks in WordPress using WP-Cron. WP-Cron allows scheduling single events or recurring tasks similarly to the Unix Cron utility. It covers scheduling events, adding custom schedules, cancelling tasks, and looking up scheduled tasks. While WP-Cron works across operating systems, it only runs when a site is visited so alternative cron services may be necessary for high traffic sites.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
2. Blog - shawnhooper.ca
Twitter - @shawnhooper
Director of IT at
Actionable.co
Web Developer for the past 20 years
Happy to be visiting here from Ottawa
Hi, I’m Shawn
3. Blog - shawnhooper.ca
Twitter - @shawnhooper
Centrally Hosted
Subscription Basis
Usually Accessed Through a Web Browser
What is SaaS ?
4. Blog - shawnhooper.ca
Twitter - @shawnhooper
Learning & Development Platform (SaaS)
Team conversations, individually-relevant actions, peer accountability
and real-time, applicable business insights.
Sold and supported through a network of professional consultants.
Actionable Conversations
5. Blog - shawnhooper.ca
Twitter - @shawnhooper
* Team has an in-person conversation around a pain point
* Each participant creates a commitment
* Participants “check-in” (1-10) on how they’re feeling about that
commitment
* Assign an accountability buddy to encourage / keep them on track
* After a month the user, buddy, and manager “close the loop”.
* User, Manager and Consultant all get high-level insights.
Actionable Conversations
7. Blog - shawnhooper.ca
Twitter - @shawnhooper
Users need to be able to sign up for your service
without the need for your manual involvement.
If you had to manually configure each client, this wouldn’t
exactly be “on demand”.
Self-Service
8. Blog - shawnhooper.ca
Twitter - @shawnhooper
How does your database design handle tens, hundreds,
thousands, or millions (hey, I can dream!) of users?
Scalability
9. Blog - shawnhooper.ca
Twitter - @shawnhooper
What impact does your architecture selection have
on the complexity of your code?
(Application code, Database Queries, etc.)
Code Complexity
10. Blog - shawnhooper.ca
Twitter - @shawnhooper
“With Great Power Comes Great Responsibility.”
How does your database design impact data security ?
Security
11. Blog - shawnhooper.ca
Twitter - @shawnhooper
What impact does your architecture decision have on
your ability to make changes your application?
Extendability / Customization
17. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
Self-Service: Easy - Just Add Database Records
Multi-Tenancy Model
18. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
Self-Service: Easy - Just Add Database Records
Scalability: Limited by storage & system resources
Multi-Tenancy Model
19. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
Self-Service: Easy - Just Add Database Records
Scalability: Limited by storage & system resources
Code Complexity: Queries need to include client ID
Multi-Tenancy Model
20. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
Self-Service: Easy - Just Add Database Records
Scalability: Limited by storage & system resources
Code Complexity: Queries need to include client ID
Security Concerns: Poorly written queries, single point of data
breach.
Multi-Tenancy Model
21. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
Upgrades:
Easy! One copy of the database to perform migrations on.
Also means everyone gets upgraded at the same time.
Multi-Tenancy Model
22. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
Customization:
Extensions or custom features available to all clients.
Potential for more bugs to reach all users.
Multi-Tenancy Model
23. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
Data Storage:
All data lives in the same place.
This needs to be a consideration for where, geographically, you’ll
store your data.
Multi-Tenancy Model
24. Blog - shawnhooper.ca
Twitter - @shawnhooper
All Users/Clients Share One Database
“Oversight Accounts”:
For our resellers (consultants) and support staff, this model made it
easy to create dashboards that could look at the activity of many
tenants at the same time.
Multi-Tenancy Model
28. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Self-Service:
More difficult. Requires the system to be able to create a new
database schema or database when a user signs up for your service.
Single Tenant Model
29. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Scalability:
Imbalance of server resources
Some users taking up more than their “share”
Single Tenant Model
30. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Scalability:
This can be an advantage too. It gives you the ability to
move databases between servers to balance load.
You can even distribute based on geography for data storage.
Single Tenant Model
31. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Security:
Data Separation! Excellent!
Single Tenant Model
32. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Code Complexity:
No need to include Tenant ID in every query.
Instead, you need to manage connection strings.
Single Tenant Model
35. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Upgrades:
In this model, you could upgrade some tenants and not others to do
a controlled release.
Single Tenant Model
36. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Customizations:
You could fork and/or provide add-ons only available to some
tenants without an impact on other’s databases.
Single Tenant Model
37. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Data Migrations:
A benefit of this model is that you could easy backup/move one
tenant.
Example : Refresh Staging / Test Environment
Single Tenant Model
38. Blog - shawnhooper.ca
Twitter - @shawnhooper
Separate Database or Schema For Each Tenant
Oversight Accounts:
Not a great model for the “oversight accounts”.
Hard to build dashboards, aggregating data from
multiple databases.
Single Tenant Model
42. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
This is much closer to the multi-tenant model we first explored.
Micro Services Model
43. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
Self-Service:
You’re still just adding rows to tables, just in multiple databases.
Micro Services Model
44. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
Scalability:
Assign more/less resources to the services that need them the most.
Micro Services Model
45. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
Security:
You’ll be including the Tenant ID again.
However, less data is stored in each service, limiting
potential for loss in the event of a breach.
Micro Services Model
46. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
Code Complexity:
Multiple Database Connections to Maintain
(Multiple APIs too)
Micro Services Model
47. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
Code Complexity:
Lack of Referential Integrity between services.
Micro Services Model
48. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
Code Complexity:
Lots of traffic between services!
Micro Services Model
49. Blog - shawnhooper.ca
Twitter - @shawnhooper
Databases Separated by Function
Customization:
Bolting new features onto your application may be
adding a new micro-service.
Micro Services Model
50. Blog - shawnhooper.ca
Twitter - @shawnhooper
We looked at:
* Multi Tenancy
* Single Tenancy
* Micro Service
Models We’ll Look At
56. Blog - shawnhooper.ca
Twitter - @shawnhooper
Multi-Tenant Model
* Easy Scalability
* Support for Oversight Accounts (Consultants / Resellers )
* Allowed users to be part of multiple tenants with one account
Downside:
We had to pick one geography in which
to store data.
Actionable Conversations
57. Blog - shawnhooper.ca
Twitter - @shawnhooper
Micro-Services Model
One service to handle the “Common” parts of the system:
User Accounts
Partner Profiles (Consultants)
Wholesale Pricing and Sales
Lists - ex: countries, industries, etc.
Actionable Conversations
58. Blog - shawnhooper.ca
Twitter - @shawnhooper
Micro-Services Model
One service to handle the “Tenants” parts of the system:
Memberships
Conversations Run
Feedback & Check-Ins
Credit Usage / Purchase History
Actionable Conversations
59. Blog - shawnhooper.ca
Twitter - @shawnhooper
Micro-Services Model
One service to handle the “Notifications” parts of the system:
E-Mail & SMS Message Schedules, Queues and Logs
Actionable Conversations
60. Blog - shawnhooper.ca
Twitter - @shawnhooper
Micro-Services Model
One service to handle the “Content” parts of the system:
Why re-invent the wheel?
We used WordPress, connected with a REST API.
Actionable Conversations
61. Blog - shawnhooper.ca
Twitter - @shawnhooper
Hosting
RDS Instance with Amazon Web Services.
Allowed for scaling as the platform grows.
Actionable Conversations
62. Blog - shawnhooper.ca
Twitter - @shawnhooper
API
We built the application using API First methodology
using the Loopback Framework & Strongloop.
Actionable Conversations
64. Blog - shawnhooper.ca
Twitter - @shawnhooper
A new platform that allowed clients to
use the “Actionable” method to deliver
their own onboarding programs.
Duplicates the application & database
using the same Multi-Tenant Model
with only one tenant in it.
Actionable Training
66. Blog - shawnhooper.ca
Twitter - @shawnhooper
shawn@actionable.co
Slides will be available shortly
at
shawnhooper.ca
Questions? Tweet @shawnhooper
Thank You!