This talk is specifically for NON-SharePoint infrastructure administrators (or for new ones still figuring things out)! Instead it’s for the rest of the SharePoint team – come learn about the basic building blocks of SharePoint infrastructure – things like DNS, load balancing, AD, high availability and disaster recovery, backup options, database options, and some of the core components of Windows in an understandable way so you can speak the lingo and seem really smart!
Zvonimir Mavretić
Speaker: Igor Pavleković;
Products included in Office 365 are due to be released to the market with new version number. In this session participants will be introduced into new features and highlights included in new versions of Exchange, Lync and Sharepoint bundled into Microsoft’s cloud environment named Office 365.
Developing Search-driven application in SharePoint 2013 SPC Adriatics
Search-driven solutions are applications that use a search engine to drive the data access and present results. Microsoft SharePoint 2013 offers developers new ways to extend search to create search-based solutions and Apps. Using Search applications, developers can unite and control data from different site collections and external locations. In this session, I will cover all different ways of querying SharePoint 2013 Search including Client-Side Object Model (CSOM) and REST API. The main goal of the session is to provide strong understanding of search-driven solutions for the attendees and encourage many new ideas for using search to deliver end-user productivity.
Darko Milevski
ECS2019 - Managing Content Types in the Modern WorldMarc D Anderson
When the order of the day was huge, pyramid-shaped Site Collections for capabilities like Intranets, managing your Content Types was relatively easy: any Site Columns and Content Types you built in the root site were available throughout the Site Collection. When we needed more enterprise-wide information architecture, we turned to the Content Type Hub. In our new, flatter world, we need to think about information architecture differently – while hanging onto the better practices of the past.
14 Tips for Planning ECM Content Migration to SharePointJoel Oleson
• Is your organization using any Enterprise Content Management systems besides SharePoint?
• Has your current ECM system been deprecated or require an expensive annual maintenance contract?
• Does your firm already use Microsoft SharePoint as an intranet/collaboration portal?
• Would you like to leverage the cutting edge ECM and taxonomy features in SharePoint 2010 or 2013?
If so, it may be time to migrate your scanned and other transactional documents from your legacy ECM system to SharePoint, and take advantage of innovative ECM and taxonomy features available in this powerful platform.
Top industry experts and influencers Joel Oleson and Tom Castiglia from Hershey Technologies will explain best practices to plan and implement a successful ECM content migration to Microsoft SharePoint. Join us on June 4th to learn about:
• Using ECM and taxonomy related features in SharePoint 2010 and 2013
• Reasons to migrate content to SharePoint (as well as reasons not to migrate!)
• Best practices for ECM architecture in SharePoint including security, taxonomy and governance
• 14 specific tips for planning your migration from any ECM system to SharePoint
Design a share point 2013 architecture – the basicsAlexander Meijers
session walks you through the necessary steps to design a SharePoint 2013 architecture. It explains what information is needed to actually design such an architecture and discusses the many things you need to know to make the right decisions. It helps you to design a small, medium or large SharePoint farm for your customers
Speaker: Igor Pavleković;
Products included in Office 365 are due to be released to the market with new version number. In this session participants will be introduced into new features and highlights included in new versions of Exchange, Lync and Sharepoint bundled into Microsoft’s cloud environment named Office 365.
Developing Search-driven application in SharePoint 2013 SPC Adriatics
Search-driven solutions are applications that use a search engine to drive the data access and present results. Microsoft SharePoint 2013 offers developers new ways to extend search to create search-based solutions and Apps. Using Search applications, developers can unite and control data from different site collections and external locations. In this session, I will cover all different ways of querying SharePoint 2013 Search including Client-Side Object Model (CSOM) and REST API. The main goal of the session is to provide strong understanding of search-driven solutions for the attendees and encourage many new ideas for using search to deliver end-user productivity.
Darko Milevski
ECS2019 - Managing Content Types in the Modern WorldMarc D Anderson
When the order of the day was huge, pyramid-shaped Site Collections for capabilities like Intranets, managing your Content Types was relatively easy: any Site Columns and Content Types you built in the root site were available throughout the Site Collection. When we needed more enterprise-wide information architecture, we turned to the Content Type Hub. In our new, flatter world, we need to think about information architecture differently – while hanging onto the better practices of the past.
14 Tips for Planning ECM Content Migration to SharePointJoel Oleson
• Is your organization using any Enterprise Content Management systems besides SharePoint?
• Has your current ECM system been deprecated or require an expensive annual maintenance contract?
• Does your firm already use Microsoft SharePoint as an intranet/collaboration portal?
• Would you like to leverage the cutting edge ECM and taxonomy features in SharePoint 2010 or 2013?
If so, it may be time to migrate your scanned and other transactional documents from your legacy ECM system to SharePoint, and take advantage of innovative ECM and taxonomy features available in this powerful platform.
Top industry experts and influencers Joel Oleson and Tom Castiglia from Hershey Technologies will explain best practices to plan and implement a successful ECM content migration to Microsoft SharePoint. Join us on June 4th to learn about:
• Using ECM and taxonomy related features in SharePoint 2010 and 2013
• Reasons to migrate content to SharePoint (as well as reasons not to migrate!)
• Best practices for ECM architecture in SharePoint including security, taxonomy and governance
• 14 specific tips for planning your migration from any ECM system to SharePoint
Design a share point 2013 architecture – the basicsAlexander Meijers
session walks you through the necessary steps to design a SharePoint 2013 architecture. It explains what information is needed to actually design such an architecture and discusses the many things you need to know to make the right decisions. It helps you to design a small, medium or large SharePoint farm for your customers
Leveraging microsoft’s e discovery platform in your organizationDon Donais
Statistics around eDiscovery implementations are staggering: 90% of US companies are engaged in some sort of litigation with an average eDiscovery case costing around $1 million. Organizations can leverage their Microsoft investment without having to purchase expensive add-ons. This session will look at how to configure and use the Microsoft eDiscovery platform.
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013K.Mohamed Faizal
Come and understand different type of SharePoint Topologies and learn how to design for SharePoint architecture that serve for Intranet, Websites, Office Web Apps Server, App management, wide-area networks, monitoring, newsfeeds, distributed cache, high availability, and disaster recovery.
SharePoint Conference 2011 was the only official Microsoft Conference in North America this year to feature experts from Microsoft and around the world.
This fall a panel of C/D/H consultants, just back from SPC, hit the highlights and answered questions about important topics, like cloud services, best practices, adoption, SharePoint for internet sites, and of course, news about upcoming features and releases!
Whether you missed SPC or attended and just just want to find out more, view our slide deck.
And for more on this and other topics, visit our blog at www.cdhtalkstech.com.
Enterprise content management overview in SharePoint 2013SPC Adriatics
Speaker: Zlatan Džinić; ECM has played a central role in Microsoft’s Business Productivity infrastructure (as part of the Unified Business Platform along with Unified Communications, Business Intelligence, Collaboration and Enterprise Search). The promise that SharePoint has delivered over the years has been about bringing ECM to the masses, or bringing organizational content to everyone. In this session we will take a look at the SharePoint’s ECM offering focusing on advancements in SharePoint 2013 on how to create, control and protect the information in your organization with this next generation platform.
Learn about the various SharePoint 2013 APIs, CSOM, SOM, OData/REST and WCF Data Services, and how to call them from your web applications, line-of-business systems, and back-end services, to leverage all the power of SharePoint 2013 without having to target and deploy code into SharePoint 2013.
The curse of Project is that it’s functionalities seem intuitive and we believe we know what they mean and how to use them implicitly. Yet, although logical when you know them, Project features are numerous and quite a few are complex. In addition, almost all Project/Project Server features require that you follow at least some procedure to be able to use them effectively. The curse ends with many people running Project/Project Server at least once, some using it for basic initial schedule development and a very few using it in the full capability. Being human, we tend to blame it on the tool so – it must be a bug!
The goal of this presentation is to alter the negative usage statistics for Project – at least for those of you who will attend! We will identify five simple but key areas; technical or procedural – that are typically misused or are not used at all due to the misconception. For each of those we will shortly show what exactly is a problem and propose the solution. Among the five areas, we will be discussing effects of dynamic scheduling, options for re-planning, options for automatic resource scheduling (or lack of those) and options for tracking and reporting on task progress.
This session is for everyone who uses Project (with or without the server component) or needs to support others using Project in their organizations. Those of you who have conceptual complaints about some Project/Project Server features are welcome to share them (I cannot promise to answer them but I will for sure use them in consecutive presentations).
Search-driven solutions are applications that use a search engine to drive the data access and present results. Microsoft SharePoint 2013 offers developers new ways to extend search to create search-based solutions and Apps. Using Search applications, developers can unite and control data from different site collections and external locations. In this session, I will cover all different ways of querying SharePoint 2013 Search including Client-Side Object Model (CSOM) and REST API. The main goal of the session is to provide strong understanding of search-driven solutions for the attendees and encourage many new ideas for using search to deliver end-user productivity.
Leveraging microsoft’s e discovery platform in your organizationDon Donais
Statistics around eDiscovery implementations are staggering: 90% of US companies are engaged in some sort of litigation with an average eDiscovery case costing around $1 million. Organizations can leverage their Microsoft investment without having to purchase expensive add-ons. This session will look at how to configure and use the Microsoft eDiscovery platform.
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013K.Mohamed Faizal
Come and understand different type of SharePoint Topologies and learn how to design for SharePoint architecture that serve for Intranet, Websites, Office Web Apps Server, App management, wide-area networks, monitoring, newsfeeds, distributed cache, high availability, and disaster recovery.
SharePoint Conference 2011 was the only official Microsoft Conference in North America this year to feature experts from Microsoft and around the world.
This fall a panel of C/D/H consultants, just back from SPC, hit the highlights and answered questions about important topics, like cloud services, best practices, adoption, SharePoint for internet sites, and of course, news about upcoming features and releases!
Whether you missed SPC or attended and just just want to find out more, view our slide deck.
And for more on this and other topics, visit our blog at www.cdhtalkstech.com.
Enterprise content management overview in SharePoint 2013SPC Adriatics
Speaker: Zlatan Džinić; ECM has played a central role in Microsoft’s Business Productivity infrastructure (as part of the Unified Business Platform along with Unified Communications, Business Intelligence, Collaboration and Enterprise Search). The promise that SharePoint has delivered over the years has been about bringing ECM to the masses, or bringing organizational content to everyone. In this session we will take a look at the SharePoint’s ECM offering focusing on advancements in SharePoint 2013 on how to create, control and protect the information in your organization with this next generation platform.
Learn about the various SharePoint 2013 APIs, CSOM, SOM, OData/REST and WCF Data Services, and how to call them from your web applications, line-of-business systems, and back-end services, to leverage all the power of SharePoint 2013 without having to target and deploy code into SharePoint 2013.
The curse of Project is that it’s functionalities seem intuitive and we believe we know what they mean and how to use them implicitly. Yet, although logical when you know them, Project features are numerous and quite a few are complex. In addition, almost all Project/Project Server features require that you follow at least some procedure to be able to use them effectively. The curse ends with many people running Project/Project Server at least once, some using it for basic initial schedule development and a very few using it in the full capability. Being human, we tend to blame it on the tool so – it must be a bug!
The goal of this presentation is to alter the negative usage statistics for Project – at least for those of you who will attend! We will identify five simple but key areas; technical or procedural – that are typically misused or are not used at all due to the misconception. For each of those we will shortly show what exactly is a problem and propose the solution. Among the five areas, we will be discussing effects of dynamic scheduling, options for re-planning, options for automatic resource scheduling (or lack of those) and options for tracking and reporting on task progress.
This session is for everyone who uses Project (with or without the server component) or needs to support others using Project in their organizations. Those of you who have conceptual complaints about some Project/Project Server features are welcome to share them (I cannot promise to answer them but I will for sure use them in consecutive presentations).
Search-driven solutions are applications that use a search engine to drive the data access and present results. Microsoft SharePoint 2013 offers developers new ways to extend search to create search-based solutions and Apps. Using Search applications, developers can unite and control data from different site collections and external locations. In this session, I will cover all different ways of querying SharePoint 2013 Search including Client-Side Object Model (CSOM) and REST API. The main goal of the session is to provide strong understanding of search-driven solutions for the attendees and encourage many new ideas for using search to deliver end-user productivity.
Project Server: Who can benefit from it and how?SPC Adriatics
Strict quantification of value provided by some software solution is very difficult. That’s especially true in the case of software which is supposed to increase value of project management discipline whose benefits are itself difficult to quantify. Difficulty to quantify doesn’t imply that such value doesn’t exist. It only means that we need to add an extra effort to recognize it.
The purpose of this presentation is to make that extra effort and, by examining different attributes like; industry, character and size of projects, maturity of the organization – recognize patterns that lead to value realization. The key Project Server capabilities will be discussed in context of how they provide value in specific usage scenarios.
As always, realized value have to be contrasted with required investment so we will estimate the cost of EPM implementation in on-premise and cloud model.
The target audience for the presentation are all of you who believe that projects could and should be better managed in your organizations, and you have a vote on decision on using software for such an improvement.
Igor Slišković
Nintex and Office 365: Workflow solutions that take full advantage of mobile,...SPC Adriatics
Nintex Workflow for Office 365 and Nintex Forms for Office 365 were born in the cloud to create best-of-breed experiences for automating business processes in Office 365. This session will show how users can build solutions quickly and easily and how professionals can connect them to a world of on-premise data and cloud services like Yammer, SkyDrive, Azure, Twitter, Bing, Google, and much more. For those interested in how real-world, commercial-grade, provider-hosted apps can be created for Office 365, this session will also walk through how the products work.
Working with site policies in SharePoint 2013 - Dragan PanjkovSPC Adriatics
Similar to lists and content types in previous SharePoint versions, with SharePoint 2013 it is possible to set and enforce retention rules to entire SharePoint site collections. In this session we will describe what are site retention policies, what we need to set up in order to be able to define and apply site retention policies, and how to work with site retention from code.
The improvements made to managed metadata services, managed navigation, search and the new content by search web part and product catalog provide new ways for building internet and even intranet sites. In this session we’ll show you how and what this means to your information infrastructure.
Daniel Wessels
Don't be deceived by the simplified experience of managing SharePoint permissions! What appears to be harmless could tailspin to a giant mess, requiring massive cleanup. This presentation walks through real-world scenarios and pitfalls of permissions administrations, so you could learn from the mistakes of others and not end up digging yourself into a SharePoint permissions hole.
View a recording of the session here: https://www.youtube.com/watch?v=Poh4zxHTNvw
The Domain Name System (DNS) is a critical part of Internet infrastructure and the largest distributed Internet directory service. DNS translates names to IP addresses, a required process for web navigation, email delivery, and other Internet functions. However, the DNS infrastructure is not secure enough unless the security mechanisms such as Transaction Signatures (TSIG) and DNS Security Extensions (DNSSEC) are implemented. To guarantee the availability and the secure Internet services, it is important for networking professionals to understand DNS concepts, DNS Security, configurations, and operations.
This course will discuss the concept of DNS Operations in detail, mechanisms to authenticate the communication between DNS Servers, mechanisms to establish authenticity, and integrity of DNS data and mechanisms to delegate trust to public keys of third parties. Participant will be involved in Lab exercises and do configurations based on number of scenarios.
Let's Encrypt is a free, automated and open Certificate Authority to encourage the adoption of encrypted Internet connections. The inherent weakness of using third party CAs though, is they're able to issue certificates for any name or organisation. DANE is a protocol that allows certificates to be cryptographically bound to DNS names using DNSSEC, and this presentation also outlines how Let's Encrypt was tested with DANE records.
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
OSI: is a layered, abstract representation created as a guideline for network protocol design. Application Layer, provides human interface to the network.
Differnces between the function of OSI application, presentation and session layers.
The two forms of software programs that provide access to the network which are network-aware applications and application layer services.
The difference between applications, services and protocols.
Client Server Model.
Peer-to-Peer (P2P) Networking and Applications.
Application layer Protocols and Port numbers, ex. DNS - TCP/UDP Port 53, FTP - TCP Ports 20 and 21 and SMTP - TCP Port 25.
Root DNS Servers and TLD Servers.
Different Application layer protocols such as HTTP, HTTPS, FTP, Telnet, SSH, DHCP, DNS, SMTP, POP3, SMB and Gnutella Protocol
This presentation is intended to provide an overview of vulnerabilities and attack techniques that are popular in penetration testing at the moment. This talk includes real-world examples of attacks that they use on a daily basis, and some reflections on what techniques have changed over the last year. Vulnerabilities related to the application, network, and server layers will all be covered along with current anti-virus bypass and privilege escalation techniques used by attackers and penetration testers. This presentation should be interesting to security professionals and system administrators looking for more insight into real world attacks.
More security blogs by the authors can be found @
https://www.netspi.com/blog/
Carlos García - Pentesting Active Directory [rooted2018]RootedCON
Introducción a las pruebas de intrusión en entornos Microsoft Active Directory en forma de ponencia práctica para auditores o personas interesadas en el pentesting en entornos corporativos. Se dará una breve introducción al servicio de directorio Active Directory y sus componentes más críticos desde el punto de vista de la seguridad.Posteriormente, se explicarán las principales diferencias con respecto a un pentesting clásico de infraestructura, así como las técnicas y ataques más comunes para llevar a cabo el ejercicio y comprometer completamente el dominio corporativo.Requisitos: Se recomienda que los asistentes tengan conocimientos básicos de Active Directory y básicos/medios de pentesting o hacking ético, preferiblemente en infraestructuras y/o Sistemas Operativos.
Practical Red Teaming is a hands-on class designed to teach participants with various techniques and tools for performing red teaming attacks. The goal of the training is to give a red teamer’s perspective to participants who want to go beyond VAPT. This intense course immerses students in a simulated enterprise environment, with multiple domains, up-to-date and patched operating systems. We will cover several phases of a Red Team engagement in depth – Local Privilege escalation, Domain Enumeration, Admin Recon, Lateral movement, Domain Admin privileges etc.
If you want to learn how to perform Red Team operations, sharpen your red teaming skillset, or understand how to defend against modern attacks, Practical Red Teaming is the course for you.
Topics :
• Red Team philosophy/overview
• Red Teaming vs Penetration Testing
• Active Directory Fundamentals – Forests, Domains, OU’s etc
• Assume Breach Methodology
• Insider Attack Simulation
• Introduction to PowerShell
• Initial access methods
• Privilege escalation methods through abuse of misconfigurations
• Domain Enumeration
• Lateral Movement and Pivoting
• Single sign-on in Active Directory
• Abusing built-in functionality for code execution
• Credential Replay
• Domain privileges abuse
• Dumping System and Domain Secrets
• Kerberos – Basics and its Fundamentals
• Kerberos Attack and Defense (Kerberoasting, Silver ticket, Golden ticket attack etc)
https://bsidessg.org/schedule/2019-ajaychoudhary-and-niteshmalviya/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Assure Contact Center Experiences for Your Customers With ThousandEyes
Demystifying SharePoint Infrastructure – for NON-IT People
1. SHAREPOINT AND PROJECT CONFERENCE ADRIATICS 2013
ZAGREB, NOVEMBER 27-28 2013
Demystifying SharePoint
Infrastructure – for NON-IT People
ZVONIMIR MAVRETIĆ, EVISION / K2 ADRIATICS
3. SharePoint infrastructure
• Lot of acronyms:
• TCP/IP - Transmission Control Protocol/Internet Protocol
• DNS - Domain Name System
• HTTP - Hypertext Transfer Protocol
• TLS/SSL - Transport Layer Security/Secure Sockets Layer
• CA & PKI – Certificate Authority and Public Key Infrastructure
• SMTP – Simple Mail Transfer Protocols
• LDAP - Lightweight Directory Access Protocol
• AD – Active Directory
• HA & DR – High Availability and Disaster Recovery
• NLB – Network Load Balancing
• …
4. TCP/IP - Transmission Control Protocol/Internet Protocol
• The Internet protocol suite is the networking model and a set of
communications protocols used for the Internet and similar
networks.
• It is commonly known as TCP/IP, because its most important
protocols, the Transmission Control Protocol (TCP) and the
Internet Protocol (IP), were the first networking protocols defined
in this standard.
• It is occasionally known as the DoD model, because the
development of the networking model was funded by DARPA, an
agency of the United States Department of Defense.
Source: http://en.wikipedia.org/wiki/Internet_protocol_suite
5. DNS – Simple explanation
• Servers on the Internet have IP Addresses, like a telephone
number.
• A Domain Name (like evision.hr, twitter.com, or microsoft.com) is a
name badge on the Internet.
• DNS (domain name system) service is the Internet’s Telephone
Book.
• If you have someone’s name, you can look up their phone
number.
• DNS maps domain names to IP addresses and other pieces of
network data to get you to the right place.
6. DNS - Domain Naming System
• Provides resolution of names to IP addresses and resolution of IP
addresses to names
• Forward lookup - Requests name-to-address resolution
• Reverse lookup - Requests address-to-name resolution
• Client/Server system
• Name Servers - contain information about some segments of the
database
• Resolvers - create queries and send them across the network to a name
server
• FQDN
• Fully Qualified Domain Name
• Identifies a host’s name within the DNS namespace hierarchy
• Host name plus DNS domain name = FQDN
7. Subdomain
Second-Level Domain - Domain
Top-Level Domain TLD
Root .
.com
microsoft.com
www.microsoft.com …
k2.com
www.k2.com help.k2.com
.org … .hr
evision.hr
www.evision.hr
DNS Namespace
• Defines a hierarchical namespace where each level of the
namespace is separated by a “.”
8. How DNS Works
Preferred DNS Server: 10.1.1.1
10.1.1.1 Root Server
http://server1.microsoft.com
Recursive Query: server1.microsoft.com.
Is name in cache?
No
Am I authoritative?
No
Root Hints:
b.root-servers.net [128.9.0.107]
j.root-servers.net [198.41.0.10]
k.root-servers.net [193.0.14.129]
l.root-servers.net [198.32.64.12]
m.root-servers.net [202.12.27.33]
i.root-servers.net [192.36.148.17]
e.root-servers.net [192.203.230.10]
d.root-servers.net [128.8.10.90]
a.root-servers.net [198.41.0.4]
h.root-servers.net [128.63.2.53]
c.root-servers.net [192.33.4.12]
g.root-servers.net [192.112.36.4]
f.root-servers.net [192.5.5.241]
Iterative Query: server1.microsoft.com.
To: Root Servers
Is name in cache?
No
Am I authoritative?
Delegation:
.com. =
a.gtld-servers.net [192.5.6.30]
g-gtld-servers.net [192.42.93.30]
c.gtld-servers.net [192.26.92.30]
i.gtld-servers.net [192.36.144.133]
b.gtld-servers.net [203.181.106.5]
d.gtld-servers.net [192.31.80.30]
l.gtld-servers.net [192.41.162.30]
f.gtld-servers.net [192.35.51.30]
j.gtld-servers.net [210.132.100.101]
k.gtld-servers.net [213.177.194.5]
e.gtld-servers.net [192.12.94.30]
m.gtld-servers.net [202.153.114.101]
I don’t know. Ask:
a.gtld-servers.net [192.5.6.30]
g-gtld-servers.net [192.42.93.30]
c.gtld-servers.net [192.26.92.30]
i.gtld-servers.net [192.36.144.133]
b.gtld-servers.net [203.181.106.5]
d.gtld-servers.net [192.31.80.30]
l.gtld-servers.net [192.41.162.30]
f.gtld-servers.net [192.35.51.30]
j.gtld-servers.net [210.132.100.101]
k.gtld-servers.net [213.177.194.5]
e.gtld-servers.net [192.12.94.30]
m.gtld-servers.net [202.153.114.101]
Cache response
TLD Server
Is name in cache?
No
Am I authoritative?
Delegation:
microsoft.com. =
dns2.cp.msft.net [207.46.138.21]
dns1.cp.msft.net [207.46.138.20]
dns1.tk.msft.net [207.46.232.37]
dns2.tk.msft.net [207.46.232.38]
dns3.uk.msft.net [213.199.144.151]
dns4.uk.msft.net [213.199.144.152]
dns3.jp.msft.net [207.46.72.123]
dns4.jp.msft.net [207.46.72.124]
dns1.dc.msft.net [207.68.128.151]
dns2.dc.msft.net [207.68.128.152]
dns1.sj.msft.net [207.46.97.11]
I don’t know. Ask:
dns2.cp.msft.net [207.46.138.21]
dns1.cp.msft.net [207.46.138.20]
dns1.tk.msft.net [207.46.232.37]
dns2.tk.msft.net [207.46.232.38]
dns3.uk.msft.net [213.199.144.151]
dns4.uk.msft.net [213.199.144.152]
dns3.jp.msft.net [207.46.72.123]
dns4.jp.msft.net [207.46.72.124]
dns1.dc.msft.net [207.68.128.151]
dns2.dc.msft.net [207.68.128.152]
dns1.sj.msft.net [207.46.97.11]
microsoft.com
DNS Servers
Is name in cache?
No
Am I authoritative?
Yes
server1.microsoft.com=192.168.7.99
Cache response
http/tcp session- 192.168.7.99
192.168.7.99
10.1.1.1 Root Server
TLD Server
microsoft.com
DNS Servers
192.168.7.99
http://server1.microsoft.com
server1.microsoft.com=192.168.7.99
http/tcp session- 192.168.7.99
Recursive Query: server1.microsoft.com.
9. DNS - Popular Record Types
• Address Records / Host (A or AAAA)
• points names to IPv4 (A) or IPv6 (AAAA) addresses
• ex. www.evision.hr is at 141.138.14.171
• Canonical Name / Alias (CNAME)
• points one name to another
• intranet.evision.hr is an alias for www.evision.hr
• Mail Exchanger Records (MX)
• points email to an inbound email server
• mail.evision.hr handles mail for evision.hr
• Pointer Records (PTR)
• points address to name
• 141.138.14.171 is the address for www.evision.hr
10. HTTP - Hypertext Transfer Protocol
• Hypertext is structured text that uses logical links (hyperlinks)
between nodes containing text. HTTP is the protocol to exchange
or transfer hypertext.
Source: http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol
Client request Server response
11. TLS/SSL - Transport Layer Security/Secure Sockets Layer
• Transport Layer Security (TLS) and its predecessor, Secure Sockets
Layer (SSL), are cryptographic protocols which are designed to
provide communication security over the Internet.
• X.509 certificates and asymmetric cryptography are used verify
counterparty to exchange a symmetric key.
• Symmetric session key is used to encrypt data between the
parties.
• Certificate authorities and a public key infrastructure are needed
to verify the relation between a certificate and its owner, as well as
to generate, sign, and administer the validity of certificates
Source: http://en.wikipedia.org/wiki/Transport_Layer_Security
12. CA & PKI - Certificate Authority and Public Key Infrastructure
• Certificate authority or certification authority (CA), is an entity that
issues digital certificates.
• Digital certificate certifies the ownership of a public key by the named
subject of the certificate.
• CA is a trusted third party that is trusted by both the subject (owner) of
the certificate and the party relying upon the certificate.
• Commercial CA issues certificates automatically trusted by most web browsers – VeriSign,
GeoTrust, Thawte Digital Certificates, Entrust.net,…
• Internal CA issues certificates trusted only on managed devices - manually or through policy
deployed root CA certificates as trusted
• A public-key infrastructure (PKI) is a set of hardware, software, people,
policies, and procedures needed to create, manage, distribute, use,
store, and revoke digital certificates
Source: http://en.wikipedia.org/wiki/Certificate_authority and http://en.wikipedia.org/wiki/Public_key_infrastructure
13. SMTP – Simple Mail Transfer Protocols
• Simple Mail Transfer Protocol (SMTP) is an Internet standard for
electronic mail (e-mail) transmission across Internet Protocol (IP)
networks
• SMTP uses TCP port 25. SMTP connections secured by SSL are known
by SMTPS on TCP port 465
• Electronic mail servers and other mail transfer agents use SMTP to
send and receive mail messages
• User-level client mail applications to access their mail box accounts on
a mail server usually use some of this:
• SMTP for sending, Post Office Protocol (POP) or the Internet Message Access
Protocol (IMAP) for retrieving
• Exchange ActiveSync or Exchange Messaging Application Programming
Interface (MAPI)
Source: http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol
14. LDAP - Lightweight Directory Access Protocol
• The Lightweight Directory Access Protocol (LDAP) is an
application protocol for accessing and maintaining distributed
directory information services over an Internet Protocol (IP)
network.
• Directory services may provide any organized set of records, often
with a hierarchical structure, such as a corporate email directory.
• A common usage of LDAP is to provide a "single sign-on" where
one password for a user is shared between many services, such as
applying a company login code to web pages (so that staff log in
only once to company computers, and then are automatically
logged into the company intranet).
Source: http://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol
15. AD – Active Directory
• Microsoft implementation of directory services
• Provides a centralized location to store information in a
distributed environment about networked devices and services
and the people who use them.
• Implements the services that make this information available to
users, computers, and applications.
• Acts both as a database storage system (directory store) and a set
of services that provide the means to securely add, modify, delete,
and locate data in the directory store
• Lightweight Access Directory Protocol (LDAP) is the primary
access protocol for Active Directory.
16. Some Active Directory Terminology
• Forest – A collection of one or more trees of domains, organized as
peers and connected by two-way transitive trusts. The forest holds one
or more trees.
• Trees - A tree holds one or more Domain and domain trees, linked in a
hierarchy.
• Domains – A directory-based container object containing a hierarchical
structure of other containers and objects. Domains can be joined into
trees of domains
• Domain Controllers – Stores a physical Copy of the Active Directory
Database and runs logon services
• Kerberos - authentication protocol which works on the basis of 'tickets'
to allow nodes communicating over a non-secure network to prove
their identity to one another in a secure manner.
17. HA & DR – High Availability and Disaster Recovery
High Availability is for: Disaster Recovery is for:
Photo licensed with Creative Commons, used from:
http://www.flickr.com/photos/melancon/280076809/
Photo licensed with Creative Commons, used from:
http://www.flickr.com/photos/meltedplastic/2854777253/
18. HA & DR – High Availability and Disaster Recovery
High Availability is for:
• Clustering
• Synchronous Mirroring
• Replication
• AlwaysOn Availability Groups in
SQL 2012
Disaster Recovery is for:
• Replication
• Asynchronous Mirroring
• Log Shipping
• SAN Replication
• Virtualization Replication
• Geo-distributed clustering in
SQL 2012
• AlwaysOn Availability Groups in
SQL 2012
Photo licensed with Creative Commons, used from:
http://www.flickr.com/photos/melancon/280076809/
Photo licensed with Creative Commons, used from:
http://www.flickr.com/photos/meltedplastic/2854777253/
27. NLB – Network Load Balancing
• Load balancing is a technique to spread work between many computers,
processes, disks or other resources in order to get optimal resource
utilization and decrease computing time.
• A load balancer can be used to increase the capacity of a server farm beyond
that of a single server.
• It can also allow the service to continue even in the face of server down time
due to server failure or server maintenance.
• A load balancer consists of a virtual server which, in turn, consists of an IP
address and port.
• Virtual server is bound to a number of physical services running on the
physical servers in a server farm.
• A client sends a request to the virtual server, which in turn selects a physical
server in the server farm and directs this request to the selected physical
server.
This talk is specifically for NON-SharePoint infrastructure administrators (or for new ones still figuring things out)! Instead it’s for the rest of the SharePoint team – come learn about the basic building blocks of SharePoint infrastructure – things like DNS, load balancing, AD, high availability and disaster recovery, backup options, database options, and some of the core components of Windows in an understandable way so you can speak the lingo and seem really smart!
Identical (or nearly)hardware requiredMust be geographically next to each other right nowOnly one disk – so when data is deleted, it’s deleted instantlyPay attention to hardware compatibilityVirtual clusters may work, may notClustering + Mirroring = Hotness
Two separate servers, with two independent sets of disksTransactions are committed at both servers before the result is returned to the clientMachines must be very close to each other, like in the same stateFailovers are done at the individual database levelDoesn’t include anything that’s not inside the database, like logins and jobsBe wary of accidental failoversBe wary of single-db failoversBe wary of index maintenance jobsMonitor performance closely
Can use 2-way replication or p2p replication to get high availabilityCan be DR since you can have replication partners far apartLot more work and management involvedNot a set-it-and-forget it solutionBe wary of schema changesNot all 3rd party apps support itCan be bandwidth-intensiveCan fall behindNeed a good monitoring solution
Same as our synchronous mirroring slide, but the servers can be a long way from each other
Still need regular backup strategyRun one server “behind” for restoresCompressed backups reduce storage and bandwidth problemsMonitor what’s happening
It’s complicated.It’s expensive.It requires full time dedicated management staff.Learn it once, and it works for all of your applications AND all of your OS’s.
Picture is from NetApp, but the same concept applies across multiple vendorsOnly works for virtualized gear