Exceptional Technology Solutions (ETS) is a full-service IT solutions company that employs certified engineers and technicians. ETS offers a range of managed IT services including backup and disaster recovery, security, desktop, mail, and server solutions. ETS also provides professional services such as onsite support, project management, CTO services, equipment repair, and installations.
Simplifying SDN Networking Across Private and Public Clouds5nine
This presentation everything you need to know about SDN architectures including the following topics:
- 5 Essential Elements of SDN architectures
- 6 Business benefits of software-defined network solutions
- Why software-defined networking is the future of legacy data centers
**Originally published here: https://info.5nine.com/webinar-sdn-management-and-security-best-practices
In this webinar, alarming experts from Inductive Automation will dive into the best practices of alarm management to help you improve the safety of your industrial system and reduce catastrophic downtime incidents. No matter which industry you work in, these time-tested principles will help you get the most out of your SCADA alarming system.
Watch this webinar to learn more about:
What alarms should and shouldn’t be used for
- Prioritizing your alarms
- Getting nuisance alarms under control
- How to reduce alarm floods
- How to easily set up complex alarming systems and remote alarms
- And more
Simplifying SDN Networking Across Private and Public Clouds5nine
This presentation everything you need to know about SDN architectures including the following topics:
- 5 Essential Elements of SDN architectures
- 6 Business benefits of software-defined network solutions
- Why software-defined networking is the future of legacy data centers
**Originally published here: https://info.5nine.com/webinar-sdn-management-and-security-best-practices
In this webinar, alarming experts from Inductive Automation will dive into the best practices of alarm management to help you improve the safety of your industrial system and reduce catastrophic downtime incidents. No matter which industry you work in, these time-tested principles will help you get the most out of your SCADA alarming system.
Watch this webinar to learn more about:
What alarms should and shouldn’t be used for
- Prioritizing your alarms
- Getting nuisance alarms under control
- How to reduce alarm floods
- How to easily set up complex alarming systems and remote alarms
- And more
Inductive Automation’s Co-Director of Sales Engineering Kevin McClusky (presenter) and Chief Strategy Officer Don Pearson (moderator) discusses a prevention-focused approach that encompasses physical security as well as cybersecurity. As you’ll learn, an effective SCADA security plan doesn’t just safeguard the platform itself but also each network, device, and database connection.
Learn more about:
- Phishing and other common attack vectors
- Guarding against internal threats
- Locking down your operating system
- Leveraging encryption effectively
- Using Java safely
- Applying security guidelines in the Ignition industrial application platform
- And much more
Effective Patch and Software Update ManagementQuest
In this session, industry expert and Penton Tech contributing editor Orin Thomas, offers all the advice you need to create a comprehensive and proactive strategy for implementing patches and updates.
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds
In this webinar, Group Product Manager Rob Hock and Network Management Head Geek Leon Adato will show how SolarWinds deep packet inspection and analysis and the new Quality of Experience dashboard within Network Performance Monitor (NPM) version 11 can help you solve both common and complex application and network performance issues.
Every landscape is different, but there are some common needs that we all have when it comes to handling remote sites- making every connection as efficient as possible.
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
Join Don Pearson and Travis Cox from Inductive Automation and Chris Harlow from Bedrock Automation as they discuss an end-to-end approach to SCADA/ICS security that encompasses software as well as hardware.
You’ll learn about:
What built-in security is and why it’s essential
Security benefits of OPC UA and MQTT
How to secure your PLC, RTU, or DCS
Best practices such as role-based access and authentication
Security risks that are often overlooked
And more!
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
Quest endpoint systems management experts Sean Musil and Bruce Johnson will show you how securing your network can be made faster, safer and easier with the newest capabilities added to KACE Endpoint Systems Management Appliances. Watch the webcast here: http://bit.ly/2gIOc50.
Enterprise PowerShell for Remote Security AssessmentsEnclaveSecurity
As organizations assess the security of their information systems, the need for automation has become more and more apparent. Not only are organizations attempting to automate their assessments, the need is becoming more pressing to perform assessments centrally against large numbers of enterprise systems. Forensic analysts, incident handlers, penetration testers, and auditors all regularly find themselves in situations where they need to remotely assess a large number of systems through an automated set of tools. Microsoft’s PowerShell scripting language has become the defacto standard for many organizations looking to perform this level of distributed automation. In this presentation James Tarala, of Enclave Security, will describe to students the enterprise capabilities PowerShell offers and show practical examples of how PowerShell can be used to perform large scale Windows security assessments.
Inductive Automation’s Co-Director of Sales Engineering Kevin McClusky (presenter) and Chief Strategy Officer Don Pearson (moderator) discusses a prevention-focused approach that encompasses physical security as well as cybersecurity. As you’ll learn, an effective SCADA security plan doesn’t just safeguard the platform itself but also each network, device, and database connection.
Learn more about:
- Phishing and other common attack vectors
- Guarding against internal threats
- Locking down your operating system
- Leveraging encryption effectively
- Using Java safely
- Applying security guidelines in the Ignition industrial application platform
- And much more
Effective Patch and Software Update ManagementQuest
In this session, industry expert and Penton Tech contributing editor Orin Thomas, offers all the advice you need to create a comprehensive and proactive strategy for implementing patches and updates.
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds
In this webinar, Group Product Manager Rob Hock and Network Management Head Geek Leon Adato will show how SolarWinds deep packet inspection and analysis and the new Quality of Experience dashboard within Network Performance Monitor (NPM) version 11 can help you solve both common and complex application and network performance issues.
Every landscape is different, but there are some common needs that we all have when it comes to handling remote sites- making every connection as efficient as possible.
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
Join Don Pearson and Travis Cox from Inductive Automation and Chris Harlow from Bedrock Automation as they discuss an end-to-end approach to SCADA/ICS security that encompasses software as well as hardware.
You’ll learn about:
What built-in security is and why it’s essential
Security benefits of OPC UA and MQTT
How to secure your PLC, RTU, or DCS
Best practices such as role-based access and authentication
Security risks that are often overlooked
And more!
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
Quest endpoint systems management experts Sean Musil and Bruce Johnson will show you how securing your network can be made faster, safer and easier with the newest capabilities added to KACE Endpoint Systems Management Appliances. Watch the webcast here: http://bit.ly/2gIOc50.
Enterprise PowerShell for Remote Security AssessmentsEnclaveSecurity
As organizations assess the security of their information systems, the need for automation has become more and more apparent. Not only are organizations attempting to automate their assessments, the need is becoming more pressing to perform assessments centrally against large numbers of enterprise systems. Forensic analysts, incident handlers, penetration testers, and auditors all regularly find themselves in situations where they need to remotely assess a large number of systems through an automated set of tools. Microsoft’s PowerShell scripting language has become the defacto standard for many organizations looking to perform this level of distributed automation. In this presentation James Tarala, of Enclave Security, will describe to students the enterprise capabilities PowerShell offers and show practical examples of how PowerShell can be used to perform large scale Windows security assessments.
We are a Network solutions provider & Hardware aggregator. We offer comprehensive solutions for all sectors - Turnkey Project solutions for IT Infrastructure, IT Services, Security Surveillance Systems & Services, Hardware Consulting and Aggregation After Sales Management & Maintenance Services.
Managed Services;
AdvancedWatch IT Monitoring;
AdvancedBackup Disaster Recovery and Business Continuity;
Storage Solutions;
Network Design, Implementation, and Documentation;
Network Security;
IP Telephony;
Secure Wireless Solutions;
Project Management and Consulting;
Consolepark is a cloud hosting company that provides dedicated hosting, cloud computing, email hosting and other services allied to cloud computing in USA. Consolepark is the leading Network Management Service provider in USA, and the dedicated team of IT professionals proactively monitors, detects and takes care of the issues providing you a successful infrastructure management.
This is the first mockup design I have done for AWS. This presentation is a mockup preso for JTWS for a mockup project. Check it out and let me know if you like it or if you have suggestions on how I can improve. Thanks and enjoy.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. About ETS
Exceptional Technology Solutions, LLC is a full service IT Solutions company
We are the first responders to cyber attacks, hardware and software issues, as well as
end-user issues within the computer and network environments of our clients. ETS
can handle any computer, network, server, desktop or security issue.
ETS employs some of the best, most certified engineers and technicians in the area.
3. Technical Certifications
•Microsoft Certified Systems Engineer
•Microsoft Certified Desktop Technician
•Microsoft Certified Professional
•MCSE with Exchange
•MCSE with Security
•Cisco Certified Network Associate
•CompTia A+
•Network+
•Security+
•Server+
•Comptia CWNA
•Verde Certified Engineer
•Watchguard Certified Systems Professional
•Watchguard Certified XCS Professional
•VMWare Certified Professional
•VMWare Certified Professional
•VMWare Certified Technical Professional
•VMWare Certified Sales Professional
•Dell Certified Solutions Provider in Managed Services
•Dell Certified Desktop Professional
4. Process
1. We will discuss the issues in your company and the various services provided by
ETS.
2. A technician will come in to perform a technology assessment.
3. A quote will be prepared based on your needs and the assessment.
4. I will deliver the quote in a timely manner and we will move on with the deal if you
accept the quote.
6. DNACloud Backup
All backups monitored 24/7/365 for consistency.
All support included in monthly fees.
Complete backup & disaster recovery planning.
Multiple pay options: fixed price or pay as you go.
Never a long term contract.
Secure 128 bit or 192 bit AES encryption.
All of our technicians are TLETS/CJIS approved through CJIS.
All data backed up to ETS secure facility.
7. DNACloud Security
DNACloud Security is a multi-faceted approach to Information Security.
• Managed Firewall
• Managed Anti-Virus
• 2 Factor Authentication
8. DNACloud Desktop
DNACloud Desktop is designed for users on the go. A secure, affordable, dynamic
hosted desktop solution designed for environments from SMB to large Enterprise.
DNACloud reduces the risk of data loss and cost of deploying desktops while drastically
reducing roll out time.
• Access your desktop on any computer
• No hardware to buy
• Fixed Per User Pricing
• No long term contracts
• Your choice of OS, Windows XP, 7, 8, Linux or Server Remote Desktop Session
• Service Level Agreement and all support included
9. DNACloud Mail
DNACloud Mail is the best of breed offering for Managed Email Services. Employing the
Microsoft Exchange 2013 platform our clients get the latest in email technology for extremely
competitive pricing.
• Advanced Security
• Outlook Web App
• Mobile Email with Exchange ActiveSync
• Email Archiving
• Mailbox Resiliency
• Information Protection and Control
• Advanced Management Tools
• No Long Term Contracts
• Hosted in ETS secure facility
• Secured by Watchguard’s latest firewall and SpamBlocker technology
10. DNACloud Server
DNACloud Server is designed to provide from one to several servers dedicated and
configured to your needs. With ETS DNACloud Server, you have the power to run the
software you need in an extremely powerful environment while having a team is IT
experts at your disposal manage your cloud environment.
• Completely managed solution.
• Provisioning is fast; your instance can be ready for login in as little as 30 minutes.
• Monthly rates with no long-term commitment
• Fully supported by our in-house data center experts.
• Completely customizable
• Never a Long Term Contract
• Fixed Price
• Service Level Agreement and all support included.
11. DNACloud Netmanage
With DNACloud NetManage you can rest assured that your business has "proactive, always on" protection.
DNACloud NetManage is automated, verified and works when you work to ensure that your computers, servers
and network are up to date and secure. We apply all the necessary security and application patches and updates
on an hourly, daily, weekly and monthly basis.
• Anti-Virus Software (includes software and monitoring)
• Anti-Malware Software (includes software and monitoring)
• Anti-Spyware Software (includes software and monitoring)
• Complete Microsoft Security Patching and Updating
• Total Systems Administration
• Complete Server Monitoring (Monitor for critical services, up/down, security)
• Complete Desktop Monitoring (Monitor for critical services, security)
• System Cleanup (Temp Internet File, Cookies, Disk management and monitoring)
• Asset and Inventory of entire network
• Support - Discounted and Unlimited, Remote and Onsite Support
13. Onsite Services
• Hardware Installation or replacement
• Software Installation
• Implementation of Network Infrastructure
(routers, switches)
• Operating System Installation / Reinstallation
• LAN Construction
• Structured Cabling
• WAN/MAN Construction
• VPN Implementation
• Telco/ISP Installation and Implementation
• LAN (Local Area Network) design,
implementation and maintenance
• Server integration, upgrades and migrations
• Implementation of Network Infrastructure
(routers, switches)
• Virus, Spyware, Malware Removal
• WAN connectivity (branch office connectivity
via DSL/CABLE/T1 or VPN)
• Broadband and Telco Line management
(DSL, Cable, ISDN, T1, Fractional T, Frame
Relay)
• Desktop Rollouts and Deployments
• Category 5e Data Cable Installation
• Consultation Services
14. Project Management
Planning - We will plan the project to your specifications making sure everything
is in place before rollout.
Analysis - We analyze all project plans before execution to ensure maximum
viability.
Execute - We will execute the stated plan on time, in budget.
A few examples of IT projects include:
• BDR (Backup/Disaster recovery) Planning and Implementation
• Office Relocations
• New Site Setup
• Network Overhaul
• Software Upgrades
• Security Audits
15. CTO Services
Clients enrolled in ETS Chief Technology Services are assigned a Chief Technology Officer (CTO) whose
priority is to keep their business on the fast track to success.
CTO Services include:
• Current Technology Assessment
• Business Objectives Meeting
• Quarterly Service Review
• Annual Service Review
• Backup Review
• Sensitive Data Review
• Hardware Lifecycle Review
• Annual Plan
• Quarterly External Security Review
• Business Continuity Planning
16. Benchwork
ETS has a full service repair lab built specifically to service computers, laptops, servers and most other IT
appliances. Services include but are not limited to:
• Servers, PC’s, Laptops, Firewalls, Routers and Switches repair
• Microsoft Windows XP Pro Desktop Operating Systems installation and repair
• Microsoft Office 2000, 2003 and 2007 installation and repair
• Microsoft Windows Server 2003 and Small Business Server 2003 installation and repair
• Microsoft Exchange Server 2003, 2007 and 2010 installation and repair
• Microsoft SQL Server 2000 and 2005 installation and repair
• Server build and customization
• Desktop and Laptop build and customization
• Firewall build and customization
• Upgrades to all major systems
• Drop off service for all major manufacturers or PC's, Laptops and Servers
17. Thank you for your time today.
Exceptional Technology Solutions, LLC
419 Rice Road
Tyler, Texas 75703
903 509 0008
www.etstexas.com
Editor's Notes
Ease-of-use: No need for tons of technical experience DNACloud Office is a completely managed solution.