The document discusses tackling the single sign-on challenge. It begins with an introduction to claims-based identity and access control. It then demonstrates how to implement claims-based identity with Windows Identity Foundation and Active Directory Federation Services to solve a fictitious company's authentication and authorization problems across multiple applications and domains. It also shows how Windows Azure Access Control Service can be used to outsource authentication and provide single sign-on capabilities for applications hosted on Windows Azure or on-premises.
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challengeITCamp
The document discusses tackling the single sign-on challenge through claims-based identity and access control. It describes how claims-based identity works, benefits like simplified authentication and decoupled authorization. It also demonstrates configuring Windows Azure Access Control to provide single sign-on for an enterprise application, integrating identity providers and issuing normalized tokens.
ITCamp 2012 - Martin Kulov - Using the cloud for load testingITCamp
This document discusses using cloud computing for load testing web applications. It notes that performance is important for websites as many users expect pages to load quickly. The cloud allows for easy scaling of load testing by distributing it across multiple agents. Microsoft's Windows Azure platform enables simulating real network latency during load tests, which is important as latency keeps server resources busy and causes users to abandon sites. The document presents a diagram of how load testing can be set up across Azure and an on-premise data center.
In the cloud, data is not tied to one server or even one group of servers, and it can be accessed from multiple devices simultaneously. To protect data, therefore, security solutions must shift from defense of a fixed perimeter towards an approach that protects the data as it travels from physical to virtual to cloud environments.
In the post-PC era, Trend Micro envisions a smart, data-centric security framework that advances the capabilities of our cloud-based Smart Protection Network™, adds smarter threat protection that correlates local threat intelligence; smarter data protection that follows and protects your data; and unified security management that increases visibility into data access and potential attacks.
This presentation was given at the Information Security Executive Summit on 28th / 29th February 2012
The document discusses the rise of shadow IT and consumerization of IT. It notes that over the last 3 years, user-driven IT has added more to productivity than corporate IT. Reasons for the rise of shadow IT include rigid corporate IT policies, lack of choice and fun usability. The document outlines how IT is evolving to become more flexible and driven by end user needs, including accepting bring your own device (BYOD) and moving to cloud-based solutions. It argues that standardization will mean creating a more dynamic IT environment that removes technology constraints and allows self-service options.
This document discusses security challenges in the cloud era. It covers four pillars of cloud computing: infrastructure, applications, data protection, and consumerization. The rise of mobile devices and consumerization of IT brings new security risks. Advanced persistent threats are challenging to detect due to sophisticated techniques including social engineering, stealthy behavior, and use of zero-day vulnerabilities. Deep Discovery provides specialized threat detection across the attack sequence through network visibility, analysis, and correlation with Trend Micro's global threat intelligence.
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...ITCamp
This document discusses the architecture of a social media platform for a marketing campaign called "Spots vs Stripes" run by Cadbury. The key elements discussed are:
1. The campaign involved online and real-world games and events to engage consumers on social media platforms.
2. The system was built using Telligent Community for the social platform, WCF RESTful services for the API, and Sitecore for content management.
3. Security for the API involved authenticating both client applications and users, using application keys, sessions, and request signatures to prevent replay attacks.
The document discusses trends related to endpoints such as the shift to a post-PC era where desktop PCs are getting old and many different devices are used. It also discusses bring your own device (BYOD) and changing client architectures involving tablets, smartphones and other technologies. Mobile devices are consuming more of the digital experience and employees will use multiple devices syncing data via cloud.
Presentation from the launch of Reading UTC http://www.utcreading.co.uk/ and http://www.sourcewire.com/news/76755/microsoft-hosts-utc-reading-taster-event
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challengeITCamp
The document discusses tackling the single sign-on challenge through claims-based identity and access control. It describes how claims-based identity works, benefits like simplified authentication and decoupled authorization. It also demonstrates configuring Windows Azure Access Control to provide single sign-on for an enterprise application, integrating identity providers and issuing normalized tokens.
ITCamp 2012 - Martin Kulov - Using the cloud for load testingITCamp
This document discusses using cloud computing for load testing web applications. It notes that performance is important for websites as many users expect pages to load quickly. The cloud allows for easy scaling of load testing by distributing it across multiple agents. Microsoft's Windows Azure platform enables simulating real network latency during load tests, which is important as latency keeps server resources busy and causes users to abandon sites. The document presents a diagram of how load testing can be set up across Azure and an on-premise data center.
In the cloud, data is not tied to one server or even one group of servers, and it can be accessed from multiple devices simultaneously. To protect data, therefore, security solutions must shift from defense of a fixed perimeter towards an approach that protects the data as it travels from physical to virtual to cloud environments.
In the post-PC era, Trend Micro envisions a smart, data-centric security framework that advances the capabilities of our cloud-based Smart Protection Network™, adds smarter threat protection that correlates local threat intelligence; smarter data protection that follows and protects your data; and unified security management that increases visibility into data access and potential attacks.
This presentation was given at the Information Security Executive Summit on 28th / 29th February 2012
The document discusses the rise of shadow IT and consumerization of IT. It notes that over the last 3 years, user-driven IT has added more to productivity than corporate IT. Reasons for the rise of shadow IT include rigid corporate IT policies, lack of choice and fun usability. The document outlines how IT is evolving to become more flexible and driven by end user needs, including accepting bring your own device (BYOD) and moving to cloud-based solutions. It argues that standardization will mean creating a more dynamic IT environment that removes technology constraints and allows self-service options.
This document discusses security challenges in the cloud era. It covers four pillars of cloud computing: infrastructure, applications, data protection, and consumerization. The rise of mobile devices and consumerization of IT brings new security risks. Advanced persistent threats are challenging to detect due to sophisticated techniques including social engineering, stealthy behavior, and use of zero-day vulnerabilities. Deep Discovery provides specialized threat detection across the attack sequence through network visibility, analysis, and correlation with Trend Micro's global threat intelligence.
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...ITCamp
This document discusses the architecture of a social media platform for a marketing campaign called "Spots vs Stripes" run by Cadbury. The key elements discussed are:
1. The campaign involved online and real-world games and events to engage consumers on social media platforms.
2. The system was built using Telligent Community for the social platform, WCF RESTful services for the API, and Sitecore for content management.
3. Security for the API involved authenticating both client applications and users, using application keys, sessions, and request signatures to prevent replay attacks.
The document discusses trends related to endpoints such as the shift to a post-PC era where desktop PCs are getting old and many different devices are used. It also discusses bring your own device (BYOD) and changing client architectures involving tablets, smartphones and other technologies. Mobile devices are consuming more of the digital experience and employees will use multiple devices syncing data via cloud.
Presentation from the launch of Reading UTC http://www.utcreading.co.uk/ and http://www.sourcewire.com/news/76755/microsoft-hosts-utc-reading-taster-event
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...City University London
This document discusses a multi-disciplinary approach called RED (Research, Envision, Design) for experience design. It emphasizes hypothesis-driven research, capability modeling, and scenario planning to envision solutions. The design process involves concept and product design, workload definition, and user-centered and comparative design. Delivery focuses on proof of concepts, vision demonstrators, and investment cases. Examples discussed include an assisted living innovation platform and projects helping organizations promote digital literacy and envision breakthrough customer experiences.
The document discusses the past, present, and future direction of Citrix Receiver. Receiver started as Updater in 2008, focusing on simplicity and automatic updates. It evolved into App Picker in 2010 with an emphasis on self-service app launching. In 2011-2012, Receiver became the Access Hub, providing access to anything from anywhere through multiple platforms. Looking ahead, Receiver will take the form of a Broker in 2013, facilitating discovery, connectivity, interaction between apps and services through a centralized access point. The summary concludes that Receiver continues evolving to normalize diverse devices, operating systems and app types through its brokering functions.
This document discusses the growing adoption of cloud computing from different perspectives. It notes that Gartner research predicts 20% of businesses will eliminate all their own IT assets by moving fully to the cloud by 2012. It also discusses how application developers, IT administrators and operators, and business advocates view and are influencing the cloud. Finally, it introduces VMware's vCloud initiatives to provide cloud solutions that can be deployed privately or publicly and integrate internal and external clouds.
The document discusses Citrix CloudGateway and its role in enabling enterprise mobility management. Some key points:
1. CloudGateway provides a common architecture for managing and securing mobile devices and apps across iOS and Android using a technique called MDX.
2. It allows for user and device enrollment, single sign-on with Active Directory, app delivery and management, app-specific VPNs, and information containment on mobile devices.
3. The MDX framework intercepts APIs to apply security policies and encrypt data storage, restricting data transfer and access to managed apps only. This allows enterprises to securely enable BYOD while maintaining control over corporate data and access.
This document discusses originator control (ORCON) and how it can provide persistent control over data as it is shared beyond the enterprise. ORCON is related to digital rights management and information rights management as it allows the originator or enterprise to specify access controls for shared data, such as preventing forwarding or rescinding access. The document argues that while networks and infrastructure are difficult to secure, focusing protection at the data layer through encryption and ORCON can provide better persistent control over sensitive data as it moves to different domains.
The document provides an overview of digital watermarking. It defines watermarking as imperceptibly altering a work to embed a message about the work. The document outlines the history of watermarking and discusses its applications, including owner identification, proof of ownership, broadcast monitoring, transaction tracking, and content authentication. It also compares watermarking to other techniques like cryptography and discusses the importance of digital watermarking for copyright protection in the digital age.
This document discusses whether virtual worlds are still relevant for business applications. It provides several examples of how companies like IBM have used virtual worlds for various uses such as collaboration, recruitment, education, and training. While there are technological, legal, organizational, and cultural challenges to virtual worlds, they can provide benefits like establishing trust, saving time and costs, and enabling remote and immersive learning.
Introduction - The Smart Protection NetworkAndrew Wong
Trend Micro is introducing its Smart Protection Network, a next-generation security architecture. It collects threat data from various sources and analyzes it using TrendLabs to provide up-to-date threat information to lightweight endpoint clients in near real-time. This network removes the need for pattern monitoring and management on individual endpoints, reducing network traffic and memory usage. It also protects customers faster and with less staff time compared to traditional security solutions.
The document discusses digital watermarking, which involves embedding invisible copyright information into digital media like images, video, and audio. It can serve as a supplementary technique to encryption to help address challenges of protecting intellectual property in the digital age. The summary provides an overview of digital watermarking technology and classifications of watermarks, distinguishing visible watermarks meant to identify owners from invisible watermarks that are imperceptible but can still embed copyright details. The goal is to make watermarks robust against modifications while keeping them invisible or inaudible to humans.
The document provides an overview of Microsoft Azure services categorized into Compute, Data, Network, and App services that can be used in public cloud or on-premises cloud environments. It also discusses how Microsoft System Center 2012 R2 and Windows Server 2012 R2 products integrate with Microsoft Azure to provide management capabilities across on-premises, service provider, and Microsoft Azure environments.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health.
Introduction to Windows Azure Access Control ServiceMihai Dan Nadas
Slides used to introduce Windows Azure ACS at a Codecamp event held in Cluj-Napoca in February 2012.
The Access Control Service (ACS) 2.0 allows you to integrate single sign on (SSO) and centralized authorization into your web applications.
Lake Superior is the largest of the Great Lakes by surface area, containing over 10% of the world's fresh surface water. At over 31,000 square miles, it is larger than many U.S. states combined and contains 3 quadrillion gallons of water. Lake Superior has extremely clear waters with underwater visibility up to 100 feet, and it is one of the youngest major geological features on Earth at only around 10,000 years old.
Pros, cons, and how-to's for 5 Web 2.0 applications are explored in this power point presentation. Learn more about Wordle, Quizinator, Photo Peach, Kidblog, and What2Learn. Great for teachers looking for advice about applications they have not yet tried.
ITCamp 2012 - Paula Januszkiewicz - Stronghold to StrengthenITCamp
The document summarizes the agenda for the ITCamp 2012 conference on Microsoft technologies. The agenda includes sessions on infrastructure techniques, hardening techniques, hacker roles in development, and demonstrations of hacking techniques. The conference promotes keeping knowledge up to date on security trends and regulations and using tools like scripting languages and debuggers to test for vulnerabilities.
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...City University London
This document discusses a multi-disciplinary approach called RED (Research, Envision, Design) for experience design. It emphasizes hypothesis-driven research, capability modeling, and scenario planning to envision solutions. The design process involves concept and product design, workload definition, and user-centered and comparative design. Delivery focuses on proof of concepts, vision demonstrators, and investment cases. Examples discussed include an assisted living innovation platform and projects helping organizations promote digital literacy and envision breakthrough customer experiences.
The document discusses the past, present, and future direction of Citrix Receiver. Receiver started as Updater in 2008, focusing on simplicity and automatic updates. It evolved into App Picker in 2010 with an emphasis on self-service app launching. In 2011-2012, Receiver became the Access Hub, providing access to anything from anywhere through multiple platforms. Looking ahead, Receiver will take the form of a Broker in 2013, facilitating discovery, connectivity, interaction between apps and services through a centralized access point. The summary concludes that Receiver continues evolving to normalize diverse devices, operating systems and app types through its brokering functions.
This document discusses the growing adoption of cloud computing from different perspectives. It notes that Gartner research predicts 20% of businesses will eliminate all their own IT assets by moving fully to the cloud by 2012. It also discusses how application developers, IT administrators and operators, and business advocates view and are influencing the cloud. Finally, it introduces VMware's vCloud initiatives to provide cloud solutions that can be deployed privately or publicly and integrate internal and external clouds.
The document discusses Citrix CloudGateway and its role in enabling enterprise mobility management. Some key points:
1. CloudGateway provides a common architecture for managing and securing mobile devices and apps across iOS and Android using a technique called MDX.
2. It allows for user and device enrollment, single sign-on with Active Directory, app delivery and management, app-specific VPNs, and information containment on mobile devices.
3. The MDX framework intercepts APIs to apply security policies and encrypt data storage, restricting data transfer and access to managed apps only. This allows enterprises to securely enable BYOD while maintaining control over corporate data and access.
This document discusses originator control (ORCON) and how it can provide persistent control over data as it is shared beyond the enterprise. ORCON is related to digital rights management and information rights management as it allows the originator or enterprise to specify access controls for shared data, such as preventing forwarding or rescinding access. The document argues that while networks and infrastructure are difficult to secure, focusing protection at the data layer through encryption and ORCON can provide better persistent control over sensitive data as it moves to different domains.
The document provides an overview of digital watermarking. It defines watermarking as imperceptibly altering a work to embed a message about the work. The document outlines the history of watermarking and discusses its applications, including owner identification, proof of ownership, broadcast monitoring, transaction tracking, and content authentication. It also compares watermarking to other techniques like cryptography and discusses the importance of digital watermarking for copyright protection in the digital age.
This document discusses whether virtual worlds are still relevant for business applications. It provides several examples of how companies like IBM have used virtual worlds for various uses such as collaboration, recruitment, education, and training. While there are technological, legal, organizational, and cultural challenges to virtual worlds, they can provide benefits like establishing trust, saving time and costs, and enabling remote and immersive learning.
Introduction - The Smart Protection NetworkAndrew Wong
Trend Micro is introducing its Smart Protection Network, a next-generation security architecture. It collects threat data from various sources and analyzes it using TrendLabs to provide up-to-date threat information to lightweight endpoint clients in near real-time. This network removes the need for pattern monitoring and management on individual endpoints, reducing network traffic and memory usage. It also protects customers faster and with less staff time compared to traditional security solutions.
The document discusses digital watermarking, which involves embedding invisible copyright information into digital media like images, video, and audio. It can serve as a supplementary technique to encryption to help address challenges of protecting intellectual property in the digital age. The summary provides an overview of digital watermarking technology and classifications of watermarks, distinguishing visible watermarks meant to identify owners from invisible watermarks that are imperceptible but can still embed copyright details. The goal is to make watermarks robust against modifications while keeping them invisible or inaudible to humans.
The document provides an overview of Microsoft Azure services categorized into Compute, Data, Network, and App services that can be used in public cloud or on-premises cloud environments. It also discusses how Microsoft System Center 2012 R2 and Windows Server 2012 R2 products integrate with Microsoft Azure to provide management capabilities across on-premises, service provider, and Microsoft Azure environments.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health.
Introduction to Windows Azure Access Control ServiceMihai Dan Nadas
Slides used to introduce Windows Azure ACS at a Codecamp event held in Cluj-Napoca in February 2012.
The Access Control Service (ACS) 2.0 allows you to integrate single sign on (SSO) and centralized authorization into your web applications.
Lake Superior is the largest of the Great Lakes by surface area, containing over 10% of the world's fresh surface water. At over 31,000 square miles, it is larger than many U.S. states combined and contains 3 quadrillion gallons of water. Lake Superior has extremely clear waters with underwater visibility up to 100 feet, and it is one of the youngest major geological features on Earth at only around 10,000 years old.
Pros, cons, and how-to's for 5 Web 2.0 applications are explored in this power point presentation. Learn more about Wordle, Quizinator, Photo Peach, Kidblog, and What2Learn. Great for teachers looking for advice about applications they have not yet tried.
ITCamp 2012 - Paula Januszkiewicz - Stronghold to StrengthenITCamp
The document summarizes the agenda for the ITCamp 2012 conference on Microsoft technologies. The agenda includes sessions on infrastructure techniques, hardening techniques, hacker roles in development, and demonstrations of hacking techniques. The conference promotes keeping knowledge up to date on security trends and regulations and using tools like scripting languages and debuggers to test for vulnerabilities.
ITCamp 2012 - Dan Fizesan - Serving 10 million requests per dayITCamp
Dan Fizesan presented on solving the architecture challenges of a high traffic ASP.NET website serving 10 million requests per day. Some key challenges included achieving high availability through redundancy, using load balancers for scalability, implementing distributed caching for performance, and designing for horizontal scalability. Fizesan demonstrated approaches for parallelizing code to improve performance of a web application processing 300 requests.
Vunvulea radu it camp-ro 2012 - building metro style applications on window...Radu Vunvulea
The document discusses building metro style applications on Windows 8 using background tasks. It covers why background tasks are needed, the different types of background tasks, common triggers to use them, conditions that can apply, how to send notifications, and basic steps to implement them. It also provides tips on optimizing background tasks for performance and best practices for designing them.
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp
This document discusses using background tasks to build metro style applications for Windows 8. It covers why background tasks are needed, the different types of background tasks, common triggers that launch tasks, conditions that tasks require, and how tasks can send notifications. It also provides an overview of the basic steps to implement background tasks and some best practices for using them.
ITCamp 2011 - Mihai Tataran - Migrating to AzureITCamp
The document discusses how to convince customers to migrate their apps to Windows Azure. It outlines some of the major concerns customers may have regarding security, robustness, dependability and the learning curve. It then discusses how migrating an existing project or building a new project from scratch on Azure can address these concerns. The document provides an example of migrating an existing project to Azure and the key steps and challenges involved.
Despite cloud computing’s maturation as an enterprise IT application or infrastructure option, IT management concerns persist, notably in the areas of security, IT governance, and business continuity. The speaker will focus on security and data governance issues regarding deployment of private, hybrid and public clouds, and offer a pragmatic plan for resolving these concerns. This plan navigates the tangle of security responsibilities between enterprises and cloud service providers to enable IT managers to leverage the economics and flexibility provided by cloud-based applications. The plan focuses on how companies can create secure spaces in the cloud and both protect and control data in those spaces.
Todd Thiemann ,. Senior Director, Datacenter Products, Trend Micro, Inc.
Todd Thiemann has been with Trend Micro for over eight years and is currently responsible for planning Trend Micro’s products and technologies designed to secure datacenter information including virtualization and cloud security, DLP, and encryption. Todd is also co-chair of the Cloud Security Alliance Solution Provider Forum.
Todd holds a BS degree from Georgetown University and an MBA from the Anderson School of Business at the University of California, Los Angeles.
Elements of DDD with ASP.NET MVC & Entity Framework Code First v2Enea Gabriel
The document discusses Domain-Driven Design (DDD) with ASP.NET MVC and Entity Framework Code First. It covers challenges with traditional architecture like layers coupling and where to implement business rules. DDD is presented as a new default architecture where the database is not the primary focus, layers are loosely coupled, and business rules are within the application domain. Today's tools like ASP.NET MVC, dependency injection frameworks, and Entity Framework Code First are discussed. A demo is presented and conclusions recommend focusing on analyzing dependencies, designing the domain, and doing refactoring and unit testing.
2016, A new era of OS and Cloud SecurityTudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
How # (sharp) is Your Katana (Ciprian Jichici)ITCamp
The Internet of Things is coming upon us bringing a whole range of fundamental changes in the way we imagine, understand, and write services. One of the major trends we’re wittnessing is the breakdown of monoliths, and Microsoft’s web stack is among the candidates. With the new .NET framework and standards like OWIN, the world of web development is changing significantly.
We’re going to cover in this session some advanced scenarios involving ASP.NET MVC 5, WebAPI 2, OWIN, Katana (Microsoft’s implementation of OWIN), and, of course, Windows Azure (Windows Azure Active Directory to be more specific). And to make things more real, we’re going to demonstrate everything using a solution used by our team at HTSS-Genisoft in real-life production.
Modern cybersecurity threats, and shiny new tools to help deal with themTudor Damian
With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others.
Modern cybersecurity threats, and shiny new tools to help deal with them - T...ITCamp
With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others.
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
This document summarizes a presentation about new security trends and technologies from Microsoft. The presentation covered:
1) Industry security trends like the evolution of attacks from script kiddies to organized crime and nation-states, and how modern attacks compromise credentials and use legitimate tools.
2) New Microsoft security technologies like Shielded VMs, Hypervisor Code Integrity, and Device Guard that provide hardware-based security on Windows devices.
3) Other technologies like Provable PC Health that attest the health of devices and Advanced Threat Analytics that uses machine learning to detect abnormal active directory usage indicating attacks.
The document discusses cloud security risks and challenges faced by enterprises adopting cloud services. It highlights recent security breaches at Dropbox, RSA, and Twitter. It notes the tension between business users who want more cloud services for agility and cost savings, and security/compliance teams who have concerns about lack of control and visibility in public clouds. The document introduces CipherCloud's encryption gateway solution that allows enterprises to securely adopt public cloud services by encrypting sensitive data before it leaves their network. It provides a demo of the product and discusses how it addresses customer pain points around data privacy, compliance and security.
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
In this session we will discuss the features provided by Windows Intune and System Center 2012 Configuration Manager to manage mobile devices using Windows Phone, Windows RT, Android and iOS.
We will discuss the configuration steps and the integration between the two platforms using Windows Intune Connector.
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsBluelock
Does hybrid cloud work? 5 success stories using a VMware vCloud-based cloud solution. Learn how to successfully implement a hybrid cloud strategy while capitalizing on your existing vSphere and VMware technology.
What you'll learn:
- How to place your workload between public, private, and non-cloud for optimal efficiency.
- Hear hybrid cloud success stories on identifying the need and implementing a solution.
- How to make your hybrid cloud strategy work for you to save you money.
DCEU 18: Edge Computing with Docker EnterpriseDocker, Inc.
Marc Meunier - Director of Business Development, Docker
Adam Parco - Director of Engineering, Edge & IoT, Docker
The Internet of Things (IoT) is pushing more computing to the edge - where data from devices can be aggregated, filtered, and analyzed before it’s sent somewhere else. As edge devices become more powerful and capable of running sophisticated applications, the edge servers have to keep pace with development. The challenge for edge computing is that these servers and devices are distributed geographically across many sites and sometimes inaccessible. The Docker platform is designed for distributed computing and provides an easy way to securely distribute and run applications at the edge. In this session, we will outline some of the major trends around edge computing and the common architectures and use cases across different industries. We will highlight some of the work we’re doing with our customers to deliver on these edge use cases and where Docker is headed.
ITCamp 2011 - Mihai Nadas - Windows Azure interopITCamp
The document discusses running various technologies like Java, PHP, and MySQL on the Windows Azure platform. It begins with an overview of Windows Azure and how it allows users to run full operating system virtual machines in the cloud. It then demonstrates running Java applications like Tomcat on Windows Azure either using a preconfigured solution accelerator or manually configuring it within a worker role. Similarly, it shows how to run PHP applications by supplying the PHP runtime within a web role. It also discusses running MySQL in a worker role and provides solutions for configuring replication and high availability. The document advocates that Windows Azure allows developers freedom of choice in technologies by enabling many common languages and databases to run on its infrastructure.
In this presentation, kartik introduces cloud computing and associated trends. In his own words Kartik would like to "work with developing powerful & efficient cryptographic methods or techniques to ensure data integrity , confidentiality & anonymity among the organizations."
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
Summary of massive changes underway in the enterprise IT marketplace being driven by social, mobile, and cloud, and the implications of these changes on what it means to be an information professional.
http://www.aiim.org/certification
As every thing becomes connected, leaders are using the Internet of Things and Artificial Intelligence on Cloud to reinvent how they operate and create value. Join us to learn how companies are using IoT insights for operational excellence, product and service design, and sustainable differentiation.
Similar to How to Tackle the Single Sign-On Challenge in 2012 (20)
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
How to Tackle the Single Sign-On Challenge in 2012
1. Tackling the
Single Sign-On Challenge
Mihai Nadăș
Windows Azure MVP
Yonder CTO
@mihainadas
mihainadas.com
@ itcampro # itcamp12 Premium conference on Microsoft technologies
2. Private &
ITCamp 2012 sponsors Public Cloud
@ itcampro # itcamp12 Premium conference on Microsoft technologies
3. Private &
About myself Public Cloud
• mihainadas.com
• @mihainadas
• Passionate about technology, background in
the .NET World
• Windows Azure MVP
• Driving Yonder’s appetite for innovation
@ itcampro # itcamp12 Premium conference on Microsoft technologies
4. Private &
On security and the future Public Cloud
• As the world becomes more interconnected, security
becomes a more important topic
• Holland, 2012 – VCD’s SaaS solution exposed publically
information about its user’s medical history
We spend our time searching for security
and hate it when we get it.
-John Steinbeck
@ itcampro # itcamp12 Premium conference on Microsoft technologies
5. Private &
Passwords and implementations Public Cloud
@ itcampro # itcamp12 Premium conference on Microsoft technologies
6. Private &
OWASP’s Top 5 Public Cloud
1. Injection
2. Cross Site Scripting (XSS)
3. Broken Authentication and Session
Management
4. Insecure Direct Object References
5. Cross Site Request Forgery
@ itcampro # itcamp12 Premium conference on Microsoft technologies
7. Private &
OWASP’s Top 5 Public Cloud
1. Injection
2. Cross Site Scripting (XSS)
3. Broken Authentication and Session
Management
4. Insecure Direct Object References
5. Cross Site Request Forgery
@ itcampro # itcamp12 Premium conference on Microsoft technologies
8. Private &
Agenda Public Cloud
• Claims-Based Identity and Access Control
• The Single Sign-On Challenge and Benefits
• Windows Azure Access Control Service
• Q&A
@ itcampro # itcamp12 Premium conference on Microsoft technologies
9. The problem with Identity and Access Control in the Enterprise
ENOUGH TALKING,
LET’S DEMO!
@ itcampro # itcamp12 Premium conference on Microsoft technologies
10. Private &
What you’ll see? Public Cloud
• A fictious case study of an enterprise called
Adatum
• The whiteboard diagram showing the
situation of the auth/auth problem pre-
claims
• DEMO
@ itcampro # itcamp12 Premium conference on Microsoft technologies
12. The problem with Identity and Access Control in the Enterprise
DEMO
@ itcampro # itcamp12 Premium conference on Microsoft technologies
13. Private &
What’s the problem? Public Cloud
• Users of a-Expense need user/password
• The IT staff have to sync roles between
authentication systems
• a-Order can’t be accessed from the Internet
• No Single Sign-On aka „Credentials Hell”
@ itcampro # itcamp12 Premium conference on Microsoft technologies
14. Private &
What’s the problem? Public Cloud
@ itcampro # itcamp12 Premium conference on Microsoft technologies
15. Private &
Be the consultant and please Adatum! Public Cloud
• Adatum’s requirements
– Single Sign-On (SSO) Capabilities
– Enable Adatum employees to access corporate
applications from the Internet (no VPN)
– Plan for the future (cloud, new apps)
• What is your solution?
@ itcampro # itcamp12 Premium conference on Microsoft technologies
16. Private &
Introducing Claims-Based Identiy Public Cloud
• Control the digital experience based on
things that are said about one party by the
other
• A party can be – web site, web service,
person, government, organization
@ itcampro # itcamp12 Premium conference on Microsoft technologies
17. Private &
Claims are not new! Public Cloud
• Mainframes asked about user/password and passed
„claims” about them to applications
– uid, gid
– sudo su
• As systems became interconnected we needed ways
to identify parties across multiple computers
• Specialized services appeared
– NTML, Kerberos (Windows Integrated Authentication)
– Public Key Infrastructure (PKI)
– Security Assertion Markup Lanaguage (SAML)
@ itcampro # itcamp12 Premium conference on Microsoft technologies
18. Private &
The Claims-Based ID Framework Public Cloud
• Two major components
1. A single, general notion of claims
2. Concept of issuer / authority
• Terminology
1. Application (Relying Party, Service Provider)
2. User (Subject, Principal)
3. Issuer (Security Token Service, Identity Provider)
4. Rich Client (Active Client)
5. Browser (Passive Client)
@ itcampro # itcamp12 Premium conference on Microsoft technologies
19. Private &
Claim-Based ID in Real World Public Cloud
Traveler Check-In Counter Airport Agents
1 Show ID or Passport
Give Boarding Card 2
Show Boarding Card to Gain
3 Access
@ itcampro # itcamp12 Premium conference on Microsoft technologies
20. Private &
Claim-Based ID in Real World Public Cloud
Traveler Check-In Counter Airport Agents
User Issuer
Application
1 Show ID or Passport
Authentication
Credentials
Give Boarding Card 2
Claims
Authorization
Show Boarding Card to Gain
3 Access
@ itcampro # itcamp12 Premium conference on Microsoft technologies
21. Private &
What are the benefits? Public Cloud
• Simplified authentication logic
• Decoupled authentication from authorization
• Eliminate redundancy
@ itcampro # itcamp12 Premium conference on Microsoft technologies
22. Private &
Implementing Claims-Based Identity Public Cloud
• What you need?
– An App (Web Service, Web Site, Mobile App, etc.)
– An Issuer
– Claims-Based Identity Magic
• What are the steps?
1. Setup an Issuer
2. Configure the Issuer to know abou the App
3. Add logic to the App to support claims
4. Configure the App to trust the Issuer
@ itcampro # itcamp12 Premium conference on Microsoft technologies
24. Private &
What’s WIF? Public Cloud
• Windows Identity Foundation
• Framework for building identity-aware applications
• Provides APIs for building ASP.NET or WCF based
security token services
• Tools for building claims-aware and federation
capable applications
• Now part of .NET Framework 4.5
@ itcampro # itcamp12 Premium conference on Microsoft technologies
25. Solving Adatum’s problem using Claims-Based Identity
ENOUGH TALKING,
LET’S DEMO!
@ itcampro # itcamp12 Premium conference on Microsoft technologies
27. Private &
Technologies at work Public Cloud
• Windows Identity Foundation
• Active Directory Federation Services
@ itcampro # itcamp12 Premium conference on Microsoft technologies
28. Solving Adatum’s problem using Claims-Based Identity
DEMO
@ itcampro # itcamp12 Premium conference on Microsoft technologies
29. Private &
What about Smart Clients? Public Cloud
@ itcampro # itcamp12 Premium conference on Microsoft technologies
30. Private &
Going beyond Identity Providers Public Cloud
• Welcome Federated Providers!
• Powerful way to provide SSO cross-domains
@ itcampro # itcamp12 Premium conference on Microsoft technologies
31. Private &
Adatum meets Litware Public Cloud
@ itcampro # itcamp12 Premium conference on Microsoft technologies
32. Windows Azure
ACCESS CONTROL SERVICE
@ itcampro # itcamp12 Premium conference on Microsoft technologies
33. Private &
Shortly Public Cloud
• A feature of Windows Azure Active Directory
• Outsourcing Authentication (no need to write
code)
• Works with .NET, PHP, Python, Java and Ruby
• Out-of-the-box support for a variety of identify
providers
• Integrates with on-premises Active Directory
@ itcampro # itcamp12 Premium conference on Microsoft technologies
34. Private &
Benefits Public Cloud
• Open industry standards
– Protocols: OAuth 2.0, WS-Trust, WS-Federation
– Token formats: SAML 1.1/2.0 and Simple Web
Token
• $1,99 / 100.000 transactions
@ itcampro # itcamp12 Premium conference on Microsoft technologies
35. Private &
Identity Providers Public Cloud
• Built-in support for
– Windows Live ID
– Facebook
– Google
– Yahoo!
– WS-Federation Identity Providers
• Programatic configuration for
– WS-Trust based (AD FS 2.0)
– OpenID based
@ itcampro # itcamp12 Premium conference on Microsoft technologies
36. Private &
Relying Party Applications Public Cloud
• An application that relies on claims
• Implements federated authentication using
ACS
• Trusts the ACS namespace
• Can be configured manually or
programatically through ACS Management
Service
@ itcampro # itcamp12 Premium conference on Microsoft technologies
37. Private &
ACS Architecture Public Cloud
@ itcampro # itcamp12 Premium conference on Microsoft technologies
38. Private &
ACS - Protocol Handling Public Cloud
• ACS does heavy lifting for handling protocols
– WS-Federation
– WS-Trust
– OpenID
– OAuth 2.0, OAuth WRAP
– Facebook Graph
• ACS issues normalized tokens
– SAML
– SWT
@ itcampro # itcamp12 Premium conference on Microsoft technologies
39. Windows Azure ACS
ENOUGH TALKING,
LET’S DEMO!
@ itcampro # itcamp12 Premium conference on Microsoft technologies
40. Private &
Goals Public Cloud
1. Configure your application to outsource authentication
to ACS
2. Configure ACS to include the identity providers you want
to leverage
3. Configure ACS to process incoming identities and add
new claims
4. Modify your application to consume claims from ACS
and drive authorization decisions
5. Customize the default authentication user experience
provided by ACS
@ itcampro # itcamp12 Premium conference on Microsoft technologies
41. Private &
Requirements Public Cloud
• Windows Vista SP2, Windows Server 2008
SP2, Windows Server 2008 R2, or Windows 7
(32-bits or 64-bits)
• Internet Information Services (IIS) 7.0
• .NET Framework 4
• Visual Studio 2010
• Windows Identity Foundation Runtime
• Windows Identity Foundation SDK
@ itcampro # itcamp12 Premium conference on Microsoft technologies
42. Windows Azure ACS
DEMO
@ itcampro # itcamp12 Premium conference on Microsoft technologies
43. Private &
Summary Public Cloud
• A feature of Windows Azure Active Directory
• Outsourcing Auth and Auth (no need to write code)
• Works with .NET, PHP, Python, Java and Ruby
• Out-of-the-box support for identify providers like
Windows Live ID, Google, Yahoo! and Facebook
• Integrates with on-premises Active Directory
@ itcampro # itcamp12 Premium conference on Microsoft technologies
44. Private &
References Public Cloud
• Windows Azure
Training Kit
• claimsid.codeplex.com
@ itcampro # itcamp12 Premium conference on Microsoft technologies
45. Private &
Check Out AzureWorks.ro Public Cloud
www.azureworks.ro
@ itcampro # itcamp12 Premium conference on Microsoft technologies