This document provides an overview and demonstration of the Microsoft Web Platform tools: IIS Web Eco-System, Web Platform Installer (Web PI), and Web Deploy. The presentation covers the main components and features of each tool, how they work, and examples of common usage scenarios. Web PI simplifies installation of web software. Web Deploy enables deployment and synchronization of websites, applications, and databases between IIS servers. Usage scenarios demonstrated include synchronization, migration, packaging, and modifying sync behavior with rules.
Open Mic - IBM Sametime Proxy Clusteringjayeshpar2006
This document discusses the installation, configuration, and clustering of IBM Sametime Proxy Servers. It provides step-by-step instructions on installing a primary and secondary Sametime Proxy Server node, configuring the database, clustering the servers, and verifying the installation. Tips are also included such as ensuring proper security settings and logging levels are configured.
This document contains log messages from the installation of a Teams software update on a Windows system. It shows the update process copying files to the installation directory, checking for and installing any add-ins, registering components in the registry, and cleaning up old files. The process encounters some errors like access denied when trying to kill existing processes and missing directories, but is ultimately able to complete the installation.
Introduction to IIS, the integrated pipeline and application pool. Introduction to IIS features, such as compression, caching, URL rewriting, and application initialization. Troubleshooting IIS with logging and failed request tracing.
F03 a history of (open) conversation alfresco at university of zaragozaAngel Borroy López
The document summarizes the history of using Alfresco at the University of Zaragoza from its beginnings in 2013 to 2017. It started with a small installation for security purposes and grew to become the main document management system. Over time, the system was customized and enhanced to meet various user requests through extensions, scripts, and open source contributions. This included integrating LDAP, restricting site creation, enforcing quotas, automating processes, and enabling external sharing. The implementation faced challenges around authentication, permissions, and storage which were addressed during this period.
Scale your Magento app with Elastic BeanstalkCorley S.r.l.
This document discusses using ElasticBeanstalk to scale Magento applications. Some key points:
ElasticBeanstalk allows automatically scaling web and worker applications by adding and removing instances as needed. It also allows running different environments like production, testing, and development. Deploying code updates can be done by pushing to Git or uploading ZIP files. Logs, configurations, and other customizations are managed through YAML files. ElasticBeanstalk simplifies scaling Magento by integrating with features like Composer, Redis, and S3.
This document provides an introduction to Microsoft IIS 7.0, including its components, architecture, and five major focus areas. It discusses the core components of IIS 7.0 such as protocol listeners and the Windows Activation Service. It also summarizes the five pillars of IIS 7.0: security, extensibility, configuration, system management, and diagnostics. The document demonstrates various IIS 7.0 features through examples.
Understanding a web server and types of web servers pptNivi Sharma
The document discusses different types of web servers, including Apache, IIS, Nginx, LiteSpeed, Apache Tomcat, and Node.js. It provides details on each server such as what organization develops it, what percentage of websites each powers, and their key features. The document also mentions other types of servers like mail, application, FTP, database, and DNS servers. It concludes by noting that web hosting companies select servers based on client needs, traffic volume, and other considerations.
Open Mic - IBM Sametime Proxy Clusteringjayeshpar2006
This document discusses the installation, configuration, and clustering of IBM Sametime Proxy Servers. It provides step-by-step instructions on installing a primary and secondary Sametime Proxy Server node, configuring the database, clustering the servers, and verifying the installation. Tips are also included such as ensuring proper security settings and logging levels are configured.
This document contains log messages from the installation of a Teams software update on a Windows system. It shows the update process copying files to the installation directory, checking for and installing any add-ins, registering components in the registry, and cleaning up old files. The process encounters some errors like access denied when trying to kill existing processes and missing directories, but is ultimately able to complete the installation.
Introduction to IIS, the integrated pipeline and application pool. Introduction to IIS features, such as compression, caching, URL rewriting, and application initialization. Troubleshooting IIS with logging and failed request tracing.
F03 a history of (open) conversation alfresco at university of zaragozaAngel Borroy López
The document summarizes the history of using Alfresco at the University of Zaragoza from its beginnings in 2013 to 2017. It started with a small installation for security purposes and grew to become the main document management system. Over time, the system was customized and enhanced to meet various user requests through extensions, scripts, and open source contributions. This included integrating LDAP, restricting site creation, enforcing quotas, automating processes, and enabling external sharing. The implementation faced challenges around authentication, permissions, and storage which were addressed during this period.
Scale your Magento app with Elastic BeanstalkCorley S.r.l.
This document discusses using ElasticBeanstalk to scale Magento applications. Some key points:
ElasticBeanstalk allows automatically scaling web and worker applications by adding and removing instances as needed. It also allows running different environments like production, testing, and development. Deploying code updates can be done by pushing to Git or uploading ZIP files. Logs, configurations, and other customizations are managed through YAML files. ElasticBeanstalk simplifies scaling Magento by integrating with features like Composer, Redis, and S3.
This document provides an introduction to Microsoft IIS 7.0, including its components, architecture, and five major focus areas. It discusses the core components of IIS 7.0 such as protocol listeners and the Windows Activation Service. It also summarizes the five pillars of IIS 7.0: security, extensibility, configuration, system management, and diagnostics. The document demonstrates various IIS 7.0 features through examples.
Understanding a web server and types of web servers pptNivi Sharma
The document discusses different types of web servers, including Apache, IIS, Nginx, LiteSpeed, Apache Tomcat, and Node.js. It provides details on each server such as what organization develops it, what percentage of websites each powers, and their key features. The document also mentions other types of servers like mail, application, FTP, database, and DNS servers. It concludes by noting that web hosting companies select servers based on client needs, traffic volume, and other considerations.
This document discusses setting up a LAMP stack on an Ubuntu server using SSH and various commands like apt-get. It installs Apache, PHP, MySQL, Redis, and Varnish. It then discusses using rsync to copy files to the server and configuring the various components like enabling PHP modules and Apache rewrite rules.
Social Connections 12 - IBM Connections AdminblastNico Meisenzahl
This document provides tips and troubleshooting advice for administering IBM Connections. It begins with an agenda for an IBM Connections Adminblast session with Nico Meisenzahl and Christoph Stoettner. The rest of the document consists of 35 tips numbered 1 through 35 covering topics like iOS push notifications, WebSphere configuration, database tuning, TLS configuration, and debugging techniques.
Oracle forms and reports 11g installation on linuxVenu Palakolanu
The document provides steps to install Oracle Forms and Reports 11g on Linux 5.4. It includes instructions on modifying OS configuration files, installing prerequisite RPM packages, setting up the user oracle and groups, installing Java JDK, unzipping the Forms and Reports software, running the installer, configuring the domain, and starting the servers. It also provides URLs to access the Forms and Reports applications and tips on deploying and running forms.
This is a webinar done with Acquia introdcing how well you can run Drupal on Windows with a demo about WebPI and Drush.
Here's a link to the recorded webinar:
http://tinyurl.com/6rfz3px
IIS 7 is a major upgrade to IIS that provides improved performance, scalability, reliability, and new features. Some key enhancements include improved administration and diagnostic tools, support for managing web farms from one location, delegation of management tasks, and built-in support for technologies like PHP. IIS 7 also integrates ASP.NET configuration and provides a new authorization model.
The document describes the author's journey of automating various Oracle database administration tasks using Python. Some key points:
1) The author started using Python to automate routine database maintenance tasks like log file management and backups that were previously done manually or via scripts.
2) Over time, the author applied object-oriented principles in Python to develop reusable modules and classes to further standardize and simplify administration of multiple databases.
3) Large projects like database migrations were made possible by building on the Python codebase, applying concepts like packages and modules to organize the code into a reusable framework. Proper documentation of the code was also emphasized.
The document provides instructions for installing and configuring Oracle Access Manager 11.1.2.1.0. It includes:
1. Installing the Required Components - Java, WebLogic, RCU, and Oracle Access Manager.
2. Configuring the Oracle Access Manager domain and security store using scripts.
3. Configuring the database security store for the Oracle Identity and Access Management domain.
Obiee 11.1.7.0 step by step installation on linux (rhel – red hat)Taoufik AIT HSAIN
This document provides step-by-step instructions for installing Oracle Business Intelligence 11.1.7.0 on Linux (RHEL). It includes prerequisites like hardware requirements, downloading files, creating a middleware home directory, setting ulimits, and creating an RCU on the database. The installation process involves unzipping files, running the installer, selecting components, providing database details, generating a response file, and verifying the installation. Key steps are creating an RCU schema on the database, selecting components during the installer, filling in database connection details, and testing the URLs upon completion.
This document provides tips and tricks for optimizing an IBM Connections environment. It includes 35 tips covering topics like Docs conversion on Linux, using a custom user for WebSphere services, surveys setup, global sender email addresses, Orient Me installation, WAS and 4096-bit SSL keys, seedlist validation, and more. The tips aim to help improve performance, security, and usability of an IBM Connections deployment.
Audit Vault Database Firewall 12.2.0.1.0 installationPinto Das
This document outlines the steps to install an Audit Vault server and Database Firewall server on two separate VMs. It describes creating the VMs, configuring memory, storage, and network settings, and starting the installation processes. The Audit Vault installation initially failed due to insufficient hard drive space but succeeded after allocating a 200GB drive. Both memory tests passed and installations began on the VMs.
Microsoft Windows 10 Bootcamp - Active directoryOlav Tvedt
This document summarizes a Microsoft Technical Bootcamp on Active Directory. It includes links and information on Active Directory templates, the central store, an Excel sheet template, and cleaning up the OU structure and using group and WMI filtering. It also discusses why modernizing Active Directory is important and the benefits of the Windows 10 Enterprise Mobility Suite, including mobile device and app management, information protection, identity and access management, and its integration with Microsoft Azure. Security topics like second factor authentication are also briefly mentioned.
WebSockets allow for bidirectional communication between a client and server over a single TCP connection. They improve on older "Comet" techniques which used polling and long-polling to simulate real-time updates. With WebSockets, the client can open a WebSocket connection to the server which sends messages at any time without needing an explicit request. This enables real-time applications with constantly updating information. The document outlines the WebSocket protocol, provides examples of the API in browsers, and discusses frameworks for building WebSocket applications.
The document provides an overview of key concepts for developers to know about Internet Information Services (IIS) 7 and 7.5. It discusses the new integrated pipeline architecture in IIS 7/7.5 which provides extensibility through modules. It also covers application pools, hosting applications and Windows Communication Foundation (WCF) services, and creating custom modules. Demo sections are included to illustrate configuration of modules, applications, and hosting WCF services.
An automated vulnerability scan was performed on a financial organization's website which uncovered several vulnerabilities in their enrollment website (enroll.site.com) that allowed sensitive customer information like credit cards and applications to be accessed. The vulnerabilities included detailed error messages revealing information, lack of session authentication, incorrect file permissions, and default files still existing for the Forte WebEnterprise application. Access to internal systems was also achieved through an exposed debugging option.
Giancarlo Gomez presented on using websockets for realtime applications with ColdFusion. He began by explaining what websockets are and how they allow for bidirectional messaging with low latency compared to HTTP polling techniques. He then demonstrated how to enable and use websockets in ColdFusion, including securing connections and using websockets in a clustered environment. Finally, he discussed real world uses of websockets and issues to consider like network connections and application reloads.
IIS (Internet Information Services) is a web server application created by Microsoft for use with Windows operating systems. It supports protocols like HTTP, HTTPS, FTP, and more. IIS has been included with Windows NT, Windows 2000, Windows Server 2003, and beyond. Newer versions of IIS have added features like support for additional authentication mechanisms, modules for extending functionality, and performance/security improvements.
Virtual Hosts Configuration with Weblogic ServerPawan Kumar
Virtual hosting in Weblogic Server allows mapping host names to the IP address of a server or cluster. This hides the server IP addresses from clients and allows applications to be targeted to a virtual host rather than an individual server. The steps to configure a virtual host include creating a network channel, defining the virtual host in the Weblogic console, targeting applications to the virtual host, and modifying host files to map the virtual host name to the server IP address.
Frontend Performance: Beginner to Expert to Crazy PersonPhilip Tellis
The very first requirement of a great user experience is actually getting the bytes of that experience to the user before they they get fed up and leave.
In this talk we'll start with the basics and get progressively insane. We'll go over several frontend performance best practices, a few anti-patterns, the reasoning behind the rules, and how they've changed over the years. We'll also look at some great tools to help you.
Containerize Legacy .NET Framework Web Apps for Cloud MigrationAmazon Web Services
In this session, we cover how to leverage Docker for Windows and the Amazon Elastic Container Service (Amazon ECS) as an effective solution for migrating legacy .NET applications to the cloud.We use Microsoft Visual Studio to demonstrate how to containerize a legacy .NET app including the Docker build and deployment process.We also cover how to deploy the container to Amazon ECS using the Amazon EC2 Container Registry (Amazon ECR) service to host the Docker image.
WordPress Security Presentation by Jason Conroy (from Finding Simple - http://findingsimple.com) for the March 2013 WordPress Canberra Meetup (http://wpcanberra.com.au)
This document discusses setting up a LAMP stack on an Ubuntu server using SSH and various commands like apt-get. It installs Apache, PHP, MySQL, Redis, and Varnish. It then discusses using rsync to copy files to the server and configuring the various components like enabling PHP modules and Apache rewrite rules.
Social Connections 12 - IBM Connections AdminblastNico Meisenzahl
This document provides tips and troubleshooting advice for administering IBM Connections. It begins with an agenda for an IBM Connections Adminblast session with Nico Meisenzahl and Christoph Stoettner. The rest of the document consists of 35 tips numbered 1 through 35 covering topics like iOS push notifications, WebSphere configuration, database tuning, TLS configuration, and debugging techniques.
Oracle forms and reports 11g installation on linuxVenu Palakolanu
The document provides steps to install Oracle Forms and Reports 11g on Linux 5.4. It includes instructions on modifying OS configuration files, installing prerequisite RPM packages, setting up the user oracle and groups, installing Java JDK, unzipping the Forms and Reports software, running the installer, configuring the domain, and starting the servers. It also provides URLs to access the Forms and Reports applications and tips on deploying and running forms.
This is a webinar done with Acquia introdcing how well you can run Drupal on Windows with a demo about WebPI and Drush.
Here's a link to the recorded webinar:
http://tinyurl.com/6rfz3px
IIS 7 is a major upgrade to IIS that provides improved performance, scalability, reliability, and new features. Some key enhancements include improved administration and diagnostic tools, support for managing web farms from one location, delegation of management tasks, and built-in support for technologies like PHP. IIS 7 also integrates ASP.NET configuration and provides a new authorization model.
The document describes the author's journey of automating various Oracle database administration tasks using Python. Some key points:
1) The author started using Python to automate routine database maintenance tasks like log file management and backups that were previously done manually or via scripts.
2) Over time, the author applied object-oriented principles in Python to develop reusable modules and classes to further standardize and simplify administration of multiple databases.
3) Large projects like database migrations were made possible by building on the Python codebase, applying concepts like packages and modules to organize the code into a reusable framework. Proper documentation of the code was also emphasized.
The document provides instructions for installing and configuring Oracle Access Manager 11.1.2.1.0. It includes:
1. Installing the Required Components - Java, WebLogic, RCU, and Oracle Access Manager.
2. Configuring the Oracle Access Manager domain and security store using scripts.
3. Configuring the database security store for the Oracle Identity and Access Management domain.
Obiee 11.1.7.0 step by step installation on linux (rhel – red hat)Taoufik AIT HSAIN
This document provides step-by-step instructions for installing Oracle Business Intelligence 11.1.7.0 on Linux (RHEL). It includes prerequisites like hardware requirements, downloading files, creating a middleware home directory, setting ulimits, and creating an RCU on the database. The installation process involves unzipping files, running the installer, selecting components, providing database details, generating a response file, and verifying the installation. Key steps are creating an RCU schema on the database, selecting components during the installer, filling in database connection details, and testing the URLs upon completion.
This document provides tips and tricks for optimizing an IBM Connections environment. It includes 35 tips covering topics like Docs conversion on Linux, using a custom user for WebSphere services, surveys setup, global sender email addresses, Orient Me installation, WAS and 4096-bit SSL keys, seedlist validation, and more. The tips aim to help improve performance, security, and usability of an IBM Connections deployment.
Audit Vault Database Firewall 12.2.0.1.0 installationPinto Das
This document outlines the steps to install an Audit Vault server and Database Firewall server on two separate VMs. It describes creating the VMs, configuring memory, storage, and network settings, and starting the installation processes. The Audit Vault installation initially failed due to insufficient hard drive space but succeeded after allocating a 200GB drive. Both memory tests passed and installations began on the VMs.
Microsoft Windows 10 Bootcamp - Active directoryOlav Tvedt
This document summarizes a Microsoft Technical Bootcamp on Active Directory. It includes links and information on Active Directory templates, the central store, an Excel sheet template, and cleaning up the OU structure and using group and WMI filtering. It also discusses why modernizing Active Directory is important and the benefits of the Windows 10 Enterprise Mobility Suite, including mobile device and app management, information protection, identity and access management, and its integration with Microsoft Azure. Security topics like second factor authentication are also briefly mentioned.
WebSockets allow for bidirectional communication between a client and server over a single TCP connection. They improve on older "Comet" techniques which used polling and long-polling to simulate real-time updates. With WebSockets, the client can open a WebSocket connection to the server which sends messages at any time without needing an explicit request. This enables real-time applications with constantly updating information. The document outlines the WebSocket protocol, provides examples of the API in browsers, and discusses frameworks for building WebSocket applications.
The document provides an overview of key concepts for developers to know about Internet Information Services (IIS) 7 and 7.5. It discusses the new integrated pipeline architecture in IIS 7/7.5 which provides extensibility through modules. It also covers application pools, hosting applications and Windows Communication Foundation (WCF) services, and creating custom modules. Demo sections are included to illustrate configuration of modules, applications, and hosting WCF services.
An automated vulnerability scan was performed on a financial organization's website which uncovered several vulnerabilities in their enrollment website (enroll.site.com) that allowed sensitive customer information like credit cards and applications to be accessed. The vulnerabilities included detailed error messages revealing information, lack of session authentication, incorrect file permissions, and default files still existing for the Forte WebEnterprise application. Access to internal systems was also achieved through an exposed debugging option.
Giancarlo Gomez presented on using websockets for realtime applications with ColdFusion. He began by explaining what websockets are and how they allow for bidirectional messaging with low latency compared to HTTP polling techniques. He then demonstrated how to enable and use websockets in ColdFusion, including securing connections and using websockets in a clustered environment. Finally, he discussed real world uses of websockets and issues to consider like network connections and application reloads.
IIS (Internet Information Services) is a web server application created by Microsoft for use with Windows operating systems. It supports protocols like HTTP, HTTPS, FTP, and more. IIS has been included with Windows NT, Windows 2000, Windows Server 2003, and beyond. Newer versions of IIS have added features like support for additional authentication mechanisms, modules for extending functionality, and performance/security improvements.
Virtual Hosts Configuration with Weblogic ServerPawan Kumar
Virtual hosting in Weblogic Server allows mapping host names to the IP address of a server or cluster. This hides the server IP addresses from clients and allows applications to be targeted to a virtual host rather than an individual server. The steps to configure a virtual host include creating a network channel, defining the virtual host in the Weblogic console, targeting applications to the virtual host, and modifying host files to map the virtual host name to the server IP address.
Frontend Performance: Beginner to Expert to Crazy PersonPhilip Tellis
The very first requirement of a great user experience is actually getting the bytes of that experience to the user before they they get fed up and leave.
In this talk we'll start with the basics and get progressively insane. We'll go over several frontend performance best practices, a few anti-patterns, the reasoning behind the rules, and how they've changed over the years. We'll also look at some great tools to help you.
Containerize Legacy .NET Framework Web Apps for Cloud MigrationAmazon Web Services
In this session, we cover how to leverage Docker for Windows and the Amazon Elastic Container Service (Amazon ECS) as an effective solution for migrating legacy .NET applications to the cloud.We use Microsoft Visual Studio to demonstrate how to containerize a legacy .NET app including the Docker build and deployment process.We also cover how to deploy the container to Amazon ECS using the Amazon EC2 Container Registry (Amazon ECR) service to host the Docker image.
WordPress Security Presentation by Jason Conroy (from Finding Simple - http://findingsimple.com) for the March 2013 WordPress Canberra Meetup (http://wpcanberra.com.au)
El documento habla sobre el contenido digital y su uso en Colombia. Explica que Internet se ha extendido a zonas rurales a través de 7621 kioscos y que ahora hay acceso a Internet de alta velocidad. También menciona que el uso de trámites por línea y el contenido digital han ayudado a disminuir el hurto y sacar a 402.000 personas de la pobreza, además de proveer soluciones digitales para personas con discapacidad.
The document provides recommendations for promoting integration of internationally educated health professionals (IEHPs) in communities in Prince Edward Island (PEI), Canada. It outlines initiatives implemented through the IEHP project to increase IEHP integration and retention in communities, workplaces, schools, and through language services. The document serves as a guide for community leaders seeking to improve integration and retention of IEHPs and other newcomers to benefit communities through addressing workforce shortages.
The newsletter announces November promotions including a 20% MCB incentive for Bionorica and 15% OI for various A.Vogel products. It also details a new placement SPIFF offering $10-20 for placing 2-4 new SKUs and $100 for every 5 15-minute in-store training sessions. Marketing support is provided for Herbatint including new brochures, swatch books, sell sheets and samples. Herbatint will be featured in magazine ads with a $10 rebate. Valerie Hall is introduced as the new Professional Trainer.
referenciaimovel.com.br Casa em Itaipuaçu Cod 212Referenciaimovel
A União Europeia está enfrentando desafios sem precedentes devido à pandemia de COVID-19 e à invasão russa da Ucrânia. Isso destacou a necessidade de autonomia estratégica da UE em áreas como energia, defesa e tecnologia digital para tornar o bloco menos vulnerável a choques externos. A Comissão Europeia propôs novas iniciativas para fortalecer a resiliência econômica e de segurança da UE nos próximos anos.
Five Gettysburg Battlefield Monuments provides objectives for a student tour of historical monuments at Gettysburg Battlefield, summarizing key details about 5 monuments. The Virginia Monument is a tall sculpture made of specific materials. The Soldiers National Monument signifies something and is a certain height. The Soldiers and Sailors of the Confederacy statue has symbolic meaning and location. The Major General George Meade sculpture took a sculptor a certain time to finish and depicts Meade in a meaningful way. The War Horse statue depicts a man and his role in the Civil War.
Build Database Applications for SharePointIron Speed
Iron Speed Designer is a tool that can generate data-centric SharePoint applications quickly from a database. It allows developers to cut costs and accelerate development time compared to traditional software development methods. The tool produces ASPX pages, code files, and handles data access and security configuration. Applications generated with Iron Speed Designer can then be deployed to SharePoint servers through a wizard that packages the application as a solution for installation and activation across a web application.
Build Database Applications for SharePoint!Iron Speed
Iron Speed Designer is a tool that can generate data-centric SharePoint applications quickly from a database. It allows developers to cut costs and accelerate development time compared to traditional software development methods. The tool produces ASPX pages, code files, and handles data access and security configuration. Applications generated with Iron Speed Designer can then be deployed to SharePoint servers through a wizard that packages the application as a solution for installation and activation across a web application.
For more information on Patch Manager, visit: http://www.solarwinds.com/patch-manager.aspx
This two-part presentation will cover how to do WSUS Deployment on Windows Server 2008.
Part 1 – General considerations:
• Documentation review
• General considerations for deployment
• Local database vs Remote database
• Installation prerequisites
Part 2 – Installation:
• Installation on connected server
• Installation on disconnected server
• Migrating existing WSUS server
• Upgrade existing WSUS server
Automatic deployment on .NET web stack (Minsk .NET meetup 12.02.14)Is Antipov
This document discusses automatic deployment of .NET applications. It describes building and packaging code, using transformations to manage configurations for different environments, deploying via tools like Web Deploy, updating databases, and triggering the process from a continuous integration server. The goal is to automate deployment and eliminate errors from manual processes.
12-Factor App is a methodology for building web applications, software-as-a-service apps. Software applications that are Easy to Setup, Portable, Cloud Platform Ready, CI/CD Ready and Scalable.
How to Deploy WSO2 Enterprise Integrator in ContainersWSO2
This slide deck explores how WSO2 Enterprise Integrator can be deployed on a containerized deployment and the key configuration steps of successful production deployment and monitoring.
Watch webinar here: https://wso2.com/library/webinars/2018/10/how-to-deploy-wso2-enterprise-integrator-in-containers/
This document describes the installation and configuration of a network intrusion detection system using Snort and ACID. It outlines the software components used including Snort, ACID, MySQL, PHP, IIS and WinPcap. It then details the process of setting up the test network, installing each component, configuring Snort and ACID settings, and testing the system by generating traffic and viewing alerts.
N-Tier Application with Windows Forms - Deployment and SecurityPeter Gfader
Part 1: Deployment of .NET Winforms apps
History
Deployment & Updates
Security
Issues & Warnings
Configuration and user settings
Part 2: Security
Role-based security
Authentication and Authorization
Impersonation
Code Access Security
Assembly Strong Naming
IBM UrbanCode Deploy 6.0 provides new features for intuitive deployment modeling, environment configuration management, rich workflow design, and distributed deployment automation. Key additions in version 6.0 include a unified resource model, seamless integration with cloud services, team-based security, and new integrations for middleware configuration, mobile deployments, and other areas.
Deploying windows containers with kubernetesBen Hall
The document discusses deploying Windows containers with Kubernetes. It covers building Windows containers, deploying containers on Kubernetes, and operating Kubernetes. Specifically, it shows how to:
- Build a Windows container with SQL Server using Docker
- Deploy a .NET Core app container to Kubernetes and expose it using a load balancer
- Scale the deployment to multiple replicas and observe traffic distribution
- Perform rolling updates to deploy new versions of the application
The Microsoft WebsiteSpark program provides benefits and resources to small web development firms and hosting partners to help them build websites using Microsoft tools. It offers software licenses, hosting licenses, support incidents, and access to communities. To join, a firm needs a nomination from a hosting partner and must agree to develop one new website using Microsoft tools every six months. The program aims to drive new business opportunities and make it easy for web professionals and their partners to use Microsoft technologies.
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...Sharon James
This document provides an agenda and overview for a presentation on practical solutions and scripts for Connections administrators. The presentation covers topics like installing and configuring IBM WebSphere, DB2, and IBM HTTP Server; performance tuning datasources; setting J2EE security roles; configuring JVM log files and heap sizes; using mod_deflate to improve performance; and scripts for common administrative tasks like checking user IDs, activating/deactivating users, syncing user data, managing file policies, database maintenance, and backups. Demo scripts are provided for many of the tasks.
This document outlines deploying IBM Notes in VMware View and Microsoft RemoteApp environments. It discusses the benefits of each approach and provides an overview of the infrastructure required. It also provides guidance on installing Notes clients and tips for ensuring optimal performance on both platforms. VMware View allows full virtualized workstations on zero clients, while RemoteApp streams individual applications. The document aims to help administrators deliver the Notes client while reducing support overhead and infrastructure complexity.
The document provides an overview of installing PHP on Windows systems. It discusses choosing between the Windows InstallShield method (for beginners) or manual binary installation. The InstallShield process is demonstrated step-by-step using IIS as an example, covering downloading, choosing options, file extensions, and testing. The manual method requires copying files, setting permissions, and configuring the web server by adding application mappings in IIS. Examples demonstrate including header and footer files to create templates.
The document discusses PowerCenter 9.x upgrade strategies presented by Softpath at the Atlanta User Group. It introduces the presenters and provides an overview of Softpath. Various upgrade approaches - such as zero downtime, parallel, cloned, and in-place upgrades - are presented along with their benefits, risks, and time requirements. The stages of an upgrade including planning, preparation work, installation, testing, and production implementation are also outlined.
Sa106 – practical solutions for connections administratorsSharon James
This document provides an agenda and information for the MWLUG 2014 SA106 session on practical solutions for Connections administrators. The session will cover topics like installing and configuring IBM WebSphere and HTTP Server, performance tuning, setting security roles, configuring log files and JVM heap sizes, checking and syncing external user IDs, and working with files policies. Scripting solutions for automating many complex administrative tasks will be demonstrated. Attendees Sharon Bellamy and Christoph Stoettner are introduced, and disclaimers are provided about using scripts.
Rock Solid Deployment of Web ApplicationsPablo Godel
This document discusses best practices for deploying web applications. It recommends automating deployment using tools like Capistrano, Fabric, or Phing to allow for continuous deployment. It also stresses the importance of monitoring servers and applications during deployment using tools like StatsD, Graphite, Logstash, Graylog, and Kibana. The document provides examples of deployment scripts and emphasizes planning deployment early in the development process.
ASP.NET MVC is a web application framework launched in 2007 by Microsoft. It is based on the model-view-controller pattern and ASP.NET, allowing developers full control over HTML and enabling test-driven development. Websites using ASP.NET MVC include Stack Overflow and MarketWatch. It requires Visual Studio 2008 or higher and optionally Microsoft SQL Server. To deploy an ASP.NET MVC project, set copy local to true for required assemblies, then use the publish feature in Visual Studio to copy files to a local or remote folder.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
1. Microsoft Confidential – Internal Use Only
IIS Web Eco-System
Kenny Abdiel Maita
Premier Field Engineer
27th February 2013
Customer Service and Support
2. Microsoft Confidential – Internal Use Only
1 MS Web Eco-system
2 Web Platform Installer
3 Web Deploy
4 Web App Gallery
Agenda.
IIS Web Eco-System
2
4. Microsoft Confidential – Internal Use Only
IIS Web Eco-system
4
Set of Servers, Databases, Frameworks, Tools, Applications, Hosting partners and training
partners looking to help you succeed on the web.
6. Microsoft Confidential – Internal Use Only
Web PI 4.5
6
Makes it easy for you to download, install, and keep up to date on the latest
software components of the Microsoft® Web Platform for development and
application hosting on the Windows® operating system.
• What it provides
• Installation
• How it works
7. Microsoft Confidential – Internal Use Only
Web PI 4.5: What it provides
7
WPI allows for easier
management, download
and install of:
• IIS Components
• SQL Server
Express/Compact
• .Net Framework/PHP
• IDE Tools and SDK
• Apps from Gallery and
dependencies.
IIS Manager integration
allows for usage simplicity
WebPICMD.exe:
Used to script, installs
and automate
deployment of servers.
3 Operation modes:
• List products
• Install products
• Offline cache
8. Microsoft Confidential – Internal Use Only
Web PI 4.5: Installation
8
http://www.microsoft.com/web/downloads/platform.aspx
12. Microsoft Confidential – Internal Use Only
Web PI 4.5: Issues
12
If WebPI itself is failing to install – Check or Post the log file here: %temp%webpi_launcher.txt
If WebPI is installed, but an application or product fails to install: Check or Post the latest WebPIx.txt file from here:
Win7/Vista/Win2k8 and above: %localappdata%microsoftweb platform installerlogswebpi
XP/Win2k3: %userprofile%local settingsapplication datamicrosoftweb platform installerlogswebpi
WebPI is installed and you know specifically which product is failing: You can look for the installer log file from the component that failed.
Win7/Vista/Win2k8 and above: %localappdata%microsoftweb platform installerlogsinstall<datetimestamp>
XP/Win2k3: %userprofile%local settingsapplication datamicrosoftweb platform installerlogsinstall<datetimestamp
http://forums.iis.net/1155.aspx
15. Microsoft Confidential – Internal Use Only
Web Deploy V3.0
15
Web Deploy (msdeploy) simplifies deployment of Web sites, Web applications
and Virtual directories to IIS servers. Administrators can use Web Deploy to
synchronize content and configurations between IIS servers or migrate to newer
versions of IIS. Additionally, Web Deploy tool enables administrators and
delegated users to use IIS Manager to deploy ASP.NET and PHP applications to
an IIS server.
• Main features
• How it works
• Usage scenarios
16. Microsoft Confidential – Internal Use Only
Web Deploy: Main features
16
It simplifies the
management
and deployment
of IIS on
multiple servers
(Win2003 and
Higher)
www.iis.net/down
load/WebDeploy
Three primary
tasks:
• Sync
• Package
• Deploy
17. Microsoft Confidential – Internal Use Only
Web Deploy: Main features
17
Sync
• Synchronize or migrate the
entire Web server, a Web
site or application.
• Synchronizes only the data
that has changed
• Ability to detect missing
dependencies during
synchronization
• Automatically gathers
content, IIS configuration,
SSL certificates and
ASP.NET configuration
when you sync a Web site
Package
• Package a Web application
or an entire site, including
the associated databases.
• Package ACLs, COM, GAC
and registry settings.
• Support both live servers
and zipped packages as a
source or destination.
Deploy
• Operations can be
performed and can
delegate tasks to non-
administrators.
• Ability to add powerful
parameters to change
text in files when they
are deployed.
18. Microsoft Confidential – Internal Use Only
18
Web Deploy: How it works
Windows Service (Listening)
Hosting Escenarios
Win 2003-IIS RM
Win Vista
Win 7
Win 2008
Win 2008R2
Win 8 (V3)
Win 2012(V3)
Win 2003-IIS RM
Win Vista
Win 7
Win 2008
Win 2008R2
Win 8 (V3)
Win 2012(V3)
MsDepSvc.exe
8172
19. Microsoft Confidential – Internal Use Only
19
Web Deploy: Verbs
VERBS
• Verbs are used to
determine the operation
that is being performed.
Dump
Sync – you will most commonly use
this verb
Delete
getDependencies
getParameters
getSystemInfo
20. Microsoft Confidential – Internal Use Only
20
Web Deploy: Providers
Providers
• Provide a scope for the
tool to work on (Source and
Destination).
•About 32 available.
21. Microsoft Confidential – Internal Use Only
21
Web Deploy: Providers Setting
Providers Setting
(Common Settings)
Customize the Providers
chosen:
source:webserver,
computerName=<serve
rname>
22. Microsoft Confidential – Internal Use Only
22
Web Deploy: Link Extensions
Link Extensions
Just Five
Provide supplementary
data not called out
explicitly by the
Provider.
23. Microsoft Confidential – Internal Use Only
23
Web Deploy: Rules
Rules
• 35 built in rules
• Apply when a Sync operation
is being attempted
• Custom rules are present in
msdeploy.exe.configsettings
file
• Examples :
skipUNC,
DependencyCheckAppPool
Exists etc.
24. Microsoft Confidential – Internal Use Only
24
Web Deploy: Usage scenarios
1. Synchronization Operations
•Migrate settings from an IIS 6.0 server to an IIS 7.x and IIS8 servers
•Synchronize settings between IIS 8.0 servers
•Synchronize settings between IIS 7.0 servers
•Synchronize settings between IIS 6.0 servers
2. Package and Deploy Operations
•Create a Package
•Import / Install a Package
25. Microsoft Confidential – Internal Use Only
25
Web Deploy: Samples
Sync (Live)
msdeploy -verb:getDependencies -source:apphostconfig="Default Web Site“
msdeploy -verb:sync -source:apphostconfig="Default Web Site" -dest:apphostconfig="Default Web Site“, computername=Server2 > msdeploysync.log
msdeploy -verb:sync -source:apphostconfig="Default Web Site",computername=Server1 -dest:apphostconfig="Default Web Site" > msdeploysync.log
Migration (Offline)
msdeploy -verb:getDependencies -source:metakey=lm/w3svc/1
msdeploy -verb:sync -source:metakey=lm/w3svc/1 -dest:package=c:Site1.zip > WebDeployPackage.log
msdeploy -verb:sync -source:package=c:Site1.zip -dest:metakey=lm/w3svc/2 > PackageSyncFinal.log
PUSH from source
PULL from Destination
26. Microsoft Confidential – Internal Use Only
26
Web Deploy: Usage scenarios
1.Sync IIS objects between two IIS 7 machines
msdeploy -verb:sync -source:apphostconfig="Default Web Site",computername=sourceserver -
dest:apphostconfig="Default Web Site" -enableLink:AppPoolExtension
msdeploy -verb:sync -source:apphostconfig="Default Web
Site",computername=sourceserver -dest:apphostconfig="Default Web Site" -
enableLink:AppPoolExtension -disableLink:ContentExtension
msdeploy -verb:sync -
source:iisApp=EntPortalIntranet,computerName=sourceServer -
dest:iisApp=EntPortalIntranet
27. Microsoft Confidential – Internal Use Only
27
Web Deploy: Usage scenarios
2. Migrate a website from IIS 6.0 to IIS 7.0
msdeploy -verb:getDependencies -source:metakey=lm/w3svc/1
msdeploy -verb:sync -source:metakey=lm/w3svc/1 -
dest:metakey=lm/w3svc/2
msdeploy -verb:sync -source:metaKey=lm/w3svc/1,metaDataGetInherited=true -
dest:metaKey=lm/w3svc/2
28. Microsoft Confidential – Internal Use Only
28
Web Deploy: Usage scenarios
3. Using manifests to sync multiple providers
<site>
<appHostConfig path="Default Web Site" />
<contentPath path="c:source" />
<appPoolConfig path="mySitePool" />
<gacAssembly path="Test.Assembly, Version=1.0.0.0, Culture=neutral, PublicKeyToken=2eds8d236nhbbf786k" />
<dirPath path="C:MyExtraFiles" />
<regKey path="HKLMSoftwareODBC" />
<comObject32 path="Microsoft.ApplicationHost.AdminManager" />
</site>
msdeploy.exe -verb:sync -source:manifest=custom.xml -dest:manifest=custom.xml,computername=Server1
29. Microsoft Confidential – Internal Use Only
29
Web Deploy: Usage scenarios
4. Modifying sync behavior using rules (Msdeploy.exe.configsetting.example)
msdeploy -verb:sync -source:webServer -dest:webServer,computerName=Server2 -
disableRule:SkipUNC
msdeploy -verb:sync -source:apphostconfig="Default Web Site",computername=sourceserver -
dest:apphostconfig="Default Web Site" -enableLink:AppPoolExtension -
skip:objectName=filepath, absolutePath=.*foldersubfolder.*.gif$
msdeploy -verb:sync -source:apphostConfig=”Default Web Site -dest:auto,computername=Destination -
replace:objectName=virtualDirectory,match="c:content",replace="c:content2"
Msdeploy.exe -verb:sync -source:iisApp=mySite -dest:auto,computername=<publishUrl> -
enableRule:AppOffline
30. Microsoft Confidential – Internal Use Only
30
Web Deploy: Usage scenarios
5. Offline syncing of servers
msdeploy -verb:sync -source:apphostconfig="Default Web Site" -
dest:archivedir=C:archive
msdeploy -verb:sync -source:archivedir=c:archive -
dest:appHostConfig="Default Web Site"
31. Microsoft Confidential – Internal Use Only
31
Web Deploy: Usage scenarios
6. Syncing databases with Web Deploy
msdeploy.exe -verb:sync -source:dbFullSql="Data Source=.SQLEXPRESS;Initial
Catalog=SourceDatabase;Integrated Security=true" -dest:dbFullSql="Data
Source=.SQLEXPRESS;Initial Catalog=DestDatabase;Integrated Security=true"
msdeploy.exe -verb:sync -source:dbFullSql="Data
Source=.SQLEXPRESS;Initial Catalog=SourceDatabase;Integrated
Security=true" -dest:package="c:package.zip"
32. Microsoft Confidential – Internal Use Only
32
Web Deploy: Usage scenarios
7. Web Deploy to compare two websites
msdeploy -verb:sync -source:apphostConfig="Site1" -dest:archivedir=C:Site1Archive
msdeploy -verb:sync -source:archiveDir=C:Site1Archive -
dest:apphostconfig="Site1" -whatif -verboseLevel:Informational > log.txt
msdeploy -verb:sync -source:archiveDir=C:Site1Archive -dest:apphostconfig="Site1" -whatif -
verboseLevel:Informational -disableRule:Dependency*
> log.txt
33. Microsoft Confidential – Internal Use Only
33
Web Deploy: Usage scenarios
8. Transform Web.config with Web Deploy
<configuration>
<configSections>
<sectionGroup name="myGroup">
<section name="data" type="MyApp.DataConfigurationSection, MyApp.Data" />
</sectionGroup>
</configSections>
<myGroup>
<data interval="3" useCache="true" />
</myGroup>
</configuration>
msdeploy -verb:sync -source:apphostconfig="Default Web Site" -dest:package=sitepackage.zip -
declareParam:name=UseCache,
kind=XmlFile,scope=web.config,match="/configuration/myGroup/data/@useCache"
msdeploy -verb:sync -source:package=sitepackage.zip -dest:auto -setParam:name=UseCache, value="false"
1
2
3
34. Microsoft Confidential – Internal Use Only
34
Web Deploy: Usage scenarios
9. Running tasks before and after a sync with Web Deploy
From source:
msdeploy –verb:sync –source:appHostConfig=Econo, computerName=Producction –dest:auto
–preSync:runCommand=”Appcmd stop site MySite & Appcmd set site MySite
/serverAutoStart:false” -postSync:runCommand=”Appcmd start site MySite & Appcmd set site
MySite /serverAutoStart:true
37. Microsoft Confidential – Internal Use Only
Web App Gallery
37
The Windows® Web Application Gallery gives Web site builders an easy way to
discover, learn about, and install freely available and community applications on
Internet Information Services (IIS) Web servers.
• What it is
• Windows Web Application Gallery for Developers
• Process for an App to be on the gallery.
38. Microsoft Confidential – Internal Use Only
Web App Gallery: What is it
38
http://www.microsoft.com/web/gallery/categories.aspx
41. Microsoft Confidential – Internal Use Only
Web App Gallery: Principles
41
Windows Web Application Gallery Principles
The application to which you provide a link Must:
• Be Current
• Be Free of Charge
• Be Compatible
• Be Deployable
• Be Supported
• Be Hostable
• Be Platform Independent
• Be Inclusive
• Be Safe
• Be a Web App
42. Microsoft Confidential – Internal Use Only
Links
42
IIS Web EcoSystem
http://www.microsoft.com/web
Web Platform Installer
http://www.iis.net/learn/install/web-platform-installer/using-the-microsoft-web-platform-installer
http://www.iis.net/learn/troubleshoot/web-platform-installer-issues/troubleshooting-problems-with-microsoft-web-platform-installer
http://forums.iis.net/1155.aspx.
Microsoft Web Deploy
http://www.iis.net/downloads/microsoft/web-deploy
http://blogs.iis.net/msdeploy/
http://technet.microsoft.com/en-us/library/dd569040(WS.10).aspx Providers
Microsoft Web App Gallery
http://www.microsoft.com/web/gallery/
http://forums.iis.net/1158.aspx
The Agenda for this Session will be
Microsoft or IIS Web Eco System
Web Platform Installer
Web Deployment Tool, Web Deploy or MsDeploy and
The App Gallery