Novell Sentinel provides many useful reports right out of the box, but what do you do when you are looking for a custom report? This session will explore how to leverage and integrate the third-party reporting tools Crystal Reports and Jasper. We will introduce you to the Sentinel and Jasper reporting environments from setup to basic usage. You will also learn how to create and generate highly customizable reports that present the Sentinel normalized event data in a format that fits your environment.
Session Benefits
During the session, you will:
Learn how to set up a Crystal Reports and Jasper reporting environment
Create basic reports for Sentinel with reporting tools
Become familiar with the Sentinel and reports environments
Briefly overview the syntax to parse and manipulate normalized Sentinel data
Demonstrate the use of iReport, the graphical report designer for Jasper, to customize existing templates
Have you wondered what the future of collaboration looks like? Because collaboration is so central to our customers' productivity and profitability, it's a key area for innovation at Novell. It's also an area that complements our focus on intelligent workload management. Attend this session, presented by the Novell Collaboration leadership team, for a sneak peek into our plans for collaboration innovation, as well as the link between collaboration and intelligent workload management.
Richard Lindstedt Collaboration Solution Manager, Novell, Inc.
Ken Muir CTSO - Collaboration Novell, Inc.
There are many roadblocks to cloud adoption. This session will discuss those roadblocks and show how Novell technology and products make the cloud safe, secure, auditable and compliant.
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
As your company considers moving toward the cloud either by adopting more Software-as-a-Service applications or other cloud services, the complexity and management of security policies and identities increase. Learn how you can manage a multi-SaaS environment to consistently enforce your internal identity and policy roles in the cloud. Leverage your existing identity infrastructure to enable single sign-on, access the right resources and receive audit logs from the cloud
Maintaining deployed software systems is one of the most challenging processes in enterprise IT. As software systems are deployed, they compound management and maintenance burdens for IT personnel. Systems that are not maintained correctly can result in increased downtime and expenses. Software appliances are no different. But during this session we'll show you simple and easy it is to use the tools that help you keep your software appliances up to date. You will learn how to handle the authentication, entitlement and access controls required to distribute updates. We will show you a framework for remote appliance configuration. And finally, you will learn how to meet unique remote appliance management needs.
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
This session will provide everything you need to know to deploy Novell iFolder 3.8—as well as a look at its latest set of rich features. Showcasing iFolder in single-server, multi-server and cluster deployments, we'll demonstrate iFolder as load balancer and iFolder in a Storage Area Network on Fiber Channel. You'll also hear about new iFolder features like Active Directory integration, pass phrase recovery, platform support and more.
Novell iPrint is truly one of the hidden gems in the Novell portfolio. Attend this session to learn highly useful advanced features for running iPrint on Linux. These features include mass management of the Print Manager database, Print Manager database disaster recovery techniques, troubleshooting tips, command line administration and much more. We'll also demonstrate some of the newest iPrint features.
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Best Practices for Administering Novell GroupWise 8Novell
Along with a host of new end-user features, Novell GroupWise 8 includes administrative updates to make it easier than ever to keep your system running reliably, safeguard your data and leverage your existing investments. This session will assist you in perfecting the administration of your GroupWise messaging environment. You'll learn how to optimize and manage agents and configuration settings to maximize your system stability and performance.
Have you wondered what the future of collaboration looks like? Because collaboration is so central to our customers' productivity and profitability, it's a key area for innovation at Novell. It's also an area that complements our focus on intelligent workload management. Attend this session, presented by the Novell Collaboration leadership team, for a sneak peek into our plans for collaboration innovation, as well as the link between collaboration and intelligent workload management.
Richard Lindstedt Collaboration Solution Manager, Novell, Inc.
Ken Muir CTSO - Collaboration Novell, Inc.
There are many roadblocks to cloud adoption. This session will discuss those roadblocks and show how Novell technology and products make the cloud safe, secure, auditable and compliant.
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
As your company considers moving toward the cloud either by adopting more Software-as-a-Service applications or other cloud services, the complexity and management of security policies and identities increase. Learn how you can manage a multi-SaaS environment to consistently enforce your internal identity and policy roles in the cloud. Leverage your existing identity infrastructure to enable single sign-on, access the right resources and receive audit logs from the cloud
Maintaining deployed software systems is one of the most challenging processes in enterprise IT. As software systems are deployed, they compound management and maintenance burdens for IT personnel. Systems that are not maintained correctly can result in increased downtime and expenses. Software appliances are no different. But during this session we'll show you simple and easy it is to use the tools that help you keep your software appliances up to date. You will learn how to handle the authentication, entitlement and access controls required to distribute updates. We will show you a framework for remote appliance configuration. And finally, you will learn how to meet unique remote appliance management needs.
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
This session will provide everything you need to know to deploy Novell iFolder 3.8—as well as a look at its latest set of rich features. Showcasing iFolder in single-server, multi-server and cluster deployments, we'll demonstrate iFolder as load balancer and iFolder in a Storage Area Network on Fiber Channel. You'll also hear about new iFolder features like Active Directory integration, pass phrase recovery, platform support and more.
Novell iPrint is truly one of the hidden gems in the Novell portfolio. Attend this session to learn highly useful advanced features for running iPrint on Linux. These features include mass management of the Print Manager database, Print Manager database disaster recovery techniques, troubleshooting tips, command line administration and much more. We'll also demonstrate some of the newest iPrint features.
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Best Practices for Administering Novell GroupWise 8Novell
Along with a host of new end-user features, Novell GroupWise 8 includes administrative updates to make it easier than ever to keep your system running reliably, safeguard your data and leverage your existing investments. This session will assist you in perfecting the administration of your GroupWise messaging environment. You'll learn how to optimize and manage agents and configuration settings to maximize your system stability and performance.
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
This session will outline how to implement the out-of-the-box controls and reports included in the identity tracking solution pack that ships with Novell Compliance Management Platform. Additionally, you will be guided through examples to expand beyond what is included with the basic configuration of Compliance Management Platform. Before attending, you should have a general understanding of the architecture and deployment of Novell Identity Manager, Novell Access Manager and Novell Sentinel.
Novell Success Stories: Endpoint Management for NonprofitsNovell
Novell Endpoint Management benefits are to improve user productivity, lower IT costs, and mitigate risks.
This presentation will show you how three nonprofits in particular- The Atlantic Philanthropies, Vancouver Convention Center, and Sesame Workshop- reduced IT costs and benefited from Novell Endpoint Management.
Novell ZENworks technologies have been in use for over a decade, and the future has never been brighter. This session will focus on Novell ZENworks Configuration Management and the upcoming version 11 release. It will also cover new developments in the product line, such as Linux device management, advanced power management tools and integrated endpoint security capabilities. Finally, we'll provide a roadmap review that details upcoming releases for other products in the Endpoint Management portfolio.
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
Facing installation problems? Not sure where to get the list of registries required? Need a tool to generate your own configuration files? Need a technical note to ensure that you proceed with installation, deployment and usage of Novell SecureLogin with ease? Not sure what the SecureLogin log means or how to use it?
If you’re running into challenges installing SecureLogin or just need to know what to do when it’s not working correctly, attend this session to get all the tips and tricks from product developers and Novell Technical Services. The session will provide installation and configuration guidance, including:
• How to use the SecureLogin config tool
• How to generate and customize your response file
• How to customize your installation
• How to complete a single-click install
• And much more
You will also learn what to do when issues with SecureLogin arise. Novell technical support presenters will cover common problems seen in support, available tools and how to use them, and specific troubleshooting steps that will help you keep SecureLogin running smoothly in your environment. You'll also learn what to do when these measures fail and what to have ready when you call support.
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
Benefit from the hard-won experience gained by Novell Consulting in dozens of Novell Open Enterprise Server 2 upgrades. In this session, we will discuss the methodologies successfully used with both large and small customers. We'll also discuss prerequisites, environmental preparation, migration strategies and post-migration cleanup. Handouts containing a pre-migration discovery survey and a migration checklist will be provided.
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
During this session, you'll get an in-depth look at the principles and best practices of planning a server consolidation project. You will learn how to ensure projects meet goals such as minimizing new hardware purchases or rack space, how and when to use different strategies such as scale up versus scale out, and how to prove those goals were met after the project is finished.
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
Come to this session and see how Novell Privileged User Manager can help your organization reduce the cost, complexity and risk associated with managing superusers across the enterprise. Find out how to rapidly deploy superuser management for Novell Open Enterprise Server 2. You will see a live demo of how Novell Privileged User Manager allows you to control what commands users are authorized to run, at what time and from what location.
Archiving and e-Discovery for Novell GroupWiseNovell
With an increase in regulations and internal policies governing data retention, e-mail has come into the spotlight. In fact, securing and preserving e-mail data is more important than ever before. Attend this session to hear the perspective of a legal expert in e-mail archiving and e-Discovery. We'll also discuss the options available for addressing this need through our partners, many of whom have significant expertise in this area.
Using Hard Disk Encryption and Novell SecureLoginNovell
Laptop theft is one of the most common crimes in industrial countries. Therefore, the demand for laptop security and the need to protect confidential data on hard disks is increasing. Several products on the market address this issue by offering hard disk encryption combined with login security. This session will show how these solutions can be integrated into a Novell environment.
A typical scenario might look like the following: The digital certificates used for encryption are generated in Novell eDirectory; the certificates are used with smartcards, which are also managed in eDirectory. The configuration of the hard disk encryption solution is deployed to clients with Novell ZENworks (no user interaction is necessary during installation and configuration). The hard disk encryption registration is combined with Novell SecureLogin, which results in a single sign-on.
This session will describe in detail what the configuration of hard disk encryption in such a scenario looks like, and will feature a live demonstration. The presenters are independent consultants with no interest in marketing a particular hard disk encryption solution.
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
This session will discuss issues that arise when migrating from Red Hat Enterprise Linux to SUSE Linux Enterprise Server. The session will focus on tools and techniques that can be used in aiding the migration, covering basic migration issues, analysis of the installation base, and moving third-party applications from Red Hat to SUSE Linux Enterprise Server. The session will also briefly touch on the Novell Expanded Support program.
This session will teach you how to leverage virtualization and advanced management technologies from Novell to build an internal cloud infrastructure. You'll be able to build an infrastructure that allows your IT organization to package, price and promote IT service capabilities to your internal customers while giving them exceptional visibility into how those services are performing against SLA targets. Learn what an enterprise cloud is, and why having a virtual infrastructure isn't enough. Understand how the concept of an internal cloud can help you work better and more efficiently with your customers, improve communication, boost utilization and speed delivery of new IT services.
Applying Novell Identity Manager to Your Everyday ProblemsNovell
In this session, you will hear from experts on the best way to approach the password management/self service and the web services - two of the most common use cases for Novell Identity Manager.
This session will remove the mystery from installing the UserApp and configuring password self-service, including a number of procedures that exist only in scattered technical information documents (TIDs). You will take away a set of proven procedures that will help you prepare password self-service for your end users and learn how to provide a simple URL for password self-service that's easy for end users to remember.
Rapid Deployment of Novell ZENworks Configuration ManagementNovell
When implementing Novell ZENworks Configuration Management, proper planning can help ensure an optimal result. In this session, you will learn methodologies developed by Novacoast for rapidly deploying the product. You will see a demonstration of implementation strategies including creation of application objects, configuration of servers and satellite devices, development of user and workstation policies, conversion of applications from earlier versions and integration with Active Directory.
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Novell
Application repackaging and operating system migrations significantly impact an IT organization's time, budget and internal reputation. In this session, you'll learn best practices for planning, testing, implementing and managing application repackaging for deployment on Novell ZENworks 10 Configuration Management—and enjoying the monetary and management value of an optimized desktop infrastructure. You'll also receive a technical overview of the best methods for packaging applications and get new tips for producing MSI 5.0 virtual packages and deploying on Windows 7.
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
File-based data is growing faster, consuming more space and being retained longer than ever before. Attend this session to find out how you can tame the file storage beast! You'll be introduced to the unique new offering from Novell, Novell File Management Suite, and how it can help you reduce storage infrastructure costs, save man hours, enhance existing investments in storage hardware and software, and improve compliance.
Demo: Easily Deploy Applications with Standing CloudOpSource
Standing Cloud powered by OpSource is an easy way to deploy, operate, and scale applications on the OpSource Cloud, whether you're a business user, software developer, or system administrator.
Using Novell Sentinel Log Manager to Monitor Novell ApplicationsNovell
Novell Sentinel Log Manager is a powerful log management and reporting solution. It supports collecting and reporting on log and audit data generated by Novell Identity Manager and Novell Open Enterprise Server. This integration enhances Identity Manager and Open Enterprise Server with powerful reporting capabilities.
This session will explain how Sentinel Log Manager can integrate with Identity Manager and Open Enterprise Server to collect log and audit data. It will also show how this integration can be used to provide compelling reports about Identity Manager and Open Enterprise Server activity.
This session explains how SLM can integrate with IDM and OES to collect log and audit data. It will also show how this integration can be used to provide compelling reports of IDM and OES activity.
Speaker: David Corlette Product Line Lead
Novell, Inc.
How to Architect a Novell Sentinel ImplementationNovell
Architecting a Novell Sentinel, Novell Sentinel Rapid Deployment or Novell Sentinel Log Manager installation can be a complicated process, particularly for users who are required to collect data from a large distributed environment. Many factors can impact the architecture users choose, including the amount of data, network link quality, device types, and features of Sentinel and/or Sentinel Log Manager the user wishes to take advantage of.
This session will explain common Sentinel architectural requirements requested by users and will demonstrate how to architect a Sentinel system to meet these requirements. This includes what and how much hardware to buy, how to choose between Sentinel Log Manager, collector managers, or a full Sentinel deployment in order to best meet your needs at the most efficient cost.
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
This session will outline how to implement the out-of-the-box controls and reports included in the identity tracking solution pack that ships with Novell Compliance Management Platform. Additionally, you will be guided through examples to expand beyond what is included with the basic configuration of Compliance Management Platform. Before attending, you should have a general understanding of the architecture and deployment of Novell Identity Manager, Novell Access Manager and Novell Sentinel.
Novell Success Stories: Endpoint Management for NonprofitsNovell
Novell Endpoint Management benefits are to improve user productivity, lower IT costs, and mitigate risks.
This presentation will show you how three nonprofits in particular- The Atlantic Philanthropies, Vancouver Convention Center, and Sesame Workshop- reduced IT costs and benefited from Novell Endpoint Management.
Novell ZENworks technologies have been in use for over a decade, and the future has never been brighter. This session will focus on Novell ZENworks Configuration Management and the upcoming version 11 release. It will also cover new developments in the product line, such as Linux device management, advanced power management tools and integrated endpoint security capabilities. Finally, we'll provide a roadmap review that details upcoming releases for other products in the Endpoint Management portfolio.
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
Facing installation problems? Not sure where to get the list of registries required? Need a tool to generate your own configuration files? Need a technical note to ensure that you proceed with installation, deployment and usage of Novell SecureLogin with ease? Not sure what the SecureLogin log means or how to use it?
If you’re running into challenges installing SecureLogin or just need to know what to do when it’s not working correctly, attend this session to get all the tips and tricks from product developers and Novell Technical Services. The session will provide installation and configuration guidance, including:
• How to use the SecureLogin config tool
• How to generate and customize your response file
• How to customize your installation
• How to complete a single-click install
• And much more
You will also learn what to do when issues with SecureLogin arise. Novell technical support presenters will cover common problems seen in support, available tools and how to use them, and specific troubleshooting steps that will help you keep SecureLogin running smoothly in your environment. You'll also learn what to do when these measures fail and what to have ready when you call support.
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
Benefit from the hard-won experience gained by Novell Consulting in dozens of Novell Open Enterprise Server 2 upgrades. In this session, we will discuss the methodologies successfully used with both large and small customers. We'll also discuss prerequisites, environmental preparation, migration strategies and post-migration cleanup. Handouts containing a pre-migration discovery survey and a migration checklist will be provided.
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
During this session, you'll get an in-depth look at the principles and best practices of planning a server consolidation project. You will learn how to ensure projects meet goals such as minimizing new hardware purchases or rack space, how and when to use different strategies such as scale up versus scale out, and how to prove those goals were met after the project is finished.
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
Come to this session and see how Novell Privileged User Manager can help your organization reduce the cost, complexity and risk associated with managing superusers across the enterprise. Find out how to rapidly deploy superuser management for Novell Open Enterprise Server 2. You will see a live demo of how Novell Privileged User Manager allows you to control what commands users are authorized to run, at what time and from what location.
Archiving and e-Discovery for Novell GroupWiseNovell
With an increase in regulations and internal policies governing data retention, e-mail has come into the spotlight. In fact, securing and preserving e-mail data is more important than ever before. Attend this session to hear the perspective of a legal expert in e-mail archiving and e-Discovery. We'll also discuss the options available for addressing this need through our partners, many of whom have significant expertise in this area.
Using Hard Disk Encryption and Novell SecureLoginNovell
Laptop theft is one of the most common crimes in industrial countries. Therefore, the demand for laptop security and the need to protect confidential data on hard disks is increasing. Several products on the market address this issue by offering hard disk encryption combined with login security. This session will show how these solutions can be integrated into a Novell environment.
A typical scenario might look like the following: The digital certificates used for encryption are generated in Novell eDirectory; the certificates are used with smartcards, which are also managed in eDirectory. The configuration of the hard disk encryption solution is deployed to clients with Novell ZENworks (no user interaction is necessary during installation and configuration). The hard disk encryption registration is combined with Novell SecureLogin, which results in a single sign-on.
This session will describe in detail what the configuration of hard disk encryption in such a scenario looks like, and will feature a live demonstration. The presenters are independent consultants with no interest in marketing a particular hard disk encryption solution.
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
This session will discuss issues that arise when migrating from Red Hat Enterprise Linux to SUSE Linux Enterprise Server. The session will focus on tools and techniques that can be used in aiding the migration, covering basic migration issues, analysis of the installation base, and moving third-party applications from Red Hat to SUSE Linux Enterprise Server. The session will also briefly touch on the Novell Expanded Support program.
This session will teach you how to leverage virtualization and advanced management technologies from Novell to build an internal cloud infrastructure. You'll be able to build an infrastructure that allows your IT organization to package, price and promote IT service capabilities to your internal customers while giving them exceptional visibility into how those services are performing against SLA targets. Learn what an enterprise cloud is, and why having a virtual infrastructure isn't enough. Understand how the concept of an internal cloud can help you work better and more efficiently with your customers, improve communication, boost utilization and speed delivery of new IT services.
Applying Novell Identity Manager to Your Everyday ProblemsNovell
In this session, you will hear from experts on the best way to approach the password management/self service and the web services - two of the most common use cases for Novell Identity Manager.
This session will remove the mystery from installing the UserApp and configuring password self-service, including a number of procedures that exist only in scattered technical information documents (TIDs). You will take away a set of proven procedures that will help you prepare password self-service for your end users and learn how to provide a simple URL for password self-service that's easy for end users to remember.
Rapid Deployment of Novell ZENworks Configuration ManagementNovell
When implementing Novell ZENworks Configuration Management, proper planning can help ensure an optimal result. In this session, you will learn methodologies developed by Novacoast for rapidly deploying the product. You will see a demonstration of implementation strategies including creation of application objects, configuration of servers and satellite devices, development of user and workstation policies, conversion of applications from earlier versions and integration with Active Directory.
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Novell
Application repackaging and operating system migrations significantly impact an IT organization's time, budget and internal reputation. In this session, you'll learn best practices for planning, testing, implementing and managing application repackaging for deployment on Novell ZENworks 10 Configuration Management—and enjoying the monetary and management value of an optimized desktop infrastructure. You'll also receive a technical overview of the best methods for packaging applications and get new tips for producing MSI 5.0 virtual packages and deploying on Windows 7.
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
File-based data is growing faster, consuming more space and being retained longer than ever before. Attend this session to find out how you can tame the file storage beast! You'll be introduced to the unique new offering from Novell, Novell File Management Suite, and how it can help you reduce storage infrastructure costs, save man hours, enhance existing investments in storage hardware and software, and improve compliance.
Demo: Easily Deploy Applications with Standing CloudOpSource
Standing Cloud powered by OpSource is an easy way to deploy, operate, and scale applications on the OpSource Cloud, whether you're a business user, software developer, or system administrator.
Using Novell Sentinel Log Manager to Monitor Novell ApplicationsNovell
Novell Sentinel Log Manager is a powerful log management and reporting solution. It supports collecting and reporting on log and audit data generated by Novell Identity Manager and Novell Open Enterprise Server. This integration enhances Identity Manager and Open Enterprise Server with powerful reporting capabilities.
This session will explain how Sentinel Log Manager can integrate with Identity Manager and Open Enterprise Server to collect log and audit data. It will also show how this integration can be used to provide compelling reports about Identity Manager and Open Enterprise Server activity.
This session explains how SLM can integrate with IDM and OES to collect log and audit data. It will also show how this integration can be used to provide compelling reports of IDM and OES activity.
Speaker: David Corlette Product Line Lead
Novell, Inc.
How to Architect a Novell Sentinel ImplementationNovell
Architecting a Novell Sentinel, Novell Sentinel Rapid Deployment or Novell Sentinel Log Manager installation can be a complicated process, particularly for users who are required to collect data from a large distributed environment. Many factors can impact the architecture users choose, including the amount of data, network link quality, device types, and features of Sentinel and/or Sentinel Log Manager the user wishes to take advantage of.
This session will explain common Sentinel architectural requirements requested by users and will demonstrate how to architect a Sentinel system to meet these requirements. This includes what and how much hardware to buy, how to choose between Sentinel Log Manager, collector managers, or a full Sentinel deployment in order to best meet your needs at the most efficient cost.
Utilizing Novell Sentinel Advisor and Attack VulnerabilityNovell
In the world of Security Information Event monitoring it is imperative that you have the ability to sort through the mass amounts of data to quickly identify and isolate any attacks and identify any vulnerabilities in your infrastructure. Advisor is an optional subscription service that provides this capability by providing normalized attack information to help identify attacks against vulnerable systems.
This session is intended to guide you through an understanding of what advisor is and how it can help you, how the advisor data feeds are downloaded and updated, what devices are supported, reporting, and step through demonstration of exploit detection.
OSMC 2010 | Insides SUSE Linux by Joachim WernerNETWAYS
SUSE Linux Enterprise is the most interoperable platform for mission-critical computing - both in traditional client-server and in virtual environments - from the desktop to the datacenter. In this talk some basic information about the data for the monitoring of SUSE LINUX and which opportunities for monitoring SUSE LINUX offers will be given.
Advanced Reporting with Novell ZENworks Reporting Server: More than Asset Man...Novell
Novell ZENworks Reporting Server is the new engine that drives predefined and custom reports for the Novell ZENworks 10 family. This session will provide an overview and tour of the Novell ZENworks Reporting Server universe—the foundation for creating reports for inventory, asset management, and other capabilities of Novell ZENworks Configuration Management. We'll cover how to lay out and filter reports, as well as some of the formatting features of the Business Objects Engine that powers the engine.
Implementing Distributed Novell Sentinel Environments: A Customer Case StudyNovell
GaVI is an IT service provider for a number of German insurance companies. Due to EU and national regulations, it is required to retain data generated while running communications services. In the scope of the data retention project, a distributed Novell Sentinel environment was deployed and several custom collectors were developed to collect logs from fixed telephone, Internet access, Internet e-mail and Internet telephone devices.
This session will discuss how you can use the enhanced event router features and Sentinel Link to implement a distributed SIEM solution in a high event rate environment. The session will finish with a lessons-learned section.
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Novell
Novell Identity Manager tools for implementation and administration have always been the product's key differentiating factor. Recent changes have made Identity Manager implementations even more easy and efficient. Whether you are new to Identity Manager or are an existing user, attend this session to learn more about Designer, Analyzer and iManager.
For Designer, you will hear about Identity Manager staging, role-based entitlements, and key performance improvements such as working over VPN and an optimized import/deployment of your identity management project. The presenters will also offer insight into how well Designer supports the latest versions of Identity Manager and Novell Identity Manager Roles Based Provisioning Module with the new Rich Client Platform (RCP) Designer and the support it offers to Novell Compliance Management Platform. Finally, you'll hear about the Designer roadmap for the Identity Manager product line.
You will also hear about the data cleansing and massaging capabilities in Analyzer. For iManager, you will see new features such as war file deployment.
Novell ZENworks Configuration Management Design and Implementation Best Pract...Novell
Getting the most out of the many features in Novell ZENworks Configuration Management starts with designing and implementing your configuration management infrastructure based on best practices. Attend this session to learn from the experts who wrote the Novell ZENworks Configuration Management Systems Deployment and Best Practices Guide, and make sure your design is ready for the real world.
The DevOps model is rapidly transforming IT operations and development practices. But what are the precursors necessary to implement DevOps? To achieve an agile, virtualized, and highly automated IT environment, what technological requirements need to be in place? OpenStack has the potential to facilitate DevOps implementation and practices at several different layers in the data center. In this session we'll quickly discuss what DevOps is, then discuss many components that are logically required to move towards DevOps in your environment. Finally we'll explore in depth several ways OpenStack can provide these baseline components.
Watch the DevNet 1104 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92695&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Thousands of customers have stepped up to the next generation of Novell GroupWise. Why? They're plugging in and turning on in this highly connected workspace that leverages Web resources to enhance collaboration. Attend this session to hear from some of the experienced partners who sell and support Novell GroupWise. They'll share a look at recent customer successes with the product and provide you with details on the real-world collaboration challenges it solves.
Avoiding Common Novell ZENworks Configuration Management Implementation PitfallsNovell
Migrations and deployments aren't always straightforward and training and manuals don't always provide all the information needed for a successful deployment. In this session, you will learn the top 10 implementation pitfalls encountered in dozens of Novell ZENworks Configuration Management customer installations—and how to avoid them. The session will also cover deployment and ongoing maintenance tips, to enable you to do it right the first time!
Novell ZENworks Configuration Management makes it easy to manage the setup, updating, healing and migration of desktops from a central location. In fact, application management is one of the most powerful and often utilized features of the product. During this session, Novell technical specialists will demonstrate application management and packaging features and provide numerous examples of how these features are used in real-life situations.
Slides from the June Oracle Middleware Forum held in Canberra, Australia. Covers some of the new features of WebLogic 12c; including HTML5 support, WebSockets, integrated Maven, managed Coherence servers among others
Coding Secure Infrastructure in the Cloud using the PIE frameworkJames Wickett
At National Instruments, we have developed an automation and provisioning framework called PIE (Programmable Infrastructure Environment) that we use daily on our devops team. Similar tools are available such as chef or puppet, but what makes PIE unique is its ability to work in multi-cloud deployments (Azure and AWS) along with multiple node OS types (linux and windows). It uses zookeeper to keep state and track dependencies across nodes and services.
When building PIE we actively considered how to implement it in a Rugged way for a DevOps team. As noted in the deck on slide 68, we are Rugged by Design and Devops by Culture. We see these as intersecting domains that have the ability to impact each other. For more info see ruggeddevops.org
Shining the Enterprise Light on Shades of SocialNovell
2010 has brought an explosion of new social tools to the market, creating a drone of news and conversation that artificially singles out “social” as a stand-alone solution—and for enterprises, a solution to what? When you peel back the category “social,” what capabilities are we really talking about and which ones are missing when it comes to forming a solution that can truly help people in the workplace be more effective?
Learn how to cut through the noise and gain a framework for thinking about the relevance of new tools to their workplace objectives and workplace realities. Attendees will leave this session with a better understanding of use cases and best practices as well as guidance for determining whether a given solution is worth exploring for their enterprise.
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
Virtual appliances are the wave of the future, declares IDC, because appliances dramatically simplify application deployment and accelerate the shift to cloud computing. Learn how the landmark strategic partnership between Novell and VMware is delivering innovative appliance versions of VMware products running on SUSE Linux Enterprise Server, and how it can help you move your applications to the cloud. See an exciting demonstration of Novell's award-winning SUSE Studio appliance construction tool, used by software vendors to build appliances in minutes for on-premise and cloud environments, and by enterprises to quickly create optimized Linux image builds. The session will also cover Novell's industry-leading lifecycle management capabilities for appliances. If you're a software vendor, you will leave this session with new ideas on how to simplify delivery of your software, perform appliance lifecycle management and extend your applications to the cloud. If you're an end-user organization, you will learn how to reduce the time spent creating and updating core OS images by 90 percent or more.
That’s right…in a recent IDC report, they tell customers don’t “move” to the cloud, “embrace” it. They also tell customers, don’t even consider the cloud without an identity strategy. That’s where WorkloadIQ comes in. In this session you will learn how WorkloadIQ, Novell’s differentiated approach to intelligent workload management, will help you infuse identity and management into your environment. Come see how together Novell and VMware will allow you to not only embrace the cloud, but also ensure that it’s manageable, secure and compliant. This will include demonstrations of brand new WorkloadIQ products - Novell Cloud Security Service, SUSE Linux Enterprise Server for VMware, Novell Identity Manager 4, and Novell Cloud Manager along with VMware technologies.
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
1. Introduction to Crystal and Jasper
Reports for Novell Sentinel 6.1 ®
™
Norbert Klasen - Senior Consultant
nklasen@novell.com
Dean Liu - Developer III
dliu@novacoast.com
Jonathan Poon - Developer III
jpoon@novacoast.com
22. Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.