In October 2010, Multnomah County migrated over 3,600 employees to Google Apps Government Edition, making it one of the first local governments to use cloud-based email and calendaring services. The implementation team was led by a project manager and included subteams for technical issues, communications, security, training, and contracting. Migration occurred in phases including a pilot program, planning, dress rehearsal, and going live. Ongoing support involves account administration integrated with directory services, customization, and consideration of security issues around privileged access, transparency, and accidental data deletion.
It is an exciting time in computing with the sea-change happening both on the technology fronts and application fronts. Networked sensors and embedded platforms with significant computational capabilities with access to backend utility computing resources, offer a tremendous opportunity to realize large-scale cyber-physical systems (CPS) to address the many societal challenges including emergency response, disaster recovery, surveillance, and transportation. Referred to as Situation awareness applications, they are latency-sensitive, data intensive, involve heavy-duty processing, run 24x7, and result in actuation with possible retargeting of sensors. Examples include surveillance deploying large-scale distributed camera networks, and personalized traffic alerts in vehicular networks using road and traffic sensing. This talk covers ongoing research in Professor Ramachandran’s embedded pervasive lab to provide system support for Internet of Things.
Local Marketing Made Easy - Why Bother Blogging?Abby Dennis
The Best of Watford share the benefits of blogging, common problems and some helpful tips to the local business community and entrepreneurs in Watford at Vicarage Road Stadium.
It is an exciting time in computing with the sea-change happening both on the technology fronts and application fronts. Networked sensors and embedded platforms with significant computational capabilities with access to backend utility computing resources, offer a tremendous opportunity to realize large-scale cyber-physical systems (CPS) to address the many societal challenges including emergency response, disaster recovery, surveillance, and transportation. Referred to as Situation awareness applications, they are latency-sensitive, data intensive, involve heavy-duty processing, run 24x7, and result in actuation with possible retargeting of sensors. Examples include surveillance deploying large-scale distributed camera networks, and personalized traffic alerts in vehicular networks using road and traffic sensing. This talk covers ongoing research in Professor Ramachandran’s embedded pervasive lab to provide system support for Internet of Things.
Local Marketing Made Easy - Why Bother Blogging?Abby Dennis
The Best of Watford share the benefits of blogging, common problems and some helpful tips to the local business community and entrepreneurs in Watford at Vicarage Road Stadium.
Challenges of Operationalising Data Science in Productioniguazio
The presentation topic for this meet-up was covered in two sections without any breaks in-between
Section 1: Business Aspects (20 mins)
Speaker: Rasmi Mohapatra, Product Owner, Experian
https://www.linkedin.com/in/rasmi-m-428b3a46/
Once your data science application is in the production, there are many typical data science operational challenges experienced today - across business domains - we will cover a few challenges with example scenarios
Section 2: Tech Aspects (40 mins, slides & demo, Q&A )
Speaker: Santanu Dey, Solution Architect, Iguazio
https://www.linkedin.com/in/santanu/
In this part of the talk, we will cover how these operational challenges can be overcome e.g. automating data collection & preparation, making ML models portable & deploying in production, monitoring and scaling, etc.
with relevant demos.
The art of information architecture in Office 365Simon Rawson
I gave this this presentation at the Collab365 Global Conference in September 2020. It covers the main elements you need to consider in developing an information architecture and management plan for Office 365
Office 365 Best Practices That You Are Not Thinking AboutQuest
Microsoft MVP Mike Crowley, Baseline Technologies, will join Quest cloud expert Ron Robbins to explore how to translate your existing on-premises security and compliance strategy to the cloud.
Management Information System
Information System
Information Systems Framework
Information Systems Concepts
system
Data Versus Information
Attributes
Transaction Processing Activities
Process Control Systems
Recent Gartner and Capgemini studies predict only around 25% of data science projects are successful and only around 15% make it to full-scale production. Of these, many degrade in performance and produce disappointing results within months of implementation. How can focusing on the desired business outcomes and business use cases throughout a data science project help overcome the odds?
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...DATAVERSITY
Many data scientists are well grounded in creating accomplishment in the enterprise, but many come from outside – from academia, from PhD programs and research. They have the necessary technical skills, but it doesn’t count until their product gets to production and in use. The speaker recently helped a struggling data scientist understand his organization and how to create success in it. That turned into this presentation, because many new data scientists struggle with the complexities of an enterprise.
As part of this session, I will be giving an introduction to Data Engineering and Big Data. It covers up to date trends.
* Introduction to Data Engineering
* Role of Big Data in Data Engineering
* Key Skills related to Data Engineering
* Role of Big Data in Data Engineering
* Overview of Data Engineering Certifications
* Free Content and ITVersity Paid Resources
Don't worry if you miss the video - you can click on the below link to go through the video after the schedule.
https://youtu.be/dj565kgP1Ss
* Upcoming Live Session - Overview of Big Data Certifications (Spark Based) - https://www.meetup.com/itversityin/events/271739702/
Relevant Playlists:
* Apache Spark using Python for Certifications - https://www.youtube.com/playlist?list=PLf0swTFhTI8rMmW7GZv1-z4iu_-TAv3bi
* Free Data Engineering Bootcamp - https://www.youtube.com/playlist?list=PLf0swTFhTI8pBe2Vr2neQV7shh9Rus8rl
* Join our Meetup group - https://www.meetup.com/itversityin/
* Enroll for our labs - https://labs.itversity.com/plans
* Subscribe to our YouTube Channel for Videos - http://youtube.com/itversityin/?sub_confirmation=1
* Access Content via our GitHub - https://github.com/dgadiraju/itversity-books
* Lab and Content Support using Slack
Security & Compliance in the Cloud [2019]Tudor Damian
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives.
With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.
As nonprofit organizations adopt cloud for basic productivity and database needs, the role of the"technology staff" must shift. Today, IT staff must engage with management and users to understand business needs and manage systems rather than hardware. We will discuss this changing role and how nonprofit leaders can prepare to successfully manage the new IT landscape, and the responsibility of managing data sources, understanding data integration and how this can affect the organization.
Information technology in global arena & enterprise resource planningSubhajit Bhattacharya
INFORMATION TECHNOLOGY IN GLOBAL ARENA & ENTERPRISE RESOURCE PLANNING. This presentation describes how Information Technology is overall impacting the global arena and how IT is necessary for the organizational growth in the competitive global market.
Role of ERP and how ERP can further enables business to run more productively and bring organization wide growth. The key constraints to identify the correct ERP suite. An overview of ERP project management and ERP as a service on cloud infrastructure.
Challenges of Operationalising Data Science in Productioniguazio
The presentation topic for this meet-up was covered in two sections without any breaks in-between
Section 1: Business Aspects (20 mins)
Speaker: Rasmi Mohapatra, Product Owner, Experian
https://www.linkedin.com/in/rasmi-m-428b3a46/
Once your data science application is in the production, there are many typical data science operational challenges experienced today - across business domains - we will cover a few challenges with example scenarios
Section 2: Tech Aspects (40 mins, slides & demo, Q&A )
Speaker: Santanu Dey, Solution Architect, Iguazio
https://www.linkedin.com/in/santanu/
In this part of the talk, we will cover how these operational challenges can be overcome e.g. automating data collection & preparation, making ML models portable & deploying in production, monitoring and scaling, etc.
with relevant demos.
The art of information architecture in Office 365Simon Rawson
I gave this this presentation at the Collab365 Global Conference in September 2020. It covers the main elements you need to consider in developing an information architecture and management plan for Office 365
Office 365 Best Practices That You Are Not Thinking AboutQuest
Microsoft MVP Mike Crowley, Baseline Technologies, will join Quest cloud expert Ron Robbins to explore how to translate your existing on-premises security and compliance strategy to the cloud.
Management Information System
Information System
Information Systems Framework
Information Systems Concepts
system
Data Versus Information
Attributes
Transaction Processing Activities
Process Control Systems
Recent Gartner and Capgemini studies predict only around 25% of data science projects are successful and only around 15% make it to full-scale production. Of these, many degrade in performance and produce disappointing results within months of implementation. How can focusing on the desired business outcomes and business use cases throughout a data science project help overcome the odds?
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...DATAVERSITY
Many data scientists are well grounded in creating accomplishment in the enterprise, but many come from outside – from academia, from PhD programs and research. They have the necessary technical skills, but it doesn’t count until their product gets to production and in use. The speaker recently helped a struggling data scientist understand his organization and how to create success in it. That turned into this presentation, because many new data scientists struggle with the complexities of an enterprise.
As part of this session, I will be giving an introduction to Data Engineering and Big Data. It covers up to date trends.
* Introduction to Data Engineering
* Role of Big Data in Data Engineering
* Key Skills related to Data Engineering
* Role of Big Data in Data Engineering
* Overview of Data Engineering Certifications
* Free Content and ITVersity Paid Resources
Don't worry if you miss the video - you can click on the below link to go through the video after the schedule.
https://youtu.be/dj565kgP1Ss
* Upcoming Live Session - Overview of Big Data Certifications (Spark Based) - https://www.meetup.com/itversityin/events/271739702/
Relevant Playlists:
* Apache Spark using Python for Certifications - https://www.youtube.com/playlist?list=PLf0swTFhTI8rMmW7GZv1-z4iu_-TAv3bi
* Free Data Engineering Bootcamp - https://www.youtube.com/playlist?list=PLf0swTFhTI8pBe2Vr2neQV7shh9Rus8rl
* Join our Meetup group - https://www.meetup.com/itversityin/
* Enroll for our labs - https://labs.itversity.com/plans
* Subscribe to our YouTube Channel for Videos - http://youtube.com/itversityin/?sub_confirmation=1
* Access Content via our GitHub - https://github.com/dgadiraju/itversity-books
* Lab and Content Support using Slack
Security & Compliance in the Cloud [2019]Tudor Damian
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives.
With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.
As nonprofit organizations adopt cloud for basic productivity and database needs, the role of the"technology staff" must shift. Today, IT staff must engage with management and users to understand business needs and manage systems rather than hardware. We will discuss this changing role and how nonprofit leaders can prepare to successfully manage the new IT landscape, and the responsibility of managing data sources, understanding data integration and how this can affect the organization.
Information technology in global arena & enterprise resource planningSubhajit Bhattacharya
INFORMATION TECHNOLOGY IN GLOBAL ARENA & ENTERPRISE RESOURCE PLANNING. This presentation describes how Information Technology is overall impacting the global arena and how IT is necessary for the organizational growth in the competitive global market.
Role of ERP and how ERP can further enables business to run more productively and bring organization wide growth. The key constraints to identify the correct ERP suite. An overview of ERP project management and ERP as a service on cloud infrastructure.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. Local Government
Goes Google
Brig Otis, IT Security
Office of Information Technology
2. Introduction
• In October 2010 Multnomah County
October, 2010,
migrated over 3,600 county employees to
Google Apps Government Edition
Edition.
• One of the first local governments
nationwide to use cloud based email and
cloud-based
calendaring services.
Office of Information Technology
3. Introduction
• Brig Otis IT Security
Otis,
• Dan Cole, Project Manager
• St Johnson, Infrastructure Manager
Stan J h I f t t M
Office of Information Technology
4. Agenda
• Why Google?
• Implementation Team
• Vendor Management
V d M t
• Implementation Considerations
• End Users
• Migration
• Support Plan
Office of Information Technology
5. Why Google?
• Budget Shortfalls
• Growing Demand for IT Services
• A i E t
Aging Enterprise E il S t
i Email System
Office of Information Technology
6. Implementation Team
• Core Team
– PM plus Subteam Leaders
• Subteams
– Technical
–CCommunications
– Security
– Training
– Contracting
Office of Information Technology
7. Implementation Team
• End Users (county employees)
• Cloud Service Team
• S t
System Integrator
I t t
• Technical Steering Committee
Office of Information Technology
8. Implementation Team
• Security Considerations
– Representation
– Core and Subteam communications
– System Integrator
• Responsibilities
• Product/Service Maturity
• Cryptographic controls
• Development and Support Processes
• Change Control
Office of Information Technology
9. Vendor Management
• Contracting
– References to dynamic policies at URLs
– SLA
• DR
– Exit strategy
• Data Escrow
• Ownership
– Data Classification (yours; not theirs)
• Encryption
yp
Office of Information Technology
10. Vendor Management
• Contracting
– Change Management
• Musical Features
– Provider Certification
• Understand the certification (the package)
• Does not certify your use of the service
– Example: Sharing of Google Objects
Office of Information Technology
11. Vendor Management
• Advanced Planning
– Time
– Get the actual support team involved
– Project management methodology
• Security Considerations
– Unauthorized access
– Breach of confidentiality
– Laws and regulations
Office of Information Technology
12. Implementation Considerations
• Paradigm Shift
– Control Set (technical controls)
• Built-in
• Design yourself
– Organizational Policy (administrative controls)
– Refresh organizational consciousness
Office of Information Technology
13. Implementation Considerations
• Fit With Existing Technology
– Authentication/Authorization Mechanisms
– Dual Delivery
– Internet Connectivity
– Endpoints (including Mobile Devices)
– Directory Services
• Wh t to expose / how?
What t h ?
– MCSO free/busy calendar synchronization
Office of Information Technology
14. Implementation Considerations
• Fit With Technology Roadmap
– Mobile Strategy
– Identity Management
– Other Cloud Services
– Network Convergence
Office of Information Technology
15. Implementation Considerations
• Fit With Existing Processes
– Basic Account Management
• Integration with HR/Payroll
– Work Unit Communications
– Shared Calendars
– Shared Inboxes
Office of Information Technology
16. Implementation Considerations
• Fit With Existing Processes
– Security Considerations
• Identity lifecycle issues
– accounts
– inboxes
– calendars
– other cloud-based objects and artifacts
• Data in Transit
– TLS / Encryption
• Confidentiality and Availability (user-managed content)
• Unauthorized Access due to sharing
Office of Information Technology
17. Implementation Considerations
• Fit With Culture
– What is the nature of the data?
– How information systems are used
(information handling)
– Security Policy governing use of Google Apps
Office of Information Technology
18. End Users
• Security Responsibilities are Increased
• Awareness Training
• C
County D
t Departmental Policy
t t l P li
– Departmental Business Processes
• End User/Department Security Concerns
– Portable Media
– Operations - Patch Management
– Economies of Scale
Office of Information Technology
19. Migration
• Phase: Pilot Program
– Security Considerations
• Early adopters running too far too fast
– Including Privileged Users (Admins)
• Representation of Security and other IT leaders in
the Pilot
Office of Information Technology
20. Migration
• Phase: Planning/Preparation
– Communications (time to overcommunicate)
– Training (classes using the SAaS)
– Support
• Self help
Self-help
• Google Guides - Staff & Googlers
• Core Team
– Load Testing
Office of Information Technology
21. Migration
• Phase: Planning/Preparation
• Security Considerations
– Awareness Training
– Consistent Organizational Message
– Accurate Responses
– Accidental Deletion of Data
– Old thinking; new Process Issues
g;
– How much Analysis is Enough?
– Dialog with Other Departments ( )
g p (fit)
Office of Information Technology
22. Migration
• Phase: Dress Rehearsal
• Phase: Big Move
–S
Security Considerations
it C id ti
• Unplanned ISP outage
• Out of band communications
• Phase: Decommission
Office of Information Technology
23. Support Plan
• Service Administration
– All or Nothing
– Google Apps Marketplace - abstract the
admin layer
– Who to Trust?
• Trust But Verify model
– Does not impede work
– Provides an audit trail
– In active state, it monitors for privileged rights use
– User Inboxes (Postini)
Office of Information Technology
24. Support Plan
• Service Administration
– Security Considerations
• Privileged Access
– Confidentiality
– Availability of Systems
• Email archives available to admins?
– Unauthorized (unintended) access
• Transparency
– Admin Activity
– User Activity
Office of Information Technology
25. Support Plan
• Account Administration
– Integration with Directory Services
• GAL
• Accounts
• Groups
p
– License Limitations
– User Terminations (end-of-life)
(end of life)
• Transference of Google Artifacts
Office of Information Technology
26. Support Plan
• Account Administration
– Security Considerations
• Accidental deletion of data
• Account sharing
• Transparency
p y
Office of Information Technology
27. Support Plan
• Customization and Automation
– Have programming support available
• Technical Control Set
• APIs
– Your organization is unique
• No cloud service is a universal answer
– You will customize
– Your organization will change
Office of Information Technology