This document provides an overview of Microsoft's Live@edu education technology solution. It discusses the key features of Live@edu including single sign-on access, a 10GB Exchange mailbox, 25GB of online storage, and Office web apps. It also covers deployment options, support services, and partnerships to help schools implement the solution. The presentation aims to demonstrate how Live@edu can meet student and teacher needs while addressing common challenges like funding and transitioning to the cloud.
This document provides an overview of Microsoft's Live@edu education technology solution. It discusses the key features of Live@edu including single sign-on access, a 10GB Exchange mailbox, 25GB of online storage, and Office web apps. It also covers deployment options, support services, and partnerships to help schools implement the solution. The presentation aims to demonstrate how Live@edu can meet student and teacher needs while addressing common challenges like funding and transitioning to the cloud.
Analysis and comparison of microservice data exchange formats on Enduro/X pla...Einars Leckis
The thesis analyzes and compares the microservice data exchange formats. The work
contains a study of what data exchange formats are available, what characteristics to consider
when choosing these formats. Each of the selected data exchange formats is implemented in a
microservice architecture environment where measurements are made on the performance of a
particular data exchange format by serialization of data, deserialization between service calls.
The end results are compared and conclusions are drawn on which of these data exchange
formats is better, which one would be better suited to specific situations.
The analytical section of the thesis examines the Enduro/X UBF data exchange format, which
was found to be incomplete during the research. Based on these shortcomings, design is being
developed.
The main body of the thesis is 82 pages, 41 pictures, 18 tables, 43 titles of information sources and 19 appendices.
Imran Razzaq is the Director of Cloud Services at Microsoft CEE in Riga, Latvia. He discusses both external challenges facing nations like environmental issues, security threats, and economic competition as well as internal constraints facing nations from factors like election cycles, data privacy laws, and skills shortages. He argues that citizens and businesses now expect improved services and engagement from their leaders anytime, anywhere. Leaders expect tools that provide greater insight, accountability, privacy, and compliance. Data visualization technologies can help provide insights to shape policies and budget decisions and help decision making with easy to use analytic tools.
Mega trends will have far-reaching impacts on business, societies, economies and cultures through 2025. The document discusses 11 key mega trends: urbanization and the rise of cities as economic centers; connectivity and convergence of technologies; social trends like an aging population; economic power shifting to emerging markets; new business models focused on customer value; health, wellness and quality of life; innovating products and services towards zero waste and emissions; the future of energy focusing on renewables; growing infrastructure needs; advances in mobility including autonomous vehicles and ride-sharing; and smart, sustainable cities.
This document discusses trends in mobile biometric devices, including:
- The increasing demand for mobile identification and the need for smaller fingerprint sensors.
- A comparison of fingerprint sensor sizes for smartphones and larger fingerprint capture devices (FAPs).
- How fingerprint sensor size affects the ability to perform 1:1 verification and 1:N identification/enrollments.
- The potential for using thinner, lighter, and more efficient light-emitting semiconductor (LES) film technology to reduce the size of fingerprint sensors while maintaining image quality and capabilities.
- Predictions that future fingerprint collection will incorporate larger capture areas in smaller sizes using thinner-film touch sensors, lower power consumption, and multi-modal biometrics as a standard
Launching great enterprise mobile apps that beat the competitionebuc
The document discusses the importance of testing mobile apps in real-world conditions with real users. It notes that modern apps need testing where users live, work and play rather than just in testing labs. The document promotes the services of Applause, which provides in-the-wild testing of apps across devices, operating systems and carriers with real testers using real devices under real-world conditions throughout the software development lifecycle. It describes tools from Applause like its SDK, analytics and 360-degree quality dashboard to help developers improve app quality and user experience.
The document discusses the security of cloud computing. It notes that insufficient knowledge and risk of security breaches are the main factors deterring adoption of cloud services. However, the statistics show that the vast majority of security breaches involve on-premises data centers, not public clouds. The document outlines how cloud providers and customers share responsibility for security, with providers handling physical and network security and customers responsible for data and applications. It addresses common concerns about cloud security like data access and location and notes the various security certifications and standards that cloud providers adhere to. The conclusion is that cloud security is at least equivalent to on-premises security when responsibilities are properly allocated.
This document discusses cloud security and authentication methods. It notes that security has limitations and existing solutions are not fully effective against cyberattacks. It then introduces an alternative no-password, single-factor authentication method called CaptureIn that uses a smartphone camera to log in without entering passwords or using multifactor authentication. CaptureIn aims to provide stronger authentication that is passwordless and does not rely on central databases of user credentials.
This document discusses enterprise asset management for aviation. It provides an overview of IBM's vision, which includes leveraging condition monitoring, visualization, mobility, analytics and intelligence to optimize asset management. Some key goals are improving reliability, reducing costs, recovering lost revenue, and assuring safety. The aviation industry faces challenges from factors like economic growth, passenger growth and globalization, which are driving new technology solutions to better predict demand, improve operations and customer experience, and increase efficiency and security.
All real time speed control cameras fix vehicles exceeding the speed limit and transmit data to a central data system for collection and processing, issuing penalties and identifying vehicle owners. Statistics show that the use of speed cameras reduced over-speeding by 50% and led to fewer administrative infringements over a given time period. Future intelligent transport systems would allow for centralized monitoring and data collection from devices like speed cameras, weather stations, and traffic surveillance to automatically identify vehicles, process data, store information and remotely control cameras.
This document discusses moving business applications and infrastructure to the cloud. It begins with an overview of trends driving cloud adoption like mobility, social media, analytics and cloud computing. Examples of cloud adoption from various companies are provided. The key pillars of developing a cloud strategy are then outlined, including addressing compliance, business cases, IT infrastructure, people readiness and change management. The benefits of the cloud for flexibility, disaster recovery, automatic updates and cost savings are highlighted. The presentation concludes with examples of good practices for hybrid cloud implementations from the Ministry of Education in Romania, Škoda Auto and EasyJet.
This document discusses big data and analytics. It predicts that by 2019, computers costing $4,000 will have processing power exceeding the human brain. Within the next 3-5 years, analytics will drive new business models and increase productivity by a factor of 100. Expert systems using knowledge bases, fact bases, and algorithms can replace "knowledge workers", making over 5,000 decisions per week in under 15 milliseconds.
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
Biznesa infrastruktūras un datu drošības juridiskie aspekti. Carlos Trigoso, EY Eiropas, Vidējo Austrumu, Indijas un Āfrikas reģiona vadības konsultāciju centra Informācijas drošības virziena vecākais projektu vadītājs.
Smart business - is cloud part of the problem or part of the solutionebuc
David Balazic gave a presentation on cloud computing. He discussed the challenges of today's IT environment, including rigid application architectures, long procurement cycles, and inability to scale with unpredictable demand. He outlined trends driving cloud adoption like mobility, social, analytics and cloud technologies. Balazic suggested finding the right balance between cloud and on-premise solutions. He provided examples of companies successfully using cloud computing and concluded by offering Consalta's expertise in developing cloud strategies.
More Related Content
Similar to Office 365 ieviesana office 365 ea seminar 24.01.2013 juris_smits
Analysis and comparison of microservice data exchange formats on Enduro/X pla...Einars Leckis
The thesis analyzes and compares the microservice data exchange formats. The work
contains a study of what data exchange formats are available, what characteristics to consider
when choosing these formats. Each of the selected data exchange formats is implemented in a
microservice architecture environment where measurements are made on the performance of a
particular data exchange format by serialization of data, deserialization between service calls.
The end results are compared and conclusions are drawn on which of these data exchange
formats is better, which one would be better suited to specific situations.
The analytical section of the thesis examines the Enduro/X UBF data exchange format, which
was found to be incomplete during the research. Based on these shortcomings, design is being
developed.
The main body of the thesis is 82 pages, 41 pictures, 18 tables, 43 titles of information sources and 19 appendices.
Similar to Office 365 ieviesana office 365 ea seminar 24.01.2013 juris_smits (8)
Imran Razzaq is the Director of Cloud Services at Microsoft CEE in Riga, Latvia. He discusses both external challenges facing nations like environmental issues, security threats, and economic competition as well as internal constraints facing nations from factors like election cycles, data privacy laws, and skills shortages. He argues that citizens and businesses now expect improved services and engagement from their leaders anytime, anywhere. Leaders expect tools that provide greater insight, accountability, privacy, and compliance. Data visualization technologies can help provide insights to shape policies and budget decisions and help decision making with easy to use analytic tools.
Mega trends will have far-reaching impacts on business, societies, economies and cultures through 2025. The document discusses 11 key mega trends: urbanization and the rise of cities as economic centers; connectivity and convergence of technologies; social trends like an aging population; economic power shifting to emerging markets; new business models focused on customer value; health, wellness and quality of life; innovating products and services towards zero waste and emissions; the future of energy focusing on renewables; growing infrastructure needs; advances in mobility including autonomous vehicles and ride-sharing; and smart, sustainable cities.
This document discusses trends in mobile biometric devices, including:
- The increasing demand for mobile identification and the need for smaller fingerprint sensors.
- A comparison of fingerprint sensor sizes for smartphones and larger fingerprint capture devices (FAPs).
- How fingerprint sensor size affects the ability to perform 1:1 verification and 1:N identification/enrollments.
- The potential for using thinner, lighter, and more efficient light-emitting semiconductor (LES) film technology to reduce the size of fingerprint sensors while maintaining image quality and capabilities.
- Predictions that future fingerprint collection will incorporate larger capture areas in smaller sizes using thinner-film touch sensors, lower power consumption, and multi-modal biometrics as a standard
Launching great enterprise mobile apps that beat the competitionebuc
The document discusses the importance of testing mobile apps in real-world conditions with real users. It notes that modern apps need testing where users live, work and play rather than just in testing labs. The document promotes the services of Applause, which provides in-the-wild testing of apps across devices, operating systems and carriers with real testers using real devices under real-world conditions throughout the software development lifecycle. It describes tools from Applause like its SDK, analytics and 360-degree quality dashboard to help developers improve app quality and user experience.
The document discusses the security of cloud computing. It notes that insufficient knowledge and risk of security breaches are the main factors deterring adoption of cloud services. However, the statistics show that the vast majority of security breaches involve on-premises data centers, not public clouds. The document outlines how cloud providers and customers share responsibility for security, with providers handling physical and network security and customers responsible for data and applications. It addresses common concerns about cloud security like data access and location and notes the various security certifications and standards that cloud providers adhere to. The conclusion is that cloud security is at least equivalent to on-premises security when responsibilities are properly allocated.
This document discusses cloud security and authentication methods. It notes that security has limitations and existing solutions are not fully effective against cyberattacks. It then introduces an alternative no-password, single-factor authentication method called CaptureIn that uses a smartphone camera to log in without entering passwords or using multifactor authentication. CaptureIn aims to provide stronger authentication that is passwordless and does not rely on central databases of user credentials.
This document discusses enterprise asset management for aviation. It provides an overview of IBM's vision, which includes leveraging condition monitoring, visualization, mobility, analytics and intelligence to optimize asset management. Some key goals are improving reliability, reducing costs, recovering lost revenue, and assuring safety. The aviation industry faces challenges from factors like economic growth, passenger growth and globalization, which are driving new technology solutions to better predict demand, improve operations and customer experience, and increase efficiency and security.
All real time speed control cameras fix vehicles exceeding the speed limit and transmit data to a central data system for collection and processing, issuing penalties and identifying vehicle owners. Statistics show that the use of speed cameras reduced over-speeding by 50% and led to fewer administrative infringements over a given time period. Future intelligent transport systems would allow for centralized monitoring and data collection from devices like speed cameras, weather stations, and traffic surveillance to automatically identify vehicles, process data, store information and remotely control cameras.
This document discusses moving business applications and infrastructure to the cloud. It begins with an overview of trends driving cloud adoption like mobility, social media, analytics and cloud computing. Examples of cloud adoption from various companies are provided. The key pillars of developing a cloud strategy are then outlined, including addressing compliance, business cases, IT infrastructure, people readiness and change management. The benefits of the cloud for flexibility, disaster recovery, automatic updates and cost savings are highlighted. The presentation concludes with examples of good practices for hybrid cloud implementations from the Ministry of Education in Romania, Škoda Auto and EasyJet.
This document discusses big data and analytics. It predicts that by 2019, computers costing $4,000 will have processing power exceeding the human brain. Within the next 3-5 years, analytics will drive new business models and increase productivity by a factor of 100. Expert systems using knowledge bases, fact bases, and algorithms can replace "knowledge workers", making over 5,000 decisions per week in under 15 milliseconds.
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
Biznesa infrastruktūras un datu drošības juridiskie aspekti. Carlos Trigoso, EY Eiropas, Vidējo Austrumu, Indijas un Āfrikas reģiona vadības konsultāciju centra Informācijas drošības virziena vecākais projektu vadītājs.
Smart business - is cloud part of the problem or part of the solutionebuc
David Balazic gave a presentation on cloud computing. He discussed the challenges of today's IT environment, including rigid application architectures, long procurement cycles, and inability to scale with unpredictable demand. He outlined trends driving cloud adoption like mobility, social, analytics and cloud technologies. Balazic suggested finding the right balance between cloud and on-premise solutions. He provided examples of companies successfully using cloud computing and concluded by offering Consalta's expertise in developing cloud strategies.
Iniciatīvas mērķis ir aicināt Latvijas reģionu 9.-12. klašu skolēnus un uzņēmējus kopīgi radīt jaunus risinājumus un inovācijas uzņēmuma ikdienas procesos, izstrādāt jaunus produktus un veicināt savstarpējo sadarbību. Jaunu ideju radīšana ir īpaši nozīmīga tieši reģionu attīstībai, lai veicinātu to izaugsmi un radītu aizvien jaunus veiksmes stāstus.
6. Ieviešanas plānošana - Predeployment
Definējam sasniedzamos mērķus
Pakalpojuma izvēle atbilstoši biznesa mērķiem
Proof of concept
Izpratne par iespējamajiem migrācijas scenārijiem
Izpratne par vides gatavību un nepieciešamo resursu ieguldījumu
Reģistrācija Office 365
Izpratne par licencēšanas plāniem un izmaksām
Vienošanās par atbildības un darbu sadalījumu, ja ieviešana netiek veikta
iekšējiem resursiem
7. Ieviešanas plānošana – Plan (1)
Projekta uzsākšanas sanāksme
Komunikācijas stratēģija
Risku vadība
Interneta kanāla jaudas apzināšana
Co-existence stratēģijas izveide
Datu migrācijas stratēģijas izveide
8. Ieviešanas plānošana – Plan (2)
Veiksmes kritēriju definēšana
Identitātes vadības procedūru izmaiņas pēc migrācijas
Active Directory servera sagatavošana
Testēšanas fāzes apsvērumi
Citas lietojumprogrammas
9. Ieviešanas plānošana – Plan (3)
Izpratne par esošo infrastruktūru
Izpratne par izmantotajām mobilajām iekārtām
Apmācības un atbalsta stratēģija
Migrācijas plāna izveide
10. Ieviešanas plānošana – Prepare (1)
Nepieciešamās komunikācijas nodrošināšana
E-pasta domain pievienošana
Datu kanāla sagatavošana
Active Directory sagatavošana
Active Directory sinhronizācijas uzstādīšana
Single sign-on uzstādīšana
Co-existance realizācija
15. Kam pievērst uzmanību
Pasūtītājs un ieinteresētās puses
Projekta plāna izveide
Komunikācijas plāna izveide
Risku vadības plāna izveide
Apmācības plāna izveide (Lietotāji, atbalsts un administratori)
Kritisko soļu identifikācija (datu kanāla rezervēšana, Active Directory
sagatavošana, lietojumprogrammu izplatīšana)
Integrācija esošajā vidē
17. Active Directory sinhronizācija
On-premises Microsoft Online Services
Exchange
Server DirSync
Web Service Live ID
Exchange
Online
Active Online
DirSync
Directory Directory
SharePoint
Online
Lync
Online
18. Active Directory sinhronizācija
DirSync – rīks, kas paredzēts, lai veiktu AD objektu sinhronizāciju
starp Active Directory un Office 365 online servisiem
«Software based appliance» – nokonfigurējam un aizmirstam
Ļauj nodrošināt Single Sign-On
Ļauj izveidot coexistence scenārijus
Nodrošina GAL sinhronizāciju
Nodrošina AD objektu sinhronizāciju
Nodrošina e-pasta maršrutēšanu starp datucentru un Office 365
viena domain ietvaros
Nav paredzēts izmantošanai vienreizējai lietotāju datu augšupielādei
19. Priekšnoteikumi DirSync izmantošanai (1)
Izvietojuma un konfigurācijas prasības
Datoram uz kura atrodas DirSync ir jābūt domainā
DirSync nepieļauj instalāciju uz domain kontroliera
Nodrošināta komunikācija ar visiem domain kontrolieriem
Programmatūras prasības
Windows Installer 4.5
Windows Power Shell 2.0
.NET Framework 3.5
X64 operētājsistēma
20. Priekšnoteikumi DirSync izmantošanai (2)
Aparatūras prasības
Minimums 1GB diska vietas
Prasības atbilstoši koponentiem:
Windows Server operētājsistēma
SQL Server 2008 R2 Express Edition
Forefront Identity Manager 2010 (x64)
Number of objects in
CPU Memory Hard disk size
Active Directory
Fewer than 10,000 1.6 GHz 4 GB 70 GB
10,000–50,000 1.6 GHz 4 GB 70 GB
50,000–100,000 1.6 GHz 16 GB 100 GB
100,000–300,000 1.6 GHz 32 GB 300 GB
21. Priekšnoteikumi DirSync izmantošanai (3)
Tīkla konfigurācija
Service Protocol Port
LDAP TCP/UDP 389
Kerberos TCP/UDP 88
DNS TCP/UDP 53
Kerberos Change
TCP/UDP 464
Password
RPC TCP 135
RPC randomly
1024 - 65535
allocated high TCP TCP
49152 - 655351
ports
SMB TCP 445
SSL TCP 443
SQL TCP 1433
23. Kas ir coexistence
Situācija, kad daļa no lietotāju datiem faktiski atrodas uzņēmuma datu
centrā, bet cita daļa Microsoft datu centrā.
Veids kā nodrošināt Active Directory objektus GAL (Global Address
List) vienlaicīgi abos datu centros.
Nodrošina e-pasta pārsūtīšanu viena e-pasta ietvaros starp
uzņēmuma datucentru un Office 365
Divi scenāriji – Simple Coexistence un Hybrid coexistence
24. Simple / Hybrid co-existence
Feature Simple Hybrid
Mail routing between on-premises and cloud (recipients on either side)
Mail routing with shared namespace (if desired) on both sides
Unified GAL
Free/Busy and calendar sharing cross-premises
Out of Office
Mailtips, messaging tracking, and mailbox search work cross-premises
OWA redirection cross-premise (single URL)
Single tool to manage cross-premises Exchange functions
Mailbox moves support both onboarding and offboarding
No outlook reconfiguration or OST resync required after mailbox
migration
Preserve auth header (interal email recognition, resolve against GAL,
etc.)
Centralized mail flow , ensures that all email routes inbound/outbound
via on-premises
25. Arhitektūra
On-premises Exchange
Org
Office 365 Directory
Users, Groups, Contacts via
Synchronization Office 365
DirSync
App
Secure Mail Flow
Sharing (free/busy, MailTips,
archive, etc.)
Mailbox Data via MRS
Existing Exchange
Exchange 2013 CAS
2007 or and MBX
later
https://portal.microsoftonline.comjurz@DPALtd.onmicrosoft.comparole: s
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Network RemediationUnderstand on-premises network infrastructure designUnderstand inbound/outbound internet routingUnderstand potential impact of proxy/firewall rulesInbound/outbound user authentication required?Provision temporary/permanent bandwidth increase?Identify bandwidth requirements during run-state (post-deployment)Will users have a good run-state experience?Identify bandwidth requirements for data migrationsHave enough bandwidth to migrate data quickly enough?Bring visibility early in planning phase to avoid negatively impacting overall timelineActive Directory RemediationUnderstand on-premises Active Directory infrastructure designForest/domain designDNS NamespaceUPN suffixes in useIdentify amount of AD remediation requiredDeployment Readiness ToolComplete AD remediation work prior to implementing Directory Synchronization and SSOBring visibility early in planning phase to avoid negatively impacting overall timeline
Note that Exch 2013 hybrid no longer supports Exch 2003Customers who have Exch 2003 can still use Exch 2010 hybridExch 2010 hybrid will be able to connect to an O15 tenant once Exch 2010 SP comes out SP3 in 1st half of 2013 per this EHLO blog entry:http://blogs.technet.com/b/exchange/archive/2012/09/25/announcing-exchange-2010-service-pack-3.aspx