In the event of a major production failure, companies need redundancy, reliability and geographic diversity in these systems. View this presentation to learn more about disaster recovery solutions.
Disaster Recovery to the Cloud with Microsoft AzureLai Yoong Seng
In this session, we will look into DR planning scenario to protect your workload with one solution for different infrastructure either hyper-v, vmware, storage or physical server.
Disaster Recovery Planning using Azure Site RecoveryNitin Agarwal
Disaster recovery and business continuity solutions have been historically expensive and time consuming. Microsoft Azure Site Recovery (ASR) makes Disaster Recovery (DR) planning and implementation simpler and affordable for all types of organizations.
Join our team of cloud experts for a walk through of DR and ASR basics. We'll highlight best practices for ASR deployments and help you get a sense of the costs for implementing a solution.
Disaster Recovery to the Cloud with Microsoft AzureLai Yoong Seng
In this session, we will look into DR planning scenario to protect your workload with one solution for different infrastructure either hyper-v, vmware, storage or physical server.
Disaster Recovery Planning using Azure Site RecoveryNitin Agarwal
Disaster recovery and business continuity solutions have been historically expensive and time consuming. Microsoft Azure Site Recovery (ASR) makes Disaster Recovery (DR) planning and implementation simpler and affordable for all types of organizations.
Join our team of cloud experts for a walk through of DR and ASR basics. We'll highlight best practices for ASR deployments and help you get a sense of the costs for implementing a solution.
Cisco & Microsoft Converged InfrastructureAymen Mami
Cisco & Microsoft Converged Infrastructure workshop @ Cisco Regional Summit Tunisia 2017
What is Cisco UCS Offering
Cisco partnership with SAN storage manufacturers
Cisco partnership with Microsoft for private cloud
Integration between Microsoft System center & Cisco UCS manager
Backup is an important activity for your data and for your business. In SME, Backup is a least-knows activity to schedule and to maintain. Cloud is a viable solution to save your data. Windows Server 2012 R2 Essential is the first edition of Window Server that contains specific tools integrating with Azure. In this presentation we'll see specific tools for Backup on Azure.
Cloud backup you say? Azure Backup of course!Wim Matthyssen
Backup is one of the most important things that an IT Administrator needs to take care of, especially when you run your workloads in the Cloud. With Azure Backup you can backup your critical business data in Azure to protect it from corruption, accidental deletion and ransomware. In this session you will discover how you can reduce costs and securely backup your Azure VMs, Azure Files and even SQL running in Azure VMs with a zero-infrastructure solution. In this demo packed session you will learn how to backup and recover your Azure resources and you will be introduced to Power BI Backup reports. You will also discover how to monitor Azure Backup using Log Analytics and how to enable security for your cloud backups.
New on-demand Webinar
We used to just worry about the unlikely natural disaster and the odd communications breakdown when planning for backup and recovery. But these days, an entirely new breed of threats have emerged that promise to knock out your business applications and data the first chance they get. From cyber crime, to cyberterrorism and mobile and cloud computing complexities, handling these new threats with the same old tools simply isn’t possible. This was the topic that drove a recent Softchoice webinar, centered on how your business can more effectively, simply and securely provide a robust DR and BC strategy leveraging a suite of Azure based technologies from Microsoft.
Watch the latest on-demand webinar.
Nesta apresentação mostramos como o popular software de backup NetBackup da Symantec se integra perfeitamente à nuvem AWS, fornecendo uma infraestrutura robusta e confiável para backup, tanto de servidores on-premises, como na nuvem, oferecendo uma solução completa para arquiteturas híbridas.
As customers begin the transformation of moving their data centers into the cloud or into multi-cloud environments, deduplication becomes more important than ever. Backup Exec will now support customers that require deduplication to help them realize the cost savings that are commonly associated with a cloud centric environment.
VMworld 2013: Software-Defined Storage: The VCDX Way VMworld
VMworld 2013
Wade Holmes VCDX, VMware
Rawlinson Rivera VCDX, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Cisco & Microsoft Converged InfrastructureAymen Mami
Cisco & Microsoft Converged Infrastructure workshop @ Cisco Regional Summit Tunisia 2017
What is Cisco UCS Offering
Cisco partnership with SAN storage manufacturers
Cisco partnership with Microsoft for private cloud
Integration between Microsoft System center & Cisco UCS manager
Backup is an important activity for your data and for your business. In SME, Backup is a least-knows activity to schedule and to maintain. Cloud is a viable solution to save your data. Windows Server 2012 R2 Essential is the first edition of Window Server that contains specific tools integrating with Azure. In this presentation we'll see specific tools for Backup on Azure.
Cloud backup you say? Azure Backup of course!Wim Matthyssen
Backup is one of the most important things that an IT Administrator needs to take care of, especially when you run your workloads in the Cloud. With Azure Backup you can backup your critical business data in Azure to protect it from corruption, accidental deletion and ransomware. In this session you will discover how you can reduce costs and securely backup your Azure VMs, Azure Files and even SQL running in Azure VMs with a zero-infrastructure solution. In this demo packed session you will learn how to backup and recover your Azure resources and you will be introduced to Power BI Backup reports. You will also discover how to monitor Azure Backup using Log Analytics and how to enable security for your cloud backups.
New on-demand Webinar
We used to just worry about the unlikely natural disaster and the odd communications breakdown when planning for backup and recovery. But these days, an entirely new breed of threats have emerged that promise to knock out your business applications and data the first chance they get. From cyber crime, to cyberterrorism and mobile and cloud computing complexities, handling these new threats with the same old tools simply isn’t possible. This was the topic that drove a recent Softchoice webinar, centered on how your business can more effectively, simply and securely provide a robust DR and BC strategy leveraging a suite of Azure based technologies from Microsoft.
Watch the latest on-demand webinar.
Nesta apresentação mostramos como o popular software de backup NetBackup da Symantec se integra perfeitamente à nuvem AWS, fornecendo uma infraestrutura robusta e confiável para backup, tanto de servidores on-premises, como na nuvem, oferecendo uma solução completa para arquiteturas híbridas.
As customers begin the transformation of moving their data centers into the cloud or into multi-cloud environments, deduplication becomes more important than ever. Backup Exec will now support customers that require deduplication to help them realize the cost savings that are commonly associated with a cloud centric environment.
VMworld 2013: Software-Defined Storage: The VCDX Way VMworld
VMworld 2013
Wade Holmes VCDX, VMware
Rawlinson Rivera VCDX, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Disaster Recovery as a Service - by the Quantum GroupProbal DasGupta
The Quantum Group offers Disaster Recovery as a Service in the Cloud, which reduces the cost of enjoying disaster recovery at as much as 85% cost reduction.
VPS, or “Virtual Private Servers,” involves partitioning one physical server into multiple servers so each has the appearance and capabilities of running on a dedicated platform. View this presentation to learn more about how VPS can benefit your business
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec
The cloud appeals to businesses for multiple reasons as it addresses many of their long standing IT issues. Whether its lowered costs, faster deployments or just less internal red tape to deal with, businesses are finding the ease and ubiquity of the cloud tempting. One of the newer use cases topping many priority lists is leveraging the cloud for disaster recovery. One benefit of DR to the cloud is the cost savings gained because there is no longer a need to build or rent a secondary data center. Symantec Disaster Recovery Orchestrator gives businesses the flexibility to affordably and easily initiate disaster recoveries of their Microsoft Windows applications to and from the cloud.
Enterprise grade disaster recovery without breaking the bankactualtechmedia
Perform a cost comparison of 3 DR strategies
View a comprehensive breakdown of DR infrastructure costs
Address the benefits of cloud-based DR
Draw from use cases of enterprises who have reduced IT expenditures with cloud DR
http://www.actualtech.io/enterprise-grade-disaster-recovery/
Migrating to the Cloud: Lessons Learned from Federal AgenciesVMware
Four years have passed since the release of the White House's Cloud First strategy, aimed at encouraging agencies to implement cloud services. To better understand the lessons learned from federal cloud adoption efforts and to determine how agencies can more effectively utilize cloud going forward, Government Business Council (GBC), Carpathia and VMware undertook an in-depth research study. Download this infographic and receive the valuable insight uncovered in the study around challenges, benefits and hear what federal leaders are saying about their adoption so far.
Businesses are rapidly expanding beyond their traditional data center boundaries into the cloud, with hybrid cloud architectures becoming the new norm. As business-critical workloads and data get increasingly run on diverse platforms across multiple data centers, private and public clouds, it is imperative for IT business continuity solutions to keep pace with the transformation and to continue meeting business Service Level Agreements (SLAs).
Veritas Resiliency Platform makes it simple for organizations to innovate without compromising on critical business SLAs. Organizations can confidently adopt hybrid cloud architectures and predictably meet critical SLAs in spite of growing IT complexity. With a unified approach to IT Service Continuity, Resiliency Platform enables IT operations to deliver predictable service levels to the business while ensuring location independence, platform choice, and operational simplicity.
AX Management: Should an Outsourcer Complete a SSAE 16 Type II Audit?oneneckitservices
Many outsourcing providers offer services for AX management but operate without a set standard for auditing and controls. To be sure application management and hosting assets are handled appropriately, a provider must follow a set standard of controls that protect each customer's investment.
For more information about AX Management, visit http://www.oneneck.com/Solutions.aspx today.
Companies typically find the demands of application management overly complex. As a result, more and more companies are turning to outsourcing application management functions. The fundamental value proposition offers service improvement and cost reduction from sharing the outsourcing provider’s technical resources.
No “one size fits all” managed services solution will ever be ideal for every business. When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security. Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items. After outsourcing, you should see immediate results in cost controls and service delivery.
Although used interchangeably with other types of auctions, a liquidation auction technically refers to a company selling its assets. These assets could be unsold inventory, office furniture, or anything else of value the company owns. The auction may be a voluntary event by a business, or involuntarily conducted as a result of bankruptcy or legal judgment. As with all types of auctions, bidders have the opportunity to snap-up quality items at deep discounts.
IT service provider, IT outsourcing, OneNeck IT Servicesoneneckitservices
This case study will examine how one of the world's largest manufacturers of pumps, valves, seals and components to the process industries turned to an IT outsourcing services company to migrate, host and manage its complex IT operations. The company is recognized as one of the world’s premier providers of flow management systems. The company supplies pumps, valves, seals, automation and services to the power, oil, gas, chemical, and other industries.
The IT service outsourcing governance process should not just be focused on the quality of specific services, or the contract terms and conditions. View this presentation to learn more about IT outsourcing.
As technology has evolved and become increasingly pervasive, there isn’t a business function that isn’t in some way enabled by technology. View this presntation to learn more about IT hosting.
ERP Outsourcing, Dynamics AX, and Managed Services by OneNeck IT Servicesoneneckitservices
Learn more about ERP Outsourcing, Dynamics AX, and Managed Services. A CIO’s Perspective on Application Management, Infrastructure, Maintenance and Support.
Visit http://www.oneneck.com/ today.
IT Outsourcing: Business Continuity by Design by OneNeck IT Servicesoneneckitservices
OneNeck provides a comprehensive, flexible suite of IT outsourcing solutions designed specifically for mid-market companies. Visit http://www.oneneck.com/ today.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Disaster Recovery Companies often depend heavily on 24/7 availability of scheduling, CRM and communication systems. In the event of a major production failure, companies need redundancy, reliability and geographic diversity in these systems. The following is a case study outlining how a global company implemented a disaster recovery solution to replicate and validate proprietary data and more.
3. The Company The company has been a world leader in hair loss and medical hair restoration for more than 35 years. Throughout its history, the company has performed almost 200,000 hair transplant procedures on men and women from 60 different nations. The company helps people who suffer from hair loss and progressive baldness by using advanced techniques to achieve natural results. The company operates eighty-five locations throughout the U.S.A., Canada and Mexico.
4.
5. Disaster Recovery Solution A disaster recovery solution provider duplicated the hair restoration company’s production infrastructure to a hosted and managed DR environment in their cloud infrastructure. Specific services, which are guaranteed by the solution provider’s 99.99% service level agreement, include: Managed Hosting in the provider’s Data Centers . The solution provider hosts and manages the hair restoration company’s physical and virtual cloud-based, disaster recovery servers, software and web-based applications in its data centers. These data centers meet the stringent requirements for Tier 3, SAS70 Type II backed operational facilities, are maintained 24/7 by an on-site team, and provide the hair restoration company with a DR environment that would otherwise be inaccessible.
6. Disaster Recovery Solution Virtual Private Servers (VPS). The solution provider’s VPS infrastructure provides a low cost, scalable and flexible infrastructure for the hair restoration company without the need for hardware life-cycle management. VPS keeps the hair restoration company’s capital costs for its DR infrastructure at a minimum. Disaster Recovery Replication. An investment in disaster recovery would be useless without replicating critical data from production to the disaster recovery environment. DR provides aggressive RTO and RPO times by using solutions such as SAN, VM and file level replication.
7. Disaster Recovery Solution WAN Connectivity Solutions. MPLS WAN connectivity allows the hair restoration company’s remote offices to effectively access the DR environment in the event of a production failure. The provider offers a carrier neutral environment and cross-connects from the telecommunications demarc to the hair restoration company’s hosted DR environment. Should a production failure occur, the hair restoration company’s systems are accessed over the MPLS network via the additional MPLS link at the provider’s data centers.
8. Disaster Recovery Mitigating to a disaster recovery solution provider’s private cloud environment provided the following benefits: 99.99% guaranteed server and network availability, no hardware life-cycles to manage, survivability and redundancy, flexibility and scalability, lower IT costs and peace of mind. The hair restoration company has a partner to help create, monitor and maintain a more robust DR environment. The solution provider not only hosts the hair restoration company’s DR infrastructure, but manages it with leading expertise, advanced technologies and significant cost efficiencies.
9. About the Author Chuck Vermillion is CEO and founder of OneNeck IT Services, a leading provider of mid-market enterprise hosting and managed services since 1997. For more information about disaster recovery solutions, visit http://www.oneneck.com/