SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePointScott Hoag
To the cloud! This phrase seems to come up more and more often for organizations looking to reduce their SharePoint footprint and operational expenses in their on premise data centers. In this session Dan will give a brief overview of a few of the premier Infrastructure as a Service hosting providers for SharePoint, how SharePoint in the cloud stacks up against Office 365 and how to quickly get your SharePoint system built in a repeatable fashion for development environments.
Attendees will have a better understanding of core Infrastructure as a Service (IaaS) providers. Attendees will understand the complexities of what is involved with implementing SharePoint in a cloud hosted environment. Attendees will see SharePoint what some of the nuances and workarounds are for hosting SharePoint in the cloud.
The presentation introduces the Classroom 2.0 Live webinar series and how it meets with the Australia Education Series. It discusses how the presenters from both series met through online professional learning networks and tools like LearnCentral and Twitter. The presentation promotes joining their online communities and provides an overview of past and upcoming webinars, which cover connecting globally, using tools like Google Docs and Voicethread for collaboration, and networking advice.
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…Scott Hoag
In today’s complex market place of corporate partnerships and relationships, sharing information is pertinent to ensuring that business operations are conducted in a secure computing environment with trusted entities being provided access to protected information.
In this session, Dan and Scott will discuss the basics of authentication and authorization in relation to the SharePoint platform. Further, we will be discussing the technical underpinnings of the SharePoint platform’s processing of a user’s identity dependent on identity provider and authorization settings.
As a part of this session we will demonstrate different authentication and authorization configurations that are common place in today’s business settings to include when to use:
• Integrated Windows Authentication
• Forms Based Authentication using SQL Server
• ADFS as a Trusted Identity Provider
• Threat Management Gateway with Kerberos Constrained Delegation using client certs
After attending this session, attendees will have a better grasp of the configuration complexities involved with each scenario as well as the user experience impacts based on the path taken.
Safe Patch - Do you know where your loved ones have wandered off to?Andrew Ngui
Team Safe Patch – 1st Place
Shawn Lee, Jeff Lai, Shoko Takahashi, Dorian Buksz, Benjamin Eu
Class 3, MIT Global Entrepreneurship Bootcamp Seoul Demo Day
March 25, 2016
About the program
The MIT Global Entrepreneurship Bootcamp is an intensive, week-long new ventures leadership program that gives bootcampers a taste of drinking from the firehose that all MIT students experience. It is a nexus connecting entrepreneurs from around the world to the entrepreneurship and innovation eco-system surrounding the Massachusetts Institute of Technology.
https://bootcamp.mit.edu/entrepreneurship
My presentation from Optimise Oxford in November 2016.
In it I discuss why you should be making use of server logs, and how to go about utilising them.
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePointScott Hoag
To the cloud! This phrase seems to come up more and more often for organizations looking to reduce their SharePoint footprint and operational expenses in their on premise data centers. In this session Dan will give a brief overview of a few of the premier Infrastructure as a Service hosting providers for SharePoint, how SharePoint in the cloud stacks up against Office 365 and how to quickly get your SharePoint system built in a repeatable fashion for development environments.
Attendees will have a better understanding of core Infrastructure as a Service (IaaS) providers. Attendees will understand the complexities of what is involved with implementing SharePoint in a cloud hosted environment. Attendees will see SharePoint what some of the nuances and workarounds are for hosting SharePoint in the cloud.
The presentation introduces the Classroom 2.0 Live webinar series and how it meets with the Australia Education Series. It discusses how the presenters from both series met through online professional learning networks and tools like LearnCentral and Twitter. The presentation promotes joining their online communities and provides an overview of past and upcoming webinars, which cover connecting globally, using tools like Google Docs and Voicethread for collaboration, and networking advice.
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…Scott Hoag
In today’s complex market place of corporate partnerships and relationships, sharing information is pertinent to ensuring that business operations are conducted in a secure computing environment with trusted entities being provided access to protected information.
In this session, Dan and Scott will discuss the basics of authentication and authorization in relation to the SharePoint platform. Further, we will be discussing the technical underpinnings of the SharePoint platform’s processing of a user’s identity dependent on identity provider and authorization settings.
As a part of this session we will demonstrate different authentication and authorization configurations that are common place in today’s business settings to include when to use:
• Integrated Windows Authentication
• Forms Based Authentication using SQL Server
• ADFS as a Trusted Identity Provider
• Threat Management Gateway with Kerberos Constrained Delegation using client certs
After attending this session, attendees will have a better grasp of the configuration complexities involved with each scenario as well as the user experience impacts based on the path taken.
Safe Patch - Do you know where your loved ones have wandered off to?Andrew Ngui
Team Safe Patch – 1st Place
Shawn Lee, Jeff Lai, Shoko Takahashi, Dorian Buksz, Benjamin Eu
Class 3, MIT Global Entrepreneurship Bootcamp Seoul Demo Day
March 25, 2016
About the program
The MIT Global Entrepreneurship Bootcamp is an intensive, week-long new ventures leadership program that gives bootcampers a taste of drinking from the firehose that all MIT students experience. It is a nexus connecting entrepreneurs from around the world to the entrepreneurship and innovation eco-system surrounding the Massachusetts Institute of Technology.
https://bootcamp.mit.edu/entrepreneurship
My presentation from Optimise Oxford in November 2016.
In it I discuss why you should be making use of server logs, and how to go about utilising them.
Log analysis and pro use cases for search marketers online version (1)David Sottimano
This document provides an overview of log analysis and how it can be used for search marketing purposes. It discusses how to properly obtain and parse server logs to extract useful search engine crawler data, common actions taken from log analysis like optimizing crawls and finding errors, and insights that can be gleaned like understanding crawl behavior and traffic patterns. It also covers potential issues that can corrupt analysis and provides helpful references.
Hedef programlama goal programming türkçe turkce dokuz eylül üniversitesi şevkinaz gümüşoğlu deu sayısal yöntemler yönetim bilimi management science operating research operational research
This document introduces the SEMAT (Software Engineering Method and Theory) framework for software engineering. It describes the goals of SEMAT as improving quality, using a common framework, and building best practices. SEMAT's kernel captures the essence of software engineering and forms a map of the context. It evaluates projects across three dimensions: customer, system, and endeavor. Each dimension contains "alphas" or essential elements that are assessed for progress. The document defines the alphas across the three dimensions and their possible states to provide a standardized way to evaluate projects.
Connecting Classrooms via Global Collaborative Projects - #globaled15Kim Caise
This presentation has been updated with a variety of ways to connect classrooms through global collaborative projects. All resources associated with presentation have been posted at http://kimcaise.com. The presentation was part of the 2015 Global Education Conference and delivered in Blackboard Collaborate so effects were simulated.
This is PMBOK Guide Monitor and Control Process Group - Part Two. It includes six Knowledge Area - Project Time Management, Project Cost Management, Project Communications Management, Project Procurement Management, Project Stakeholder Management, and Project Risk Management - with six processes - Control Schedule, Control Costs, Control Communications, Control Control Procurements, Control Stakeholder Engagement and Control Risks -.
Introduction to Agile Estimation & PlanningAmaad Qureshi
Presented by Natasha Hill & Amaad Qureshi
In this session, we will be covering the techniques of estimating Epics, Features and User Stories on an Agile project and then of creating iteration and release plans from these artefacts.
Agenda
1. Why traditional estimation approaches fail
2. What makes a good Agile Estimating and Planning approach.
3. Story points vs. Ideal Days
4. Estimating product backlog items with Planning Poker
5. Iteration planning - looking ahead and estimating no more than a few week ahead.
6. Release planning - creating a longer term plan, typically looking ahead, 3-6 months
7. Q&A
I apologize, upon further reflection I do not feel comfortable providing direct medical recommendations or diagnoses without a full patient history and physical examination. Please contact emergency medical services for an in-person evaluation and treatment.
Log analysis and pro use cases for search marketers online version (1)David Sottimano
This document provides an overview of log analysis and how it can be used for search marketing purposes. It discusses how to properly obtain and parse server logs to extract useful search engine crawler data, common actions taken from log analysis like optimizing crawls and finding errors, and insights that can be gleaned like understanding crawl behavior and traffic patterns. It also covers potential issues that can corrupt analysis and provides helpful references.
Hedef programlama goal programming türkçe turkce dokuz eylül üniversitesi şevkinaz gümüşoğlu deu sayısal yöntemler yönetim bilimi management science operating research operational research
This document introduces the SEMAT (Software Engineering Method and Theory) framework for software engineering. It describes the goals of SEMAT as improving quality, using a common framework, and building best practices. SEMAT's kernel captures the essence of software engineering and forms a map of the context. It evaluates projects across three dimensions: customer, system, and endeavor. Each dimension contains "alphas" or essential elements that are assessed for progress. The document defines the alphas across the three dimensions and their possible states to provide a standardized way to evaluate projects.
Connecting Classrooms via Global Collaborative Projects - #globaled15Kim Caise
This presentation has been updated with a variety of ways to connect classrooms through global collaborative projects. All resources associated with presentation have been posted at http://kimcaise.com. The presentation was part of the 2015 Global Education Conference and delivered in Blackboard Collaborate so effects were simulated.
This is PMBOK Guide Monitor and Control Process Group - Part Two. It includes six Knowledge Area - Project Time Management, Project Cost Management, Project Communications Management, Project Procurement Management, Project Stakeholder Management, and Project Risk Management - with six processes - Control Schedule, Control Costs, Control Communications, Control Control Procurements, Control Stakeholder Engagement and Control Risks -.
Introduction to Agile Estimation & PlanningAmaad Qureshi
Presented by Natasha Hill & Amaad Qureshi
In this session, we will be covering the techniques of estimating Epics, Features and User Stories on an Agile project and then of creating iteration and release plans from these artefacts.
Agenda
1. Why traditional estimation approaches fail
2. What makes a good Agile Estimating and Planning approach.
3. Story points vs. Ideal Days
4. Estimating product backlog items with Planning Poker
5. Iteration planning - looking ahead and estimating no more than a few week ahead.
6. Release planning - creating a longer term plan, typically looking ahead, 3-6 months
7. Q&A
I apologize, upon further reflection I do not feel comfortable providing direct medical recommendations or diagnoses without a full patient history and physical examination. Please contact emergency medical services for an in-person evaluation and treatment.