With the advent of microservices , containers and on demand computing and the rate at which code is getting churned out every single day we need to automate or perish. DevOps or Build at Scale and how to have a hands free approach like autonomous cars is what companies need the most today. It is no longer OK to say we build it someone will test it and certify it , it needs to happen in real time and all at once the Build, Automate and Test in a continuous pipeline. How can companies stay on top by effectively making use of Automation shall be looked at in this talk.
Peter Coffee of salesforce.com summarizes the state of the cloud after a decade of enterprise assimilation, and lays out the upside value opportunities of the reconceived Cloud 2 -- combining cloud economy with connected community
Cloud has brought in the concept of managing security within bounded contexts. All else is outside the scope of the service provider or the hosting vendor. How do you plan for scope security activities around the nebulous scope of the cloud especially in a hybrid / multi cloud scenarios where clear cut boundaries are not well defined.How can architecture frameworks help you to fix this issue which is like trying to safeguard a fort not knowing which doors to lock and where to start ?The talk will focus on how enterprise architecture frameworks can help create the much needed trace ability and help define the scope of the security architecture activity. Using tried and tested means has the advantage of not having to reinvent the wheel and avoid missing out plugging the weak links within your enterprise.
his VeeamUP special edition focuses on Availability for the Always-On Enterprise™. Highlighting key events during VeeamOn 2015 this edition also contains featured articles around:
The value of VMCE certification;
DRaaS’ cost and complexity implications;
Precise Point-in-Time restoration with Veeam Explorer for Oracle, how to increase efficiency with availability;
Maximizing availability with ROBOs;
And how IT perception is shifting and why CIO’s need to “take a seat at the boardroom table”.
You’ll also learn about Trend Micro’s global deployment of Veeam to truly become an Always-on Enterprise.
With the advent of microservices , containers and on demand computing and the rate at which code is getting churned out every single day we need to automate or perish. DevOps or Build at Scale and how to have a hands free approach like autonomous cars is what companies need the most today. It is no longer OK to say we build it someone will test it and certify it , it needs to happen in real time and all at once the Build, Automate and Test in a continuous pipeline. How can companies stay on top by effectively making use of Automation shall be looked at in this talk.
Peter Coffee of salesforce.com summarizes the state of the cloud after a decade of enterprise assimilation, and lays out the upside value opportunities of the reconceived Cloud 2 -- combining cloud economy with connected community
Cloud has brought in the concept of managing security within bounded contexts. All else is outside the scope of the service provider or the hosting vendor. How do you plan for scope security activities around the nebulous scope of the cloud especially in a hybrid / multi cloud scenarios where clear cut boundaries are not well defined.How can architecture frameworks help you to fix this issue which is like trying to safeguard a fort not knowing which doors to lock and where to start ?The talk will focus on how enterprise architecture frameworks can help create the much needed trace ability and help define the scope of the security architecture activity. Using tried and tested means has the advantage of not having to reinvent the wheel and avoid missing out plugging the weak links within your enterprise.
his VeeamUP special edition focuses on Availability for the Always-On Enterprise™. Highlighting key events during VeeamOn 2015 this edition also contains featured articles around:
The value of VMCE certification;
DRaaS’ cost and complexity implications;
Precise Point-in-Time restoration with Veeam Explorer for Oracle, how to increase efficiency with availability;
Maximizing availability with ROBOs;
And how IT perception is shifting and why CIO’s need to “take a seat at the boardroom table”.
You’ll also learn about Trend Micro’s global deployment of Veeam to truly become an Always-on Enterprise.
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...Amazon Web Services Korea
스폰서 발표 세션 | ITSM in an Agile World
Scott Goh-Davis, Solutions Engineer APAC, Atlassian
Expert tips for building agile ITSM and improving team collaboration
Publishers understand that content management is a pivotal piece in today's publishing environment. Yet budgeting for a CMS initiative can quickly scale to the point where executives question why they should stray from the status quo. In this free webinar, Barry Bealer, CEO of Really Strategies, will lead a panel of publishing professionals who will discuss how they made their business case and got executive buy-in for content management in their organizations.
A cloud revolution is brewing, and it promises to radically transform the way we compete, collaborate, and consume business services. Indeed, in an economy as volatile and hypercompetitive as today’s, the cloud’s potent mix of simplicity, security, faster innovation, and lower operating costs is proving increasingly attractive. For many businesses—small, medium, and large—the time to adopt this game-changing approach is now.
This presentation provides a high-level overview for the practice of IT Architecture in today's enterprise. It is the first in several IT Architecture presentations we will be providing.
Permission Boundary Round: AWS Security Week at the San Francisco LoftAmazon Web Services
Permission Boundary Round: Security Week at the San Francisco Loft
Learn how to use permission boundaries to truly delegate administration in AWS. This new feature can be challenging to understand so we'll do a good intro and then dive into an in-depth hands-on exercise to help you master it.
Level: 300
Speaker: Greg McConnel - Sr. Solutions Architect, AWS
Architecting security & governance across your AWS environmentAmazon Web Services
Many AWS customers use multiple accounts to meet their requirements for billing, infrastructure isolation, and separation of duties. In this session, we discuss the latest updates around establishing and building a multi-account security and governance strategy. We will also take a look at data protection strategies for ensuring data integrityand availability using the AWS native services.
On January 10, Everest Group and Cloud Connect hosted a webinar that covered enterprise cloud adoption trends.
Everest Group and Cloud Connect conducted a first of its kind assessment of the major driving forces behind enterprise cloud adoption. This survey was unique in that it examined the perceived benefits and pain points among cloud buyers and compared the results with those of service providers and third party consultants. The results are surprising and indicate some shifting market drivers and surprising disconnects between cloud buyers and sellers. The survey also examined:
Current and future adoption patterns across cloud layers – IaaS, PaaS, SaaS, BPaaS, Current and future adoption across cloud hosting models – Public, Private and Hybrid, Adoption trends by application workload, & Stakeholder involvement in cloud investments
Modern Architectures: Keynote - Using Fabrics to Weave Success in the CloudDreamforce
Cloud. Mobile. Big Data. Data Science. Internet of Things. We know that these trends are harnessing easily accessible technological power to connect to nearly everything - bringing a world of opportunity for businesses to build apps that connect employees, partners, data, and even products, in entirely new ways. But while you are constantly bombarded with these 'next big things', how can they be utilized most effectively within your Enterprise? How do you balance new revenue and service opportunities against application backlogs and other 'technical deb'? More importantly, as a CIO, CTO, or Enterprise Architect, how do you approach your current set of applications and ensure that it is truly ready for adopting "Modern Architectures"? Watch the video now: https://www.youtube.com/watch?v=YYE5RW1bjKw
More and more organisations are choosing to work with managed cloud service providers to ease the transition to the cloud. Despite the knowledge that these specialists can offer, not all collaborative projects go successfully. That's why Paul Bates, Vice President of Managed Cloud Services at leading cloud and data centre provider Proact, looks at seven key lessons that should be kept in mind when defining a cloud strategy and choosing an associated partner.
Gain insight into key areas, including:
- Data location
- Cost models
- Automation and orchestration
- Hybrid and public cloud platforms
Set firm foundations before you embark on your journey to the cloud.
How to Leverage Business Partners Migration to SaaS / CloudClub Alliances
This presentation was prepared as background material for 2009 Channel Focus Europe [22/23 october - see www.baptie.com].
In a session entitled "How to Leverage Business Partners' Migration to SaaS / Cloud", Loic Simon shared IBM's Club Alliances experience on leveraging business partners migrating to a SaaS/Cloud based business model.
After a quick summary of SaaS and Cloud challenges for Vendors and their Business Partners, he delivered a point of view on SaaS/Cloud distribution and influence channels and shared his hands-on experience as the leader of "Club Alliances" [www.cluballiances.com].
Club Alliances members leverage cloud computing, SaaS and BPO [business process outsourcing] models to promote and deliver business solutions, "as a service".
Their "Solutions as a Service" are typically powered by IBM IaaS [Infrastructure as a Service] or PaaS [Platform as a Service] components.
Aknowledgments : Among various materials borrowed from key specialists on the topic [thanks to all of them : Lustratus, Gilwell Group, Saugatuck...], Loic specifically leveraged some slides from presentations prepared by Philippe Martinez - Philmart - and Laurent Glaentzer - Lemon Operations, two members of Club Alliances who deliver their channel expertise to their fellow Club Alliances members.
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...Amazon Web Services Korea
스폰서 발표 세션 | ITSM in an Agile World
Scott Goh-Davis, Solutions Engineer APAC, Atlassian
Expert tips for building agile ITSM and improving team collaboration
Publishers understand that content management is a pivotal piece in today's publishing environment. Yet budgeting for a CMS initiative can quickly scale to the point where executives question why they should stray from the status quo. In this free webinar, Barry Bealer, CEO of Really Strategies, will lead a panel of publishing professionals who will discuss how they made their business case and got executive buy-in for content management in their organizations.
A cloud revolution is brewing, and it promises to radically transform the way we compete, collaborate, and consume business services. Indeed, in an economy as volatile and hypercompetitive as today’s, the cloud’s potent mix of simplicity, security, faster innovation, and lower operating costs is proving increasingly attractive. For many businesses—small, medium, and large—the time to adopt this game-changing approach is now.
This presentation provides a high-level overview for the practice of IT Architecture in today's enterprise. It is the first in several IT Architecture presentations we will be providing.
Permission Boundary Round: AWS Security Week at the San Francisco LoftAmazon Web Services
Permission Boundary Round: Security Week at the San Francisco Loft
Learn how to use permission boundaries to truly delegate administration in AWS. This new feature can be challenging to understand so we'll do a good intro and then dive into an in-depth hands-on exercise to help you master it.
Level: 300
Speaker: Greg McConnel - Sr. Solutions Architect, AWS
Architecting security & governance across your AWS environmentAmazon Web Services
Many AWS customers use multiple accounts to meet their requirements for billing, infrastructure isolation, and separation of duties. In this session, we discuss the latest updates around establishing and building a multi-account security and governance strategy. We will also take a look at data protection strategies for ensuring data integrityand availability using the AWS native services.
On January 10, Everest Group and Cloud Connect hosted a webinar that covered enterprise cloud adoption trends.
Everest Group and Cloud Connect conducted a first of its kind assessment of the major driving forces behind enterprise cloud adoption. This survey was unique in that it examined the perceived benefits and pain points among cloud buyers and compared the results with those of service providers and third party consultants. The results are surprising and indicate some shifting market drivers and surprising disconnects between cloud buyers and sellers. The survey also examined:
Current and future adoption patterns across cloud layers – IaaS, PaaS, SaaS, BPaaS, Current and future adoption across cloud hosting models – Public, Private and Hybrid, Adoption trends by application workload, & Stakeholder involvement in cloud investments
Modern Architectures: Keynote - Using Fabrics to Weave Success in the CloudDreamforce
Cloud. Mobile. Big Data. Data Science. Internet of Things. We know that these trends are harnessing easily accessible technological power to connect to nearly everything - bringing a world of opportunity for businesses to build apps that connect employees, partners, data, and even products, in entirely new ways. But while you are constantly bombarded with these 'next big things', how can they be utilized most effectively within your Enterprise? How do you balance new revenue and service opportunities against application backlogs and other 'technical deb'? More importantly, as a CIO, CTO, or Enterprise Architect, how do you approach your current set of applications and ensure that it is truly ready for adopting "Modern Architectures"? Watch the video now: https://www.youtube.com/watch?v=YYE5RW1bjKw
More and more organisations are choosing to work with managed cloud service providers to ease the transition to the cloud. Despite the knowledge that these specialists can offer, not all collaborative projects go successfully. That's why Paul Bates, Vice President of Managed Cloud Services at leading cloud and data centre provider Proact, looks at seven key lessons that should be kept in mind when defining a cloud strategy and choosing an associated partner.
Gain insight into key areas, including:
- Data location
- Cost models
- Automation and orchestration
- Hybrid and public cloud platforms
Set firm foundations before you embark on your journey to the cloud.
How to Leverage Business Partners Migration to SaaS / CloudClub Alliances
This presentation was prepared as background material for 2009 Channel Focus Europe [22/23 october - see www.baptie.com].
In a session entitled "How to Leverage Business Partners' Migration to SaaS / Cloud", Loic Simon shared IBM's Club Alliances experience on leveraging business partners migrating to a SaaS/Cloud based business model.
After a quick summary of SaaS and Cloud challenges for Vendors and their Business Partners, he delivered a point of view on SaaS/Cloud distribution and influence channels and shared his hands-on experience as the leader of "Club Alliances" [www.cluballiances.com].
Club Alliances members leverage cloud computing, SaaS and BPO [business process outsourcing] models to promote and deliver business solutions, "as a service".
Their "Solutions as a Service" are typically powered by IBM IaaS [Infrastructure as a Service] or PaaS [Platform as a Service] components.
Aknowledgments : Among various materials borrowed from key specialists on the topic [thanks to all of them : Lustratus, Gilwell Group, Saugatuck...], Loic specifically leveraged some slides from presentations prepared by Philippe Martinez - Philmart - and Laurent Glaentzer - Lemon Operations, two members of Club Alliances who deliver their channel expertise to their fellow Club Alliances members.
As presented by Peter J Cooper CEO of Saasu.com the web finance engine at CeBIT Conference May 2008 on Transaction 2.0. A bit rough, the live version was better :-) with thanks to Marc Lehmann for some bits.
The People Pillar of Cloud Adoption: Developing Your Workforce & Building Dig...Amazon Web Services
A successful cloud-transformation journey incorporates three pillars: people, process, and technology. Far too often, organisations focus on process improvements and technology implementation, but ignore the human aspect. Many leaders acknowledge that the first two are easy to modify, while influencing culture is more difficult. This session covers best-practice methods meant to empower customers to address this challenge. Learn about roles and responsibilities germane to the transition and post-cloud adoption phase. Assess your organisation’s gaps among the requisite skills and competencies, build effective training models, and shape an effective DevOps culture.
Next generation semantic technologies help individuals and businesses develop semantic superpowers. That is how we break the chains of legacy systems, free resources from maintenance, and innovate the new capabilities we need to thrive in the next Internet. Learn what semantic superpowers can do for you.
Deploying an Lottery Results Website Using
CMS
Meerja Maqbul Baig1
Founder at Speedraftaar Informative LLP, Dharmapuri, Jagityal, Karimnagar- 505425, India
Application security for the modern web - ISSA South Texas Houston DevOpsPhillip Maddux
Presented on September 9, 2018 at ISSA South Texas Houston DevOps conference (http://www.southtexasissa.org/).
Over the last several years we’ve witnessed, and experienced, an advance towards new approaches in web technologies and the processes to deploy web applications. In this talk, we’ll explore and describe the “Modern Web”, discuss observations on the evolution of the Secure SDLC, recognize existing challenges in achieving real-time threat visibility once web applications are deployed to production, and finally, walk through the concepts that address the challenges in fast paced “agile” development cycles.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Monitoring Java Application Security with JDK Tools and JFR Events
SharePoint 2010's Killer App
1. SharePoint 2010 Killer App Who Let The Content Out? Perth SharePoint User Group – Session 1, Thurs 15th April 2010 Mike Stringfellow IT Consultant Seven Sigma Business Solutions mike.stringfellow@sevensigma.com.au
4. About Mike ‘ MOSSuMS’ Stringfellow Seven Sigma Business Solutions www.sevensigma.com.au mike.stringfellow@sevensigma.com.au 20 years of IT in Perth, Sydney Dublin and the UK IS Consultant, SharePoint specialist, .net programmer Geek in denial: Do not have an Android or iPhone. Yet. Blogs and rants on G’DayMOSSuMS
Stores of structured and unstructured information such as network drives, web content servers, SharePoint, local drives/OS, DMS, ECM, Source Control... We all have our preferences and often use the most handy store rather than the right one.
Stores of structured and unstructured information such as network drives, web content servers, SharePoint, local drives/OS, DMS, ECM, Source Control... We all have our preferences and often use the most handy store rather than the right one.
Stores of structured and unstructured information such as network drives, web content servers, SharePoint, local drives/OS, DMS, ECM, Source Control... We all have our preferences and often use the most handy store rather than the right one.
OASIS - Org for Advancement of Structured Information Standards
OASIS - Org for Advancement of Structured Information Standards
OASIS - Org for Advancement of Structured Information Standards
OASIS - Organisation
OASIS - Organisation
OASIS - Organisation
OASIS - Organisation
OASIS - Organisation
MS will be ready. The issue might be that there has not been any public beta testing (or information for that matter). If there are delays to the CMIS1.0 vote, they may RTM without it. Then we will all have to start asking about SP1, hotfixes etc…How much of SP2010 has been leveraged? BCS (BDC 2), Friendly unique doc Ids, open data protocol…
MS will be ready. The issue might be that there has not been any public beta testing (or information for that matter). If there are delays to the CMIS1.0 vote, they may RTM without it. Then we will all have to start asking about SP1, hotfixes etc…How much of SP2010 has been leveraged? BCS (BDC 2), Friendly unique doc Ids, open data protocol…
MS will be ready. The issue might be that there has not been any public beta testing (or information for that matter). If there are delays to the CMIS1.0 vote, they may RTM without it. Then we will all have to start asking about SP1, hotfixes etc…How much of SP2010 has been leveraged? BCS (BDC 2), Friendly unique doc Ids, open data protocol…
MS will be ready. The issue might be that there has not been any public beta testing (or information for that matter). If there are delays to the CMIS1.0 vote, they may RTM without it. Then we will all have to start asking about SP1, hotfixes etc…How much of SP2010 has been leveraged? BCS (BDC 2), Friendly unique doc Ids, open data protocol…
MS will be ready. The issue might be that there has not been any public beta testing (or information for that matter). If there are delays to the CMIS1.0 vote, they may RTM without it. Then we will all have to start asking about SP1, hotfixes etc…How much of SP2010 has been leveraged? BCS (BDC 2), Friendly unique doc Ids, open data protocol…
MS will be ready. The issue might be that there has not been any public beta testing (or information for that matter). If there are delays to the CMIS1.0 vote, they may RTM without it. Then we will all have to start asking about SP1, hotfixes etc…How much of SP2010 has been leveraged? BCS (BDC 2), Friendly unique doc Ids, open data protocol…
Couldn’t find any public info on vorsite, seeUnity, oracle or sap support dates
W3C saw this and ‘invited’ MS to make in an ‘incubator group’, similar to Apache. No response from MS yet!