This document summarizes the IT infrastructure and security measures at TWGHs Ko Ho Ning Memorial Primary School. It outlines their virtual desktop environment consisting of 410 virtual machines hosted on 3 servers with 10Gbps backbone. It then describes the base arrangements of the virtual machines in different groups and sectors. Finally, it details the security protections in place including antivirus software, firewalls, access controls, monitoring of student online activity and management of applications and internet access.
OSDC 2017 | Taming the Modern Data Center by Seth VargoNETWAYS
Today we are plagued by hundreds of choices when architecting a modern data center. Should our machines be virtual or physical? Should we use containers or Docker? Should we use a public cloud provider or a private cloud provider? Which configuration management tool is best to use? What about IaaS, PaaS, and SaaS? It would be manageable if these were binary choices; however, we often find ourselves in a hybrid environment.
OSDC 2017 - Seth Vargo - Taming the modern data centerNETWAYS
Today we are plagued by hundreds of choices when architecting a modern data center. Should our machines be virtual or physical? Should we use containers or Docker? Should we use a public cloud provider or a private cloud provider? Which configuration management tool is best to use? What about IaaS, PaaS, and SaaS? It would be manageable if these were binary choices; however, we often find ourselves in a hybrid environment.
OSDC 2017 | Modern Secrets Management with Vault by Seth VargoNETWAYS
Creating secrets is easy, but effectively managing them is much more complex. Vault, which is a free and open source tool by HashiCorp, is a popular tool for managing organizational secrets.
Named one of the top 10 coolest storage startups of 2014 by CRN, NAKIVO is delivering a new way for cloud providers, enterprises, and SMBs to protect their VMware environments more reliably, efficiently, and cost effectively. NAKIVO Backup & Replication is VMware-certified, purely agentless, and can be deployed on both Linux and Windows. Featuring a simple and intuitive Web UI, the product can back up and replicate VMware VMs onsite, offsite, and to private/public clouds. NAKIVO Backup & Replication supports live applications and databases and provides data deduplication, instant file recovery, instant Exchange object recovery, flash VM boot, and network acceleration
Looking at historic, current and evolving approaches, I will take you through from how we used to 'live' edit on one server with HTML in the code; to implementing Template Toolkit and 'front end / back end' servers; to the addition of version control; all the way through to distributed caching, file systems and processing (aka Six Apart worship) with 15+ servers.
The Professional Developers Conference (PDC) is the definitive developer event focused on the technical strategy of the Microsoft developer platform. In this session David Glover & Catherine Eibner provide their summary of what was hot to trot at the PDC 2009.
OSDC 2017 | Taming the Modern Data Center by Seth VargoNETWAYS
Today we are plagued by hundreds of choices when architecting a modern data center. Should our machines be virtual or physical? Should we use containers or Docker? Should we use a public cloud provider or a private cloud provider? Which configuration management tool is best to use? What about IaaS, PaaS, and SaaS? It would be manageable if these were binary choices; however, we often find ourselves in a hybrid environment.
OSDC 2017 - Seth Vargo - Taming the modern data centerNETWAYS
Today we are plagued by hundreds of choices when architecting a modern data center. Should our machines be virtual or physical? Should we use containers or Docker? Should we use a public cloud provider or a private cloud provider? Which configuration management tool is best to use? What about IaaS, PaaS, and SaaS? It would be manageable if these were binary choices; however, we often find ourselves in a hybrid environment.
OSDC 2017 | Modern Secrets Management with Vault by Seth VargoNETWAYS
Creating secrets is easy, but effectively managing them is much more complex. Vault, which is a free and open source tool by HashiCorp, is a popular tool for managing organizational secrets.
Named one of the top 10 coolest storage startups of 2014 by CRN, NAKIVO is delivering a new way for cloud providers, enterprises, and SMBs to protect their VMware environments more reliably, efficiently, and cost effectively. NAKIVO Backup & Replication is VMware-certified, purely agentless, and can be deployed on both Linux and Windows. Featuring a simple and intuitive Web UI, the product can back up and replicate VMware VMs onsite, offsite, and to private/public clouds. NAKIVO Backup & Replication supports live applications and databases and provides data deduplication, instant file recovery, instant Exchange object recovery, flash VM boot, and network acceleration
Looking at historic, current and evolving approaches, I will take you through from how we used to 'live' edit on one server with HTML in the code; to implementing Template Toolkit and 'front end / back end' servers; to the addition of version control; all the way through to distributed caching, file systems and processing (aka Six Apart worship) with 15+ servers.
The Professional Developers Conference (PDC) is the definitive developer event focused on the technical strategy of the Microsoft developer platform. In this session David Glover & Catherine Eibner provide their summary of what was hot to trot at the PDC 2009.
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Ralph Szeto, Chairman, Hong Kong Association of Interactive Marketing
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Saron Leung, Industry Head of Financial Services, Google Hong Kong
Inspire@eLC Chapter 3 - HKTVMall: Leading Technology Evolution for eCommerce Industry by Ms. Jelly Zhou, Executive Director and Chief Executive Officer (Hong Kong) of Hong Kong Technology Venture Company Limited
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
10. Basic Protection
Run minimum services
AntiVirus
Only accessible by authorized
Application Control
Internal firewall and police setting
Open limited ports
Bandwidth management
IPaddr lock
Accesible time schedule
System and patch update
Log / Audit record
File / Directory Sync
11. Basic Protection
Run minimum services
AntiVirus
Only accessible by authorized
Application Control
Internal firewall and police setting
Open limited ports
Bandwidth management
IPaddr lock
Accesible time schedule
System and patch update
Log / Audit record
File / Directory Sync
12. Basic Protection
Run minimum services
AntiVirus
Only accessible by authorized
Application Control
Internal firewall and police setting
Open limited ports
Bandwidth management
IPaddr lock
Accesible time schedule
System and patch update
Log / Audit record
File / Directory Sync
學生用
電腦
13. Basic Protection
學生用
電腦
AntiVirus Brand A
Accessible by:
Students
IT Teachers
教職員用
電腦
AntiVirus Brand A
Accessible by:
That teacher
IT Admin
Student File
Server
User
Profile
Server
Teacher
File
Server
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Gateway
14. Basic Protection
AntiVirus Brand A
Accessible by:
Students
IT Teachers
That teacher
IT Admin
教職員用
電腦
AntiVirus Brand A
Accessible by:
Student File
Server
User
Profile
Server
Teacher
File
Server
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Gateway
學生用
電腦
School base Protection
15. Screen Capture
School base Protection
學生用
電腦
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
16. Screen Capture
School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
17. School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
18. School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
19. School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
Activity History
20. School base Protection
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Activity History
21. School base Protection
Direct Control
Speed Management
Virtual Application
Virtual Portal
Bounded Accessible Area
學生用
電腦
Activity History
Direct Control
23. School base Protection
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Direct Control
Speed Management
24. Strict Accessible Area
Student Desktop
School base Protection 學生用
電腦
Virtual Application
Virtual Browser
Server for
Virtual App
25. Strict Accessible Area
School base Protection 學生用
電腦
Virtual Application
Student Desktop
Virtual Browser
Server for
Virtual App
Strict Accessible Area
26. School base Protection 學生用
電腦
Strict Accessible Area
App Locker
User Quota Management
Folder/File Management
Child AD Server
Security settings of browsers
Audit Log
Network Management / VLAN
AntiVirus / Anti Spyware etc
Secure Password
Firewall / Port Management
OS / Software update
Auto Logoff when unattended
Data Sync / Backup policy