The document discusses user management in IBM Connections. It describes how user profiles are stored in LDAP directories and the PeopleDB database. It also discusses how single sign-on is implemented using LTPA cookies and tokens. User authentication can integrate with directories like Active Directory, Domino, and Websphere Identity Management. Procedures are important for handling user leave/returns from maternity or sabbatical.
In many organizations, users are still faced with entering multiple passwords and even some configuration data to gain access to their Notes Client, Sametime Client and Connections Plugins.
In this session I will show you how you can provide a secure IBM Notes Client experience without the user entering any configuration data or passwords at all.
Buzzword Bingo for this session: ID Vault, SSO, LTPA, SPNEGO, SAML, Domino Policies, Account Documents, Citrix
Tipps zum effizienteren Umgang mit und Empfehlungen zum sicheren Betrieb von ssh(d). Sichere Kommandozeile auch von unterwegs mit Mosh. SSH Zwei-Faktor-Authentifizierung mit “Google Authenticator”.
Feed me, Seymour! Supplemental User Data For IBM Connections ProfilesMartin Leyrer
Presentation given at ICONUK 2016-09-15 in London
If you have tried to map a long office name and adress into the officeName of the PEOPLEDB, you probably stumbled upon the chapter "Supplemental user data for Profiles" in the IBM Connections documentation. What is described as "supplemental tables within the Profiles database" are in fact rather essential tables that can help you with adoption by providing more data within a users profile. Also, their use cuts down on the number of customizations needed as well as providing more information to the Cognos reports.
I will talk you through the countries, departments, organization, enmployee and worklocation tables, how the can be filled with data either through csv files as well as custom assembly lines and how to reference them efficiently. Also we will take a look on what is necessary to expose the additional data in search, business cards and the profile pages.
After this session you should be able to easily and quickly add more data to your IBM Connections profiles.
Buzzword Bingo for this session: fill-scripts, profiles, tdi, csv workplace, address, department, reports, cognos, search.
The latest, ultimative final version, current release, approved, last minute...Martin Leyrer
To offer your customers the best IBM Connections install possible, there are quite a few thing you should at least think about activating. The range of options you should think about spans from enabling the file sync through URL previews to assigning ToDos to multiple people.
We will take you on a tour of free features that you could enable for your users to give them a better Connections experience. You will leave this session with a checklist and links to documentation so you can start implementing right after the session.
Buzzword Bingo for this session: free, hidden settings, free, checlist, additional functionality, free, best practice
Debugging IBM Connections for the Impatient Admin - Social Connections VIIMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the “Best Practices” and debugging settings for Connections that will offer additional information quick, in case something goes wrong. Also, I will offer you recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
Google Authenticator, possible attacks and preventionBoštjan Cigan
This presentation describes Google's Time Based One Time Password authentication scheme and its practical implementation Google Authenticator. It also presents possible attacks and their prevention.
When using Notes, iNotes, Sametime and Connections on either Windows or a mobile device, users are confronted with several different passwords and settings they have to enter. In this session I will show you how to setup and configure Notes & Domino so that users do not have to enter passwords or server settings and still get logged into Notes, Sametime and Connections when starting their Notes Client or Browser.Buzzwords for this talk are: SSO, NSL, LTPA, SAML and SPNEGO.
In many organizations, users are still faced with entering multiple passwords and even some configuration data to gain access to their Notes Client, Sametime Client and Connections Plugins.
In this session I will show you how you can provide a secure IBM Notes Client experience without the user entering any configuration data or passwords at all.
Buzzword Bingo for this session: ID Vault, SSO, LTPA, SPNEGO, SAML, Domino Policies, Account Documents, Citrix
Tipps zum effizienteren Umgang mit und Empfehlungen zum sicheren Betrieb von ssh(d). Sichere Kommandozeile auch von unterwegs mit Mosh. SSH Zwei-Faktor-Authentifizierung mit “Google Authenticator”.
Feed me, Seymour! Supplemental User Data For IBM Connections ProfilesMartin Leyrer
Presentation given at ICONUK 2016-09-15 in London
If you have tried to map a long office name and adress into the officeName of the PEOPLEDB, you probably stumbled upon the chapter "Supplemental user data for Profiles" in the IBM Connections documentation. What is described as "supplemental tables within the Profiles database" are in fact rather essential tables that can help you with adoption by providing more data within a users profile. Also, their use cuts down on the number of customizations needed as well as providing more information to the Cognos reports.
I will talk you through the countries, departments, organization, enmployee and worklocation tables, how the can be filled with data either through csv files as well as custom assembly lines and how to reference them efficiently. Also we will take a look on what is necessary to expose the additional data in search, business cards and the profile pages.
After this session you should be able to easily and quickly add more data to your IBM Connections profiles.
Buzzword Bingo for this session: fill-scripts, profiles, tdi, csv workplace, address, department, reports, cognos, search.
The latest, ultimative final version, current release, approved, last minute...Martin Leyrer
To offer your customers the best IBM Connections install possible, there are quite a few thing you should at least think about activating. The range of options you should think about spans from enabling the file sync through URL previews to assigning ToDos to multiple people.
We will take you on a tour of free features that you could enable for your users to give them a better Connections experience. You will leave this session with a checklist and links to documentation so you can start implementing right after the session.
Buzzword Bingo for this session: free, hidden settings, free, checlist, additional functionality, free, best practice
Debugging IBM Connections for the Impatient Admin - Social Connections VIIMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the “Best Practices” and debugging settings for Connections that will offer additional information quick, in case something goes wrong. Also, I will offer you recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
Google Authenticator, possible attacks and preventionBoštjan Cigan
This presentation describes Google's Time Based One Time Password authentication scheme and its practical implementation Google Authenticator. It also presents possible attacks and their prevention.
When using Notes, iNotes, Sametime and Connections on either Windows or a mobile device, users are confronted with several different passwords and settings they have to enter. In this session I will show you how to setup and configure Notes & Domino so that users do not have to enter passwords or server settings and still get logged into Notes, Sametime and Connections when starting their Notes Client or Browser.Buzzwords for this talk are: SSO, NSL, LTPA, SAML and SPNEGO.
Developing social solutions on Microsoft technologies (SP Social and Yammer)SPC Adriatics
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Adis Jugo
Developing social solutions on Microsoft technologies (SP Social and Yammer)SPC Adriatics
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Adis Jugo
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Many Microsoft partners have found success driving revenue and delivering solutions with Office 365. Partners have built profitable service portfolios by selling, implementing, and creating value-added services for Office 365.
But there are many additional opportunities from Microsoft which enable Office 365 partners to elevate productivity for their customers. Microsoft Dynamics CRM Online is such an opportunity.
Dynamics CRM Online is a customer relationship management solution which allows your customers to track relationships and interactions, automate business processes and gain valuable insights into their own customers. Capabilities include Sales Force Automation, Marketing Automation, Customer Service and Social Media Insight.
O365 and CRM Online give customers an incredible solution and partners a fantastic new offering. Adding CRM Online to O365 lets customers cut through the clutter—to zero in and easily identify what they need to do next. It lets them find a relevant way to connect with their customer so they can win faster. And lets them collaborate with people, find, and access the information they need to ultimately sell more and grow their business.
By adding CRM Online, you elevate the discussion to business solutions. Plus, in addition to sales, Dynamics CRM has great solutions across marketing, customer service, and social listening & engagement.
xRM extends this to industry-specific solutions.
In this technical training we introduce Dicker Data reseller partners to Managing and deploying customizations; Configuring role-based security; Customizing entities, adding fields and relationships; Building forms for users to input and retrieve data; Presenting clear information in views and charts; Combining data sources on a dashboard; Going beyond role-based record-level security and assisting users through their business processes.
Reducing the Chance of an Office 365 Security BreachQuest
Office 365 includes some security features, however those may not be enough. Join Orin Thomas and Quest's Todd Mera as they discuss what you can do to reduce the risk of an Office 365 security breach.
Share, Follow, and Sync: How SharePoint 2013 uses Personal MySites for Social...Paul Stork (Microsoft MVP)
Prior to SharePoint 2013 many organizations built a MySite Host but never implemented personal MySite storage. This was a very viable strategy in 2010. But with the introduction of the Social features in SharePoint 2013 things have changed. In this talk we'll review all the new "Social" features in SharePoint 2013 that depend on personal MySites. We'll also look at how to control and manage personal MySites in your organization and discuss how future integration with Yammer may change this requirement.
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Albert Hoitingh
In this session you will learn about more complex Microsoft 365 (E5) compliance functionality - information barriers (Chinese Walls) and communications compliance.
Soccnx10: IBM Connections Troubleshooting or “Get the Cow off the Ice”panagenda
You are an IBM Connections admin and you would like to know how to fix your problems and open tickets?
We will talk about some troubleshooting basics and other useful things to ensure that you have enough skills to get your Connections running smoothly.
There are many areas where you need different debugging skills. We will cover backend like DB2, TDI, SSO and some IBM integrations like Docs, CCM, Cognos or Forms Experience Builder. Of course we will cover Connections itself, too.
You will also get some helpful best practises which will help you within your daily work.
A presentation by Christoph Stoettner & Nico Meisenzahl
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
As organizations move to a cloud-first and mobile-first world. it is important to ensure the security of data, both at rest and in transit and compliance with legal standards.
In this presentation, we will show how Office 365 can meet your organization’s needs for content security and data usage compliance with legal, regulatory, and technical standards to establish a secure and compliant Office 365 work environment that meets your organization’s requirements.
We will also dive into SharePoint’s policies, templates and rules management framework and show how to add persistent labels to sensitivity files.
We will show how a SharePoint admin can increase the organization safety using policies that consider the user identity, permissions, device, location, time frame and actions and conclude with a live demo of the impact of some of these policies.
We will also include some security related topics such as:
- Office 365 security and compliance
- Auditing in Office 365
- Data Loss Prevention in Office 365
- eDiscovery in Office 365
- Advanced Threat Protection and Intelligent Security in Office 365
User Profiles: I Didn't Know I Could Do That? (Demo Slides)Stacy Deere
Many think that the User Profile service is simply used for connecting SharePoint to Active Directory so that the attributes can be synced into their user profiles in SharePoint. They also know they can add really cool pictures to their profile along with some additional information that the others can see if you give them the ability to.
User profiles are so much more than that and I could talk for hours about all the great things that it can do. Many don't realize it but you can increase user adoption by implementing some of cool features and connections to other service applications such as Managed Metadata and Search. In this session we go through the configuration of the user profile service application and the integration with the other service applications to build your one stop shop for company information.
Areas that will be covered in this session:
• Custom User Properties
• Deeper Active Directory Integration
• Social
• Relevant Searching
• Company Directory
• Deep Dive into a Profile
• Audiences
• MySites
This PPT gives information about:
1. Install and Uninstall Modules
2. Module Management
3. Use of Default Modules
4. Why use cms
5. drupal Structure
6. Module
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Martin Leyrer
Connections and especially Connections Profiles are very customizable. I will show you, based on the work my colleagues and I did for a customer, why, what and how you can customize the TDI assembly lines and the Connections Profiles user interface to provide your customers with a profiles experience adapted to their expectations (including leading and trailing titles, customized hierarchy trees, additional fields, imported rich text, etc.).
Social Conndections VI -- Debugging IBM Connections During Install And OperationMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the debugging settings for Connections that will offer additional information quickly, in case something goes wrong. Also, there will be recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
Developing social solutions on Microsoft technologies (SP Social and Yammer)SPC Adriatics
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Adis Jugo
Developing social solutions on Microsoft technologies (SP Social and Yammer)SPC Adriatics
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Adis Jugo
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Many Microsoft partners have found success driving revenue and delivering solutions with Office 365. Partners have built profitable service portfolios by selling, implementing, and creating value-added services for Office 365.
But there are many additional opportunities from Microsoft which enable Office 365 partners to elevate productivity for their customers. Microsoft Dynamics CRM Online is such an opportunity.
Dynamics CRM Online is a customer relationship management solution which allows your customers to track relationships and interactions, automate business processes and gain valuable insights into their own customers. Capabilities include Sales Force Automation, Marketing Automation, Customer Service and Social Media Insight.
O365 and CRM Online give customers an incredible solution and partners a fantastic new offering. Adding CRM Online to O365 lets customers cut through the clutter—to zero in and easily identify what they need to do next. It lets them find a relevant way to connect with their customer so they can win faster. And lets them collaborate with people, find, and access the information they need to ultimately sell more and grow their business.
By adding CRM Online, you elevate the discussion to business solutions. Plus, in addition to sales, Dynamics CRM has great solutions across marketing, customer service, and social listening & engagement.
xRM extends this to industry-specific solutions.
In this technical training we introduce Dicker Data reseller partners to Managing and deploying customizations; Configuring role-based security; Customizing entities, adding fields and relationships; Building forms for users to input and retrieve data; Presenting clear information in views and charts; Combining data sources on a dashboard; Going beyond role-based record-level security and assisting users through their business processes.
Reducing the Chance of an Office 365 Security BreachQuest
Office 365 includes some security features, however those may not be enough. Join Orin Thomas and Quest's Todd Mera as they discuss what you can do to reduce the risk of an Office 365 security breach.
Share, Follow, and Sync: How SharePoint 2013 uses Personal MySites for Social...Paul Stork (Microsoft MVP)
Prior to SharePoint 2013 many organizations built a MySite Host but never implemented personal MySite storage. This was a very viable strategy in 2010. But with the introduction of the Social features in SharePoint 2013 things have changed. In this talk we'll review all the new "Social" features in SharePoint 2013 that depend on personal MySites. We'll also look at how to control and manage personal MySites in your organization and discuss how future integration with Yammer may change this requirement.
Teams Day Online V - Information Barriers - Communication Compliance and Micr...Albert Hoitingh
In this session you will learn about more complex Microsoft 365 (E5) compliance functionality - information barriers (Chinese Walls) and communications compliance.
Soccnx10: IBM Connections Troubleshooting or “Get the Cow off the Ice”panagenda
You are an IBM Connections admin and you would like to know how to fix your problems and open tickets?
We will talk about some troubleshooting basics and other useful things to ensure that you have enough skills to get your Connections running smoothly.
There are many areas where you need different debugging skills. We will cover backend like DB2, TDI, SSO and some IBM integrations like Docs, CCM, Cognos or Forms Experience Builder. Of course we will cover Connections itself, too.
You will also get some helpful best practises which will help you within your daily work.
A presentation by Christoph Stoettner & Nico Meisenzahl
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
As organizations move to a cloud-first and mobile-first world. it is important to ensure the security of data, both at rest and in transit and compliance with legal standards.
In this presentation, we will show how Office 365 can meet your organization’s needs for content security and data usage compliance with legal, regulatory, and technical standards to establish a secure and compliant Office 365 work environment that meets your organization’s requirements.
We will also dive into SharePoint’s policies, templates and rules management framework and show how to add persistent labels to sensitivity files.
We will show how a SharePoint admin can increase the organization safety using policies that consider the user identity, permissions, device, location, time frame and actions and conclude with a live demo of the impact of some of these policies.
We will also include some security related topics such as:
- Office 365 security and compliance
- Auditing in Office 365
- Data Loss Prevention in Office 365
- eDiscovery in Office 365
- Advanced Threat Protection and Intelligent Security in Office 365
User Profiles: I Didn't Know I Could Do That? (Demo Slides)Stacy Deere
Many think that the User Profile service is simply used for connecting SharePoint to Active Directory so that the attributes can be synced into their user profiles in SharePoint. They also know they can add really cool pictures to their profile along with some additional information that the others can see if you give them the ability to.
User profiles are so much more than that and I could talk for hours about all the great things that it can do. Many don't realize it but you can increase user adoption by implementing some of cool features and connections to other service applications such as Managed Metadata and Search. In this session we go through the configuration of the user profile service application and the integration with the other service applications to build your one stop shop for company information.
Areas that will be covered in this session:
• Custom User Properties
• Deeper Active Directory Integration
• Social
• Relevant Searching
• Company Directory
• Deep Dive into a Profile
• Audiences
• MySites
This PPT gives information about:
1. Install and Uninstall Modules
2. Module Management
3. Use of Default Modules
4. Why use cms
5. drupal Structure
6. Module
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Martin Leyrer
Connections and especially Connections Profiles are very customizable. I will show you, based on the work my colleagues and I did for a customer, why, what and how you can customize the TDI assembly lines and the Connections Profiles user interface to provide your customers with a profiles experience adapted to their expectations (including leading and trailing titles, customized hierarchy trees, additional fields, imported rich text, etc.).
Social Conndections VI -- Debugging IBM Connections During Install And OperationMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the debugging settings for Connections that will offer additional information quickly, in case something goes wrong. Also, there will be recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013Martin Leyrer
Tipps zum effizienteren Umgang mit und Empfehlungen zum sicheren Betrieb von ssh(d). Sichere Kommandozeile auch von unterwegs mit Mosh. SSH Zwei-Faktor-Authentifizierung mit “Google Authenticator”.
Slides von den Linuxwochen 2013.
Digitools: Sicherheit im Netz
Sowohl Internet wie auch das World Wide Web werden immer integriertere Bestandteile unseres Lebens. Jedoch sollte man im virtuellen Leben einige grundlegende Details beachten, um problemfrei die Vorteile der Online-Angebote nutzen zu können.
So wie z.B. das regelmäßige Service des Autos oder das Versperren der Haustüre zu den Selbstverständlichkeiten des täglichen Lebens gehören, so sollte man auch seinen Rechner „versperren“ und regelmäßig einer Überprüfung unterziehen.
Um „sicher“ im Netz unterwegs zu sein, genügt es jedoch nicht nur, eine Software zu installieren. Ein prüfender Blick auf die diversen Angebote und deren Nutzungsbedingungen gehören genauso dazu, wie ein kritischer Blick darauf, welche Daten von den verschiedenen Diensten überhaupt gesammelt werden.
Während es in manchen Situationen wichtig ist, genau zu wissen, mit wem man online kommuniziert und wie man dessen Identität - etwa bei signierten E-Mails - überprüfen kann, so ist es – etwa im Rahmen einer Recherche – manchmal von Vorteil, wirklich anonym im Netz unterwegs zu sein.
All diese Themen wollen wir im Rahmen des Workshops „Digitools: Sicherheit im Netz“ aufgreifen und Ihnen praxisorientiert zeigen, wie sie sicher surfen, vertrauliche E-Mails schreiben oder anonym kommunizieren können.
Der dreistündige Workshop ist in drei Teile (mit zwei Pausen zu je 15 Minuten) gegliedert und bietet zwischendurch auch ausreichend Zeit für Fragen und Diskussionen.
Teil 1 – Sicher Online
Firewall, Virenscanner, Einstellungen – Was sollte ich beachten, wenn ich „sicher“ surfen will. Welche Einstellungen sollte ich in meinem Browser ändern, wie schütze ich mich vor Spyware und Drive-By Downloads. Sind Cookies nun gut oder böse, wie kann ich diese einfacher verwalten. Wie kann ich „sicher“ Online-Banking und andere Online-Angebote nutzen.
Teil 2 – Vertrauen ist gut, ...
Wie kann ich mich relativ gefahrlos in Sozialen Netzwerken bewegen. Was sollte ich im Umgang mit den diversen Anwendungen dieser Netzwerke beachten. Wann und wem darf ich meine Passwörter bekannt geben, wer verbirgt sich eigentlich hinter dieser Site, udgl.
Teil 3 – Black Helicopter Alert
Wirklich anonym über das Internet zu kommunizieren, ist ein Anspruch, den nicht nur die Anhänger von Verschwörungstheorien für sich in Anspruch nehmen können. Auch Anwälte, Unternehmen sowie Personen wie Du und ich wollen oder müssen immer wieder im Web surfen oder kommunizieren können, ohne Spuren zu hinterlassen. Aber auch das Löschen von Accounts in diversen Netzwerken oder Diensten ist nicht immer so einfach, wie man sich das vorstellt.
Im letzten Teil des Workshops widmen wir uns den „schwarzen Künsten“ des Internets wie etwa dem Tor Netzwerk oder jenen „offenen Proxies“ um solche Inhalte sehen zu können, die vor uns verborgen werden.
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...Martin Leyrer
EU-Legislation demands 'accessible' websites, often leaving details or exact specifications on what that means out. In this session, we will have a look at the most often cited 'specifications', the Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0 and how to interpret them. I will show a few free tools that can help a Notes Developer to asses what needs to be done to make a website 'compliant'. And of course I will offer quick tips and easy to implement 'hacks' to make an existing web application more 'accessible', sharing along the way a few best practices and experiences from the work I have done so far.
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz EditionMartin Leyrer
Moderne Anwendungen bestehen nicht mehr aus ein wenig HTML sowie Code am Server. Cascading Style Sheets (CSS), JavaScript und AJAX machen die Anwendungen einerseits benutzerfreundlicher, andererseits auch schwerer zu entwickeln und zu pflegen. Mit dem Open Source Browser Firefox und einer Handvoll von Open Source Plug-Ins kann sich der Entwickler sein Leben aber deutlich einfacher machen. Diese Session behandelt Firefox-Erweiterungen, die sich in der Praxis bei der Entwicklung großer Web 2.0 Anwendungen bewährt haben. Gezeigt werden "am lebenden Objekt" unter anderem die Webdeveloper Toolbar sowie Firebug. Der Bogen der vorgestellten Tools erstreckt sich aber noch weiter und beinhaltet u.a. Sicherheitschecks, WAI-Tools und noch viel mehr.
Open Source und Free Software unter WindowsMartin Leyrer
Die erste Assoziation zu Open Source und Freier Software ist oft eine GNU/Linux Distribution. Viele Anwender scheuen aber aufgrund der (vermuteten) Komplexität vor einem Wechsel auf das neue Betriebssystem zurück.
In diesem Talk möchte ich zeigen, dass man auch unter Windows eine Vielzahl von Open Source Anwendungen und Freie Software im täglichen Umgang mit dem PC einsetzen und so den sanfteren Wechsel zu einem freien Betriebssystem vorbereiten kann.
Effiziente Fehlersuche in Web 2.0 AnwendungenMartin Leyrer
Moderne Anwendungen bestehen nicht mehr aus ein wenig HTML sowie Code am Server. Cascading Style Sheets (CSS), JavaScript und AJAX machen die Anwendungen einerseits benutzerfreundlicher, andererseits auch schwerer zu entwickeln und zu pflegen. Mit dem Open Source Browser Firefox und einer Handvoll von Open Source Plug-Ins kann sich der Entwickler sein Leben aber deutlich einfacher machen. Diese Session behandelt Firefox-Erweiterungen, die sich in der Praxis bei der Entwicklung großer Web 2.0 Anwendungen bewährt haben. Gezeigt werden "am lebenden Objekt" unter anderem die Webdeveloper Toolbar sowie Firebug. Der Bogen der vorgestellten Tools erstreckt sich aber noch weiter und beinhaltet u.a. Sicherheitschecks, WAI-Tools und noch viel mehr.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
3. Martin Leyrer - IBM
•
Working 5 years for IBM
as an IT-Specialist
•
ICS product stack since
1995
•
Twitter → leyrer
•
Linkedin →
www.linkedin.com/in/leyrer
●
Blog → www.leyon.at
4. Sjaak Ursinus - ilionx
•
Working 11 Years for ilionx as a
consultant
•
Working with IBM Connections
since Jan 2007
•
IBM Champion since start of program
•
Twitter → sursinus
•
Skype → sursinus
•
Linkedin → www.linkedin.com/in/sursinus
•
Various other social website’s
9. What makes a Person?
PEOPLEDB Profiles
Directory
Service
Virtual Member
Manager
(VMM)
LDAP
PROF_GUID ID uniqueId UUID/GUID/UNID
PROF_DISPLAY_NAME Name cn/displayName cn/displayName
PROF_MAIL Mail mail/ibm-
primaryEmail
mail/ibm-
primaryEmail
PROF_SOURCE_UID DN uniqueName DN
PROF_UID UID UID UID or
samAccountName
10. Person – AD LDAP
•
displayName: Martin Leyrer
•
cn: IBMX372
•
mail: martin.leyrer@at.ibm.com
•
dn:
CN=IBMX372,OU=Users,OU=exampl
e,DC=prod,DC=IBM
•
sAMAccountName: IBMX372
11. Person – IBM Domino LDAP
•
displayName: Martin Leyrer/cloud
•
cn: Martin Leyrer
•
mail: martin.leyrer@at.ibm.com
•
dn: CN=Martin Leyrer,o=cloud
•
uid: mleyrer
14. Fixing
sync_ipdates_hash_field
•
If the value of the hash field in the
source has changed
– set this property to a different field
that has not changed
– for at least one run of sync_all_dns
15. Do you know what
happens in your LDAP ...
•
If a user quits
•
If a user goes on maternity leave
(and comes back later)
•
If a user goes on sabbatical (and
comes back)
16. Do you have procedures
in place ...
•
If a user quits
•
If a user goes on maternity leave
(and comes back later)
•
If a user goes on sabbatical (and
comes back)
25. Websphere WIM + VMM
•
WIM is the security provider within
WAS
•
VMM is basically an LDAP of its own
•
The first VMM login property is a
special one because that is mapped
to userPrincipal
34. Questions
Sjaak Ursinus
Ilionx
Twitter → sursinus
Skype → sursinus
Linkedin → www.linkedin.com/in/sursinus
Various other social website’s
Martin Leyrer
IBM Austria
E-mail: martin.leyrer@at.ibm.com
Twitter: http://www.twitter.com/leyrer
Blog: http://www.leyon.at
Slideshare:
http://www.slideshare.net/Martin.Leyrer