To offer your customers the best IBM Connections install possible, there are quite a few thing you should at least think about activating. The range of options you should think about spans from enabling the file sync through URL previews to assigning ToDos to multiple people.
We will take you on a tour of free features that you could enable for your users to give them a better Connections experience. You will leave this session with a checklist and links to documentation so you can start implementing right after the session.
Buzzword Bingo for this session: free, hidden settings, free, checlist, additional functionality, free, best practice
Optimizing WordPress for Performance - WordCamp HoustonChris Olbekson
Speeding up websites is important- Not just to site owners but to all Internet users. In this session, we’ll look at some techniques you can use to speed up your WordPress site including optimizing theme files and database queries, caching and some tips on improving server performance. Note: This talk will be geared towards users who have a basic understanding of theme template files and experience with web development tools, such as Firebug.
This presentation is based on a real life experience migrating Oracle E-Business Suite production to AWS.
We will talk about:
- Certification basics. Overview on supported configurations.
- How to build. Recommendations based on migration and 2 year production runtime experience.
- Advanced configurations.
- R12.2.
- Microsoft Azure and Oracle Cloud review. Quick comparison outline of main alternative platforms. How ready is Oracle's own cloud service.
- Scaling.
This is a very client demanding topic. Many are looking into cloud migration options and how they can optimize the cost compared to the on-premise hosting, and many misunderstand the complexity of Oracle EBS stack being capable for cloud deployment.
Optimizing WordPress for Performance - WordCamp HoustonChris Olbekson
Speeding up websites is important- Not just to site owners but to all Internet users. In this session, we’ll look at some techniques you can use to speed up your WordPress site including optimizing theme files and database queries, caching and some tips on improving server performance. Note: This talk will be geared towards users who have a basic understanding of theme template files and experience with web development tools, such as Firebug.
This presentation is based on a real life experience migrating Oracle E-Business Suite production to AWS.
We will talk about:
- Certification basics. Overview on supported configurations.
- How to build. Recommendations based on migration and 2 year production runtime experience.
- Advanced configurations.
- R12.2.
- Microsoft Azure and Oracle Cloud review. Quick comparison outline of main alternative platforms. How ready is Oracle's own cloud service.
- Scaling.
This is a very client demanding topic. Many are looking into cloud migration options and how they can optimize the cost compared to the on-premise hosting, and many misunderstand the complexity of Oracle EBS stack being capable for cloud deployment.
Our data should be secure. And our environment too. What we can do for maximizing security in a hybrid environment, where SQL Server exist in two forms: premise and cloud. How to organize our job, how to control our data if we use Windows Azure SQL Database - The Cloud Database. physical security, policy-based management, auditing, encryption, federation, access and authorization. All of those subjects will be covered during my session.
EBS in an hour: Build a Vision instance - FAST - in Oracle Virtualboxjpiwowar
Slides from OAUG Connection Point conference in Pittsburgh, July 2013. Presentation discussed how to create an EBS Vision instance in Oracle Virtualbox, using OVM templates to avoid some of the pain of installation and patching. Content based on this blog post: http://www.pythian.com/blog/build-ebs-sandbox-1hr/ , with some minor modifications: resulting EBS instance is single-node, not two-node, instance.
Slides by themselves are of questionable value, since much of the presentation was a live demo. Still, I believe in sharing, so here they are. ;)
On Wednesday November 18th, 2015 Microsoft publicly released SharePoint 2016 Beta 2. I was on route from LA to Houston to speak at the Houston SharePoint Users Group and the organizers asked me to speak about what was new.
All of the content herein comes from the TechNet articles that Microsoft released on that morning and can be found here: https://technet.microsoft.com/EN-US/library/cc261970(v=office.16).aspx
I used this deck to talk to the new features that were released in IT Preview & Beta 2 that evening and was asked to share this deck.
Enjoy!
-jase
Realización de respaldos de datos de SQL Server 2015 a Windows Azure, requerimientos on-premises y en Azure, y procedimiento para realizarlo mediante SSMS, T-SQL, Powershell y SMO
Joe Kaiser, System Engineer at StackIQ at the Seattle Scalability Meetup on April 27, 2016
This presentation was followed by a demo of Kubernetes on Stacki
This is a webinar done with Acquia introdcing how well you can run Drupal on Windows with a demo about WebPI and Drush.
Here's a link to the recorded webinar:
http://tinyurl.com/6rfz3px
AEM (CQ) Dispatcher Security and CDN+Browser CachingAndrew Khoury
This presentation cover Adobe AEM Dispatcher security and CDN and browser caching.
This presentation is the second part of a webinar on AEM Dispatcher:
http://dev.day.com/content/ddc/en/gems/dispatcher-caching---new-features-and-optimizations.html
Visit url above to view the whole presentation. Domique Pfister the primary engineer developing AEM Dispatcher covers the first part on new features.
Writing recipes for Windows typically involves taking a dependency on the platform-specific Windows cookbook, an artifact that has no real analog when authoring content for Unix-like systems. This requirement is changing starting with Chef 11, as more functionality and resources such as the registry resource formerly tied to the Windows cookbook are available in the core chef-client itself, thus reducing or eliminating the need to use the Windows cookbook. Additionally, the new implementations of the resources provide additional features that make recipes more predictable and robust on the Windows platform.
We’ll see some of this new capability in action, describe the motivation and what gets better, and look forward to additional Windows functionality that can be folded into chef-client.
Takeaways
All of us, Windows and non-Windows users alike, benefit when we rely less on the Windows cookbook
New resources for registry, powershell, and batch scripting are available without the Windows cookbook
These resources enable predictability for 32-bit / 64-bit (Wow64) difficulties
We should start changing our cookbooks to use the new resources
Chef-client as a Windows service is now robust and reliable, no Windows cookbook needed
This is just the beginning–let us know what should jump into core Chef next!
In many organizations, users are still faced with entering multiple passwords and even some configuration data to gain access to their Notes Client, Sametime Client and Connections Plugins.
In this session I will show you how you can provide a secure IBM Notes Client experience without the user entering any configuration data or passwords at all.
Buzzword Bingo for this session: ID Vault, SSO, LTPA, SPNEGO, SAML, Domino Policies, Account Documents, Citrix
One think that gets often overlooked in an IBM Connections project is the user lifecycle inside an organisation.
People leave for various reasons, maybe come back as a part-timer and then later switch back to a full-time employment. All this gets handled differently in different companies having sometimes desasterous effects on Connections, causing data loss and confusion amongst users.
We will show you what issues to look out for, how to migitate certain issues and how to design the user lifecycle with your customers, before you install Connections and configure the TDI Usersync.
Buzzword Bingo for this session: user management, duplicate users, data loss, user resync, GUID, UID, email address.
Our data should be secure. And our environment too. What we can do for maximizing security in a hybrid environment, where SQL Server exist in two forms: premise and cloud. How to organize our job, how to control our data if we use Windows Azure SQL Database - The Cloud Database. physical security, policy-based management, auditing, encryption, federation, access and authorization. All of those subjects will be covered during my session.
EBS in an hour: Build a Vision instance - FAST - in Oracle Virtualboxjpiwowar
Slides from OAUG Connection Point conference in Pittsburgh, July 2013. Presentation discussed how to create an EBS Vision instance in Oracle Virtualbox, using OVM templates to avoid some of the pain of installation and patching. Content based on this blog post: http://www.pythian.com/blog/build-ebs-sandbox-1hr/ , with some minor modifications: resulting EBS instance is single-node, not two-node, instance.
Slides by themselves are of questionable value, since much of the presentation was a live demo. Still, I believe in sharing, so here they are. ;)
On Wednesday November 18th, 2015 Microsoft publicly released SharePoint 2016 Beta 2. I was on route from LA to Houston to speak at the Houston SharePoint Users Group and the organizers asked me to speak about what was new.
All of the content herein comes from the TechNet articles that Microsoft released on that morning and can be found here: https://technet.microsoft.com/EN-US/library/cc261970(v=office.16).aspx
I used this deck to talk to the new features that were released in IT Preview & Beta 2 that evening and was asked to share this deck.
Enjoy!
-jase
Realización de respaldos de datos de SQL Server 2015 a Windows Azure, requerimientos on-premises y en Azure, y procedimiento para realizarlo mediante SSMS, T-SQL, Powershell y SMO
Joe Kaiser, System Engineer at StackIQ at the Seattle Scalability Meetup on April 27, 2016
This presentation was followed by a demo of Kubernetes on Stacki
This is a webinar done with Acquia introdcing how well you can run Drupal on Windows with a demo about WebPI and Drush.
Here's a link to the recorded webinar:
http://tinyurl.com/6rfz3px
AEM (CQ) Dispatcher Security and CDN+Browser CachingAndrew Khoury
This presentation cover Adobe AEM Dispatcher security and CDN and browser caching.
This presentation is the second part of a webinar on AEM Dispatcher:
http://dev.day.com/content/ddc/en/gems/dispatcher-caching---new-features-and-optimizations.html
Visit url above to view the whole presentation. Domique Pfister the primary engineer developing AEM Dispatcher covers the first part on new features.
Writing recipes for Windows typically involves taking a dependency on the platform-specific Windows cookbook, an artifact that has no real analog when authoring content for Unix-like systems. This requirement is changing starting with Chef 11, as more functionality and resources such as the registry resource formerly tied to the Windows cookbook are available in the core chef-client itself, thus reducing or eliminating the need to use the Windows cookbook. Additionally, the new implementations of the resources provide additional features that make recipes more predictable and robust on the Windows platform.
We’ll see some of this new capability in action, describe the motivation and what gets better, and look forward to additional Windows functionality that can be folded into chef-client.
Takeaways
All of us, Windows and non-Windows users alike, benefit when we rely less on the Windows cookbook
New resources for registry, powershell, and batch scripting are available without the Windows cookbook
These resources enable predictability for 32-bit / 64-bit (Wow64) difficulties
We should start changing our cookbooks to use the new resources
Chef-client as a Windows service is now robust and reliable, no Windows cookbook needed
This is just the beginning–let us know what should jump into core Chef next!
In many organizations, users are still faced with entering multiple passwords and even some configuration data to gain access to their Notes Client, Sametime Client and Connections Plugins.
In this session I will show you how you can provide a secure IBM Notes Client experience without the user entering any configuration data or passwords at all.
Buzzword Bingo for this session: ID Vault, SSO, LTPA, SPNEGO, SAML, Domino Policies, Account Documents, Citrix
One think that gets often overlooked in an IBM Connections project is the user lifecycle inside an organisation.
People leave for various reasons, maybe come back as a part-timer and then later switch back to a full-time employment. All this gets handled differently in different companies having sometimes desasterous effects on Connections, causing data loss and confusion amongst users.
We will show you what issues to look out for, how to migitate certain issues and how to design the user lifecycle with your customers, before you install Connections and configure the TDI Usersync.
Buzzword Bingo for this session: user management, duplicate users, data loss, user resync, GUID, UID, email address.
Feed me, Seymour! Supplemental User Data For IBM Connections ProfilesMartin Leyrer
Presentation given at ICONUK 2016-09-15 in London
If you have tried to map a long office name and adress into the officeName of the PEOPLEDB, you probably stumbled upon the chapter "Supplemental user data for Profiles" in the IBM Connections documentation. What is described as "supplemental tables within the Profiles database" are in fact rather essential tables that can help you with adoption by providing more data within a users profile. Also, their use cuts down on the number of customizations needed as well as providing more information to the Cognos reports.
I will talk you through the countries, departments, organization, enmployee and worklocation tables, how the can be filled with data either through csv files as well as custom assembly lines and how to reference them efficiently. Also we will take a look on what is necessary to expose the additional data in search, business cards and the profile pages.
After this session you should be able to easily and quickly add more data to your IBM Connections profiles.
Buzzword Bingo for this session: fill-scripts, profiles, tdi, csv workplace, address, department, reports, cognos, search.
Tipps zum effizienteren Umgang mit und Empfehlungen zum sicheren Betrieb von ssh(d). Sichere Kommandozeile auch von unterwegs mit Mosh. SSH Zwei-Faktor-Authentifizierung mit “Google Authenticator”.
Debugging IBM Connections for the Impatient Admin - Social Connections VIIMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the “Best Practices” and debugging settings for Connections that will offer additional information quick, in case something goes wrong. Also, I will offer you recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
Google Authenticator, possible attacks and preventionBoštjan Cigan
This presentation describes Google's Time Based One Time Password authentication scheme and its practical implementation Google Authenticator. It also presents possible attacks and their prevention.
When using Notes, iNotes, Sametime and Connections on either Windows or a mobile device, users are confronted with several different passwords and settings they have to enter. In this session I will show you how to setup and configure Notes & Domino so that users do not have to enter passwords or server settings and still get logged into Notes, Sametime and Connections when starting their Notes Client or Browser.Buzzwords for this talk are: SSO, NSL, LTPA, SAML and SPNEGO.
Similar to The latest, ultimative final version, current release, approved, last minute changes included post installation checklist - Version November 2015
Prescriptive Security with InSpec - All Things Open 2019Mandi Walls
What is Chef InSpec, and how can it help you manage and maintain system security through the full lifecycle of your applications? See how this powerful tool can keep your systems secure. Demo slides included in the appendix
A free webinar to learn how to make your site secure.
Learn :
- Common problems that are easily overlooked
- Simple solutions to forecast that your website may be under attack
- Easy two step trick using an FTP client to correct a very common mistake
- Hidden gems of data in your site that often indicate a hack or pending hack
- and more
If you own or maintain an open source website, based on Joomla, WordPress or Drupal, you owe it to yourself to attend. Don't fall victim to these common problems that hit even the most savvy of administrator. Join the webinar and learn how you can improve your security at little to no cost.
See you at the webinar. Be prepared to take notes.
Visit www.corephp.com to learn more about 'corePHP'
Python in the serverless era (PyCon 2017)Benny Bauer
Overview of Serverless and frameworks for developing Serverless Python applications.
Video: https://www.youtube.com/watch?v=G17E4Muylis&index=4&list=PLoPozIuXIZp7PERmO3CqVDUgYUMhUk5ml
IBM Think 2018 - IBM Connections TroubleshootingNico Meisenzahl
Curious about how to make your IBM Connections environment run smoothly while reducing support effort? Need help debugging and getting to the core of some Connections challenges? Join Nico to find out how to resolve common issues, and learn troubleshooting basics and other useful knowledge to ensure an efficient Connections on-premises environment. Level up your debugging skills while learning more about back-end topics such as IBM Cloud Private, Db2, TDI, SSO, Directory and integrations like Docs, CCM, Cognos and FEB. He'll also cover the new PINK features like Orient Me, Metrics and Customizer. Walk away with Connections best-practice tips and tricks to help you provide steady and efficient social capabilities!
Saving Time And Effort With QuickBase Api - Sergio HaroQuickBase, Inc.
Ever wish you could enter pages of data into QuickBase without lifting a finger? How about aggregating data from an external source but you don't want to set up your own SQL server and build your own reporting tools? Learn to rise above the native QuickBase interface and explore the vast and powerful capabilities QuickBase provides through its API's. It's time to get started with the QuickBase API and build your first tool/script/app.
Buckle up, join Christoph and get ready to learn 50 tips and tricks you can implement right away to improve your IBM Connections environment. Your users will thank you as they too benefit from this best practice list gathered from real-world projects while deploying and administering IBM Connections On-premises. Walk away with knowledge covering anything from Cognos integration, docs, CCM and Forms Experience Builder to the back end and DB2, TDI and SSO.
Similar to The latest, ultimative final version, current release, approved, last minute changes included post installation checklist - Version November 2015 (20)
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Martin Leyrer
Connections and especially Connections Profiles are very customizable. I will show you, based on the work my colleagues and I did for a customer, why, what and how you can customize the TDI assembly lines and the Connections Profiles user interface to provide your customers with a profiles experience adapted to their expectations (including leading and trailing titles, customized hierarchy trees, additional fields, imported rich text, etc.).
Social Conndections VI -- Debugging IBM Connections During Install And OperationMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the debugging settings for Connections that will offer additional information quickly, in case something goes wrong. Also, there will be recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013Martin Leyrer
Tipps zum effizienteren Umgang mit und Empfehlungen zum sicheren Betrieb von ssh(d). Sichere Kommandozeile auch von unterwegs mit Mosh. SSH Zwei-Faktor-Authentifizierung mit “Google Authenticator”.
Slides von den Linuxwochen 2013.
Digitools: Sicherheit im Netz
Sowohl Internet wie auch das World Wide Web werden immer integriertere Bestandteile unseres Lebens. Jedoch sollte man im virtuellen Leben einige grundlegende Details beachten, um problemfrei die Vorteile der Online-Angebote nutzen zu können.
So wie z.B. das regelmäßige Service des Autos oder das Versperren der Haustüre zu den Selbstverständlichkeiten des täglichen Lebens gehören, so sollte man auch seinen Rechner „versperren“ und regelmäßig einer Überprüfung unterziehen.
Um „sicher“ im Netz unterwegs zu sein, genügt es jedoch nicht nur, eine Software zu installieren. Ein prüfender Blick auf die diversen Angebote und deren Nutzungsbedingungen gehören genauso dazu, wie ein kritischer Blick darauf, welche Daten von den verschiedenen Diensten überhaupt gesammelt werden.
Während es in manchen Situationen wichtig ist, genau zu wissen, mit wem man online kommuniziert und wie man dessen Identität - etwa bei signierten E-Mails - überprüfen kann, so ist es – etwa im Rahmen einer Recherche – manchmal von Vorteil, wirklich anonym im Netz unterwegs zu sein.
All diese Themen wollen wir im Rahmen des Workshops „Digitools: Sicherheit im Netz“ aufgreifen und Ihnen praxisorientiert zeigen, wie sie sicher surfen, vertrauliche E-Mails schreiben oder anonym kommunizieren können.
Der dreistündige Workshop ist in drei Teile (mit zwei Pausen zu je 15 Minuten) gegliedert und bietet zwischendurch auch ausreichend Zeit für Fragen und Diskussionen.
Teil 1 – Sicher Online
Firewall, Virenscanner, Einstellungen – Was sollte ich beachten, wenn ich „sicher“ surfen will. Welche Einstellungen sollte ich in meinem Browser ändern, wie schütze ich mich vor Spyware und Drive-By Downloads. Sind Cookies nun gut oder böse, wie kann ich diese einfacher verwalten. Wie kann ich „sicher“ Online-Banking und andere Online-Angebote nutzen.
Teil 2 – Vertrauen ist gut, ...
Wie kann ich mich relativ gefahrlos in Sozialen Netzwerken bewegen. Was sollte ich im Umgang mit den diversen Anwendungen dieser Netzwerke beachten. Wann und wem darf ich meine Passwörter bekannt geben, wer verbirgt sich eigentlich hinter dieser Site, udgl.
Teil 3 – Black Helicopter Alert
Wirklich anonym über das Internet zu kommunizieren, ist ein Anspruch, den nicht nur die Anhänger von Verschwörungstheorien für sich in Anspruch nehmen können. Auch Anwälte, Unternehmen sowie Personen wie Du und ich wollen oder müssen immer wieder im Web surfen oder kommunizieren können, ohne Spuren zu hinterlassen. Aber auch das Löschen von Accounts in diversen Netzwerken oder Diensten ist nicht immer so einfach, wie man sich das vorstellt.
Im letzten Teil des Workshops widmen wir uns den „schwarzen Künsten“ des Internets wie etwa dem Tor Netzwerk oder jenen „offenen Proxies“ um solche Inhalte sehen zu können, die vor uns verborgen werden.
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...Martin Leyrer
EU-Legislation demands 'accessible' websites, often leaving details or exact specifications on what that means out. In this session, we will have a look at the most often cited 'specifications', the Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0 and how to interpret them. I will show a few free tools that can help a Notes Developer to asses what needs to be done to make a website 'compliant'. And of course I will offer quick tips and easy to implement 'hacks' to make an existing web application more 'accessible', sharing along the way a few best practices and experiences from the work I have done so far.
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz EditionMartin Leyrer
Moderne Anwendungen bestehen nicht mehr aus ein wenig HTML sowie Code am Server. Cascading Style Sheets (CSS), JavaScript und AJAX machen die Anwendungen einerseits benutzerfreundlicher, andererseits auch schwerer zu entwickeln und zu pflegen. Mit dem Open Source Browser Firefox und einer Handvoll von Open Source Plug-Ins kann sich der Entwickler sein Leben aber deutlich einfacher machen. Diese Session behandelt Firefox-Erweiterungen, die sich in der Praxis bei der Entwicklung großer Web 2.0 Anwendungen bewährt haben. Gezeigt werden "am lebenden Objekt" unter anderem die Webdeveloper Toolbar sowie Firebug. Der Bogen der vorgestellten Tools erstreckt sich aber noch weiter und beinhaltet u.a. Sicherheitschecks, WAI-Tools und noch viel mehr.
Open Source und Free Software unter WindowsMartin Leyrer
Die erste Assoziation zu Open Source und Freier Software ist oft eine GNU/Linux Distribution. Viele Anwender scheuen aber aufgrund der (vermuteten) Komplexität vor einem Wechsel auf das neue Betriebssystem zurück.
In diesem Talk möchte ich zeigen, dass man auch unter Windows eine Vielzahl von Open Source Anwendungen und Freie Software im täglichen Umgang mit dem PC einsetzen und so den sanfteren Wechsel zu einem freien Betriebssystem vorbereiten kann.
Effiziente Fehlersuche in Web 2.0 AnwendungenMartin Leyrer
Moderne Anwendungen bestehen nicht mehr aus ein wenig HTML sowie Code am Server. Cascading Style Sheets (CSS), JavaScript und AJAX machen die Anwendungen einerseits benutzerfreundlicher, andererseits auch schwerer zu entwickeln und zu pflegen. Mit dem Open Source Browser Firefox und einer Handvoll von Open Source Plug-Ins kann sich der Entwickler sein Leben aber deutlich einfacher machen. Diese Session behandelt Firefox-Erweiterungen, die sich in der Praxis bei der Entwicklung großer Web 2.0 Anwendungen bewährt haben. Gezeigt werden "am lebenden Objekt" unter anderem die Webdeveloper Toolbar sowie Firebug. Der Bogen der vorgestellten Tools erstreckt sich aber noch weiter und beinhaltet u.a. Sicherheitschecks, WAI-Tools und noch viel mehr.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
The latest, ultimative final version, current release, approved, last minute changes included post installation checklist - Version November 2015
1. The Latest, Ultimative Final Ver
sion, Current Release, Approved,
Last Minute Changes Included
Post-Installation Checklist
Sjaak Ursinus
ilionx
Martin Leyrer
IBM
3. Martin Leyrer - IBM
•
Working 5 years for IBM
as an IT-Specialist
•
ICS product stack since
1995
•
Twitter → leyrer
•
Linkedin →
www.linkedin.com/in/leyrer
●
Blog → www.leyon.at
4. Sjaak Ursinus - ilionx
•
Working 11 Years for ilionx as a
consultant
•
Working with IBM Connections
since Jan 2007
•
IBM Champion since start of program
•
Twitter → sursinus
•
Skype → sursinus
•
Linkedin → www.linkedin.com/in/sursinus
•
Various other social website’s
5. Why ?
•
Even we forget things
•
Info is scattered across the
Connections documentation
•
So far no singular check list has
emerged
•
Overview of „optional“ configuration
steps
6. Disclaimer
•
NOT an installation guide
•
Probably incomplete
•
Biased towards what we think is
useful
•
If you want to add something, please
let us know
7. 01. Increase Number of
Open Files (Linux only)
•
default is: 1024 open files/process
•
recommended limit: 8192
•
Martins recomendation: 65536
•
„ulimit -n“ to check
•
To change, edit
/etc/security/limits.conf
icuser soft nofile 65536
icuser hard nofile 65536
8. 02. JDBC Connection
Pool Size
•
Initial WebSphere JDBC pool size:
10 connections/connection pool
•
Connections 5.0 CR1 Performance
Tuning Guide has recommendations
•
Use scripts from „Connections
Administration & Scripting 101“ to
set automatically
9. 03. JVM Heap Size
•
Connections needs „sufficient“ heap
space, esp. Search
•
Connections 5.0 CR1 Performance
Tuning Guide has recommendations
•
Use scripts from „Connections
Administration & Scripting 101“ to
set automatically
10. 04. Change Websphere
Default Log Language
•
Open Websphere Integrated Solution Console
•
Go to Servers->Server Types -> „Websphere
application servers“ and select server you
want to change
•
Server Infrastructure → Java and Process
Management → Process definition →
Additional properties → Java Virtual Machine
•
Add to “Generic JVM arguments”:
-Duser.language=en -Duser.region=GB
11. 05. Proper IHS TLS Settings
SSLProtocolDisable SSLv2 SSLv3
SSLCompression off
SSLCipherSpec ALL NONE
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
SSLCipherSpec TLSv12 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SSLCipherSpec ALL TLS_RSA_WITH_AES_128_GCM_SHA256
SSLCipherSpec ALL TLS_RSA_WITH_AES_256_GCM_SHA384
SSLCipherSpec ALL TLS_RSA_WITH_AES_128_CBC_SHA256
SSLCipherSpec ALL TLS_RSA_WITH_AES_256_CBC_SHA256
SSLCipherSpec ALL TLS_RSA_WITH_AES_128_CBC_SHA
SSLCipherSpec ALL TLS_RSA_WITH_AES_256_CBC_SHA
# Enable strict CBC padding
# https://www-01.ibm.com/support/docview.wss?uid=swg21692502
SSLAttributeSet 471 1
Header add Strict-Transport-Security "max-age=15768000"
13. 06. Redirect All Traffic To
HTTPS
●
httpd.conf
LoadModule rewrite_module
modules/mod_rewrite.so
RewriteEngine on
RewriteRule ^(.*)
https://social.example.com/$1/
[R,L]
<IfModule mod_ibm_ssl.c>
...
14. 07. File Downloads Through
IBM HTTP Server
•
Improves performance significantly
•
Available for files stored in
– Activities
– Files
– Libraries
– Mobile
– Wikis
•
Advanced Setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/install/t_install_post_files_downloads.dita?lang=en
15. 08. Add A Reverse Caching
Proxy
•
„Optional“ configuration
•
Improves performance, especially
over wide area networks (WAN)
•
Lots of options:
– WebSphere Edge Components
– Nginx
– Varnish
– Apache
– Squid
16. 09. Push Notifications for
Mobile
•
Notifications are sent, when the
following events occur:
– The user is invited to join a community.
– The user is invited to join a person's
network.
– A task is assigned to the user.
– A user is @mentioned.
– A comment is added to content that the
user owns.
– A synced file is modified on the server and
updated on the user's mobile device.
17. 09. Push Notifications for
Mobile
•
The following ports must be open on
each node in the cluster where the
Mobile application is installed:
– Android
●
Port 443 (HTTPS only)
– iOS
●
Ports 2195 and 2196
18. 09. Push Notifications for
Mobile
•
Check out & edit mobile-config.xml
•
<Push enabled="true">
•
<RememberPassword>true</Remem
berPassword>
...
•
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/overview/t_configure_push-note_mobile.dita?lang=en
19. 10. Email-Notification
Sender
•
Default: generic email address, such
as connections-admin@example.com
•
Displayname and Email-Address can
be changed
•
Globally or per app
•
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/t_admin_act_managing_notifications.dita?lang=en
21. 11. Email-Notification
Mobile Links
•
Not included by default
•
Adds link to notification that opens in
mobile Connections app
•
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/t_admin_notifications_include_mobile_links.dita?
lang=en
25. 13. Add Search Languages
•
Not everyone speaks & creates
english-only conten
•
You can have multiple languages
•
You have to define one primary
language
•
Recreate Searchindex after adding
languages
27. 14. More Language Related
Search Settings
•
For better multilingual support set
•
search.ignore.punctuation.enabled
•
search.language.sensitivity.enabled
•
oneToTwoMapping.enabled
28. 14. More Language Related
Search Settings
•
Set via wsadmin command
LCConfigService.updateConfig()
•
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/r_admin_common_props_wsadmin.dita?lang=en
30. 15. Enable User To Set
Language Preference
•
Default: User interface is displayed in
the language set by the locale
settings of the web browser.
•
Easy Setup:
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/t_admin_common_enable_lang_change.dita?
lang=en
31. 15. Enable User To Set
Language Preference
•
LotusConnections-config.xml
<languageSelector cookieDomain=""
cookieName="" defaultLanguage=""
enabled="true"usePermanentCookie
="false">
<language lang="en">English</language>
<language lang="de">Deutsch</language>
<language
lang="fr">Franu00e7ais</language>
</languageSelector>
33. 16. Enable URL Preview
•
Connections (WAS) needs to be able
to access „The Internet“
•
Can facilitate a Proxy
•
Easy to set-up
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/t_admin_news_url_preview_config.dita?lang=en
35. 17. Enable Sync For Files
•
Not always enabled by default, so
verify
•
Enable before deploying the Client-
Plugin
•
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/t_admin_enabling_file_sync.dita?lang=en
38. 18. Enable Sync For Mobile
•
Not enabled by default
•
Consider enabling file download via
IHS beforehand
•
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/overview/t_configure_FileSync.dita?lang=en
39. 18. Enable Sync For Mobile
•
mobile-config.xml
<FileSync enabled="true">
<InactiveDevicesPurgeThreshold>180</I
nactiveDevicesPurgeThreshold>
<AutoSync>true</AutoSync>
</FileSync>
41. 19. Enable Round-Trip
Editing For Files
●
Not enabled by default.
●
Enable before deploying the Client-
Plugin
●
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin/
admin/t_admin_enabling_roundtrip_edit.dita?lang=en
42. 20. Modify Maximum File
and Library Size
Default maximum file size is 512 MB
•
Default personal library: 512 MB
•
Default Community library: 512 MB
•
•
There are limits for files in Wikis,
Activities, … as well, but try to
educate your users to store files in
„Files“
43. 20. Modify Maximum File
and Library Size
•
Change via FilesPolicyService
•
Modify „Default Policy“
•
Create new policies for different user
groups
•
Numbers > 2GB must add an "L"!
eg: 2GB are given as „2147483648L“
•
Easy setup:
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/t_admin_files_library_maxsize.dita?lang=en
44. 21. Assigning tasks to
multiple people
•
Marked as completed when all
assigned users mark the item
complete
•
An activity owner can also mark the
activity complete
45. 21. Assigning tasks to
multiple people
•
Disabled by default
•
Watch out for „side-effects“ with
Notes-Plugin and mobile apps.
•
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/r_admin_activities_props.dita?lang=en
46. 21. Assigning tasks to
multiple people
•
oa-config.xml
<property
name="feature.multiAssignment.enabled
">true</property>"
55. 22. Table Of Contents
Macro for Wikis
•
Disabled by default
•
Room for improvement
•
Option for more macros
•
Support?
•
Easy Setup
http://www.stoeps.de/activate-customize-table-of-contents-
macro-in-ibm-connections-wiki/
57. 23. Wiki Syntax Tab
Disabled by default
•
Enable in wikis-config.xml via
editor.wikitexttab.enabled
•
Easy Setup:
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/admin/r_admin_wikis_config_properties2.dita?lang=en
61. 27. Microbrowser Support
•
Not enabled by default
•
Renders Connections for mobile
device webbrowsers
•
Useful when the mobile App is not
available
•
Easy setup
http://www-
01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/admin
/overview/c_use_microbrowser.dita?lang=en
62. 28. Bonus Tip:
App Password
•
Check out the Social Connecions 9
session „IBM Connections – Beyond a
standard installation – Fasten your
seatbelt!“
by Maik Weber and Stefan Heßler for
details.
64. Questions
Sjaak Ursinus
Ilionx
Twitter → sursinus
Skype → sursinus
Linkedin → www.linkedin.com/in/sursinus
Various other social website’s
Martin Leyrer
IBM Austria
E-mail: martin.leyrer@at.ibm.com
Twitter: http://www.twitter.com/leyrer
Blog: http://www.leyon.at
Slideshare:
http://www.slideshare.net/Martin.Leyrer