Universiti Pendidikan Sultan Idris (UPSI) Sharing Success Story by the Regional OSS Case Study Winners. MyGOSSCON 2008. En. Mohd Nazri Md Saad
Pengarah Pusat ICT,
Universiti Pendidikan Sulatan Idris (UPSI)
Category: Infrastructure
MERN is one of several MEAN stack (MongoDB Express Angular Node) variants in which the traditional Angular.js frontend framework is replaced with React.js. MEVN (MongoDB, Express, Vue, Node) is another variant, and really any frontend JavaScript framework can work.Node.js is a popular and powerful JavaScript server platform, and Express.js is a server-side web framework. Regardless of which variant you choose, ME(RVA)N is the best way to work with JavaScript and JSON from start to finish.
DURATION:60 days
MERN is one of several MEAN stack (MongoDB Express Angular Node) variants in which the traditional Angular.js frontend framework is replaced with React.js. MEVN (MongoDB, Express, Vue, Node) is another variant, and really any frontend JavaScript framework can work.Node.js is a popular and powerful JavaScript server platform, and Express.js is a server-side web framework. Regardless of which variant you choose, ME(RVA)N is the best way to work with JavaScript and JSON from start to finish.
DURATION:60 days
An effective DBA is an efficient DBA. And if you work with SQL Server, dbatools is a lifesaver. With over 500 commands, this free and open source PowerShell module has the horsepower to automate just about every task you can imagine—and then some! Written by dbatools creator Chrissy LeMaire and dbatools advocate Rob Sewell, Learn dbatools in a Month of Lunches teaches you techniques that will make you more effective—and efficient—than you ever thought possible.
If you want to know more about the book, check it out here: https://www.manning.com/books/learn-dbatools-in-a-month-of-lunches?utm_source=slideshare&utm_medium=social&utm_campaign=book-learndbatoolsinamonthoflunches&utm_content=slideshare_01
Full stack development using javascript what and why - ajay chandravadiyaajayrcgmail
This presentation is about my first encounter with world of fullstack development using html, css, javascript, jsp, servlet, struts, hibernate, hql, spring, sql, stored procs and lot of other pains and second encounter with fullstack development using html, css and javascript.
I hope you got the message ;)
An effective DBA is an efficient DBA. And if you work with SQL Server, dbatools is a lifesaver. With over 500 commands, this free and open source PowerShell module has the horsepower to automate just about every task you can imagine—and then some! Written by dbatools creator Chrissy LeMaire and dbatools advocate Rob Sewell, Learn dbatools in a Month of Lunches teaches you techniques that will make you more effective—and efficient—than you ever thought possible.
If you want to know more about the book, check it out here: https://www.manning.com/books/learn-dbatools-in-a-month-of-lunches?utm_source=slideshare&utm_medium=social&utm_campaign=book-learndbatoolsinamonthoflunches&utm_content=slideshare_01
Full stack development using javascript what and why - ajay chandravadiyaajayrcgmail
This presentation is about my first encounter with world of fullstack development using html, css, javascript, jsp, servlet, struts, hibernate, hql, spring, sql, stored procs and lot of other pains and second encounter with fullstack development using html, css and javascript.
I hope you got the message ;)
(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...Amazon Web Services
Minimizing customer impact is a key feature in successfully rolling out frequent code updates. Learn how to leverage the AWS cloud so you can minimize bug impacts, test your services in isolation with canary data, and easily roll back changes. Learn to love deployments, not fear them, with a blue/green architecture model. This talk walks you through the reasons it works for us and how we set up our AWS infrastructure, including package repositories, Elastic Load Balancing load balancers, Auto Scaling groups, internal tools, and more to help orchestrate the process. Learn to view thousands of servers as resources at your command to help improve your engineering environment, take bigger risks, and not spend weekends firefighting bad deployments.
Lesson learned during new project base on SOA architecture. Technology used in our project:
- Symfony 2.3
- PHPUnit
- SoapUI
- RabbitMQ
- MySQL (Percona)
- Elasticsearch
- Jenkins
- Memcached
- Nagios
- New Relic
Session s083 01 - moving away from ip authenticationMay Yan
What happens when university IT mandates that all patrons must login to library resources using two-factor authentications instead of IP authentication? What are major considerations when exploring solutions? Alternatives to IP authentication are presented. Lessons learned from implementing a solution using proxy server at a large university environment.
Presented at Electronic Resources & Libraries Conference 2017 in Austin Texas, April 4th, 2017.
The Autobahn Has No Speed Limit - Your XPages Shouldn't Either!Teamstudio
Using XPages out of the box lets you build good-looking and well-performing applications. As XPage applications become bigger and more complex, performance can become an issue. There are several ways to improve scalability and performance that you should take into consideration. In this webinar, learn how to use partial refresh and partial execution mode and how to monitor its execution using a JSFLifeCycle monitor to avoid multiple re-calculations. See how readily available tools from OpenNTF will allow you to profile and analyze your code to improve the speed of your applications. Using Server Side Java Script and encountering a significant slow down when using Script Libraries? Learn how you can improve the speed of your application using JAVA instead of JavaScript, JSON and even @formulas.
How to (nicely) reclaim what is yours in a Private Cloud environment
In private cloud environments, capacity management is a necessary evil. Cloud resources are not without cost, but they can seem that way to end-users. Zero capacity means “the cloud is broken!” to some, which could decelerate cloud adoption within companies. In this talk we will provide real-world examples on how eBay Inc has significantly reduced waste within our own cloud.
MongoDB: How We Did It – Reanimating Identity at AOLMongoDB
AOL experienced explosive growth and needed a new database that was both flexible and easy to deploy with little effort. They chose MongoDB. Due to the complexity of internal systems and the data, most of the migration process was spent building a new identity platform and adapters for legacy apps to talk to MongoDB. Systems were migrated in 4 phases to ensure that users were not impacted during the switch. Turning on dual reads/writes to both legacy databases and MongoDB also helped get production traffic into MongoDB during the process. Ultimately, the project was successful with the help of MongoDB support. Today, the team has 15 shards, with 60-70 GB per shard.
Slides include general management, troubleshooting, compliance, policies, email archiving and the use of PowerShell. We will review how to monitor Exchange with the Event viewer and System Center, and we will discuss the Exchange best practice analyzer.
You can learn more about the latest version of FREE Veeam Explorer for Exchange: http://go.veeam.com/veeam-explorer-for-microsoft-exchange
VIDEO for this webinar: http://www.veeam.com/videos/managing-your-exchange-architecture-4813.html
I'm talking about how Ansible helps Backbase establish testing pipeline to ensure the quality of Customer Experience Platform - the leading horizontal portal software. This is done by utilizing the concept of immutable infrastructure to provision on-demand infrastructure use it and the dispose.
Storage Systems for High Scalable Systems Presentationandyman3000
Presentation from http://www.hfadeel.com/Blog/?p=151 what kind of storage systems players like Facebook or Google use for their extreme scalability requirements
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...Linuxmalaysia Malaysia
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2014)
http://lanyrd.com/2014/moscmy2014/calls/qxkg/
http://www.mosc.my/call-for-speakers-moscmy-2014
Over the years, Malaysia Open Source Conference or MOSCMY have brought together thousands participants, of CEOs and leaders, vendors, consultants, associations and regulators from around Malaysia and the world to address mutual challenges and share information on Open Source Software.
With "Open Hardware" as the theme for year 2014, we are addressing the main technology focus and trends for most consumers.
MOSCMY 2014 is set to explore the Open Source software and technology at the Enterprise level, and to promote the development of local Open Source solution for Enterprise environment to be use worldwide.
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013. MOSC 2013 brings TWO DAYS of exciting programs covering more than twenty (20) speaking sessions and multiple Birds of a Feather sessions which are streamed to reflect your TRUE IT OPERATIONS @ Strategic, Operational and Devices & Solutions.
"Boosting Mobility" is our theme for MOSC 2013 which reflect our objective to share and explore the avenues on why and how Open Source Software and technology have contributed as the foundation and catalyst for mobility initiatives.
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureLinuxmalaysia Malaysia
Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure is finally here. Please take this opportunity and interact with more than 25 speakers. It's PSMB claimable (mean its can be free to you paid by your company), covers multiple platforms. It's MOSC2013 http://www.mosc.my/register #mosc2013 #moscmy
Panduan ringkas ini saya sediakan apabila seorang sahabat bertanya tentang kemahiran keselamatan ICT yang beliau boleh pelajari dan kuasai. Dalam bidang keselamatan ICT (Information Security) secara umum terbahagi kepada tiga bahagian.
Moga ia menjadi panduan semua.
Harisfazillah Jamel aka LinuxMalaysia
6 Nov 2012
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Malaysia License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.5/my/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...Linuxmalaysia Malaysia
Survey on the Proposed Establishment of BCPM
There is currently an initiative to establish a Board of Computing Professionals Malaysia (BCPM), which will function to accredit ICT academic programmes, as well as to promote, facilitate and regulate the profession (very much like the Board of Engineers for engineering, and the Bar Council for the legal profession, etc.). This initiative is under the purview of the Ministry of Science and Innovation (MOSTI) and led by the National ICT Human Resource Task Force under the Ministry of Higher Education (MOHE) and within the ICT Human Capital Development Framework.
We would like to invite all ICT practitioners and those related to the profession to participate in an on-line survey that will be open for responses from Monday 28 June 2012 (00:00) to Monday 11 June 2012 (24:00). The survey aims to solicit feedback from the ICT community to determine the overall suitability and general acceptance to the proposal for the establishment of the BCPM. The survey site is at
http://kict.iium.edu.my/survey/
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)Linuxmalaysia Malaysia
MOSC2012 Sponsor
Partners participate as a key host and support the Malaysia Open Source Conference 2012 (MOSC2012) in the effort surrounding development and delivery of the conference. Further, the partner gains high visibility at the exhibition as well.
http://www.mosc.my/content/sponsorship
Open Source Software Community Forum Regarding Proposed Board of Computing Professional (BCPM) Bill 2011 in the implementation of Open Source Software in Malaysia. SWOT Analysis of Proposed Computing Professionals Bill 2011 slide.
Date: 6 January 2012 (Friday)
Time: 7:00 p.m.
Venue: Training Room OSCC MAMPU Level 2, MAMPU Cyberjaya 5
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. Why Zimbra?
• RnD by Server & Networking Unit
• Other email systems – Squirrelmail, Usermin, Horde.
• Zimbra Collaboration Suite provide a better solution that suits
the need of the organization.
– Email
– Group Calendars
– Address Books
– Task management
– Web document management and authoring
• Upgrading the current email system.
3. Deployment Process
• Deployed in 4 different servers:-
– mailhost.upsi.edu.my :- this server manage 8
domains for 8 faculties. Deployment period within
one week.
– maildept.upsi.edu.my :- this server manage 4
domains for 4 main excellence centres.
Deployment period within 2-3 days.
4. Deployment Process
– mailftmk.upsi.edu.my :- this server manage mail system for
dedicated faculty (FTMK). Deployment period within 8
hours.
– mymail.upsi.edu.my :- this server manage all email account
of UPSI staff (@upsi.edu.my). Deployment period within one
week.
• Current user: 1540
5. Benefits
• To provide protection and security to user mailbox.
– ClamAV: antivirus scanner
– SpamAssassin: mail filter to identify spam
– Amavisd-new: content checkers.
• User friendly and easy to manage.
6. Benefits
• Free (Open source)
• New services:
– OpenLDAP : User authentication
– Lucene : full featured text index and
search engine
– James/Sieve filtering : create filters
for email
– Import external account using
Zimbra interface.