This is a summary of Control Objectives for Information and related Technology audit framework. Anyone can understand COBIT-19 framework within few slides. COBIT was published by ITGI, a nonprofit research entity created by ISACA
How to leverage Enterprise Architecture in a regulated environmentLeanIX GmbH
This document summarizes an expert presentation on using enterprise architecture tools like leanIX to manage applications and ensure compliance in regulated industries. It discusses how leanIX can be used to identify missing information, cross-check data across different views, initiate governance reviews, and find inconsistencies. Tools like leanIX allow mapping information to standards like COBIT, GDPR, and creating structured views to more effectively manage portfolios in regulated environments.
This document discusses Cobit 2019 and typical pain points organizations experience with enterprise governance of IT. It outlines 11 design factors to consider when implementing Cobit 2019, such as understanding the enterprise goals, risk profile, current IT issues, threat landscape, compliance requirements, role of IT, sourcing model for IT, and technology adoption strategy. The document provides comparisons between Cobit 5 and Cobit 2019 and lists various Cobit 2019 focus areas.
The modern IT stack has become diverse and distributed, and it’s increasingly challenging to manage heterogeneous platforms and multi-vendor devices. Customers are looking to the cloud and APM to help address these hurdles, as well as accelerate IT transformation.
But migrating to the cloud will take time, it won’t make infrastructure ‘just disappear’, and legacy workloads are going to remain part of the enterprise reality for many. In addition, while APM will continue to be increasingly important, all applications are not the same and an application is still not equal to a digital business service.
Watch this webinar as John Worthington, a service management expert and Director of Product Marketing for eG Innovations, continues our Shift-Left series. You can learn:
• Why domain expertise is important when defining monitoring requirements
• What analytics are useful from a monitoring and observability context
• How end-to-end monitoring with converged application and infrastructure performance can drive ITSM and DevOps integration
Solution Architecture And Solution SecurityAlan McSweeney
The document proposes a core and extended model for embedding security within technology solutions. The core model maps out solution components, zones, standards and controls. It shows how solutions consist of multiple components located in zones, with different standards applying. The extended model adds details on security control activities and events. Solution security is described as a "wicked problem" with no clear solution. New technologies introduce new risks to solutions across dispersed landscapes. The document outlines types of solution zones and common component types that make up solutions.
Enterprise Architecture Implementation And The Open Group Architecture Framew...Alan McSweeney
The document discusses enterprise architecture and TOGAF. It defines enterprise architecture as a framework for addressing the increasing complexity of IT systems and poor alignment between business and IT needs. TOGAF provides a framework for developing enterprise architecture, with the goal of improving business-IT alignment and allowing organizations to better respond to changing business needs. The document outlines challenges in developing enterprise architecture and stresses the importance of balancing strategic planning with technology solutions.
The most common architecture pattern is the layered architecture pattern, otherwise known as the n-tier architecture pattern. This pattern is the de facto standard for most applications and therefore is widely known by most architects, designers, and developers. The layered architecture pattern closely matches the traditional IT communication and organizational structures found in most companies, making it a natural choice for most business application development efforts.
This is a summary of Control Objectives for Information and related Technology audit framework. Anyone can understand COBIT-19 framework within few slides. COBIT was published by ITGI, a nonprofit research entity created by ISACA
How to leverage Enterprise Architecture in a regulated environmentLeanIX GmbH
This document summarizes an expert presentation on using enterprise architecture tools like leanIX to manage applications and ensure compliance in regulated industries. It discusses how leanIX can be used to identify missing information, cross-check data across different views, initiate governance reviews, and find inconsistencies. Tools like leanIX allow mapping information to standards like COBIT, GDPR, and creating structured views to more effectively manage portfolios in regulated environments.
This document discusses Cobit 2019 and typical pain points organizations experience with enterprise governance of IT. It outlines 11 design factors to consider when implementing Cobit 2019, such as understanding the enterprise goals, risk profile, current IT issues, threat landscape, compliance requirements, role of IT, sourcing model for IT, and technology adoption strategy. The document provides comparisons between Cobit 5 and Cobit 2019 and lists various Cobit 2019 focus areas.
The modern IT stack has become diverse and distributed, and it’s increasingly challenging to manage heterogeneous platforms and multi-vendor devices. Customers are looking to the cloud and APM to help address these hurdles, as well as accelerate IT transformation.
But migrating to the cloud will take time, it won’t make infrastructure ‘just disappear’, and legacy workloads are going to remain part of the enterprise reality for many. In addition, while APM will continue to be increasingly important, all applications are not the same and an application is still not equal to a digital business service.
Watch this webinar as John Worthington, a service management expert and Director of Product Marketing for eG Innovations, continues our Shift-Left series. You can learn:
• Why domain expertise is important when defining monitoring requirements
• What analytics are useful from a monitoring and observability context
• How end-to-end monitoring with converged application and infrastructure performance can drive ITSM and DevOps integration
Solution Architecture And Solution SecurityAlan McSweeney
The document proposes a core and extended model for embedding security within technology solutions. The core model maps out solution components, zones, standards and controls. It shows how solutions consist of multiple components located in zones, with different standards applying. The extended model adds details on security control activities and events. Solution security is described as a "wicked problem" with no clear solution. New technologies introduce new risks to solutions across dispersed landscapes. The document outlines types of solution zones and common component types that make up solutions.
Enterprise Architecture Implementation And The Open Group Architecture Framew...Alan McSweeney
The document discusses enterprise architecture and TOGAF. It defines enterprise architecture as a framework for addressing the increasing complexity of IT systems and poor alignment between business and IT needs. TOGAF provides a framework for developing enterprise architecture, with the goal of improving business-IT alignment and allowing organizations to better respond to changing business needs. The document outlines challenges in developing enterprise architecture and stresses the importance of balancing strategic planning with technology solutions.
The most common architecture pattern is the layered architecture pattern, otherwise known as the n-tier architecture pattern. This pattern is the de facto standard for most applications and therefore is widely known by most architects, designers, and developers. The layered architecture pattern closely matches the traditional IT communication and organizational structures found in most companies, making it a natural choice for most business application development efforts.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
The document discusses a roundtable on Solution Architecture training and CITA-A certification. It provides an overview of the training modules which cover topics like business technology strategy, solution architecture, lifecycles, success metrics, stakeholders, and describing solutions. The training aims to help participants understand the solution architect role and gain skills across software, infrastructure, information, and business domains. It also discusses how solution architects balance conflicting priorities and connect with other architects in an organization.
My objective with this presentation is to introduce the key frameworks and standards that provide practical guidance when tackling an EA project or implementing an EA capability.
There is currently not a universality accepted definition of EA and therefore it is important to but context to the presentation, so before we start discussing standards and frameworks that address the challenges, I want to take a minute to state my definition of Enterprise Architecture.
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSMGlobal Manager Group
A Ready-to-use ISO 20000-1:2018 Training kit that helps the organization to ensure micro-level system is well established as per latest requirements.The main goal of thist training kit is for strengthening the company by system establishment and providing best training materials for ISO 20000 Certification.For more details please visit: https://www.globalmanagergroup.com/Products/iso-20000-auditor-training-ppt.htm
This document discusses evaluation and user studies. It provides the following key points:
- User studies empirically test hypotheses by determining usability, efficiency, accuracy and emotional response of users to a new interface or visualization.
- Crowdsourcing platforms like Amazon Mechanical Turk can be used for online user studies to gather a large sample size quickly and at low cost.
- User studies measure quantitative performance of systems to evaluate strengths/weaknesses and verify hypotheses. Qualitative studies also provide insights.
- Proper evaluation depends on the research context and questions being addressed, and different methodologies from fields like information visualization and cognitive science can be applied.
Enterprise Security Architecture: From access to auditBob Rhubart
Paul Andres' presentation from OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
Effective Application Portfolio Management using ArchiMateCorso
This document discusses application portfolio management (APM) and provides an overview of the Corso solution. It begins with an introduction to Martin Owen, CEO of Corso, and his background. It then discusses the benefits of APM, including alignment of business and IT, vendor management, technology rationalization, and risk reduction. The document presents Corso's definition of APM and emphasizes taking a holistic view of the relationships between applications, technologies, information and business processes. It also shows how APM concepts can be modeled and aligned with the ArchiMate standard and TOGAF framework.
Vistara is the only comprehensive IT operations management solution that enables enterprise IT teams to act as service provider to lines of business, offering common operations management functions as a service.
The document discusses application portfolio management. It begins by explaining the need for application portfolio management and how it provides visibility into an organization's applications. It then discusses how to capture application information, including how to categorize applications using metrics like type, business functionality, usage profile, and capabilities. Industry reference models for capabilities are also mentioned. The document provides examples of how to map applications to business capabilities and show application dependencies through a RACI chart. It suggests publishing the application portfolio information on an intranet for feedback. Overall, the document provides an overview of best practices for setting up and maintaining an application portfolio management practice.
Understand the concept of DevOps by employing DevOps Strategy Roadmap Lifecycle PowerPoint Presentation Slides Complete Deck. Describe how DevOps is different from traditional IT with these content-ready PPT themes. The slides also help to discuss DevOps use cases in the business, roadmap, and its lifecycle. Explain the roles, responsibilities, and skills of DevOps engineers by utilizing this visually appealing slide deck. Demonstrate DevOp roadmap for implementation in the organization with the help of a thoroughly researched PPT slideshow. Describe the characteristics of cloud computing, its benefits, and risks with the aid of this PPT layout. Utilize this easy-to-use DevOps transformation strategy PowerPoint slide deck to showcase the difference between cloud and traditional data centers. This ready-to-use PowerPoint layout also discusses the roadmap to integrate cloud computing in business. Highlight the usages of cloud computing and deployment models with the help of visual attention-grabbing DevOps implementation roadmap PowerPoint slides. https://bit.ly/3eFxYYr
The document is a presentation about the international standard ISO/IEC/IEEE 42010:2011, Systems and software engineering—Architecture description. It provides an overview of the standard's history, core concepts, use and application. The presentation covers topics such as the motivation for architecture standards, the development of IEEE 1471 and its internationalization, key terms and concepts defined in the standard, and how the standard can be applied.
The document discusses the major changes in TOGAF 9.2 including restructuring the framework and introducing the TOGAF Library. Key changes include enhancements to business architecture with new artifacts related to value streams and business capabilities, updated terms and definitions, and additional details in the ADM. Security architecture was also enhanced with its own guide. The presentation provides an overview of ITpreneurs' TOGAF training offerings and pathways for architects to become certified or take additional courses in related frameworks like DevOps and CCC.
Running the Business of IT on ServiceNow using IT4ITcccamericas
CC&C Solutions is an IT consulting firm focused on enterprise architecture and IT capability. Their mission is to help organizations and the IT industry. Michael Fulton presented on using ServiceNow to run the business of IT based on the IT4IT reference architecture. IT4IT provides a vendor-neutral framework for managing the entire IT value chain from strategy to operations. It addresses issues like lack of integration and insight. Originally developed by a consortium including Shell and HP, IT4IT is now supported by many large companies, vendors and consultants.
This document discusses DevOps feedback loops and the importance of closing the loop between development and operations. It provides examples of where feedback comes from in operations, including from people and machines, and where feedback needs to go in development, such as to developers and development systems. The key message is that closing the feedback loop through continuous feedback is critical for DevOps in order to optimize software development and address issues quickly before they become bigger problems.
System Center Service Manager is a software product by Microsoft to allow organizations to manage incidents and problems. Microsoft states that the product is compliant with industry best practices such as the Microsoft Operations Framework and in the Information Technology Infrastructure Library.
Understanding System Center
https://www.youtube.com/watch?v=4sYqb6F5QKk
Monitoring the Hashistack with PrometheusGrafana Labs
Prometheus has become the defacto monitoring system for cloud native applications, but for a while was eschewed by the Hashistack in favour of more traditional technologies. Thats all changing: Hashicorp's project are beginning to export metrics in the native Prometheus format, and many exporters exist to bridge the gap.
In this talk Tom will give a brief introduction to Prometheus, show you how to piece it all together, and give some recommendation on what to monitor and alert on.
IT Architecture is failing the business by:
• Not delivering on business strategy and business objectives
• Not helping the business respond to external and internal pressures
• Not providing the consulting and advisory services to enable the business derive value from new technologies
• Not driving IT innovation
• Not making itself relevant or useful to the business
IT Architecture failing the IT organisation by:
• Not assisting with engagement with the business to architect solutions needed by the business
• Not working as an integrated function across all architectural areas
• Not defining IT architectures that enable a portfolio of solutions to be delivered and operated quickly
• Not innovating the IT portfolio and architecture to take advantage of and integrate new technologies
Individual architecture disciplines all too frequently operate as disintegrated and siloed functions.
The consequences are that:
• At least 40% of technology spending is diverted from IT
• Over 30% of CIOs routinely not consulted on IT solution acquisition and expenditure
IT architecture needs to:
• Enable the business respond to and realise changes in response to external and internal pressures
• Identify business opportunities in technology trends and occasions for changes and greater efficiencies
• IT Architecture needs to be able to contribute to the development of business strategy and to be trusted to be able to make a contribution
• Identify how the business can use technologies and how the business should be shaped to take advantage of technologies
• Provide advice on the potential of new technologies and how to react to technology changes
• Offer real business consulting and the addition of business value
The document provides an overview of the Digital Trust Framework (DTF) and how it will integrate several frameworks including ODA, COBIT 2019, ITIL 4, and ISO 27005 to provide an overall approach for digital trust. The DTF will be a modular, cloud-based, open digital platform that can be orchestrated using AI. It will use the TMForum's Open Digital Architecture as a cornerstone and was developed for a 4IR environment.
RA TechED 2019 - IN02 - Empower Your Connected Enterprise with FactoryTalk In...Rockwell Automation
FactoryTalk InnovationSuite is a suite of IIoT solutions including ThingWorx, an IIoT platform. ThingWorx includes capabilities like asset management, analytics, and mobile/AR applications. It allows users to connect devices and machines, create digital twins using a "ThingModel", develop applications using a visual mashup tool, and engage users through mobile and augmented reality. DataAnalytics solutions like DataView allow self-service data exploration and storyboarding to gain insights without extensive IT or data science expertise.
An overview of The Open Group IT4IT Reference Architecture. It is a vendor and product-agnostic value chain-based operating model for managing the business of IT. While providing guidance on the design, procurement and implementation of the functionality needed to run IT, it also enables the systematic tracking of the state of IT services across the service life-cycle using four value streams - Strategy to Portfolio, Request to Fulfill, Requirement to Deploy, and Detect to Correct.
Download presentation from http://opengroup.co.za/presentations
The document discusses a roundtable on Solution Architecture training and CITA-A certification. It provides an overview of the training modules which cover topics like business technology strategy, solution architecture, lifecycles, success metrics, stakeholders, and describing solutions. The training aims to help participants understand the solution architect role and gain skills across software, infrastructure, information, and business domains. It also discusses how solution architects balance conflicting priorities and connect with other architects in an organization.
My objective with this presentation is to introduce the key frameworks and standards that provide practical guidance when tackling an EA project or implementing an EA capability.
There is currently not a universality accepted definition of EA and therefore it is important to but context to the presentation, so before we start discussing standards and frameworks that address the challenges, I want to take a minute to state my definition of Enterprise Architecture.
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSMGlobal Manager Group
A Ready-to-use ISO 20000-1:2018 Training kit that helps the organization to ensure micro-level system is well established as per latest requirements.The main goal of thist training kit is for strengthening the company by system establishment and providing best training materials for ISO 20000 Certification.For more details please visit: https://www.globalmanagergroup.com/Products/iso-20000-auditor-training-ppt.htm
This document discusses evaluation and user studies. It provides the following key points:
- User studies empirically test hypotheses by determining usability, efficiency, accuracy and emotional response of users to a new interface or visualization.
- Crowdsourcing platforms like Amazon Mechanical Turk can be used for online user studies to gather a large sample size quickly and at low cost.
- User studies measure quantitative performance of systems to evaluate strengths/weaknesses and verify hypotheses. Qualitative studies also provide insights.
- Proper evaluation depends on the research context and questions being addressed, and different methodologies from fields like information visualization and cognitive science can be applied.
Enterprise Security Architecture: From access to auditBob Rhubart
Paul Andres' presentation from OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
Effective Application Portfolio Management using ArchiMateCorso
This document discusses application portfolio management (APM) and provides an overview of the Corso solution. It begins with an introduction to Martin Owen, CEO of Corso, and his background. It then discusses the benefits of APM, including alignment of business and IT, vendor management, technology rationalization, and risk reduction. The document presents Corso's definition of APM and emphasizes taking a holistic view of the relationships between applications, technologies, information and business processes. It also shows how APM concepts can be modeled and aligned with the ArchiMate standard and TOGAF framework.
Vistara is the only comprehensive IT operations management solution that enables enterprise IT teams to act as service provider to lines of business, offering common operations management functions as a service.
The document discusses application portfolio management. It begins by explaining the need for application portfolio management and how it provides visibility into an organization's applications. It then discusses how to capture application information, including how to categorize applications using metrics like type, business functionality, usage profile, and capabilities. Industry reference models for capabilities are also mentioned. The document provides examples of how to map applications to business capabilities and show application dependencies through a RACI chart. It suggests publishing the application portfolio information on an intranet for feedback. Overall, the document provides an overview of best practices for setting up and maintaining an application portfolio management practice.
Understand the concept of DevOps by employing DevOps Strategy Roadmap Lifecycle PowerPoint Presentation Slides Complete Deck. Describe how DevOps is different from traditional IT with these content-ready PPT themes. The slides also help to discuss DevOps use cases in the business, roadmap, and its lifecycle. Explain the roles, responsibilities, and skills of DevOps engineers by utilizing this visually appealing slide deck. Demonstrate DevOp roadmap for implementation in the organization with the help of a thoroughly researched PPT slideshow. Describe the characteristics of cloud computing, its benefits, and risks with the aid of this PPT layout. Utilize this easy-to-use DevOps transformation strategy PowerPoint slide deck to showcase the difference between cloud and traditional data centers. This ready-to-use PowerPoint layout also discusses the roadmap to integrate cloud computing in business. Highlight the usages of cloud computing and deployment models with the help of visual attention-grabbing DevOps implementation roadmap PowerPoint slides. https://bit.ly/3eFxYYr
The document is a presentation about the international standard ISO/IEC/IEEE 42010:2011, Systems and software engineering—Architecture description. It provides an overview of the standard's history, core concepts, use and application. The presentation covers topics such as the motivation for architecture standards, the development of IEEE 1471 and its internationalization, key terms and concepts defined in the standard, and how the standard can be applied.
The document discusses the major changes in TOGAF 9.2 including restructuring the framework and introducing the TOGAF Library. Key changes include enhancements to business architecture with new artifacts related to value streams and business capabilities, updated terms and definitions, and additional details in the ADM. Security architecture was also enhanced with its own guide. The presentation provides an overview of ITpreneurs' TOGAF training offerings and pathways for architects to become certified or take additional courses in related frameworks like DevOps and CCC.
Running the Business of IT on ServiceNow using IT4ITcccamericas
CC&C Solutions is an IT consulting firm focused on enterprise architecture and IT capability. Their mission is to help organizations and the IT industry. Michael Fulton presented on using ServiceNow to run the business of IT based on the IT4IT reference architecture. IT4IT provides a vendor-neutral framework for managing the entire IT value chain from strategy to operations. It addresses issues like lack of integration and insight. Originally developed by a consortium including Shell and HP, IT4IT is now supported by many large companies, vendors and consultants.
This document discusses DevOps feedback loops and the importance of closing the loop between development and operations. It provides examples of where feedback comes from in operations, including from people and machines, and where feedback needs to go in development, such as to developers and development systems. The key message is that closing the feedback loop through continuous feedback is critical for DevOps in order to optimize software development and address issues quickly before they become bigger problems.
System Center Service Manager is a software product by Microsoft to allow organizations to manage incidents and problems. Microsoft states that the product is compliant with industry best practices such as the Microsoft Operations Framework and in the Information Technology Infrastructure Library.
Understanding System Center
https://www.youtube.com/watch?v=4sYqb6F5QKk
Monitoring the Hashistack with PrometheusGrafana Labs
Prometheus has become the defacto monitoring system for cloud native applications, but for a while was eschewed by the Hashistack in favour of more traditional technologies. Thats all changing: Hashicorp's project are beginning to export metrics in the native Prometheus format, and many exporters exist to bridge the gap.
In this talk Tom will give a brief introduction to Prometheus, show you how to piece it all together, and give some recommendation on what to monitor and alert on.
IT Architecture is failing the business by:
• Not delivering on business strategy and business objectives
• Not helping the business respond to external and internal pressures
• Not providing the consulting and advisory services to enable the business derive value from new technologies
• Not driving IT innovation
• Not making itself relevant or useful to the business
IT Architecture failing the IT organisation by:
• Not assisting with engagement with the business to architect solutions needed by the business
• Not working as an integrated function across all architectural areas
• Not defining IT architectures that enable a portfolio of solutions to be delivered and operated quickly
• Not innovating the IT portfolio and architecture to take advantage of and integrate new technologies
Individual architecture disciplines all too frequently operate as disintegrated and siloed functions.
The consequences are that:
• At least 40% of technology spending is diverted from IT
• Over 30% of CIOs routinely not consulted on IT solution acquisition and expenditure
IT architecture needs to:
• Enable the business respond to and realise changes in response to external and internal pressures
• Identify business opportunities in technology trends and occasions for changes and greater efficiencies
• IT Architecture needs to be able to contribute to the development of business strategy and to be trusted to be able to make a contribution
• Identify how the business can use technologies and how the business should be shaped to take advantage of technologies
• Provide advice on the potential of new technologies and how to react to technology changes
• Offer real business consulting and the addition of business value
The document provides an overview of the Digital Trust Framework (DTF) and how it will integrate several frameworks including ODA, COBIT 2019, ITIL 4, and ISO 27005 to provide an overall approach for digital trust. The DTF will be a modular, cloud-based, open digital platform that can be orchestrated using AI. It will use the TMForum's Open Digital Architecture as a cornerstone and was developed for a 4IR environment.
RA TechED 2019 - IN02 - Empower Your Connected Enterprise with FactoryTalk In...Rockwell Automation
FactoryTalk InnovationSuite is a suite of IIoT solutions including ThingWorx, an IIoT platform. ThingWorx includes capabilities like asset management, analytics, and mobile/AR applications. It allows users to connect devices and machines, create digital twins using a "ThingModel", develop applications using a visual mashup tool, and engage users through mobile and augmented reality. DataAnalytics solutions like DataView allow self-service data exploration and storyboarding to gain insights without extensive IT or data science expertise.
TYPO3 Congres 2012 - TYPO3 als centraal documentatiesysteemTYPO3 Nederland
Het in 1907 opgerichte bedrijf SKF is de grootste producent van kogellagers ter wereld. Naast het produceren van kogellagers is een belangrijke dienst van SKF het gegeven van advies over de toepassing van lagers. Hierbij wordt gebruik gemaakt van door SKF zelf ontwikkelde simulatiesoftware waarin praktijktoepassingen van lagers worden nagebootst om onder andere levensduurberekeningen uit te voeren. Omdat dit soort materie vrij complex kan zijn, is een belangrijk aspect van deze software de beschikbaarheid van een goede handleiding.
Dit is waar TYPO3 om de hoek komt kijken. Voor SKF ben ik op dit moment bezig om een centaal documentatiesysteem op te zetten, gebaseerd op TYPO3. De documentatie die door TYPO3 wordt gegenereerd kan in de simulatiesoftware zelf worden bekeken met een geïntegreerde browser. Bijzonder hierbij is dat niet elke gebruiker dezelfde mogelijkheden heeft in de simulatiesoftware. Afhankelijk van de licentie van een gebruiker zijn bepaalde onderdelen in het pakket wel of niet actief. Met behulp van uitgebreide gebruikersprofielen krijgt elke gebruiker uniek voor hem gegenereerde documentatie te zien, die precies past bij de mogelijkheden in zijn simulatiesoftware.
In mijn presentatie zal ik meer vertellen over deze niet alledaagse toepassing van TYPO3. Hierbij zal ik met name ingaan op hoe TYPO3 is gekoppeld en geïntegreerd met andere SKF systemen en de verschillende manieren waarop TYPO3 is uitgebreid. Denk hierbij aan de uitbreiding van de frontend authenticatie, custom backend modules, custom clickmenu's, LaTex ondersteuning in de RTE, automatische video conversie naar HTML5, en nog veel meer. Interessant voor ontwikkelaars en beleidsmakers die willen zien wat de uitbreidingsmogelijkheden van TYPO3 zijn.
- Een niet alledaagse toepassing van TYPO3
- Een showcase van de uitbreidingsmogelijkheden van TYPO3
- Aanknopingspunten voor ontwikkelaars
Bart Dubelaar
Bart is 31 jaar en werkt als Technical Software Engineer bij Logica, onderdeel van CGI. Bart is gecertificeerd TYPO3 integrator en heeft 3 jaar ervaring als TYPO3 ontwikkelaar en integrator. Op dit moment werkt Bart als consultant bij SKF in het Engineering & Research Centre waar gewerkt wordt aan interne Knowledge & Simulation tooling.
Hoe releasen minder pijnlijk werd bij de ANWB AlarmcentraleSjoerd Hemminga
Continuous Delivery wordt vaak geassocieerd met een snellere time-to-market, maar wat als dat niet je voornaamste probleem is? Een aantal jaar geleden heeft de ANWB besloten om zich van een traditionele enterprise organisatie te transformeren naar een Agile organisatie. Bij de afdeling Hulpverlening zijn wij met drie teams bezig met het ontwikkelen van het nieuwe case-managementsysteem voor de ANWB Alarmcentrale. Als onderdeel van onze agile werkwijze maakten wij een release en rolden wij deze uit aan het eind van onze tweewekelijkse sprints. Dit leverde ons regelmatig verschillende problemen op en halverwege 2016 besloten we dat het anders moest. We hebben toen een beweging ingezet richting Continuous Delivery. In deze presentatie zullen we ingaan op de uitdagingen die we hadden, hoe we die hebben aangepakt, en op een aantal onverwachte voordelen.
De complexiteit van licenties, stijgende kosten en het risico op een audit motiveren Oracle-klanten om hun migratie inspanningen snel op te starten en de liefde voor Postgres te omarmen.
EDB's Postgres migratie tools
Migreren van Oracle naar Postgres lijkt voor veel organisaties een complexe uitdaging. Daarom is onze Sales Engineer Gaby Schilders er om te helpen! Bekijk de slides van het door Gaby gepresenteerde webinar ‘DIY Oracle migratie naar Postgres’. Hij legt daarin uit waarom hij denkt dat onze tools de eenvoudigste en snelste manier zijn om zelf een migratie uit te voeren.
Tijdens dit webinar bespreekt hij onze verschillende tools en wanneer en waarom ze te gebruiken:
- EDB Postgres Advanced Server
- EDB Postgres Migration Portal
- EDB Postgres Migration Toolkit
- xDB Replication Server
SUNECO GOVERNANCE MODEL
Het Suneco Governance Model is de oplossing voor organisaties met meerdere websites op hun Sitecore systeem. Een platform met een website is eenvoudig beheersbaar, maar zodra er meer(dere) sites op het platform komen zal de beheersbaarheid evenredig afnemen. En veel bedrijven staan er niet bij stil dat de verschillende Sitecore partners allemaal hun eigen manier van werken hebben. Deze complexe situatie is niet erg zolang de status quo bestaat, maar deze bestaat in de huidige website lifecycle nooit lang. En als die status quo wordt aangetast wordt de complexiteit pas echt duidelijk. Het Suneco Governance Model ondersteunt bedrijven die op hun Sitecore instantie meerdere websites hebben draaien.
Meer op http://www.suneco.nl/governance
Techdays System Center 2012 Operations Manager end-to-end management walter ...wwwally
Tijdens deze sessie Walter Eikenboom, Principal consultant bij INOVATIV, bespreekt hoe wijzigingen in OpsMgr 2012 beperkingen van OpsMgr 2007 R2 oplost, hoe er om gegaan wordt met het verhogen van de beschikbaarheid en hoe het upgrade pad van OpsMgr 2007 R2 naar OpsMgr 2012 eruit ziet. Walter laat verder zien hoe end-to-end management in te richten met OpsMgr 2012 door gebruik te maken van de nieuwe mogelijkheden zoals netwerk monitoring en applicatie performance monitoring (APM) om end-to-end controle te verkrijgen over de business applicaties.
Hoe releasen minder pijnlijk werd bij de ANWB AlarmcentraleJeroen Reijn
Continuous Delivery wordt vaak geassocieerd met een snellere time-to-market, maar wat als dat niet je voornaamste probleem is? Een aantal jaar geleden heeft de ANWB besloten om zich van een traditionele enterprise organisatie te transformeren naar een Agile organisatie. Bij de afdeling Hulpverlening zijn wij met drie teams bezig met het ontwikkelen van het nieuwe case managementsysteem voor de ANWB Alarmcentrale. Als onderdeel van onze agile werkwijze maakten wij een release en rolden wij deze uit aan het eind van onze 2 wekelijkse sprints. Dit leverde ons regelmatig verschillende problemen op en halverwege 2016 besloten we dat het anders moest. We hebben toen een beweging ingezet richting Continuous Delivery. In deze presentatie zullen we ingaan op de uitdagingen die we hadden, hoe we die hebben aangepakt, en op een aantal onverwachte voordelen.
My talk about MEF for the Dutch Tech Days 2015 conference. All about MEF, how to use in Console applications, MVC systems and of course Windows and Windows Phone Store Apps. All the caveats are there
This presentation highlights the things to take into consideration when deploying 64-bit Uniface runtime. What are the differences in comparison with 32-bit Uniface and what should you check your Uniface code for in particular when deploying on 64-bit.
Uniface 9.7 Standard vs. Classic Deployment LectureArjen van Vliet
This presentation explains the differences between Uniface Classic Deployment and Uniface Standard Deployment. What are the differences and what are the benefits of Uniface Standard Deployment?
This presentation describes how the Uniface 9.7 development environment was modernized and how this project can be a spin off for other GUI Modernization projects
Uniface Anywhere is a simple and secure way of publishing your Windows application and to extend the reach of it to your corporate network or the Web. Without modifying a single line of code, you can make your Windows applications instantly accessible to a variety of PCs and mobile devices, platforms and browsers, for local and remote users, while retaining all the features of the original application.
The document discusses setting up PostgreSQL with Uniface 9.7.01. It provides steps to install PostgreSQL and its ODBC driver, create a data source, add a PostgreSQL license to Uniface, update the dbms.asn file to point to PostgreSQL, create a database table, build a FastForm interface, and demo basic CRUD operations on the table. Key features of the PostgreSQL connector in Uniface are also outlined.
Team leadership presentation as an application for the position.
Based on the book "Managing the Professional Services firm" by David Meister.
http://davidmaister.com/books/mtpsf/
2. Inleiding
• Kijk uit wat je shared op LinkedIn, voordat je ‘t weet mag je er een
presentatie over geven ;-)
• Presentatie is deels gebaseerd op artikel “Database changes done
right”, verschenen op 28-02-2012 op www.thedailywtf.com
2 Dienst ICT Uitvoering
4. Definitie Versiebeheersysteem
• Een computerprogramma of een verzameling programma's
waarmee men de wijzigingen in documenten, programma's of
andere informatie bewaard in computerbestanden kan beheren.
• Het meest gebruikt bij de ontwikkeling van software.
• Meerdere mensen kunnen wijzigingen aanbrengen aan dezelfde
bestanden.
• Wijzigingen worden meestal aangeduid met een code, het
"revisienummer" of "revisieniveau.
• Elke wijziging wordt gekoppeld aan een timestamp en aan de
persoon die de wijziging maakte.
• Wijzigingen kunnen vergeleken worden, hersteld en soms
samengevoegd.
4 Dienst ICT Uitvoering
6. Verschil tussen client/server en distributed
• Client/Server (plaatje):
• Centrale repository
• “Locken d.m.v. Check-In /
Check Out”
• Distributed:
• Iedere ontwikkelaar heeft een
eigen ‘working copy’
repository.
• Programmacode wordt ge-
merged.
• “Possibly the biggest advance
in software development
technology in the past ten
years." [Joel Spolsky]
6 Dienst ICT Uitvoering
7. Maar nu databases…
• Databases zijn anders t.o.v. applicatiecode :
• Applicatiecode ‘does stuff’
• Applicatiecode ‘leeft’ in source control
• Applicatiecode wordt ge(systeem)test, gepromoveerd,
ge(acceptatie)test, gepromoveerd, etc.
• Applicatiecode verandert niet na deployment; als er bug
gevonden wordt, begint het proces van voren af aan.
• Databases ‘leven’ op een database server.
• Er kunnen andere instances zijn (ontw, test, accp), maar de
produktie database is de belangrijkste.
• Databases ‘don’t do stuff’, maar ondergaan queries en updates
• Databases veranderen wel na deployment, dat is de reden dat
ze uberhaupt bestaan.
7 Dienst ICT Uitvoering
8. ‘Database changes done wrong’
• Je kunt niet even een set bestanden in een directory neerzetten en
roepen dat de nieuwe database versie uitgerold is…
• Idem voor terugrollen…
• Database changes kunnen alleen d.m.v. SQL script
• Terugrollen door ‘spiegel/undo’ script, maar beter nog door restore
van backup
Dit gaat tegen de natuur in van de gemiddelde developer vanwege:
• Weerstand tegen verandering
• Ongecontroleerde verandering
Wat dan weer tot ongewenste anti-patterns leidt….
8 Dienst ICT Uitvoering
9. Slecht voorbeeld: ‘Entity-Attribute-Value design’
• Eén van de ergste database design anti-patterns die er bestaat
• Onder het mom van ‘lekker flexibel’
• Mooi voorbeeld van ‘inner platform effect’ *
9 Dienst ICT Uitvoering
10. ‘Inner platform effect’
• De neiging van software architecten om een systeem zo
aanpasbaar/flexibel te maken, dat het een slechte replica van het
gebruikte ontwikkelplatform wordt.
10 Dienst ICT Uitvoering
11. Taxonomie (indeling) van database scripts
• Query scripts
Geen impact op data of database structuur, zoals eenvoudige
SELECT statements.
• Object scripts
Veranderen de database, maar alleen door
toevoegen/wijzigen/verwijderen van niet-data objecten zoals
stored procedures, views, functies etc.
• Change scripts
Veranderen de structuur van de opgeslagen data in tabellen
(ALTER TABLE, INSERT, CREATE INDEX etc.)
Alleen Object scripts en Change scripts vallen onder database
changes.
11 Dienst ICT Uitvoering
12. ‘Object Script Changes Done Right’
• Veel applicaties maken gebruik van objecten in de database:
• Stored procedures
• Views
• Triggers
• Deze objecten zijn gewoon programmacode en moeten dus ook als
zodanig behandeld worden:
• ‘leven’ in source control
• Gelabeld bij een build
• Deployed (uitgeleverd) tegelijk met de programmacode.
• etc.
12 Dienst ICT Uitvoering
13. Een goed object script…
• Moet drie dingen doen:
13 Dienst ICT Uitvoering
14. Naar Source Control…
• Object scripts…
• creëren slechts
objecten
• kunnen herhaald
worden zonder
consequenties
Eénmaal
aangemaakt op
disk, dan naar
Source Control…
Let ook op de
cijfer-prefix in
de
bestandsnaam…
14 Dienst ICT Uitvoering
15. Uitvoeringsvolgorde
• Deze cijfer-prefixes zorgen voor de juiste uitvoeringsvolgorde.
• Eventueel kan je een eenvoudig batch script maken dat de
bestanden in de goede volgorde uitvoert:
FOR /R . %%f IN (*.sql) DO (
OSQL -E -i "%%f" -n -b -d MyDataBase
)
Met deze technieken volg je voor je object change scripts precies
dezelfde werkwijze als met je applicatiecode.
15 Dienst ICT Uitvoering
16. ‘Database Change Scripts Done Right’
Wat database change scripts zo moeilijk maakt:
• Veranderingen komen van twee kanten tegelijk:
1. Data changes (INSERT, UPDATE, DELETE) direct in produktie database
2. Data structure changes (ALTER TABLE etc.) doorlopen staging (dev-
>test->prod) en testing.
Shortcuts leiden tot anti-patterns…
16 Dienst ICT Uitvoering
17. Twee belangrijke regels bij database change scripts
1. Draai het script één keer en niet vaker.
Je kunt maar één keer een kolom aan een tabel toevoegen…
2. Het is onmogelijk om het script te ‘undo-en’
Zodra je een kolom gedropt hebt, is-ie echt voorgoed weg…
17 Dienst ICT Uitvoering
19. • Het IF block test of het script al eens gedraaid is.
• Lijkt leuk, maar leidt tot anti-patterns en uncontrolable change
• B.V. de vorige versie van Sprocket_Name was VARCHAR(50) NULL
en was al goedgekeurd na acceptatietest.
19 Dienst ICT Uitvoering
20. Anti-pattern: Database Syncing
• Er zijn veel ‘database-diff’ tools voorhanden
• Sommigen maken zelfs change scripts aan om databases te syncen
Net als re-executable change scripts veroorzaken deze tools :
• ‘kortsluiting’ in de volgordelijkheid van het change proces
• ongecontroleerde veranderingen.
Grootste bezwaar:
Door gebruik van deze tools wordt het testproces tussen de verschillende fasen
gepasseerd.
20 Dienst ICT Uitvoering
21. Following the Cardinal Rules
1. Ontwikkel change script
2. (Code review)
3. Draai script in test omgeving
4. Draai script in productie omgeving
Bij fout: herstel database en ga naar
stap 1.
21 Dienst ICT Uitvoering
22. ‘Tools of the Trade’
Deze hulpmiddelen kan je gebruiken:
• Change Script Library
• Execution Logs
• Database Versioning
22 Dienst ICT Uitvoering
23. Change Script Library
Al je change scripts zouden in library moeten staan, met deze
aandachtspunten:
• Write–Once
Change scripts veranderen niet gedurende life cycle, net als de
applicatiecode zelf.
• Metadata
Registreer:
• Uniek ID
• Auteur
• Applicatie
• Release nummer
• Geautoriseerde toegang en logging
Alleen geautoriseerde ontwikkelaars mogen change scrips
draaien
23 Dienst ICT Uitvoering
24. Execution Logs
Registratie van welk script wanneer gedraaid is, buiten de database.
Registreer minimaal:
• Uniek ID van script
• Wie het script gedraaid heeft
• Wanneer het script gedraaid is
• Tegen welke database het gedraaid heeft
• Status na het draaien
• Output log van het script
24 Dienst ICT Uitvoering
25. Database Versioning
Registratie van welk script wanneer gedraaid is, binnen de database;
‘metadata’ tabel.
Kan zo simpel zijn als een tabel met twee kolommen:
1. Uniek ID
2. Datum gedraaid
• Voordat je een script draait, eerst deze tabel checken of het al gedraaid
is.
• Na het draaien deze ‘metadata’ tabel bijwerken. Dit valt te automatiseren!
Makkelijk hulpmiddel om een pre-productie database te restoren:
• Backup terug (laten) zetten.
• Alle scripts uit de ‘metadata’ tabel draaien.
25 Dienst ICT Uitvoering
27. ‘Wrapping Things Up’ -> Conclusie
• Databases zijn het middelpunt van je applicatie.
• Applicatiedata overleeft vaak de applicatie zelf.
• Als je bang bent om database veranderingen aan te brengen, of
juist te onvoorzichtig, laat je een ‘legacy’ (erfenis) achter die
niemand na jou wil/kan onderhouden.
27 Dienst ICT Uitvoering