Azure Forum DK Survey

Total Page:16

File Type:pdf, Size:1020Kb

Azure Forum DK Survey #msdkpartner #msdkpartner Meeting Ground Rules Please post your questions in the chat – We aim to keep QnA at the end of each session Please mute yourself to ensure a good audio experience during presentations This meeting will be recorded #msdkpartner Today's Agenda 08:30 - 08:35​ Welcome​ 08:35 - 09:15 Best of Build 09:15 - 10:00​ Top 5 Reasons to chose azure (vs. on-premise) 10:05 - 10:25​ Azure in SMB ​ 10:25 - 10:30​ Closing #msdkpartner #msdkpartner Hello! I’m Sherry List Azure Developer Engagement Lead Microsoft You can find me at @SherrryLst | @msdev_dk DevOps with Azure, GitHub, and Azure DevOps 500M apps and microservices will be written in the next five years Source: IDC Developer Velocity 100x 200x 7x 8x faster to set up a more frequent fewer failures on more likely to have dev environment code deployments deployments integrated security Source: DORA / Sonatype GitHub Actions for Azure https://github.com/azure/actions Azure Pipelines AKS & k8s support YAML CI Pipelines YAML CD Pipelines Elastic self-hosted agents Community and Collaboration In modern applications 90% of the code comes Your Code from open source Open Source Most of that code lives on GitHub Sign up for Codespaces Preview today https://github.co/codespaces Security and Compliance 70 Security and Compliance 12 56 10 42 7 LOC (M) LOC 28 5 Security Issues (k) Issues Security 14 2 Lines of code Security threats 0 0 Apr Jul Oct Jan Apr Jul Oct Jan Apr Jul Oct Jan Apr Jul Oct Jan Apr Jul Oct Jan Apr 2015 2015 2015 2016 2016 2016 2016 2017 2017 2017 2017 2018 2018 2018 2018 2019 2019 2019 2019 2020 2020 Source: 2019 Security Review, GitHub Data Science Team Shift left with security $ Millions $7,600 $960 Remediation $80 $240 Costs SDLC Develop Build Test Deploy Breach Stages Secure your complete software lifecycle with GitHub Dependency Updates Code Scanning Secret Scanning Identify vulnerable Scan your code for Prevent secrets from dependencies, and vulnerabilities, powered leaking into code, update them to secure by CodeQL, and the work including automatic versions automatically of the security research remediation with 20+ community providers Enterprise Foundations GitHub Enterprise Active Directory Support Available Today AAD sign-on and Team Sync, GitHub auth Coming Soon ● Work accounts – AAD as your primary id ● Finer-grained permissions and custom roles ● Service accounts and security groups Fully managed, single-tenant cloud service Bring-your-own-key encryptiont, work accounts, data sovereignty High availability and disaster recovery, durable backups GitHub Private Instances GitHub Premium Plus Support Available in multiple Azure regions Beta in H2 2020 AAD integration & ExpressRoute support Azure Static Web Apps you just want to publish your app!!! Vue Client-side build process $> npm run build What you get out of the other end of that build process $> npm run build Success! $> /build index.html main.min.js main.min.css HTML, CSS, and JavaScript /build index.html main.min.js main.min.css Azure Static Web Apps From <code/> to Building a static web app in minutes • build and host static web apps • authentication and authorization • APIs powered by Azure Functions • CI/CD powered by GitHub Actions Azure Static Web Apps STATIC WEB APPS REPO STATIC CONTENT HTML/JavaScript/CSS app PUSH/PR ACTION API api Azure Functions Azure Static Web Apps Single unified workflow with GitHub Actions Serverless APIs powered by Azure Functions Integrated Auth with flexible roles and access Static Web Apps resources Microsoft Docs aka.ms/swadocs Microsoft Learn Publish Angular, React, Svelte, or Vue aka.ms/swaframeworks Publish Gatsby aka.ms/staticsitegen Microsoft Learn TV http://aka.ms/learntv INT129 Azure Synapse Analytics Azure Synapse Analytics Apache Spark Synapse SQL Synapse Pipelines Synapse Studio for Synapse Azure Synapse Analytics Apache Spark Synapse SQL Synapse Pipelines Synapse Studio for Synapse Query and analyze data with Quickly create notebooks with Build end-to-end workflows Execute all data tasks with a T-SQL using both provisioned your choice of Python, Scala, for your data movement and simple UI and unified and serverless models SparkSQL, and .NET for Spark data processing scenarios workspace environment • Workload Isolation (GA) Public Preview Public Preview Public Preview • COPY Data Loading (GA) • DeltaLake Tables v0.6 • Trusted Service for Azure Storage • CosmosDB with Synapse Link • Updatable Hash Key (GA) • CDM Support and Azure Key Vault (GA) • Managed Virtual Networks • Materialized View Improvement (GA) • .NET for Apache Spark 0.11 • Managed Identity for Mapping • External Table Wizard • Built-in Samples Data Flows (GA) • Increased Notebook Cell Features Public Preview • Template Code Gen for Notebooks • Static IP ranges Azure Integration • SQL Pool Monitoring and Management Runtime (GA) • PREDICT Scoring • Spark Pool Monitoring and Management • Checkpoint and resume for binary • Bulk Load Wizard • Spark Job Graph Debugging file copy (GA) • Serverless Query Perf Enhancements • Statistical Sample Visualization of Data • Pay-per-query consumption model • More Granular Workspace RBAC • Private Endpoint support via • CSV Schema Inference Managed Virtual Networks Private Preview Private Preview • SQL MERGE support, DML Joins • Data Flow CDM Support • Column Encryption • Multi-Column Hash Distribution More Announcements 1. Developer Velocity Assessment tool: Measure your DVI and get recommendations: blog 2. Learn TV: daily live programming and discussions for developers: blog 3. Azure Arc: Azure Arc-enabled Kubernetes Cluster is in public preview: blog 4. Azure Stack: Huge news form Red Hat side of things: ManagedIQ(Cloudforms) is public preview: blog 5. Azure Stack: AKS resource provider is private preview: blog 6. SQL Edge: Azure SQL Edge is now public preview for your AI, IoT scenarios: blog and aka.ms/sqledge 7. Bot framework: adaptive dialog capability GA 8. Cognitive services: Many news, highlighting Personalizer Apprentice mode, Cognitive Servers Containers GA: blog 9. Project Bonsai: Public Preview announced, Machine Teaching and Moab to enable engineers and developers: blog 10.AKS: This was announced earlier, but Windows Server container support is there: blog 11.Visual Studio: Live Share supports chat and sharing of apps, all in VS! blog 12.GitHub actions integration: GH Actions are integrated in VS Code, Azure CLI, Azure Portal: blog 13.GitHub Satellite news recap: In case you missed GitHub announcements: blog 14.Azure Quantum: Limited Private Preview: blog and Microsoft Learn has new modules 15.Also: Microsoft is announcing the fifth most powerful publicly recorded supercomputer for AI: blog The Digital Badger Collection: 100 250 550 800 2k 5K 8K ∞ The Summer Learner aka.ms/azure.heroes #azureHeroes Thank you! See you next time… @msdev_dk Resources • Developing end-to-end analytics solutions with the latest Azure Synapse features • DevOps with Azure, GitHub, and Azure DevOps • Remote development with Visual Studio Codespaces • From idea to contribution in minutes with Codespaces • From code to scale! Build a static web app in minutes • Responsible AI Panel Interview • Create collaborative docs and apps with Microsoft Fluid Framework #msdkpartner Top 5 reasons for using Azure for Service Providers and Cloud Partners Torben Juhl Partner Technology Strategist [email protected] Agenda Scalability Security Compliance Automation Cost reduction Scalability Scalability - example Azure SQL Database Serverless The serverless compute tier for single databases in Azure SQL Database is parameterized by a compute autoscaling range and an autopause delay. The configuration of these parameters shapes the database performance experience and compute cost. Scalability - example Azure Virtual Machine Scale Sets Security https://aka.ms/MyASIS Office 365 https://aka.ms/MCRA Video Recording Strategies Azure Sentinel – Cloud Native SIEM and SOAR (Preview) Securing Privileged Access Dynamics 365 Office 365 Security Rapid Cyberattacks (Wannacrypt/Petya) Data Loss Protection Data Governance eDiscovery SQL Encryption & Data Masking +Monitor Global Secure Compliant Compliance 91 offerings GLOBAL INDUSTRY REGIONAL ▪ ISO 27001:2013 ▪ PCI DSS Level 1 ▪ Argentina PDPA ▪ ISO 27017:2015 ▪ GLBA (US) ▪ Australia IRAP Unclassified ▪ ISO 27018:2014 ▪ FFIEC (US) ▪ Australia IRAP PROTECTED ▪ ISO 22301:2012 ▪ Shared Assessments (US) ▪ Canada Privacy Laws ▪ ISO 9001:2015 ▪ SEC 17a-4 (US) ▪ China GB 18030:2005 ▪ ISO 20000-1:2011 ▪ CFTC 1.31 (US) ▪ China DJCP (MLPS) Level 3 ▪ SOC 1 Type 2 ▪ FINRA 4511 (US) ▪ China TRUCS / CCCPPF ▪ SOC 2 Type 2 ▪ SOX (US) ▪ EU EN 301 549 ▪ SOC 3 ▪ 23 NYCRR 500 (US) ▪ EU ENISA IAF ▪ CIS Benchmark ▪ OSFI (Canada) ▪ EU Model Clauses ▪ CSA STAR Certification ▪ FCA + PRA (UK) ▪ EU – US Privacy Shield ▪ CSA STAR Attestation ▪ APRA (Australia) ▪ GDPR Microsoft Cyber Defense Operations Center ▪ CSA STAR Self-Assessment ▪ FINMA (Switzerland) ▪ Germany C5 Azure ▪ WCAG 2.0 (ISO 40500:2012) ▪ FSA (Denmark) ▪ Germany IT-Grundschutz regions >3,500 full-time security professionals ▪ RBI + IRDAI (India) workbook 60 ▪ MAS + ABS (Singapore) ▪ India MeitY ▪ Japan CS Mark Gold U . S . G O V T ▪ NBB + FSMA (Belgium) 6.5 trillion global signals daily ▪ AFM + DNB (Netherlands) ▪ Japan My Number Act Largest geographical footprint of any cloud ▪ FedRAMP High ▪ AMF + ACPR (France) ▪ Netherlands BIR 2012 ▪ FedRAMP Moderate ▪ KNF (Poland) ▪ New Zealand Gov CIO Framework provider with more than 60 Azure regions $1 billion annual cybersecurity investment ▪ EAR ▪ European
Recommended publications
  • Guide to Secure Software Development in Ruby
    Fedora Security Team Secure Ruby Development Guide Guide to secure software development in Ruby Ján Rusnačko Secure Ruby Development Guide Fedora Security Team Secure Ruby Development Guide Guide to secure software development in Ruby Edition 1 Author Ján Rusnačko [email protected] Copyright © 2014 Ján Rusnačko. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]
  • Usability of the Sip Protocol Within Smart Home Solutions
    4 55 Jakub Hrabovsky - Pavel Segec - Peter Paluch Peter Czimmermann - Stefan Pesko - Jan Cerny Marek Moravcik - Jozef Papan USABILITY OF THE SIP PROTOCOL UNIFORM WORKLOAD DISTRIBUTION WITHIN SMART HOME SOLUTIONS PROBLEMS 13 59 Ivan Cimrak - Katarina Bachrata - Hynek Bachraty Lubos Kucera, Igor Gajdac, Martin Mruzek Iveta Jancigova - Renata Tothova - Martin Busik SIMULATION OF PARAMETERS Martin Slavik - Markus Gusenbauer OBJECT-IN-FLUID FRAMEWORK INFLUENCING THE ELECTRIC VEHICLE IN MODELING OF BLOOD FLOW RANGE IN MICROFLUIDIC CHANNELS 64 21 Peter Pechac - Milan Saga - Ardeshir Guran Jaroslav Janacek - Peter Marton - Matyas Koniorczyk Leszek Radziszewski THE COLUMN GENERATION AND TRAIN IMPLEMENTATION OF MEMETIC CREW SCHEDULING ALGORITHMS INTO STRUCTURAL OPTIMIZATION 28 Martina Blaskova - Rudolf Blasko Stanislaw Borkowski - Joanna Rosak-Szyrocka 70 SEARCHING CORRELATIONS BETWEEN Marek Bruna - Dana Bolibruchova - Petr Prochazka COMMUNICATION AND MOTIVATION NUMERICAL SIMULATION OF MELT FILTRATION PROCESS 36 Michal Varmus - Viliam Lendel - Jakub Soviar Josef Vodak - Milan Kubina 75 SPORTS SPONSORING – PART Radoslav Konar - Marek Patek - Michal Sventek OF CORPORATE STRATEGY NUMERICAL SIMULATION OF RESIDUAL STRESSES AND DISTORTIONS 42 OF T-JOINT WELDING FOR BRIDGE Viliam Lendel - Stefan Hittmar - Wlodzimierz Sroka CONSTRUCTION APPLICATION Eva Siantova IDENTIFICATION OF THE MAIN ASPECTS OF INNOVATION MANAGEMENT 81 AND THE PROBLEMS ARISING Alexander Rengevic – Darina Kumicakova FROM THEIR MISUNDERSTANDING NEW POSSIBILITIES OF ROBOT ARM MOTION SIMULATION
    [Show full text]
  • Microsoft Exam Questions MS-600 Building Applications and Solutions with Microsoft 365 Core Services
    Recommend!! Get the Full MS-600 dumps in VCE and PDF From SurePassExam https://www.surepassexam.com/MS-600-exam-dumps.html (100 New Questions) Microsoft Exam Questions MS-600 Building Applications and Solutions with Microsoft 365 Core Services Passing Certification Exams Made Easy visit - https://www.surepassexam.com Recommend!! Get the Full MS-600 dumps in VCE and PDF From SurePassExam https://www.surepassexam.com/MS-600-exam-dumps.html (100 New Questions) NEW QUESTION 1 - (Exam Topic 1) What are two possible URIs that you can use to configure the content administration user interface? Each correct answer present a complete solution. NOTE: Each correct selection is worth one point. A. Option A B. Option B C. Option C D. Option D Answer: BC NEW QUESTION 2 - (Exam Topic 1) How can you validate that the JSON notification message is sent from the Microsoft Graph service? A. The ClientState must match the value provided when subscribing. B. The user_guid must map to a user ID in the Azure AD tenant of the customer. C. The tenant ID must match the tenant ID of the customer’s Office 365 tenant. D. The subscription ID must match the Azure subscription used by ADatum. Answer: A Explanation: clientState specifies the value of the clientState property sent by the service in each notification. The maximum length is 128 characters. The client can check that the notification came from the service by comparing the value of the clientState property sent with the subscription with the value of the clientState property received with each notification.
    [Show full text]
  • WEB2PY Enterprise Web Framework (2Nd Edition)
    WEB2PY Enterprise Web Framework / 2nd Ed. Massimo Di Pierro Copyright ©2009 by Massimo Di Pierro. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com. Requests to the Copyright owner for permission should be addressed to: Massimo Di Pierro School of Computing DePaul University 243 S Wabash Ave Chicago, IL 60604 (USA) Email: [email protected] Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created ore extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Library of Congress Cataloging-in-Publication Data: WEB2PY: Enterprise Web Framework Printed in the United States of America.
    [Show full text]
  • Numerical Simulation of Shear Driven Wetting
    Numerical Simulation of Shear Driven Wetting Numerische Simulation schergetriebener Benetzung Zur Erlangung des akademischen Grades Doktor-Ingenieur (Dr.-Ing.) eingereichte Dissertation von Daniel Rettenmaier aus Günzburg Tag der Einreichung: 12.11.2018 Tag der mündlichen Prüfung: 16.01.2019 Darmstadt — D 17 1. Gutachten: Prof. Dr. C. Tropea 2. Gutachten: Prof. Dr. D. Bothe Numerical Simulation of Shear Driven Wetting Numerische Simulation schergetriebener Benetzung Genehmigte Dissertation von Daniel Rettenmaier aus Günzburg 1. Gutachten: Prof. Dr. C. Tropea 2. Gutachten: Prof. Dr. D. Bothe Tag der Einreichung: 12.11.2018 Tag der Prüfung: 16.01.2019 Darmstadt — D 17 Bitte zitieren Sie dieses Dokument als: URN: urn:nbn:de:tuda-tuprints-85100 URL: http://tuprints.ulb.tu-darmstadt.de/id/eprint/8510 Dieses Dokument wird bereitgestellt von tuprints, E-Publishing-Service der TU Darmstadt http://tuprints.ulb.tu-darmstadt.de [email protected] Die Veröffentlichung steht unter folgender Creative Commons Lizenz: Namensnennung 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.de Erklärung zur Dissertation Hiermit versichere ich, die vorliegende Dissertation gemäß §22 Abs. 7 APB der TU Darmstadt ohne Hilfe Dritter und nur mit den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die Quellen entnommen wurden, sind als solche kenntlich gemacht worden. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Mir ist bekannt, dass im Falle eines Plagiats (§38 Abs.2 APB) ein Täuschungsversuch vorliegt, der dazu führt, dass die Arbeit mit 5,0 bewertet und damit ein Prüfungsversuch verbraucht wird. Abschlussarbeiten dürfen nur einmal wiederholt werden. Bei der abgegebenen Thesis stimmen die schriftliche und die zur Archivierung eingereichte elektronische Fassung gemäß §23 Abs.
    [Show full text]
  • Original.Pdf
    Rails Security Primer I am not a software security expert CVE? Common Vulnerabilities and Exposures Vulnerability A weakness that an attacker can use to exploit a system Exploit A piece of software that exploits a vulnerability to achieve unintended or unanticipated behavior CVE-2012-5664 SQL Injection Vulnerability SQL Injection Vulnerability …but only exploitable if you used Authlogic or find_by_* methods in a certain way A cookie like { "session_id" => "41414141", "user_credentials" => "Phenoelit", "user_credentials_id" => { :select=> " *,\"Phenoelit\" as persistence_token from users -- " } } …would create a query like this User.find_by_id(params[:user_credendtials_id]) …would create a query like this User.find_by_id(params[:user_credendtials_id]) User.find_by_id({:select =>"*,\"Phenoelit\" as persistence_token from users --"}) …would create a query like this User.find_by_id(params[:user_credendtials_id]) User.find_by_id({:select =>"*,\"Phenoelit\" as persistence_token from users --"}) SELECT *,"Phenoelit" as persistence_token from users -- FROM "users" WHERE "users"."id" IS NULL LIMIT 1 Blood in the water… CVE-2013-0155 CVE-2013-0156 CVE-2013-0269 CVE-2013-0333 CVE-2013-0155 "Unsafe Query Generation Risk in Ruby on Rails" def reset_password if (@user = User.find_by_token(params[:token])) @user.reset_password! render :json => 'Success' else render :json => 'Failure' end end # POST to http://localhost:3000/users/ reset_password with "{\"token\":[null]}" CVE-2013-0156 "Multiple vulnerabilities in parameter parsing in Action Pack" Content-Type:
    [Show full text]
  • 05192020 Build M365 Rajesh Jha
    05192020 Build M365 Rajesh Jha Build 2020 Microsoft 365 Rajesh Jha Monday, May 19, 2020 [Music.] (Video segment.) RAJESH JHA (EVP, Experiences & Devices): Hello, everyone. Thank you for being a part of Build 2020. It is such a pleasure to connect with you all virtually today. The fact that this conference can happen right now when we are all working and living apart is really remarkable. We are truly living in an era of remote everything, and it's clear that this is an inflection point for productivity. Microsoft 365 is the world's productivity cloud, and we aspire to make it the best platform for developers to build productivity solutions for work, life and learning. But we can't do it alone, we need you, and today, you're going to see how we can partner together to create the future of productivity. Our session today is for every developer, from ISVs building their own apps, to corporate developers creating custom solutions, to citizen developers using Teams and Power Platform. As an integrated security and productivity solution, Microsoft 365 is a one-stop shop for everything that people need right now, from remote work to telemedicine to learning. But it's not just a set of finished apps and services. It's also a rich developer platform. This stack diagram summarizes the key components. Our foundation is built on the Microsoft Graph. The Microsoft Graph is the container for all rich data and signals that describe how people and teams work together in an organization to get things done.
    [Show full text]
  • Web Development Frameworks Ruby on Rails VS Google Web Toolkit
    Bachelor thesis Web Development Frameworks Ruby on Rails VS Google Web Toolkit Author: Carlos Gallardo Adrián Extremera Supervisor: Welf Löwe Semester: Spring 2011 Course code: 2DV00E SE-391 82 Kalmar / SE-351 95 Växjö Tel +46 (0)772-28 80 00 [email protected] Lnu.se/dfm Abstract Web programming is getting more and more important every day and as a consequence, many new tools are created in order to help developers design and construct applications quicker, easier and better structured. Apart from different IDEs and Technologies, nowadays Web Frameworks are gaining popularity amongst users since they offer a large range of methods, classes, etc. that allow programmers to create and maintain solid Web systems. This research focuses on two different Web Frameworks: Ruby on Rails and Google Web Toolkit and within this document we will examine some of the most important differences between them during a Web development. Keywords web frameworks, Ruby, Rails, Model-View-Controller, web programming, Java, Google Web Toolkit, web development, code lines i List of Figures Figure 2.1. mraible - History of Web Frameworks....................................................4 Figure 2.2. Java BluePrints - MVC Pattern..............................................................6 Figure 2.3. Libros Web - MVC Architecture.............................................................7 Figure 2.4. Ruby on Rails - Logo.............................................................................8 Figure 2.5. Windaroo Consulting Inc - Ruby on Rails Structure.............................10
    [Show full text]
  • Andrew W. Mellon Foundation RIT/SC Retreat 2007
    2007 Melllon Foundation RIT/SC Retreat Agenda Thursday 29 March • 8-9am Breakfast • 9-10:30a Project Updates (15 min ea.) – Fedora, OKI, VUE, KFS, Kuali Rice, ORE • 10:30-10:45a Break • 10:45a-12:15pProject Updates (30 min ea.) – Zotero, Didily, SIMILE • 12:15-1:15p Lunch • 1:15-1:45p Presentations/Discussion (30 min ea.) – Sophie • 1:45-3:15p Presentations/Discussion (45 min ea.) – Kuali Student, FLUID • 3:15-3:30p Break • 3:30-4:15p Presentations - SEASR • 4:15-4:30p ARTstor • 4:30-5:15p Discussion – "Scholarly Cyberinfrastructure for the Arts and Humanities" • 6-8p Cocktail Reception • Dinner on your own in Princeton Friday 30 March • 8-9am Breakfast • 9-9:15a Presentation – CSU Digital Marketplace • 9:15-9:45a Presentation – OKI Workshop • 9:45-10:30a Presentation - ESB Project • 10:30-10:45a Break • 10:45a-12p Discussion – ”Protecting Precarious Values in Distributed, Collaborative Software Development" • 12-1p Lunch • 1-2:30p Open Discussion, Q&A • 2:30-2:45p Break • 2:45-3p Feedback and Final Remarks • 3p Adjourn From rit.mellon.org/projects 11 March 2008 OKI Workshop Agenda 27 March 2007 9:00 Welcome and Introductions - Steve Lucas 9:15 Meeting Objectives and Agenda - Ed Walker and Jeff Kahn I. Review Study Findings and Recommendations Break approx. at 10:15 10:30 Roundtable discussion led by moderator Digital Marketplace Overview - Gerry Hanley II. Kuali Student Overview - Jens Haeusser NSNext Steps: GlRldCGoals, Roles and Concerns 11:15 Follow up actions; Objectives for Breakout Sessions - facilitated by Ed Walker Working lunch (buffet Lunch provided) 12:30 Breakout to frame Use Cases, Requirements and Action Plans III.
    [Show full text]
  • More Than Writing Text: Multiplicity in Collaborative Academic Writing
    More Than Writing Text: Multiplicity in Collaborative Academic Writing Ida Larsen-Ledet Ph.D. Thesis Department of Computer Science Aarhus University Denmark More Than Writing Text: Multiplicity in Collaborative Academic Writing A Thesis Presented to the Faculty of Natural Sciences of Aarhus University in Partial Fulfillment of the Requirements for the Ph.D. Degree. by Ida Larsen-Ledet November 2, 2020 Abstract This thesis explores collaborative academic writing with a focus on how it is medi- ated by multiple technologies. The thesis presents findings from two empirical stud- ies with university students and researchers: The first combined semi-structured interviews with visualizations of document editing activity to explore transitions through co-writers’ artifact ecologies along with co-writers’ motivations for per- forming these transitions. The second study was a three-stage co-design workshop series that progressed from dialog through ideation to exploration of a prototype for a shared editor that was based on the participants’ proposed features and designs. The contribution from the second study to this thesis is the analysis of participants’ viewpoints and ideas. The analyses of these findings contribute a characterization of co-writers’ practical and social motivations for using multiple tools in their collaborations, and the chal- lenges this poses for sharing and adressing the work. Multiplicity is also addressed in terms of co-writers bringing multiple and diverse needs and preferences into the writing, and how these may be approached in efforts to design and improve support for collaborative writing. Additionally, the notion of text function is introduced to describe the text’s role as a mediator of the writing.
    [Show full text]
  • FULLTEXT01.Pdf
    UPTEC F 18029 Examensarbete 30 hp Juni 2018 Investigation and Implementation of a Log Management and Analysis Framework for the Treatment Planning System RayStation Elias Norrby Abstract Investigation and Implementation of a Log Management and Analysis Framework for the Treatment Planning System RayStation Elias Norrby Teknisk- naturvetenskaplig fakultet UTH-enheten The purpose of this thesis is to investigate and implement a framework for log management and analysis tailored to the treatment planning system (TPS) Besöksadress: RayStation. A TPS is a highly advanced software package used in radiation Ångströmlaboratoriet Lägerhyddsvägen 1 oncology clinics, and the complexity of the software makes writing robust code Hus 4, Plan 0 challenging. Although the product is tested rigorously during development, bugs are present in released software. The purpose of the the framework is to allow the Postadress: RayStation development team insight into errors encountered in clinics by Box 536 751 21 Uppsala centralizing log file data recorded at clinics around the world. Telefon: A framework based on the Elastic stack, a suite of open-source products, is 018 – 471 30 03 proposed, addressing a set of known issues described as the access problem, the Telefax: processing problem, and the analysis problem. Firstly, log files are stored locally on 018 – 471 30 00 each machine running RayStation, some of which may not be connected to the Internet. Gaining access to the data is further complicated by legal frameworks Hemsida: such as HIPAA and GDPR that put constraints on how clinic data can be handled. http://www.teknat.uu.se/student The framework allows for access to the files while respecting these constraints.
    [Show full text]
  • Fiz: a Component Framework for Web Applications
    Fiz: A Component Framework for Web Applications John K. Ousterhout Department of Computer Science Stanford University Abstract Fiz is a framework for developing interactive Web applications. Its overall goal is to raise the level of programming for Web applications, first by providing a set of high-level reusable components that simplify the task of creating interactive Web applications, and second by providing a framework that encourages other people to create addi- tional components. Components in Fiz cover both the front-end of Web applications (managing a browser-based user interface) and the back end (managing the application's data). Fiz makes it possible to create components that encapsulate complex behaviors such as Ajax-based updates, hiding many of the Web's complexities from applica- tion developers. Because of its focus on components, Fiz does not use mechanisms such as templates and model- view-controller in the same way as other frameworks. ger and more useful structures. We will release Fiz in 1 Introduction open-source form and hope to build a user community Although the World-Wide Web was initially conceived that creates an ever-increasing set of interesting com- as a vehicle for delivering and viewing documents, its ponents, which will make it dramatically easier to cre- focus has gradually shifted from documents to applica- ate applications that advance the state-of-the-art in Web tions. Facilities such as Javascript, the Document Ob- interactivity. ject Model (DOM), and Ajax have made it possible to offer sophisticated interactive applications over the The rest of this paper is organized as follows.
    [Show full text]