TIER ROADMAP UPDATE WORKING TOGETHER TO DEVELOP THE PATH
|
|
- Barry Melvyn Cain
- 5 years ago
- Views:
Transcription
1 TIER ROADMAP UPDATE WORKING TOGETHER TO DEVELOP THE PATH Ann West (Internet2) Steve Zoppi (Internet2) James Jokl (University of Virginia) Warren Curry (University of Florida)
2 Topics for Today TIER Overview TIER Development Update Focus on Packaging API and Registry Components TIER Mid-Program Survey Closing Comments 25 April 2017
3 What is TIER all about? Sustain components that we've developed together. Fill the gaps by providing a set of integrated components that addresses IAM as a whole. Address community requirements across the components. Developing, maintaining community and corporate partnerships
4
5 COmanage Grouper Shibboleth Grouper
6 Trust and Identity / TIER Development Update GLOBAL SUMMIT / APRIL 25TH 2017
7 TIER Development Update Component Packaging API and Data Structures Extensibility Security 25 April
8 TIER Development Update Component Packaging Not Beta just Not Rigorously Tested Shift of Community Bias (Docker and/or VM) Instrumentation of Beacon 25 April
9 TIER Development Update API and Data Structures APIs Entity Registry MidPoint Versus COmanage Registry 25 April
10 TIER Development Update Extensibility CAR [Consent Services] (NSTIC, Duke, Internet2) Packaged as an optional component Demonstrates Community Contribution 25 April
11 TIER Development Update Security Leveraging the community Skills and Resources Expensive and Skilled Resources Required 25 April
12 TIER Component Packaging for Ease of Installation and Operation JAMES JOKL
13 TIER Packaging Mission Make TIER products Simple to deploy Easy to operate Easy to maintain Deliver solution TIER staff will support implementation and longterm maintenance of packaged components Goals Identify and work with common subcomponents Solve current issues Example: Shibboleth ease of use with InCommon Simplify, streamline Administrative tools, scripts, GUIs, Out-of-the-box configuration Be prepared for the future [ 13 ]
14 Packaging Process: Two Parallel Work Streams Discover enhancement opportunities Survey to identify Pain points and needs Computing environment: current & future Results ~80 questions Responses from ~60 institutions Analyze and build technical solutions Preconfigure / enhancement of existing installers Virtual machines Containers [ 14 ]
15 TIER Packaging Highlighted Survey Results Packaging Preferences [ 15 ]
16 TIER Packaging Highlighted Survey Results Campus use of Docker containers [ 16 ]
17 Packaging Goals for Current TIER Release Complete packaging build automation process Packaged containers match current component versions Transition build process to TIER staff Enhance component setup automation Add packaging instrumentation [ 17 ]
18 Packaging Instrumentation Goals Track TIER adoption Help us follow trends Data Collected Component Version IP address JSON Beacon You can opt-out [ 18 ]
19 Future Pipeline: Shibboleth Configuration Initial Configuration CANARIE installer Operational Configuration Manage most day-to-day configuration via a GUI Entity attribute based configuration Code will become part of Shibboleth 3.4 Configuration distribution [ 19 ]
20 Future Packaging Pipeline TIER Docker VM container configuration options Internal configuration Mounted configuration TIER Stand-alone Docker containers Other Virtual Machine environments Transition documentation [ 20 ]
21 Current Release: Packaging Status Release components are ready for Testing Production use Documentation and Download D You can help by testing and deploying [ 21 ]
22 TIER Packaging Highlighted Survey Results Shibboleth Configuration [ 22 ]
23 Packaging Summary A lot has been accomplished Dedicated set of volunteers Excellent work by TIER staff and commercial partner Weekly calls If you have interest in this space, please join us Timing and needs are hard to predict from simple survey results Timing for native Docker support Virtual machine environments targeted at non- Docker campuses Deployment / integration documentation Testing and deployment Remains difficult to find the number of testers / deployers that we need [ 23 ]
24 TIER Registry, Data Structures and Connective APIs WARREN CURRY WITH AN ASSIST FROM KEITH HAZELTON IN ABSENTIA
25 The TIER Registry and the TIER Data Structures and APIs Working Groups are working hard and attempting to prepare for a transformative future in IAM Edison s electric light did not come about from the continuous improvement of the candle -Oren Harari If I had asked people what they wanted, they d have told me a faster horse! -Henry Ford [ 25 ]
26 TIER Architecture [ 26 ]
27 The Business View [ 27 ]
28 Identity Repository Person Repository Data Classes to compose a USER Entity Registry - person and non-person objects that require access management functionality and interface to that functionality. As it turns out a certain very few attributes are minimally needed. Entity Groups and Privileges Grouper Implementation Guide defining groups of securable entities from the systems of record Basis Groups, transformational abstractions into Reference Group forms then relating these to form Application related permission ODS, master data, person hub - a unified person or entity data concept an institution elects to manage independent of IAM. Workgroup thinking evolved to a THIN REGISTRY [ 28 ]
29 Identity Repository Client (Thing that calls an API Service) Client registration Client permission to use API Client has unique identifier Client authenticates Client authorizations Client to Service relationship Use case client w/o person. Use Client Registry Use Groups [ 29 ]
30 The Foundations of TIER Infrastructure RESTful APIs are the primary interfaces between TIER IAM Components and between TIER Components and External Systems Messaging may be used as a valid alternative to restful API. TIER-defined Resources are shared and manipulated by either of these approaches. The API/Messaging first approach is a key element supporting campus autonomy If you want to keep your identity registry, just expose its functionality as implementations of TIER APIs, it will then plug and play with other TIER components Supports selective adoption of TIER components and hybrid infrastructure models [ 30 ]
31 Grouper Deployment Guide What if instead of every institution having its own special sauce there was broad agreement on access management strategies, vocabulary, and assumed capabilities? What if, we could drive federation deeper into institutional identity and access management (IAM) practices and more easily enable highvalue collaboration Why - The goal of this document is to help you come up to speed on Grouper concepts, how they relate to identity and access management, and how they can be deployed to implement effective access control in a wide variety of situations. Who - This guide is targeted at both technical staff and managers responsible for identity and access management who are seeking detailed deployment and operational information on a TIER compatible Grouper deployment. Standard TIER Group Structure etc: Grouper configuration, administrative access control groups, loader jobs basis: groups used exclusively by the IAM team to build reference groups ref: reference groups institutional meaningful cohorts truth with natural language bundle: sets of reference groups used in policy for many services app: enterprise applications access control policy specific policy for a service org: delegated authority, ad-hoc groups, org owned apps or reference groups test: test folder for system verification [ 31 ]
32 TIER Provisioning and Deprovisioning An Example Authorization Flow reflects the TIER Grouper Structures The workgroup provisioning demo at the booth leverages components together employing TIER concepts! Data Repository Grouper in TIER standard Shibboleth Authentication and Auth Based on a provisioned LDAP Provisioning to: A web app Canvas LMS Evolve this demo to a more widely available resource demo workbench. [ 32 ]
33 Closing Comments
34 In Particular, Thanks to... Arizona State University * Boston University * Carnegie Mellon University * Case Western Reserve University * Duke University * Harvard University * Indiana University * Lafayette College * Louisiana State University * New York University * Northwestern University * The Ohio State University * Old Dominion University * Oregon State University * Purdue University - Main Campus * Rice University * University of Arizona * University of California - Berkeley * University of California - Merced * University of Chicago * University of Florida * University of Hawaii - Manoa * University of Illinois - Urbana-Champaign * University of Maryland - Baltimore County * University of Maryland - College Park * University of Miami * University of Michigan - Ann Arbor * University of Missouri - Columbia * University of Nebraska - Lincoln * University of North Carolina - Chapel Hill * University of Notre Dame * University of Virginia * University of Wisconsin - Madison * Washington University - Saint Louis
35 Results: Software and Deliverables Component/ Service in Prod Prior to 2015 Today Deliverables/ Components Number of References Shibboleth InCommon Federation Grouper 9 21 COmanage 2 2 Packaging Questions 12 Registry Requests 16 API Work Very Promising 9 API Questions 2 Provisioning Requests 9 Sustaining Key Software is good 7
36 TIER Development Community Workshop use cases/ requirements Community Developed Specifications Process Open source Iterative dev, test, review Assumes collaboration & tight integration with campus teams Campus Functional Review &Testing Internet2 Automated Testing Internet2 Contracted Software Development
37 Putting it All Together TIER Program needs to look forward, but must fit into diverse environments today Desire for commercial grade services and documentation TIER progressing on stable integrated platform API and Registry Components to be delivered in fall Provide feedback to your colleagues on the working groups to speed the delivery of functionality
38 TIER Homework Achieving Tier Goals Requires the Community to Help Itself Operations Environment TIER Development Cycle Reviewing TIER and Providing Feedback Starting Discussions on Campus 38
39 Thank You! Warren Curry - whcurry@ufl.edu Jim Jokl jaj@virginia.edu Ann West awest@internet2.edu Steve Zoppi szoppi@internet2.edu 39
What s New and What s Next
Trust and Identity in Education and Research (TIER) What s New and What s Next Jim Jokl Keith Hazelton Bill Thompson Tom Jordan Kevin Morooney Ann West Steve Zoppi (University of Virginia), Chair/TIER
More informationTrust and Identity Services an introduction
KEVIN MOROONEY Vice President, Trust and Identity Services OCTOBER, 2016 PACIFIC NORTHWEST GIGAPOP (PNWGP) Trust and Identity Services an introduction ADVISORY COUNCIL MEETING Background Me trust and identity
More informationManufactured Home Production by Product Mix ( )
Manufactured Home Production by Product Mix (1990-2016) Data Source: Institute for Building Technology and Safety (IBTS) States with less than three active manufacturers are indicated with asterisks (*).
More informationHow Can Testing Teams Play a Key Role in DevOps Adoption?
June 3, 2016 How Can Testing Teams Play a Key Role in DevOps Adoption? Sujay Honnamane QA Director @sujayh Rameshkumar Bar Sr. Automation Architect @rameshbar 2016 Cognizant Session take away DevOps Overview
More informationQuestion by: Scott Primeau. Date: 20 December User Accounts 2010 Dec 20. Is an account unique to a business record or to a filer?
Topic: User Accounts Question by: Scott Primeau : Colorado Date: 20 December 2010 Manitoba create user to create user, etc.) Corporations Canada Alabama Alaska Arizona Arkansas California Colorado Connecticut
More informationCINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF # ) April 26, 2017
CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF #1650445) April 26, 2017 1 CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP)
More informationInternet2 NLR Cisco TelePresence Cooperation: What s it mean (to me)?
Internet2 NLR Cisco TelePresence Cooperation: What s it mean (to me)? Brent Sweeny, Indiana University, GRNOC, and NLR engineering Ben Fineman, Internet2 Main Points What is Cisco TelePresence anyway?
More informationBuilding a National Address Database. Presented by Steve Lewis, Department of Transportation Mark Lange, Census Bureau July 13, 2017
Building a National Address Database Presented by Steve Lewis, Department of Transportation Mark Lange, Census Bureau July 13, 2017 Topics Building the NAD FGDC Address Theme 2 Building the NAD 3 First
More informationIAM Project Overview & Milestones
IAM Project Overview & Milestones TABLE OF CONTENTS IAM PROJECT SUCCESS FACTORS 3 PROJECT SCOPE 3 IN SCOPE 3 OUT OF SCOPE 4 IAM NOW VS. FUTURE 5 IAM NOW 5 IAM IN THE FUTURE 7 IAM PROJECT END STATE 8 ACCESS
More informationC.A.S.E. Community Partner Application
C.A.S.E. Community Partner Application This application is to be completed by community organizations and agencies who wish to partner with the Civic and Service Education (C.A.S.E.) Program here at North
More informationManaging Transportation Research with Databases and Spreadsheets: Survey of State Approaches and Capabilities
Managing Transportation Research with Databases and Spreadsheets: Survey of State Approaches and Capabilities Pat Casey AASHTO Research Advisory Committee meeting Baton Rouge, Louisiana July 18, 2013 Survey
More informationChart 2: e-waste Processed by SRD Program in Unregulated States
e Samsung is a strong supporter of producer responsibility. Samsung is committed to stepping ahead and performing strongly in accordance with our principles. Samsung principles include protection of people,
More informationOpen mustard seed. Patrick Deegan, Ph.D. ID3
Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal
More informationDocker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications
Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,
More informationReporting Child Abuse Numbers by State
Youth-Inspired Solutions to End Abuse Reporting Child Abuse Numbers by State Information Courtesy of Child Welfare Information Gateway Each State designates specific agencies to receive and investigate
More informationGrouper Working Group
Grouper Working Group Agenda Internet2 IPR, agenda bash" Grouper v2.0 in brief" Whoʼs using Grouper? Survey take aways" Focus on v2.x: current plans & discussion" Grouper & OSIdM4HE" Your items " 2" October
More informationHATHITRUST. A Shared Digital Repository. Your Library, Now Online! Putting HathiTrust in the Context of Traditional (and New) Library Services
HATHITRUST A Shared Digital Repository Your Library, Now Online! Putting HathiTrust in the Context of Traditional (and New) Library Services MCLS Webinar February 6, 2012 Jeremy York, Project Librarian,
More informationWINDSTREAM CARRIER ETHERNET: E-NNI Guide & ICB Processes
WINDSTREAM CARRIER ETHERNET: E-NNI Guide & ICB Processes Version.0, April 2017 Overview The Carrier Ethernet (E-Access) product leverages Windstream s MPLS and Ethernet infrastructure to provide switched
More informationTom Barton, Keith Hazelton, Bill Yock. Strategies for Accelerating Identity and Access Management (IAM) in Higher Education
Tom Barton, Keith Hazelton, Bill Yock Strategies for Accelerating Identity and Access Management (IAM) in Higher Education Three Speeches for the Price of One! Tom Barton Global Access Services for R&E
More informationUS STATE CONNECTIVITY
US STATE CONNECTIVITY P3 REPORT FOR CELLULAR NETWORK COVERAGE IN INDIVIDUAL US STATES DIFFERENT GRADES OF COVERAGE When your mobile phone indicates it has an active signal, it is connected with the most
More informationBUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back
BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE These Common Misconceptions Could Be Holding You Back 2 IT Is Facing a New Set of Challenges As technology continues to evolve, IT must adjust to changing
More informationBulk Resident Agent Change Filings. Question by: Stephanie Mickelsen. Jurisdiction. Date: 20 July Question(s)
Topic: Bulk Resident Agent Change Filings Question by: Stephanie Mickelsen Jurisdiction: Kansas Date: 20 July 2010 Question(s) Jurisdiction Do you file bulk changes? How does your state file and image
More informationTUESDAY 24 APR 2012 GENERAL UPDATE JERRY GROCHOW, VICE PRESIDENT (INTERIM) SHEL WAGGENER, SENIOR VICE PRESIDENT (AFTER THE INTERIM)
TUESDAY 24 APR 2012 GENERAL UPDATE JERRY GROCHOW, VICE PRESIDENT (INTERIM) SHEL WAGGENER, SENIOR VICE PRESIDENT (AFTER THE INTERIM) Why Internet2 NET+ Services? Define a new generation of -developed and
More informationHitachi Enterprise Cloud Container Platform
Hitachi Enterprise Cloud Container Platform Accelerate Enterprise Cloud-Native Development Initiatives SOLUTION PROFILE Cloud-native application development is synonymous with the modern scalable, real-time
More informationArizona does not currently have this ability, nor is it part of the new system in development.
Topic: Question by: : E-Notification Cheri L. Myers North Carolina Date: June 13, 2012 Manitoba Corporations Canada Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware District of
More informationProvisioning and Integration: New Models and Practices
Provisioning and Integration: New Models and Practices IAM Online June 12, 2013 Speakers: Rob Carter, Duke University Jimmy Vuccolo, Penn State Jeremy Grieshop, Clemson University Moderator: Keith Hazelton,
More informationOnline Certification/Authentication of Documents re: Business Entities. Date: 05 April 2011
Topic: Question by: : Online Certification/Authentication of Documents re: Business Entities Robert Lindsey Virginia Date: 05 April 2011 Manitoba Corporations Canada Alabama Alaska Arizona Arkansas California
More informationTerry McAuliffe-VA. Scott Walker-WI
Terry McAuliffe-VA Scott Walker-WI Cost Before Performance Contracting Model Energy Services Companies Savings Positive Cash Flow $ ESCO Project Payment Cost After 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
More informationThe Promise of Brown v. Board Not Yet Realized The Economic Necessity to Deliver on the Promise
Building on its previous work examining education and the economy, the Alliance for Excellent Education (the Alliance), with generous support from Farm, analyzed state-level economic data to determine
More informationWhat's Next for Clean Water Act Jurisdiction
Association of State Wetland Managers Hot Topics Webinar Series What's Next for Clean Water Act Jurisdiction July 11, 2017 12:00 pm 1:30 pm Eastern Webinar Presenters: Roy Gardner, Stetson University,
More informationJ.D. Power and Associates Reports: Overall Wireless Network Problem Rates Differ Considerably Based on Type of Usage Activity
Reports: Overall Wireless Network Problem Rates Differ Considerably Based on Type of Usage Activity Ranks Highest in Wireless Network Quality Performance in Five Regions WESTLAKE VILLAGE, Calif.: 25 August
More informationAlaska no no all drivers primary. Arizona no no no not applicable. primary: texting by all drivers but younger than
Distracted driving Concern is mounting about the effects of phone use and texting while driving. Cellphones and texting January 2016 Talking on a hand held cellphone while driving is banned in 14 states
More informationKutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in
Kutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in 2011-12 Alumni Responders Response Rate Kutztown 1,802 250 14% Notes: Alumni who had no
More informationTest Automation Strategies in Continuous Delivery. Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions
Test Automation Strategies in Continuous Delivery Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions The world of application is going through a monumental shift.. Evolving
More informationSOCIAL IDENTITIES IN HIGHER ED: WHY AND HOW WITH REAL-WORLD EXAMPLES
SOCIAL IDENTITIES IN HIGHER ED: WHY AND HOW WITH REAL-WORLD EXAMPLES Todd Haddaway, University of Maryland, Baltimore County Jacob Farmer, Indiana University Dedra Chamberlin, Cirrus Identity 2015 Internet2
More informationOklahoma Economic Outlook 2016
Oklahoma Economic Outlook 216 by Dan Rickman Regents Professor of Economics and Oklahoma Gas and Electric Services Chair in Regional Economic Analysis http://economy.okstate.edu/ U.S. Real Gross Domestic
More informationOur broad and deep array of solutions enables you to use the cloud in your own way, at your own pace.
Agenda Agenda The New Office overview Rethink productivity possibilities Demo Why Microsoft for productivity Break The New Office architecture Identity management Authentication options Hybrid scenarios
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationIs your standard BASED on the IACA standard, or is it a complete departure from the. If you did consider. using the IACA
Topic: XML Standards Question By: Sherri De Marco Jurisdiction: Michigan Date: 2 February 2012 Jurisdiction Question 1 Question 2 Has y If so, did jurisdiction you adopt adopted any the XML standard standard
More informationOpen Apereo Grouper in Action Access Management Strategies for Higher Education and Research. 100% Open for Education
Open Apereo 2016 100% Open for Education Grouper in Action Access Management Strategies for Higher Education and Research Chris Hyzer, University of Pennsylvania Bill Thompson, Lafayette College Jeff Pasch,
More informationMICROSOFT AND SAUCE LABS FOR MODERN SOFTWARE DELIVERY
SOLUTIONS BRIEF MICROSOFT AND SAUCE LABS FOR MODERN SOFTWARE DELIVERY AUTOMATE TESTING WITH VISUAL STUDIO TEAM SERVICES (VSTS) AND TEAM FOUNDATION SERVER (TFS) The key to efficient software delivery is
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationCurriculum Guide. ThingWorx
Curriculum Guide ThingWorx Live Classroom Curriculum Guide Introduction to ThingWorx 8 ThingWorx 8 User Interface Development ThingWorx 8 Platform Administration ThingWorx 7.3 Fundamentals Applying Machine
More informationHow Employers Use E-Response Date: April 26th, 2016 Version: 6.51
NOTICE: SIDES E-Response is managed by the state from whom the request is received. If you want to sign up for SIDES E-Response, are having issues logging in to E-Response, or have questions about how
More informationBrown University Libraries Technology Plan
Brown University Libraries Technology Plan 2009-2011 Technology Vision Brown University Library creates, develops, promotes, and uses technology to further the Library s mission and strategic directions
More informationTed C. Jones, PhD Chief Economist
Ted C. Jones, PhD Chief Economist Hurricanes U.S. Jobs Jobs (Millions) Seasonally Adjusted 150 145 140 135 130 1.41% Prior 12 Months 2.05 Million Net New Jobs in Past 12-Months 125 '07 '08 '09 '10 '11
More informationACCELERATE APPLICATION DELIVERY WITH OPENSHIFT. Siamak Sadeghianfar Sr Technical Marketing Manager, April 2016
ACCELERATE APPLICATION DELIVERY WITH Siamak Sadeghianfar Sr Technical Marketing Manager, OpenShift @siamaks April 2016 IT Must Evolve to Stay Ahead of Demands WA CPU R RAM isc tar SI Jar vm dk MSI nic
More informationTRANSFORMING TO IT-AS-A- SERVICE
TRANSFORMING TO IT-AS-A- SERVICE Leveraging IT To Accelerate Business Agility Paul O Doherty Cloud Solution Manager ONX Enterprise Solutions 1 Enterprise IT Provides Control & Reliability Enterprise IT
More informationInternet2 Overview, Services and Activities. Fall 2007 Council Briefings October 7, 2007
Internet2 Overview, Services and Activities Fall 2007 Council Briefings October 7, 2007 Agenda Building Community - Marianne Smith International Partnerships Heather Boyles Middleware and Security - Renee
More informationDocker CaaS. Sandor Klein VP EMEA
Docker CaaS Sandor Klein VP EMEA The Docker mission Build Ship Run Distributed Applica ons Anywhere Docker Driving the Containerization Movement Build, Ship, Run Distributed Applications Anywhere Docker
More informationFeduShare Update. AuthNZ the SAML way for VOs
FeduShare Update AuthNZ the SAML way for VOs FeduShare Goals: Provide transparent sharing of campus resources in support of (multiinstitutional) collaboration Support both HTTP and non-web access using
More informationOneUConn IT Service Delivery Vision
OneUConn IT Service Delivery Vision The University s Academic Vision establishes a foundation and high expectations for excellence in research, teaching, learning, and outreach for all of UConn s campuses.
More informationOpenShift Roadmap Enterprise Kubernetes for Developers. Clayton Coleman, Architect, OpenShift
OpenShift Roadmap Enterprise Kubernetes for Developers Clayton Coleman, Architect, OpenShift What Is OpenShift? Application-centric Platform INFRASTRUCTURE APPLICATIONS Use containers for efficiency Hide
More informationUser Experience Task Force
Section 7.3 Cost Estimating Methodology Directive By March 1, 2014, a complete recommendation must be submitted to the Governor, Chief Financial Officer, President of the Senate, and the Speaker of the
More informationKaryn Higa-Smith, Research Program Manager
Personal Identity Verification- Interoperability/ First Responder Authentication Credential (PIV-I/FRAC) I/FRAC) Technology Transition Work Group (TTWG) Karyn Higa-Smith, Research Program Manager Identity
More informationCloud Transformation and Significance of Security
Cloud Transformation and Significance of Security Mohit Sharma, Chief Architect & Cloud Evangelist @onlinesince2009 www.cloudsec.com Datacenter Management Change Management Policy Physical Network Management
More informationSummary of the State Elder Abuse. Questionnaire for Alaska
Summary of the State Elder Abuse Questionnaire for Alaska A Final Report to: Department of Administration Adult Protective Services February 2002 Prepared by Researchers at The University of Iowa Department
More informationSOFTWARE DEMONSTRATION
SOFTWARE DEMONSTRATION IDENTITY AND ACCESS MANAGEMENT SOFTWARE AND SERVICES RFP 644456 DEMONSTRATION AGENDA Executive Summary Technical Overview Break User Interfaces and Experience Multi-Campus and Inter-Campus
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationPresented by Max Fritz Senior Systems Consultant, Now Micro. Office 365 for Education What to Use When
Presented by Max Fritz Senior Systems Consultant, Now Micro Office 365 for Education What to Use When Max Fritz Senior Systems Consultant MCSA Office 365, MCSE Productivity Founder of Minnesota Office
More informationI D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management
I D C T E C H N O L O G Y S P O T L I G H T Orchestration S i m p l i f i es and Streamlines V i r t u a l and Cloud D a t a Center Management January 2013 Adapted from Systems Management Software Purchasing
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationGo Faster: Containers, Platforms and the Path to Better Software Development (Including Live Demo)
RED HAT DAYS VANCOUVER Go Faster: Containers, Platforms and the Path to Better Software Development (Including Live Demo) Paul Armstrong Principal Solutions Architect Gerald Nunn Senior Middleware Solutions
More informationTHE HYBRID CLOUD. Private and Public Clouds Better Together
THE HYBRID CLOUD Private and Public Clouds Better Together Bruno Terkaly Principal Software Engineer Cloud Architect Open Source/Linux Global ISV at Microsoft A MULTI-CLOUD WORLD A growing trend in the
More informationOklahoma Economic Outlook 2015
Oklahoma Economic Outlook 2015 by Dan Rickman Regents Professor of Economics and Oklahoma Gas and Electric Services Chair in Regional Economic Analysis http://economy.okstate.edu/ October 2013-2014 Nonfarm
More informationFDA's Collaborative Efforts to Promote ISO/IEC 17025:2005 Accreditation for the Nation's Food/Feed Testing Laboratories
FDA's Collaborative Efforts to Promote ISO/IEC 17025:2005 Accreditation for the Nation's Food/Feed Testing Laboratories Ruiqing Pamboukian, Ph.D. Angele Smith Office of Regulatory Affairs/Office of Regulatory
More informationThe Challenges of User Consent
IAM Online The Challenges of User Consent Wednesday, May 11, 2011 3 p.m. ET Tom Barton, University of Chicago Steve Carmody, Brown University Russell Beall, University of Southern California Tom Scavo,
More informationIdentity and Access Management PIN App Owner Town Hall Meeting. March 31, 2015 Tuesday 3:00 4:30 p.m. Taubman, T-520 (HKS)
Identity and Access Management PIN App Owner Town Hall Meeting March 31, 2015 Tuesday 3:00 4:30 p.m. Taubman, T-520 (HKS) Agenda Meeting Purpose and Intended Outcomes Rollout of HarvardKey Explanation
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationThe Now Platform Reference Guide
The Now Platform Reference Guide A tour of key features and functionality START Introducing the Now Platform Digitize your business with intelligent apps The Now Platform is an application Platform-as-a-Service
More informationHow to Keep UP Through Digital Transformation with Next-Generation App Development
How to Keep UP Through Digital Transformation with Next-Generation App Development Peter Sjoberg Jon Olby A Look Back, A Look Forward Dedicated, data structure dependent, inefficient, virtualized Infrastructure
More informationContainers, Serverless and Functions in a nutshell. Eugene Fedorenko
Containers, Serverless and Functions in a nutshell Eugene Fedorenko About me Eugene Fedorenko Senior Architect Flexagon adfpractice-fedor.blogspot.com @fisbudo Agenda Containers Microservices Docker Kubernetes
More informationACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development
ACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development Jeremy Fischer Indiana University 9 September 2014 Citation: Fischer, J.L. 2014. ACCI Recommendations on Long Term
More informationMERAKI SERVICE DESCRIPTION
MERAKI SERVICE DESCRIPTION Document Control Purpose of this Document The purpose of this document is to provide clear guidance on what the Meraki service will deliver to the end client. Document Contributors
More informationNetwork Device Provisioning
Network Device Provisioning Spring Internet2 Meeting April 23, 2013 Jim Jokl University of Virginia 1 The Problem Set Enable the use of strong authentication Passwords are painful and phishing is easy
More information21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationWelcome! Presenters: STFC January 10, 2019
Welcome! Presenters: Vas Vasiliadis vas@uchicago.edu Brendan McCollam bjmc@globus.org STFC January 10, 2019 Agenda Morning topics Introduction to the Globus SaaS Service overview & architecture Demo: A
More informationMapMarker Plus v Release Notes
Release Notes Table of Contents Introduction............................................................... 2 MapMarker Developer Installations........................................... 2 Running the
More informationTHE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES
SESSION ID: STR-R14 THE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES Doug Cahill Group Director and Senior Analyst Enterprise Strategy Group @dougcahill WHO IS THIS GUY? Topics The Composition
More informationAlaska ATU 1 $13.85 $4.27 $ $ Tandem Switching $ Termination
Page 1 Table 1 UNBUNDLED NETWORK ELEMENT RATE COMPARISON MATRIX All Rates for RBOC in each State Unless Otherwise Noted Updated April, 2001 Loop Port Tandem Switching Density Rate Rate Switching and Transport
More informationAPCO Public Safety Broadband Summit Next Generation Policy-Makers Panel May 4, 2105
APCO Public Safety Broadband Summit Next Generation 9-1-1 Policy-Makers Panel May 4, 2105 An Introduction to NASNA The National Association of State 911 Administrators (NASNA) represents state 911 programs
More informationFROM VSTS TO AZURE DEVOPS
#DOH18 FROM VSTS TO AZURE DEVOPS People. Process. Products. Gaetano Paternò @tanopaterno info@gaetanopaterno.it 2 VSTS #DOH18 3 Azure DevOps Azure Boards (ex Work) Deliver value to your users faster using
More informationCisco CloudCenter Solution with Cisco ACI: Common Use Cases
Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer
More informationOne Body, Many Heads for Repository-Powered Library Applications
One Body, Many Heads for Repository-Powered Library Applications Tom Cramer! Chief Technology Strategist! Stanford University Libraries!! CNI * 13 December 2011! Repositories make strange bedfellows University
More informationIACMI - The Composites Institute
IACMI - The Composites Institute Raymond. G. Boeman, Ph.D. Associate Director Vehicle Technology Area managed & operated by Michigan State University Manufacturing USA - Institutes Membership 149 Members
More informationInternet2 and IPv6: A Status Update
Internet2 and IPv6: A Status Update Rick Summerhill Associate Director, Network Infrastructure, Internet2 North American IPv6 Summit Santa Monica, CA 15 June 2004 Outline Internet2 Goals Participation
More informationThink Small to Scale Big
Think Small to Scale Big Intro to Containers for the Datacenter Admin Pete Zerger Principal Program Manager, MVP pete.zerger@cireson.com Cireson Lee Berg Blog, e-mail address, title Company Pete Zerger
More informationA DEVOPS STATE OF MIND. Chris Van Tuin Chief Technologist, West
A DEVOPS STATE OF MIND Chris Van Tuin Chief Technologist, West cvantuin@redhat.com THE NEED FOR SPEED THE ACCELERATION OF APPLICATION DELIVERY FOR THE BUSINESS In short, software is eating the world. -
More information4/25/2013. Bevan Erickson VP, Marketing
2013 Bevan Erickson VP, Marketing The Challenge of Niche Markets 1 Demographics KNOW YOUR AUDIENCE 120,000 100,000 80,000 60,000 40,000 20,000 AAPC Membership 120,000+ Members - 2 Region Members Northeast
More informationFederated Services for Scientists Thursday, December 9, p.m. EST
IAM Online Federated Services for Scientists Thursday, December 9, 2010 1 p.m. EST Rachana Ananthakrishnan Argonne National Laboratory & University of Chicago Jim Basney National Center for Supercomputing
More informationDo I Really Need Another Account? External Identities for Campus Applications
Do I Really Need Another Account? External Identities for Campus Applications Dedra Chamberlin, Cirrus Identity Eric Goodman, University of California Todd Haddaway, UMBC Tom Jordan, University of Wisconsin-Madison
More informationSimplifying IT through Virtualization
E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while
More informationGoing cloud-native with Kubernetes and Pivotal
Going cloud-native with Kubernetes and Pivotal A guide to Pivotal Container Service (PKS) by role Fast, low-risk enterprise-grade Kubernetes has arrived With Pivotal Container Service (PKS), organizations
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More informationMapMarker Plus 10.2 Release Notes
MapMarker Plus 10.2 Table of Contents Introduction............................................................... 1 System Requirements...................................................... 1 System Recommendations..................................................
More informationIBM Skills Academy. For <<Academy>> Career-based Education
IBM Skills Academy Providing students with a career-oriented training program on emerging technologies such as Mobile Computing, Cybersecurity, Business Analytics, Big Data, Cloud Computing, Cognitive
More informationAlaska ATU 1 $13.85 $4.27 $ $ Tandem Switching $ Termination
Page 1 Table 1 UNBUNDLED NETWORK ELEMENT RATE COMPARISON MATRIX All Rates for RBOC in each State Unless Otherwise Noted Updated July 1, 2001 Loop Port Tandem Switching Density Rate Rate Switching and Transport
More informationMobility best practice. Tiered Access at Google
Mobility best practice Tiered Access at Google How can IT leaders enable the productivity of employees while also protecting and securing corporate data? IT environments today pose many challenges - more
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More information