SlideShare a Scribd company logo
1 of 160
ZotPortal:
Integrating Legacy Systems and
Planning for the Worst Case
Erik A. Olsson
erik.olsson@uci.edu
University of California, Irvine

 In between San Diego
 and Los Angeles
 30,000 students
 Founded 1965
 Jasig member
 institution (every year)
Agenda
Agenda
Some history
Agenda
Some history
“Selling” the Prototype
Agenda
Some history
“Selling” the Prototype
Connecting the silos
Agenda
Some history
“Selling” the Prototype
Connecting the silos
Preparing for the worst-case
Agenda
Some history
“Selling” the Prototype
Connecting the silos
Preparing for the worst-case
Plans for the future
Agenda
Some history
“Selling” the Prototype
Connecting the silos
Preparing for the worst-case
Plans for the future
Q&A
A Quick History
A Quick History
Staff Portal - uPortal
based (2001)
A Quick History
Staff Portal - uPortal
based (2001)
Started many times
A Quick History
Staff Portal - uPortal
based (2001)
Started many times
Student Portal
committee (2005)
A Quick History
Staff Portal - uPortal
based (2001)
Started many times
Student Portal
committee (2005)
2006 FTE hired
A Quick History
Staff Portal - uPortal
based (2001)
Started many times
Student Portal
committee (2005)
2006 FTE hired
Early 2007 first prototype
A Quick History
Staff Portal - uPortal
based (2001)
Started many times
Student Portal
committee (2005)
2006 FTE hired
Early 2007 first prototype
Based on MyVT branch
“Selling” the Prototype
“Selling” the Prototype

 The traveling road-show
“Selling” the Prototype

 The traveling road-show
 50+ presentations: libraries, academic departments,
 student groups, managers, chancellor
“Selling” the Prototype

 The traveling road-show
 50+ presentations: libraries, academic departments,
 student groups, managers, chancellor
 Input from many stakeholders
“Selling” the Prototype

 The traveling road-show
 50+ presentations: libraries, academic departments,
 student groups, managers, chancellor
 Input from many stakeholders
 Identified the requirements
“Selling” the Prototype

 The traveling road-show
 50+ presentations: libraries, academic departments,
 student groups, managers, chancellor
 Input from many stakeholders
 Identified the requirements
 Wiki
Prototype to Reality
Prototype to Reality
 Approval to proceed
Prototype to Reality
 Approval to proceed
 Decide on a version
 2.5.3 → 2.6.1 → 3.0.1
Prototype to Reality
 Approval to proceed
 Decide on a version
 2.5.3 → 2.6.1 → 3.0.1
 ALM → DLM
Prototype to Reality
 Approval to proceed
 Decide on a version
 2.5.3 → 2.6.1 → 3.0.1
 ALM → DLM
 Table-based → DIV-
 based
Prototype to Reality
 Approval to proceed
 Decide on a version
 2.5.3 → 2.6.1 → 3.0.1
 ALM → DLM
 Table-based → DIV-
 based
 Something to use a
 development base
Usability
Usability

 Followed User-Centered Design (UCD) principles
   Made personas, user stories, etc
Usability

 Followed User-Centered Design (UCD) principles
   Made personas, user stories, etc
 Mock-ups in Illustrator
Usability

 Followed User-Centered Design (UCD) principles
   Made personas, user stories, etc
 Mock-ups in Illustrator
 When you have something to test, test it (with
 incentives)
Usability

 Followed User-Centered Design (UCD) principles
   Made personas, user stories, etc
 Mock-ups in Illustrator
 When you have something to test, test it (with
 incentives)
 Discovered several problems
Usability
Usability

            Too light
Usability

               Too light
       Too
     similar
Usability

                  Too light
       Too
     similar




                Hard
               to see
Test Results
Test Results

 Studies & survey results
Test Results

 Studies & survey results
 Students want: course enrollment, course
 management system (EEE), financial aid, bookstore,
 admissions & “fun stuff.”
Test Results

 Studies & survey results
 Students want: course enrollment, course
 management system (EEE), financial aid, bookstore,
 admissions & “fun stuff.”
 UI problems mostly fixed by uPortal 3 release
Connecting the Silos
Connecting the Silos

  Admissions            Financial



Books
                 Course
               Management           Registrar
Connecting the Silos
Connecting the Silos

Difficulties
  Disparate standards
Connecting the Silos

Difficulties
  Disparate standards
  Disparate skill sets
Connecting the Silos

Difficulties
  Disparate standards
  Disparate skill sets
  Willingness to participate
Connecting the Silos

Difficulties
  Disparate standards
  Disparate skill sets
  Willingness to participate
  Availability
Approaches
Approaches
1.Authenticated RSS/XML
Approaches
1.Authenticated RSS/XML
2.IP-restricted script with parameters (or web proxy)
Approaches
1.Authenticated RSS/XML
2.IP-restricted script with parameters (or web proxy)
3.Authenticated Screen Scraping
Approaches
1.Authenticated RSS/XML
2.IP-restricted script with parameters (or web proxy)
3.Authenticated Screen Scraping
4.Web-services SOAP/WSDL
Approaches
1.Authenticated RSS/XML
2.IP-restricted script with parameters (or web proxy)
3.Authenticated Screen Scraping
4.Web-services SOAP/WSDL
  Avoided:
    Direct database
Approach 1: RSS/XML

User
                 RSS

                        Silo’d App
                 XSLT
       uPortal
Approach 1: RSS/XML

User
                 RSS    Auth Cookie

                                      Silo’d App
                 XSLT
       uPortal
Approach 1: RSS/XML

User
                 RSS    Auth Cookie

                                      Silo’d App
                 XSLT
       uPortal                         Determines
                                        validity of
                                         cookie
Approach 1: RSS/XML

User
                 RSS    Auth Cookie

                        RSS           Silo’d App
                              XML
                 XSLT
       uPortal                         Determines
                                        validity of
                                         cookie
Approach 1: RSS/XML
Used for:
  “My Admissions Application” channel
  “MyEEE Tasks” channel (course management)




Work involved:
  Install XSLT file, setup channel,
  Small portlet, pull in the RSS
Approach 2: IP-restr. script

 User

              JSR-168
                        Silo’d App
        uPortal
Approach 2: IP-restr. script

 User
                        ?id=jstudent
              JSR-168
                                       Silo’d App
        uPortal
Approach 2: IP-restr. script

 User
                        ?id=jstudent
              JSR-168
                                       Silo’d App
        uPortal
                                         Checks
                                       against list of
                                        portal IPs
Approach 2: IP-restr. script

 User
                        ?id=jstudent
              JSR-168
                                       Silo’d App
                         Simple XML
        uPortal
                                         Checks
                                       against list of
                                        portal IPs
Approach 2: IP-restr. script
 Used for:
   “My Housing” portlet
   Needed “campus_id”


 Work involved:
   Create simple portlet to fetch & parse simple
   response codes
Appr. 3: Auth. Screen Scrape
User



                         Silo’d
                        Web Page
       uPortal
Appr. 3: Auth. Screen Scrape
User
                 JSR-168




                            Silo’d
                           Web Page
       uPortal
Appr. 3: Auth. Screen Scrape
                                       Normal Web
                                          Proxy
User                                    Request
                 JSR-168

                           Auth C
                                  ookie

                                           Silo’d
                                          Web Page
       uPortal

                                           Determines
                                            validity of
                                             cookie
Appr. 3: Auth. Screen Scrape
                                                      Normal Web
                                                         Proxy
User                                                   Request
                        JSR-168

                                          Auth C
                                                 ookie
                   Unmarshal

                                                          Silo’d
                 View       Transform
                                                         Web Page
       uPortal                    Clean


                                                          Determines
                                     Massage               validity of
                                     Response               cookie
Appr. 3: Auth. Screen Scrape
 Used for:
   Library portlet
   Fetching bookstore books

 Why bother?
   Department uses vendor product with bad HTML
   Want to show less than whole page and rewrite
   significantly (otherwise WPP works)
Approach 4: Web-service
User


                 JSR-168   Spring-WS +
                           WS-Security   Silo’d DB
                           Web Service
       uPortal
Approach 4: Web-service
User                   Signs with
                       x509 cert




                 JSR-168            Spring-WS +
                                    WS-Security   Silo’d DB
                                    Web Service
       uPortal
Approach 4: Web-service
                                         Verifies x509
User                   Signs with       cert signed by
                       x509 cert          custom CA




                 JSR-168            Spring-WS +
                                    WS-Security          Silo’d DB
                                    Web Service
       uPortal
Approach 4: Web-service
                                         Verifies x509
User                   Signs with       cert signed by
                       x509 cert          custom CA




                 JSR-168            Spring-WS +
                                    WS-Security                 Silo’d DB
                                    Web Service
       uPortal

                                                          Reverse-
                                                         engineered
                                                          Hibernate
Approach 4: Web-service
                                                 Verifies x509
User                   Signs with               cert signed by
                       x509 cert                  custom CA




                 JSR-168                  Spring-WS +
                                          WS-Security                   Silo’d DB
                                          Web Service
       uPortal
                                Encrypts
                               with portlet’s                     Reverse-
                                public key                       engineered
                                                                  Hibernate
Approach 4: Web-service
Approach 4: Web-service
No early progress
Approach 4: Web-service
No early progress
Gained DB access, basic schema docs
Approach 4: Web-service
No early progress
Gained DB access, basic schema docs
Hibernate “rev-eng” ant scripts
Approach 4: Web-service
No early progress
Gained DB access, basic schema docs
Hibernate “rev-eng” ant scripts
Design XSD
Approach 4: Web-service
No early progress
Gained DB access, basic schema docs
Hibernate “rev-eng” ant scripts
Design XSD
Implement service and deliver to department
Approach 4: Web-service
No early progress
Gained DB access, basic schema docs
Hibernate “rev-eng” ant scripts
Design XSD
Implement service and deliver to department
Other departments now using
Approach 4: Web-service
No early progress
Gained DB access, basic schema docs
Hibernate “rev-eng” ant scripts
Design XSD
Implement service and deliver to department
Other departments now using
Demo of this portlet
My Courses (demo)
My Courses (demo)
My Courses (demo)
My Courses (demo)
My Courses (demo)
My Courses (demo)
My Courses (demo)
Preparing for the Worst Case
Preparing for the Worst Case



                Your
             Datacenter
Requirements
Requirements
Potential combined traffic of Staff Portal & Course
Management System (EEE)
Requirements
Potential combined traffic of Staff Portal & Course
Management System (EEE)
Full redundancy
Requirements
Potential combined traffic of Staff Portal & Course
Management System (EEE)
Full redundancy
Extremely low cost
Requirements
Potential combined traffic of Staff Portal & Course
Management System (EEE)
Full redundancy
Extremely low cost
Need:
  Load balancer/app switch (redundant)
  Reliable hardware (redundant)
  Redundant data centers
Products Considered
Products Considered	


Barracuda, very cheap, light-duty, not scalable
Products Considered	


Barracuda, very cheap, light-duty, not scalable
F5, easy to use, very expensive & not scalable
Products Considered	


Barracuda, very cheap, light-duty, not scalable
F5, easy to use, very expensive & not scalable
Cisco, cheap & scalable, difficult to use
Normal Operation
portal.uci.edu
SSL




portal.uci.edu
SSL                    SSL




      portal.uci.edu
SSL




      portal.uci.edu
SSL   portal.uci.edu
SSL
portal.uci.edu
SSL
portal.uci.edu   SESS

     1-1
SSL
      portal.uci.edu   SESS




1-1
SSL
portal.uci.edu   SESS
portal.uci.edu   SESS
portal.uci.edu
SSL




portal.uci.edu
SSL                    SSL




      portal.uci.edu
SSL




      portal.uci.edu
SSL   portal.uci.edu
SSL
portal.uci.edu
SSL
portal.uci.edu   SESS

     2-3
SSL
portal.uci.edu   SESS




                        2-3
SSL
portal.uci.edu   SESS




                        2-3
SSL
portal.uci.edu   SESS
portal.uci.edu   SESS
Disaster 1


 Berkeley Place goes down
 Secondary location
 100% uptime maintained
portal.uci.edu
SSL




portal.uci.edu
SSL




      portal.uci.edu
SSL   portal.uci.edu
SSL
portal.uci.edu
     1-3
SSL
      portal.uci.edu




1-3
SSL
portal.uci.edu
portal.uci.edu
Disaster 1 (BP) Considerations

 Primaries are still up
 When BP comes back up,
 primaries unaffected
 No manual intervention required
 100% uptime
Disaster 2


 Worst Case
 ADC (Engineering Gateway) goes down
 Primaries go down
portal.uci.edu
SSL




      portal.uci.edu
SSL




portal.uci.edu
portal.uci.edu   SSL
SSL
portal.uci.edu
     2-3
SSL
portal.uci.edu




             2-3
DB



          SSL
     portal.uci.edu




                  2-3
SSL
               portal.uci.edu




  Manual
Configuration
  Rewrite                   2-3
SSL
               portal.uci.edu




  Manual
Configuration
  Rewrite                   2-3
SSL
               portal.uci.edu




  Manual
Configuration
  Rewrite
portal.uci.edu




  Manual
Configuration
  Rewrite
Disaster 2 (ADC) Considerations


 Secondaries are now primaries
 Manual DB configuration change
 Depends on human response time
 Requires manual configuration change
 once ADC is back up
Future Improvements
Future Improvements

Send DB traffic through App Switches
  No manual configuration changes required
  Protection against primary taking over
  automatically when restored
Future Improvements

Send DB traffic through App Switches
  No manual configuration changes required
  Protection against primary taking over
  automatically when restored
App switch supports multiple contexts
Since We Launched
Since We Launched
Hardware failure on secondary server
  Not noticed
  App switch worked
Since We Launched
Hardware failure on secondary server
  Not noticed
  App switch worked
Kernel panic in secondary server’s primary domain
  Killed networking
  uPortal instances lost network connectivity
  App switched worked
Questions?

Erik A. Olsson
erik.olsson@uci.edu

More Related Content

Similar to ZotPortal: Integrating Legacy Systems and Planning for the Worst Case

Implementing Authorization
Implementing AuthorizationImplementing Authorization
Implementing AuthorizationTorin Sandall
 
How to Use Stormpath in angular js
How to Use Stormpath in angular jsHow to Use Stormpath in angular js
How to Use Stormpath in angular jsStormpath
 
Adding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your ApplicationAdding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your ApplicationÁlvaro Alonso González
 
Kotlin server side frameworks
Kotlin server side frameworksKotlin server side frameworks
Kotlin server side frameworksKen Yee
 
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server TutorialWSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server TutorialPrabath Siriwardena
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2
 
Rails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp TampaRails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp TampaBryce Kerley
 
Rest Security with JAX-RS
Rest Security with JAX-RSRest Security with JAX-RS
Rest Security with JAX-RSFrank Kim
 
WSO2Con US 2013 - Advanced API Management Tactics
WSO2Con US 2013 - Advanced API Management TacticsWSO2Con US 2013 - Advanced API Management Tactics
WSO2Con US 2013 - Advanced API Management TacticsWSO2
 
Testing in the 21st Century (ExpoQA)
Testing in the 21st Century (ExpoQA)Testing in the 21st Century (ExpoQA)
Testing in the 21st Century (ExpoQA)Alex Soto
 
Crafting Consumable APIs
Crafting Consumable APIsCrafting Consumable APIs
Crafting Consumable APIsWSO2
 
Using Istio to Secure & Monitor Your Services
Using Istio to Secure & Monitor Your ServicesUsing Istio to Secure & Monitor Your Services
Using Istio to Secure & Monitor Your ServicesAlcide
 
High Availability by Design
High Availability by DesignHigh Availability by Design
High Availability by DesignDavid Prinzing
 
API Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIsAPI Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIsApigee | Google Cloud
 
O Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bO Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bBruce O'Dell
 
Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)Codemotion
 
A recipe for standards-based Cloud IdM
A recipe for standards-based Cloud IdMA recipe for standards-based Cloud IdM
A recipe for standards-based Cloud IdMPaul Madsen
 

Similar to ZotPortal: Integrating Legacy Systems and Planning for the Worst Case (20)

Implementing Authorization
Implementing AuthorizationImplementing Authorization
Implementing Authorization
 
How to Use Stormpath in angular js
How to Use Stormpath in angular jsHow to Use Stormpath in angular js
How to Use Stormpath in angular js
 
Open sso fisl9.0
Open sso fisl9.0Open sso fisl9.0
Open sso fisl9.0
 
Adding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your ApplicationAdding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your Application
 
Kotlin server side frameworks
Kotlin server side frameworksKotlin server side frameworks
Kotlin server side frameworks
 
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server TutorialWSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server Tutorial
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
Rails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp TampaRails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp Tampa
 
Rest Security with JAX-RS
Rest Security with JAX-RSRest Security with JAX-RS
Rest Security with JAX-RS
 
WSO2Con US 2013 - Advanced API Management Tactics
WSO2Con US 2013 - Advanced API Management TacticsWSO2Con US 2013 - Advanced API Management Tactics
WSO2Con US 2013 - Advanced API Management Tactics
 
Testing in the 21st Century (ExpoQA)
Testing in the 21st Century (ExpoQA)Testing in the 21st Century (ExpoQA)
Testing in the 21st Century (ExpoQA)
 
Crafting Consumable APIs
Crafting Consumable APIsCrafting Consumable APIs
Crafting Consumable APIs
 
Using Istio to Secure & Monitor Your Services
Using Istio to Secure & Monitor Your ServicesUsing Istio to Secure & Monitor Your Services
Using Istio to Secure & Monitor Your Services
 
High Availability by Design
High Availability by DesignHigh Availability by Design
High Availability by Design
 
API Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIsAPI Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIs
 
O Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bO Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10b
 
Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)Stop reinventing the wheel with Istio by Mete Atamel (Google)
Stop reinventing the wheel with Istio by Mete Atamel (Google)
 
SWORD: The Story So Far
SWORD: The Story So FarSWORD: The Story So Far
SWORD: The Story So Far
 
Sword Crig 2007 12 06
Sword Crig 2007 12 06Sword Crig 2007 12 06
Sword Crig 2007 12 06
 
A recipe for standards-based Cloud IdM
A recipe for standards-based Cloud IdMA recipe for standards-based Cloud IdM
A recipe for standards-based Cloud IdM
 

Recently uploaded

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

ZotPortal: Integrating Legacy Systems and Planning for the Worst Case

Editor's Notes