Ytria
Login
Printer Friendly Version
DCLUG 2015
Tactics and tools for the modern admin/dev
A Ytria tech-talk




November 30, 2015 | 9:00 AM |
IBM Technical Exploration Center-Washington DC
Register Here



What are you doing on November 30th? Join us for some collaborative ESS (ICS) tech talk!.
Brush up on current admin techniques, logging facts, replication tactics, and more with Ben Menesi, IBM Champion and Head of Product at Ytria. Tell Ben all your admin/dev problems, and he'll show you how to solve them with Ytria's EZ Suite tools. You're sure to learn something new, either from Ben's presentations or from each other.
Save your spot soon so we know how many donuts to bring! IBM will graciously provide food and refreshments.
Agenda

09:00 - 9:30
09:30 - 10:00
10:00 - 11:00

11:00 - 11:15
11:15 - 12:30

12:30 - 13:30
13:30 - 14:30
Coffee & Refreshments
Welcome and Quick Community Update
Mastering your Logs: Everything You Should Know About Logging in IBM Domino (for administrators & developers)
Coffee Break
Hands on with Ytria's Administration & Development tools: understanding your logs, consoles, replication, etc.
Lunch
News From the Trenches: Domino Security Fortification to Mitigate Potential Security Threats
Session Descriptions
Ben Menesi - Head of Product at Ytria Ben Menesi

As Head of Product at Ytria, IBM Champion Ben Menesi oversees its R&D activities, leads workshops on IBM Notes/Domino administration and development best practices, and delivers technical sessions at conferences such as IBM ConnectED and various ICS events around the globe.





Mastering Your Logs: Everything You Should Know About Logging in IBM Domino

Proper monitoring and logging of what happens in your Domino environment is critically important for both security and performance. In order to get the most out of your log data in the event that things go wrong, it's vital to understand its structure, what is (or isn't) logged and how, and the ways to effectively search logs. During this in-depth session, we will explore the inner workings of various Domino logging mechanisms by dissecting the structure of log event documents (e.g. Replication, Usage Session, User Activity, Miscellaneous, etc.). You'll learn: how to deal with verbose logging, solutions for monitoring bottlenecks, retention best practices, etc.; you'll also gain knowledge of behind-the-scenes data such as status codes and how best to use them. You will walk away from this presentation with a solid understanding of your log architecture, the means to set up notifications for signaling when things go wrong, and a faster process for finding what you're looking for.
http://www.slideshare.net/BenedekMenesi/ibm-connected-2015




Hands on with Ytria's administration tools: understanding your logs, consoles, replication, etc.

As a company that has been developing software tools to help IBM Domino Administrators and Developers for over 15 years, we continue to talk to hundreds of customers and assist them with tackling interesting, tedious, and annoying problems every week. During this BYOP session (Bring Your Own Problem), you're welcome to share your own dilemmas as we dive straight into a troublesome live environment to find, understand, and resolve the toughest problems administrators face on a daily basis. We'll make use of the Ytria tools to get a quicker (and better) understanding of Log.nsf, identify and fix inconsistent replicas, discover and patch security holes, analyze application usage, and more.



News From the Trenches: Domino Security Fortification to Mitigate Potential Security Threats

Long established as a leader in the enterprise collaboration climate, IBM Domino continues to perform with pliancy beyond its years. However, with this flexibility and power comes a great amount of potentially problematic bottlenecks. As administrators and developers on the front lines, it's vital that we understand the low level mechanisms that help us hone our servers, apps, and documents into secure systems. In this in-depth session, we'll dissect a wide variety of security protocols like SSL / TLS, SHA1 and SHA2 certificates, SAML, Cryptography, as well as talk about ACL tactics, best practices for securing agents, documents, and more. You'll come away primed with enough best practice tactics to help you understand your environment, anticipate security risks, and prevent data breaches.




Need More Info?
Contact Us Check our Techlab

Follow Us!

Twitter Linkedin Facebook Techlab




Thousands of organizations use Ytria software for faster Notes development and better Domino administration
 

This website require JavaScript for full functionality.
Please enable JavaScript in your Web browser.