A request came from a customer to estimate how long it would take to encrypt a database with cvencrypt utility.

This question is a little bit like how long is a piece of string — it depends. But its an interesting question. The answer primarily depends on the performance of CPU and storage on the target platform the customer is using, so the answer is more about coming up with a simple methodology that can be used to benchmark the CPU and storage while running cvencrypt.

6 0
1 1.1K

Hello all.

I think the forum experience is great as whole, but it could improve even more if we had somewhere to share our ideas. So that's why I'm creating a thread dedicated for that purpose. Maybe this way someone from InterSystems could catch something good?

8 11
0 445

Hi, Community!

Recently we announced Developer Community Meetup in Cambridge, MA. Let me describe what is it.

Meetup it's a one evening event where you can enjoy some sessions by presenters (today InterSystems engineers, tomorrow you can be a presenter) and chat with local developers and InterSystems developers, engineers and product managers (depends on who is in town) and discuss your problems, experience, and success with InterSystems technologies.

1 0
0 293
Article
· Nov 14, 2016 1m read
openssl for Windows

Question:

Where can I find the openssl command line tool for Windows?

Answer:

The openssl command line utility comes with Unix, but not with Windows. It is used for working with security certificates.

The main site is

https://www.openssl.org/

There are no binaries on this site but in the Community section there is a link for binaries which leads to:

1 0
0 1K

If I am in a community on this website looking at articles would expect a search box at top so I can search within this community.

1) The search top right is too general (I don't want to have to sub search, refine or just ignore irrelevant results)

2) Most forums have the ability to easily search within them on other sites, which is what as a user I would expect

1 6
0 239

Presenter: Rich Taylor
Task: Use an LDAP schema that differs from the provided default
Approach: Give examples of customized LDAP schema development, using LDAP APIs and ZAUTHORIZE

In this session we explore the various options of for working with LDAP as an authentication and authorization framework. We will look beyond the simple LDAP schemas into working with more complex LDAP configurations that incorporate application level security information.

Content related to this session, including slides, video and additional learning content can be found here.

0 1
0 460

Presenter: Andreas Dieckow
Task: Securely store sensitive information
Approach: Give examples of data-at-rest encryption and data element encryption

Description: In this session, InterSystems will showcase how to use API calls to programmatically do everything using your own scripts. This approach is highly effective if you have recipe based settings and configurations that you would like to roll out in a controlled and fast fashion.

Problem: Implement Security relevant information correctly and how. Examples are Credit Card information, Sensitive information (e.g. SSN, Classified Information)

Solution: Data-at-rest encryption and data element encryption

Content related to this session, including slides, video and additional learning content can be found here.

0 1
0 294

Presenter: Andreas Dieckow
Task: Apply SQL security to multiple servers in a distributed system
Approach: Provide code samples for using new API calls to apply SQL security statements to multiple instances of our products

Description: The requirement that started at all. See examples on how to use this new feature and integrate it into your application by discuss code examples.

Problem: SQL Security is local to the instance and most of time driven by customer application code. That it is only local to the instance and is not automatically going to other instances requires a solution.

Solution: With application code use new API calls to issue SQL security statements that is applied to multiple instances.

Content related to this session, including slides, video and additional learning content can be found here.

0 1
0 243

Presenter: Benjamin De Boe
Task: Perform advanced analytics on huge amounts of data
Approach: Use third-party analytics frameworks to leverage your entire clustered environment

In this session, we’ll explain what machine learning means and how it can help you gain insights in vast amounts of data, leveraging complex environments.

Content related to this session, including slides, video and additional learning content can be found here.

0 0
0 284

Presenter: Harry Tong
Task: Load terabytes of data into a distributed environment
Approach: Leverage parallelism and open-source tools

In this session, we’ll discuss how to load TBs of data into a distributed environment, leveraging parallelism and open source to reach exceptional load rates.

Content related to this session, including slides, video and additional learning content can be found here.

0 0
0 340

Presenter: Tony Pepper
Task: Host an application based on InterSystems’ technology in a public cloud environment
Approach: Provide a checklist of things to think about before you deploy

Are you looking at hosting your applications in the public cloud? This talk will highlight what you need to think about when deploying InterSystems technology in any public cloud environment.

Content related to this session, including slides, video and additional learning content can be found here.

1 0
0 213

Presenter: Mark Bolinsky
Task: Provide failover for distributed systems without using a VIP
Approach: Demonstrate using InterSystems’ database mirroring with external traffic managers such as F5 LTM/GTM

With distributed environments and even public cloud environments, the use of a VIP sometimes is not desirable or even possible given network topology or deployment. The session will demonstrate integrating database mirroring with external traffic managers such F5 LTM/GTM using API based triggers in InterSystems products to interface with the F5 appliances. This not only presents automated redirection for the local mirror members, but also provided automated client redirection to asynchronous DR mirror members.

Content related to this session, including slides, video and additional learning content can be found here.

0 0
0 474

Presenter: Michael Broesdorf
Task: Use the Internet of Things in a business application
Approach: Demonstrate incorporating device-generated messages into a business process, and using that information to trigger physical events

(Session Sequence: Dependent on EOPEN) IoT may be the most hyped idea of the year, but how do you actually make use of it in your business applications? This session gives a detailed demonstration of incorporating device generated messages into an business process, to interact with your business applications and triggering physical events as a part of a business process.

Content related to this session, including slides, video and additional learning content can be found here.

0 0
0 406

Presenter: Alain Houf
Guest Speaker: Joop van Uden of Philips Healthcare
Task: Evolve your data model as you build your application
Approach: Provide a real-world example of how to leverage the flexibility of the document data model and how to easily integrate it into existing environments

Description: Come and learn how you can leverage new technology like the document data model in your current environment. We will explore a customer use case that managed to include this brand new technology within weeks in their current application stack and start to benefit from it.

Problem: Tools that help you build a stable backend, sometimes are in the way when you need to evolve.

Solution: Use flexible data models like the document data model for areas where you have to evolve constantly and mix and match it with the power of the OO and relational model.

Dependencies: Most value if session "The Power of Handling Data without a Schema" was attended before.

Content related to this session, including slides, video and additional learning content can be found here.

0 0
0 234

Presenter: Luca Ravazzolo
Task: Track the status and performance of clustered environments
Approach: Give examples of using modern technology to spot potential bottlenecks before they turn into problems

This session will discuss how modern technology can be used to keep track of the status and performance of your cloud clustered environments.

Content related to this session, including slides, video and additional learning content can be found here.

0 0
0 293

Presenter: Mark Massias
Guest Speaker: Bruce Porteous of Northgate
Task: Build a composite application that bridges data silos
Approach: Give a real-world example of combining data from multiple sources to run a composite application

Most organizations need to bridge silos of data or combine separate applications. This session describes techniques for building composite applications and silos. The session also looks at a real application that does this. It uses workflow to assign cases to individuals for investigation and extracts information from multiple systems to provide the investigator with a complete context for the case at the scene of the incident.

Content related to this session, including slides, video and additional learning content can be found here.

0 0
0 191