This course consists of a survey of the key principles of security labels and markings, an overview of data models to support a labeling approach to row- and column-level security, and specific considerations for implementing a row- and/or column-level security model within the Microsoft SQL Server framework. The course also features an in-depth live demonstration of the architecture and principles at work. We begin with trying to establish a clear functional definition of row-level security, and an examination of real-world contexts which either demand or benefit from such a model. We then discuss the various kinds of requirements that can impact level of complexity of a particular solution. This leads us into developing a database model that supports the standard superset of likely use-cases. We’ll start with the simplest possible implementation and then discuss the addition of layers of complexity such as the classic “Top Secret / Confidential / Classified / UnClassified” hierarchies, and other approaches to access. Finally, we’ll connect to a live Microsoft SQL Server database with many of these principles implemented, and conduct several tests and demonstrations which illustrate how to implement the principles.
This session will offer a technical blueprint and step-by-step instructions for creating a RESTful web service connected to a Microsoft SQL Server back-end. We’ll briefly review the criteria for a RESTful architecture, then demonstrate an actual solution with PHP-based web pages running on an IIS web server, along with the required components and configuration settings needed to make the whole thing work.
So you have a great product, have found some customers, and are ready to be wildly successful? This session will take an in-depth look at some of the key challenges facing entrepreneurs whose products and services are starting to sell, and who are experiencing rapidly-expanding growth. The goal of the session is to leaving you asking the right questions of the right people so you can set up appropriate, scalable business processes BEFORE your well-deserved growth turns into months-on-end of business-process fire-fighting and sleepless nights, especially for your CFO and CEO. You’d rather get back to innovating, so why not set yourself up for graceful growth from the beginning? We’ll examine common systems growing companies need such as quote-to-cash pipeline, revenue recognition and revenue forecasting, to name a few. We’ll discuss the usual causes of problem faced by these systems, and take a look at additional problems associated with those same causes. Then we’ll discuss data and system planning and architecture methodologies that can help you grapple with these challenges, ideally before they even occur, so that your path to success can be smoother, swifter and much more profitable. Along the way we’ll discuss requirements-gathering, product- and customer-to-business-process matrices, data integration concerns, and actual business process and workflow design.
- Not Interested