We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJasmine Wyse
Modified about 1 year ago
–Custom security realms
–scheduled tasks –Custom security realms –Change resolution rules
–scheduled tasks –Custom security realms –Change resolution rules –Manipulate downloaded content
–Custom security realms –Change resolution rules –Manipulate downloaded content –Listeners on storage events
–Change resolution rules –Manipulate downloaded content –Listeners on storage events –searches –New rest commands
–Manipulate downloaded content –Listeners on storage events –searches –New rest commands –Custom promotions
–Listeners on storage events –searches –New rest commands –Custom promotions –Deploy and query artifacts and metadata
Totally new language
Small helpers Totally new language
Small helpers Totally new language
Parse groovy scripts Create closure objects Cast to SAMFind SAMs in classpath SAMs map Cast to Closure Execute
Show me the code!
©2012 Microsoft Corporation. All rights reserved..
Total<200% FPL 200% FPL or more Adults in families with a job loss in past 2 years* 24% 43 million^ 34% 24 million 16% 15 million Among adults in families.
Schedule of Releases (since Tromso meeting) and New Access Interfaces.
1 Ontolog OOR Use Case Review Todd Schneider 1 April 2010 (v 1.2)
Copyright © 2007 Vangent, Inc. All Rights Reserved. Example of OOR Architecture Open Ontology Repository Architecture – Some Considerations April 28-29,
View from Elsevier NISO Metasearch Initiatives Meeting May 7, 2003 M. Krellenstein.
Co-funded by the European Union Semantic CMS Community Project Review Meeting Luxemburg, Knowledge Representation and Reasoning.
Upgrade And Migration From Windows Sharepoint Services V2 And Sharepoint Portal Server 2003 Allan Schweighardt Sr. Technology Specialist Microsoft Corporation.
1 A Cloud Reference Framework … for discussion only … Please send comments and suggestions to Bhumip Khasnabish Friday,
Breakout Group 3: Distribution, Replication and Interfacing with Specialized Repositories.
CMPT 354 Database Systems I Spring 2012 Instructor: Hassan Khosravi.
Dr. Leo Obrst MITRE Information Semantics Information Discovery & Understanding Command & Control Center February 6, 2014February 6, 2014February 6, 2014.
Domain Driven Design and RIM. Introduction 1 RIMResistance is Futile, you Will be Assimilated!
What does LOFAR have to do with the Virtual Observatory (VO)? LOFAR Science Day 16 December 2003 Melbourne David Barnes The University of Melbourne.
NVO Summer School VO Protocols and Jargon Overview Tom McGlynn NASA/GSFC T HE US N ATIONAL V IRTUAL O BSERVATORY.
Fedora TM and Repository Implementation at UVa Leslie Johnston, UVa Library DASER Summit November 22, 2003.
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Senior Solutions Architect, MongoDB James Kerr Security Features Preview Field Level Access Control.
Why metadata matters for libraries... Rachel Heery UKOLN: The UK Office for Library and Information Networking, University of Bath
Olaf Feldkamp Microsoft Schweiz GmbH Part II.
AMD.COM Monthly Stats* 15.3m unique visitors 21.7m visits 72m page views 7.3m downloads ~10k total pages 13 languages * Source: Adobe.
September 13, 2004NVO Summer School1 VO Protocols Overview Tom McGlynn NASA/GSFC T HE US N ATIONAL V IRTUAL O BSERVATORY.
Xtremesoft and Understanding AppMetrics in the.NET Environment © Xtremesoft, Inc.
Tridion 5.3 Templates. Agenda Introduction to Tridion 5.3 Advantages of Tridion 5.3 Templates Code Migration (VB Script to C#) XSLT, Custom Page features.
Presented by Srini CAPAREA SPONSORS AUDIENCE.
How well REALLY move to the cloud – the coming alignment between hosters and cloud platform providers Dave Wright.
Cultural Heritage in REGional NETworks REGNET Project Meeting Content Group Part 3: Content Testing.
The go-to place for all our Extensive Reading needs.
©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 3D Security Analysis Report Tool.
2011 NetIS Presentation The Complete ePublishing Platform Designed for the 21 st Century.
© 2016 SlidePlayer.com Inc. All rights reserved.