Whats New in Service Pack 12. 2 Educator Efficiency and Effectiveness Focused Insight Student Experience Administrator Efficiency and Effectiveness Blackboard.

Slides:



Advertisements
Similar presentations
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.
Advertisements

1 Capability Set - Bullet. 2 Common Community Problems Too Much Information –Institutions have to SPAM their faculty and students –Too many online sources.
Nick Feamster CS 6262 Spring 2009
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
State of New Jersey Department of Health and Senior Services Patient Safety Reporting System Module 2 – New Event Entry.
Server Access The REST of the Story David Cleary
Yammer Technical Solutions Overview
Page 1 of 30 To the Create Assignment Request Online Training Course An assignment request is created by an assignor to initiate the electronic assignment.
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
31242/32549 Advanced Internet Programming Advanced Java Programming
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
Pasewark & Pasewark Microsoft Office XP: Introductory Course 1 INTRODUCTORY MICROSOFT WORD Lesson 8 – Increasing Efficiency Using Word.
School Census Summer 2011 Headlines Version Jim Haywood Product Manager for Statutory Returns.
Module 12 WSP quality assurance tool 1. Module 12 WSP quality assurance tool Session structure Introduction About the tool Using the tool Supporting materials.
Improving the way we learn
Welcome to the GIG Event 1. MICROSOFT ACTIVE DIRECTORY SERVICES Presenter: Avinesh MCP, MCTS 2.
Benchmark Series Microsoft Excel 2013 Level 2
DEV333. Describe each main attack Demo how the attack works Fix our poor vulnerable application! Why Script Kiddies, Why? Click to Hack.
Implementing enterprise governance can sometimes feel like trying to corral an exuberant crowd.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
My First Building Block Presented By Tracy Engwirda 28 September, 2005.
Sharepoint 2007  An integrated suite of server capabilities can help improve organizational effectiveness by providing various processes.  Provides.
The Design Of A Web Document Snapshots Delivery System David Chao College of Business San Francisco State University.
Introduction to the OWASP Top 10. Cross Site Scripting (XSS)  Comes in several flavors:  Stored  Reflective  DOM-Based.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
The OWASP Foundation OWASP Chennai Phishing.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
Windows.Net Programming Series Preview. Course Schedule CourseDate Microsoft.Net Fundamentals 01/13/2014 Microsoft Windows/Web Fundamentals 01/20/2014.
Active Security Infrastructure Stuart Kenny Trinity College Dublin.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
EQUELLA Product Strategy and Development
Zscaler New Interface and Reporting From Saturday 8 th June 2013.
DEMO - 8/14/2007. R2 Feature List ReceiveDocumentBatch Web Service SendPESCAcknowledgment Web Service Validate Acknowledgment Upload Acknowledgment Transcript.
1 Capability Set - Bullets. 2 Common Content Problems Content Mayhem –File management and storage confusion Content Multiplication –Editing déjà vu -
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
Building Secure Web Applications With ASP.Net MVC.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
Module 7: Advanced Application and Web Filtering.
The Management of a Website’s Historical Resources David Chao College of Business San Francisco State University.
Evil Code and how to defend against it CSCI 4300
Deconstructing API Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Web2.0 Secure Development Practice Bruce Xia
Chapter 1 The Software Security Problem. Goals of this course Become aware of common pitfalls. Static Analysis and tools.
SIF Data Collection 101 Melissa Marino Data Collection Supervisor October 2014.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
Forms Manager. What is Forms Manager? Forms Manager is a completely new online form creation and form data management tool.
10 Things You May Not Know About SharePoint Technology Arpan Shah Director, SharePoint Technology TPM Microsoft Corporation.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Unvalidated Redirects & Forwards
Web Application Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
Marking Scheme for Semantic-aware Web Application Security
1. ASSOCILATE DEGREE PROGRAM Application Attacks SUBMITTED TO: Fatima Ashiq SUBMITTED By: University Of Central Punjab Farooq Sardar (V1F16ASOC0012) Adnan.
Office 365 Enterprise Value
Virtualization & Security real solutions
2018 Real Cisco Dumps IT-Dumps
Strong Security for Your Weak Link:
CSC 495/583 Topics of Software Security Intro to Web Security
BlackBoard 5 A Definitive e-Learning Software Platform Ozgur Balsoy,
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Cross-Site Scripting Attack (XSS)
Doxing Phishers: Analyzing Phishing Attacks from Lure to Attribution
Presentation transcript:

Whats New in Service Pack 12

2 Educator Efficiency and Effectiveness Focused Insight Student Experience Administrator Efficiency and Effectiveness Blackboard Learn Service Pack 12+ the themes

3 Administrat or Efficiency and Effectivene ss Target Audience: Sys Admins

LEARN + ACCESSIBILIT Y

5 WAI-AA WCAG 2.0

7

8

9 TAKEAWAY:

LEARN+ SOCIAL AND CLOUD UPDATES

13 TAKEAWAY:

LEARN + ENTERPRISE INTEGRATION

9.1 SP12 Any SIS IMS Enterprise 1.1 B2 LIS 2.0 B2 Snapshot B2 LIS 2.0 IMS Enterprise 1.1 Other SIS LIS 2.0 SIS 2 3 XML/Flatfile LIS 2.0 capable SIS 1

1 2 3 Integration Process Tracking via Data Set Identifier Monitor Data Set Processing via Data Set Status Endpoint Cross-Integration Data Management Complete Refresh By Data Source 4

17 TAKEAWAY:

LEARN + SECURITY

Security Event Comment/Message Invalid or Missing Cross-site Request Forgery Nonce Detected Missing cross-site request forgery nonce for request authenticity and exception thrown. May be an indicator of a cross-site request forgery attack. Invalid URL Redirection Detected Invalid url in request and exception thrown. May an indicator of attempts to perform arbitrary redirects to malicious websites. Invalid Resource Link in Course Package Invalid resource link in course package detected and ignored due to. May be an indicator of attempts to gain unauthorized access to resources. Invalid Input Detected Invalid input detected and dropped. May be an indicator of attempts to perform phishing or cross-site scripting attacks. Inline Receipt Message Signature Validation Failure Detected and Exception Thrown Page not displayed due to missing inline receipt message signature and exception thrown. May be an indicator of attempts to perform phishing or cross-site scripting attacks. Security Library OWASP ESAPI B2 Not Available but is called Page not displayed and request not processed due to missing OWASP ESAPI Security Module B2 and exception thrown. Ensure the B2 is enabled since it is required.

21 TAKEAWAY:

CONTENT EDITOR IMPROVEMENTS

24 TAKEAWAY 1:

25 TAKEAWAY 2:

TOOL AVAILABILITY+ INFRASTRUCTURE IMPROVEMENTS

SP12 SP10

Rest API B2 Common Styles B2

29 TAKEAWAY: