November 10, 2010 Washington, D.C.. Agenda Secure Component tool Secure Component tool Contacts and Messaging Contacts and Messaging Workspaces Workspaces.

Slides:



Advertisements
Similar presentations
Microsoft ® Office OneNote ® 2007 Training Using your Notebook to its fullest potential Kent School District presents:
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Whats New in Microsoft Office 365 Module 01 | Daniel Sierra | Account Technology Strategist Microsoft Education México.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 14 Upgrading to Exchange Server 2003.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Oracle Beehive Vivek Pavle Orabyte LLC Orabyte.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Overview of Office 2003 Corinne Hoisington Central Virginia Community College.
Services Course Live SkyDrive Participant Guide.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
| Copyright© 2010 Microsoft Corporation What’s New in Office New user interface Role based access Identity federation (eliminate sign-in client)
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Moodle Integration with Microsoft Seree Chinodom Kittisak Onuean BURAPHA UNIVERSITY Powerful Tool for MoodlePowerful Tool for Moodle.
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Pasewark & Pasewark 1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2007: Introductory.
ETP Reloaded e-Commission Technological Platform Upgrade to Microsoft Office 2003 DIGIT Adapted to DG SCIC.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
| | Tel: | | Computer Training & Personal Development Microsoft Office PowerPoint 2007 Expert.
SharePoint and SharePoint Online: Today and what's next? Presented by Luke Abeling – IT Platforms.
Connecting Businesses and Staff Tools for the Virtual Office  Microsoft Groove Office Collaboration Software  Skype VOIP Telephone  Transferring Files.
By: Amber Shepard   Microsoft Outlook is an client and personal information manager (PIM) that's available as part of Microsoft's Office suite.
MIGRATING FROM MICROSOFT EXCHANGE SERVER AND OTHER MAIL SYSTEMS Appendix B.
Office Live Workspace Visio 2007 Outlook 2007 Groove 2007 Access 2007 Excel 2007 Word 2007.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Module 9 Configuring Messaging Policy and Compliance.
Configuring Directory Certificate Services Lesson 13.
Word Lesson 13 Sharing Documents Microsoft Office 2010 Advanced Cable / Morrison 1.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Module 7 Planning and Deploying Messaging Compliance.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Lesson 4: Sharing and Collaborating
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
The SharePoint Shepherd’s Course for End Users Based on the book by Robert L. Bogue Copyright 2011 AvailTek LLC All Rights Reserved.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
The best independent Business Instant Messenger any organization can get.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
Power Point Mistakes Contrasting background and text Microsoft Office PowerPoint 2007 enables users to quickly create high-impact, dynamic presentations,
Introduction to the Secure Component
Using E-Business Suite Attachments
Gareth Johns IT Skills Development Advisor
MICROSOFT OUTLOOK and Outlook service Provider
Services Course 9/9/2018 3:37 PM Services Course Windows Live SkyDrive Participant Guide © 2008 Microsoft Corporation. All rights reserved.
Lesson 9 Sharing Documents
Workspaces and Hypothetical Case
Quick Comparison of workspaces
Using Groove Philip S. Vavalides Professor - IT/Networking Guilford Technical Community College Jamestown, NC.
Course Overview and Install Procedure
Contacts and Messaging
Gareth Johns IT Skills Development Advisor
Lesson 14 Sharing Documents
SharePoint Foundation 2010
SharePoint services Provides team collaboration through SharePoint Sites and makes it easy for communities to work together on documents, tasks, contacts,
Presentation transcript:

November 10, 2010 Washington, D.C.

Agenda Secure Component tool Secure Component tool Contacts and Messaging Contacts and Messaging Workspaces Workspaces Hypothetical Case Hypothetical Case

Communication (Instant Messaging) Information Sharing (Workspaces) Coordination Groupware Common Goals and Objectives What is Groupware?

Security (Encryption) Communication (Instant Messaging) Information (Workspaces) Coordination Groupware Secure Groupware Common Goals and Objectives

Message is not encrypted Message can be intercepted Message can be altered Message is not confidential Internet Attached documents are not encrypted Both message and attachments can be intercepted Both message and attachments can be altered Both message and attachments are not confidential vs. Secure Groupware

Message remains encrypted when stored in the hard drive and while in transit Internet Message is encrypted all the time Message can not be deciphered Message can not be altered vs. Secure Groupware If user is behind a off-line, OAS servers are used Authenticity, Integrity and Availability

Initial Considerations Facilitate communications among points of contact on Mutual Legal Assistance. Facilitate communications among points of contact on Mutual Legal Assistance. Confidentiality of the information: Confidentiality of the information: No central database No central database No OAS Member State has control over the application No OAS Member State has control over the application SG/OAS has no access to the information shared by the participants SG/OAS has no access to the information shared by the participants Decision in 2003: Groove Networks Groove Networks

Evolution of the Plataform 2003 – Implementation of Groove Networks 2005 – Microsoft acquires Groove Networks 2007 – Microsoft integrates Groove to Office – Microsoft SharePoint Workspace 2010 Integration with content management platform

2007- OAS/Microsoft agreement 2007 version available in: EnglishSpanishFrenchPortuguese Technology upgrade: Evolution of the Plataform

New platform only works in 64-bit platforms New platform only works in 64-bit platforms 32 Migration to new 64-bit servers required Migration to new 64-bit servers required Upgrade Windows 2000 to Windows bit Upgrade Windows 2000 to Windows bit Technology Upgrade The SG/OAS has upgraded the current platform to its latest version

ManagementServer Management Server Relay Server Groove 3.1 Windows bit 32-bit Storage Area Network Windows bit 64-bit 64-bit Office Groove 2007 Relay Servers ManagementServer Management Server Technology Upgrade

Components of Groove within the OAS Infrastructure Microsoft Office Groove 2007 GrooveUsersGrooveUsers Public and Private components

Security Authenticity, Integrity and availability of the information contained in the local hard drive and while in transit Authenticity: information is only available to the intended recipient Integrity: information is never altered or modified Availability: information is always available and ready to be used when desired Use of Certificate Authority (CA) and Public Key Infrastructure (PKI) High encryption standards used

Secure Communications System Definition: It is a software that allows groups of geographically separated individuals to work together securely over public networks such as the Internet. Security is always enabled and it is not optional.

Secure Communications System Features Efficient use of the Network – Bandwidth optimization Synchronization – can be used off-line Security is always enabled Data encryption – local and while in transit Compatibility with MS Office applications User awareness Alerts Users decide who they share information with Easy to use

Launchbar Contacts panel Contacts panel Workspaces Workspaces Common tasks Common tasks

Status Indicators Active Active Online Online Online – No Activity Online – No Activity Offline Offline New Content New Content

Alerts Notifications of status change, content updates and user presence ContactsWorkspacesContent

Contacts Panel The contact panel shows the list of every participant added. This panel is different from the contact panel that appears in the Workspaces Options in the contacts panel: Adding contacts using the Search functionality Deleting contacts Show contacts status

Messaging Messages can be sent to an individual or a group Messages can contain text, pictures, documents or audio Messages are sent immediately if the receiver is online. If the receiver is offline, the message is held until he/she reconnects Large files should be shared creating a Workspace Message History

The message history maintains a list of sent and received messages

Workspace Definition A workspace is a place for information sharing among individuals with common goals and objectives A workspace is a place for information sharing among individuals with common goals and objectives

Workspace Definition The information within a Workspace is highly dynamic The information within a Workspace is highly dynamic The information is synchronized instantaneously with the online members of the Workspace The information is synchronized instantaneously with the online members of the Workspace Any change in the Workspace is synchronized with offline users as soon as they reconnect Any change in the Workspace is synchronized with offline users as soon as they reconnect Only Workspace members can access the information shared in that Workspace Only Workspace members can access the information shared in that Workspace

Workspace Elements Files panel Workspace members Chat for EVERY member of the Workspace Common tasks Folders panel Message history Files panel Workspace members Chat for EVERY member of the Workspace Common tasks Folders panel Message history

Workspace Contacts Allows to choose who to share the information with Allows to choose who to share the information with Allows sending messages to Workspace members Allows sending messages to Workspace members Allows to Chat with EVERY member of the Workspace Allows to Chat with EVERY member of the Workspace Allows sharing Word documents, presentations, pictures or any other file type Allows sharing Word documents, presentations, pictures or any other file type

User Roles User Roles Manager – changes roles and rights Manager – changes roles and rights Participant – adds documents and invites contacts Participant – adds documents and invites contacts Guest – read only Guest – read only Folder permissions configuration Folder permissions configuration Features in a Workspace

Hypothetical Case

November 10, 2010 Washington, D.C.

Encryption Algorithms RSA 2048-bits ElGamal 1536-bits MARC4 192-bits ESIGN 1536-bits AES 192-bits MARC4 256-bits AES 256-bits IdentityIdentity MessagesMessages WorkspacesWorkspaces Hard Disc Management Server Relay Server FeatureAlgorithm

Security

On-line Course “E-Learning” platform MS Office Groove 2007 Available in English and Spanish