Changes for document Session OW2 Project Spotlight

From version 24.1
edited by Catherine Nuel
on 2012/10/23 17:45
To version 25.1
edited by Selvalakshmi R
on 2012/10/29 12:41
Change comment: There is no comment for this version

Metadata changes

Document author

Content changes

... ... @@ -11,17 +11,17 @@
11 11
12 12 ===== DocDokuPLM: Product Structure - Digital MockUp visualization using HTML5 =====
13 13 **Speaker:** Florent Garin, DocDoku
14 -**Schedule** Wednesday Nov 28, 12:00 - 12:15am
14 +**Schedule** Wednesday Nov 28, 12:00 - 12:15pm
15 15 **Abstract:** DocDokuPLM (Product Lifecycle Management) is a middleware solutions aim at managing the entire lifecycle of a product from its conception to its disposal through the manufacturing stage. PLM systems involve the whole enterprise, they gather at a central point data, business processes and people. They expose backbone services for the company, their partners and their subcontrators thus we design our PLM with the extended enterprise concept in mind. On the technical part we made the decision to not rely on any native code on the client side all the features must be accessible through a regular web browser. If that seems quite obvious nowadays and doesn’t represent a big challenge for the “Document Management”, “Product Configuration”, “Change Management” or “Bill of Materials” modules that tends to be far more complex when developing the data visualization of the product structure. This session will focus on how we implemented the visualization and the manipulation of the Digital MockUp (DMU) using HTML5 technologies. We’ll explain the difficulties we encountered and also the various optimizations we made in order to render a model with thousands part. And obviously we’ll show a real demonstration !
16 16
17 17 ===== Building an application on the SugarCRM platform =====
18 18 **Speaker:** John Mertic, SugarCRM
19 -**Schedule:** Wednesday Nov 28, 12:15 - 12:30am
19 +**Schedule:** Wednesday Nov 28, 12:15 - 12:30pm
20 20 **Abstract:** Need to build an application to run part of your organization? One approach is that you could start writing something from scratch, perhaps leveraging an existing general purpose framework to help get you going. However, even if you use a framework, there's still the need to build all those standard components such as user interface, workflow, and ACL security, which can take quite some time to design and code. There's no need to start from scratch; SugarCRM is designed as a Rapid Application Development platform. In this session you'll learn the basics on how to build a business application on the Open Source SugarCRM platform
21 21
22 22 ===== VESPA: Multi-Layered Self-Protection for IaaS Clouds =====
23 23 **Speaker:** Marc Lacoste
24 -**Schedule:** Wednesday Nov 28, 12:30 - 12:45am
24 +**Schedule:** Wednesday Nov 28, 12:30 - 12:45pm
25 25 **Abstract:** Self-protection has raised growing interest as possible element of answer to the cloud protection challenge. Faced with multiple threats and heterogeneous defense systems, the autonomic approach proposes simpler, stronger, and more efficient cloud security management. Previous solutions fall at the last hurdle, overlooking one or several key desirable features such as flexible security policies, cross-layered defense, multiple control granularities, and open security architectures. This talk presents VESPA, an open self-protection architecture and framework for cloud infrastructures that overcomes the previous limitations. Developed in the OpenCloudWare project, VESPA adopts a policy-based management approach, and allows a two-level regulation of security, both within a software layer and across layers. Flexible coordination between self-protection loops allows enforcing a rich spectrum of security strategies such as cross-layer detection and reaction. A multi-plane, extensible architecture also enables simple integration of commodity detection and reaction components. Evaluation results on a VESPA KVM-based implementation show that the design is applicable for effective and yet flexible self-protection of cloud infrastructures.
26 26
27 27