Wet Open Overheid (WOO) vergt nu al voorbereiding

De Wet Open Overheid (WOO) wordt begin 2017 behandeld door de Eerste Kamer. Maar door de organisatorische en technische veranderingen die deze wet vergt voor overheidsorganisaties is het belangrijk om nu al bij de consequenties stil te staan. Door nu al rekening te houden met de toekomstige wettelijke verplichtingen is de organisatie beter in staat om, na inwerkingtreding, spoedig te voldoen aan de eisen van deze wet.

Half december heeft Minister Plasterk de door de Eerste Kamer gewenste Quick Scan naar de implementatiekosten van de WOO aan de kamer gestuurd. Uit deze Quick Scan komt naar voren dat bij inwerkingtreding van de WOO, er extra ICT-investeringen nodig zijn van vele honderden miljoenen euro’s. De geschatte kosten geven aan hoeveel werk eraan komt, en het is handig om daar bij nieuwe projecten direct rekening mee te houden.

Meer weten over het vervolg van de wet? En welke organisatorische en technische consequenties deze wet heeft? Lees de volledige blog op: https://www.vka.nl/blog/wet-open-overheid-woo-vergt-nu-al-voorbereiding/

Enterprise Mobility vraagt om Security-by-Design

Uit de 2de nationale Benchmark voor Enterprise Mobility van VKA blijkt dat alle deelnemende organisaties mobiele apparaten uitgeven aan hun medewerkers. Echter, 1 op de 8 organisaties heeft geen oplossing om deze apparaten te beheren. Juist wanneer u mobiele apparaten uitgeeft is het belangrijk de informatiebeveiliging vanaf het begin goed te regelen.

Het uitreiken van mobiele apparaten zorgt volgens het Nationaal Cyber Security Center (NCSC) voor nieuwe beveiligingsrisico’s binnen uw organisatie. Het NCSC definieert voornamelijk risico’s op het gebied van (on)bedoeld lekken van informatie. Deze risico’s zijn veelal technisch van aard. Echter, thema’s als reputatieschade of verlies van belangrijke gegevens hangen hier ook mee samen. Daarom is het belangrijk dat u vooraf keuzes maakt over de beveiliging van de informatie.

Het apparaat beveiligen of de applicatie?

De belangrijkste vraag ten aanzien van de beveiliging is of het apparaat zelf beveiliging nodig heeft (Mobile Device Management, MDM), of de bedrijfsinformatie binnen de bedrijfsspecifieke apps (Mobile Application Management, MAM).

Verder lezen? Lees de volledige blog op: https://www.vka.nl/blog/enterprise-mobility-vraagt-om-security-by-design/

ARCHITECTEN INNOVEER!

Organisaties worden geconfronteerd met steeds meer nieuwe en soms disruptieve technologieën. De architect speelt een cruciale rol om hiervan de vruchten te plukken. Dit vergt van hem een mindset waarin verbinden centraal staat.

In een steeds sneller innoverende wereld wordt een andere mindset van de architect gevergd. De architect stelt zich hierbij op als verbinder die vooral de kansen wil uitproberen die nieuwe technologie biedt voor de organisatie. Door te werken met kleine en snelle pilots wordt een snelle introductie van de nieuwe technologie bij de business gerealiseerd. Dit zorgt er tevens voor dat de consequenties voor de architectuur snel duidelijk zijn, die hij zal moeten vastleggen in beknopte en toegankelijke documenten. De architect blijft zo betrokken bij de innovaties die daadwerkelijk worden omgezet tot ‘going concern’ en heeft de fantastische rol deze ook te initiëren.

Lees  de volledige blog op: http://www.vka.nl/blog/architecten-innoveer/

DE ARCHITECT IS DE ONMISBARE DUIZENDPOOT IN EEN SCRUM TEAM

Een van de principes van het Agile manifesto luidt: “The best architectures, requirements, and designs emerge from self-organizing teams”. Een architect zorgt voor verbinding in, en tussen, de zelfsturende teams. Maar ook voor commitment aan de vastgestelde architectuur principes en richtlijnen van de organisatie. In de praktijk wordt de rol van solution architect vaak vergeten in scrum teams, terwijl de rollen ‘ontwikkelaar’ en ‘tester’ wel expliciet worden benoemd. De rol van de solution architect is een essentiële en onmisbare rol binnen een Scrum team.

Lees de rest van de blog op de site van VKA: http://www.vka.nl/blog/architect-scrum-agile/

Using Bing Maps within SharePoint 2013

joost

Today I was preparing a SharePoint 2013 demonstration for the conference Overheid & ICT 2014. This is a large conference within The Netherlands where all kinds of governments can see new innovations and possibilities on IT.  For this conference we decided to go along with a whole bunch of solutions we‘ve created of the past few years. One of them where SharePoint project sites. In order to show some more information and to answer a question of a customer, who recently asked If we are able to provide map data on a SharePoint site I decided to display some data on a map as well. I thought this was going to be hard, however with SharePoint 2013 it turned out to be quite easy. Based on this blog, I was able to fix it within 20 minutes. Here is how I did it.

Requesting a Bing key

First of all, you need to request a Bing key. To request a key, navigate to the URL: http://www.bingmapsportal.com/. Using this website you are able to login, or create a new account using your Microsoft credentials. After registering, you are now able to generate key’s. The key is used as a authentication provider, when no key is provided a bar will be shown in the middle of your maps, stating that you are not authenticated. All of the information on Bing Maps will be entered using this key. I suggest you would use a company account to request the key

You are able to generate multiple key’s. So when you want to create something for another SharePoint farm, request a new key, in order to separate al of the Data flows. Especially when developing a commercial website, a lot of request can bring some additional costs.

Preparing SharePoint

When a new key is generated, please copy the key. The key now needs to be imported into SharePoint. This is done using PowerShell. In order to do this login to your SharePoint server, open a SharePoint Management Shell and enter the following command:

Set-SPBingMapsKey –BingKey “<Enter a valid Bing Maps key>”

When the key is imported a new column needs to be created. As we work mostly with site columns and content types, a little PowerShell Script can be used to create the column. The most interesting part, is that a certain field type, namely GeoLocation, is used. Apparently this is a default field type within SharePoint 2013 which can be used. In order to create such a column, use the following PowerShell command:

$weburl = "http://<website_address>"
$fieldXml = "<Field Type ='Geolocation' DisplayName='GPS Location'/>"
$web = Get-SPWeb $weburl
$fieldName = $web.Fields.AddFieldAsXml($fieldXml)
$web.Update()

When entering the correct URL the column will be created on that site. In order to change the name of the column change the term <GPS location>, and provide a name that is convenient for you.

The last thing is that this column needs to be added to a content type, and the content type needs to be added to a list. In that case you can use the column.

Entering data and displaying it in Views

After the column is created you can enter data. Normally the column is shown in two lines. However when you click “Specify location” a pop-up appears where the longitude and latitude can be entered, see figure below. Enter both the longitude and the latitude in the separate textboxes.

image

After entering the data and saving the item, the location is stored in the list which is being used. When the ‘GPS location’ column is added to the view a globe is shown in your view. When clicking the globe, it displays the location of the item. See figure below.

image 

New View

Using this type of column within a view, also offer you the possibility of creating a new type of view. When creating a new view it is possible to create a ‘Map view’. Within this view, a map is shown with pointers to items incorporated in the view. Whenever filters are applied, the items outside of the filter will not be shown. On the left side of the map, all items will be shown, when hovering an item, it will be shown in blue on the map. An example of the map view is shown below.

image

Conclusion

In the end using this kind of columns offer a whole lot new possibilities. The relative ease of use of this column, makes sure that it is incorporated in solutions easier and out of the box it provides already a lot possibilities. Using such a column I can see a lot of new possibilities appearing within SharePoint.

How to: Test Incoming Enable Libraries in SharePoint

joostFor a project I am currently involved with, we had to create email enabled libraries within SharePoint. At first sight this wasn’t such a problem and we’ve created an installation manual in order to configure all parts related to the Incoming mails. The part of installing and configuring all parts is heavily discussed all over the Internet and the document we’ve created was mainly based on the Blog written by Harmeet Walia. However due to some technical limitations we were not able to test the entire mail flow to date. However we really would want to test the pickup of the messages from the mail server and wanted to see them added to the configured library.

The only option I thought of was with the Command Prompt. However out of the box this isn’t possible, on the other side the good news was that sending emails using command prompt can be done using a Telnet session. The Telnet client can be installed from the Windows Server 2008 R2 Server Manager.

When everything is in place, it is possible to send the email to the SMTP service. In order to do so, first start Command Prompt as an Administrator.

Next execute the following command:

telnet {Server FQDN} 25

In the above mentioned command line first the program Telnet is used. Second the server name to which the connection needs to be set-up is defined, this needs to be the FQDN of the server. And the last part (here 25) is the port number. For mail client’s in most cases port 25 is being used.

When the Enter button is hit, a connection to the server is made. We see a new screen within the Command Prompt and we can start defining the email. First we have to configure several parts. In order to do this, execute the following command lines.

helo {server FQDN}
mail from:{your email address}
rcpt to:{email address of email enabled library}
data

Within the first line we say hello to the SMTP server (the helo as spelled above is the correct spelling format!). Don’t ask me why this has to be done with this spelling, but it has to be done anyway. Second you have to add a valid email address from which the mail is being send, and next to recipient of the email needs to be configured, which is in our case the email enabled library. Finish this block with data. When the Enter button is being hit, the message can be configured. For configuring the e-mail, use the following example:

From: joost.van.lier@centric.eu
Subject: test email

this is a test e-mail
Hello World
sent from Command Prompt
.

The From and Subject address are being displayed in you message. This can be any valid value. After hitting Enter twice it is possible to configure the body of the email. in this case we have defined three lines (but can be more or less). When the entire email is configured, a dot (.) needs to be entered in the Command Prompt. By entering a dot it is declared that the message is done and can be send. In this case the message is sent and queued on your SMTP server.

Microsoft Lync Server: People I Manage Calls for

joost

The last several weeks I received various questions regarding the group ‘People I Manage calls for’. During the roll-out of the Lync client users were confronted with this default group in Lync. For a lot of users the purpose of this group was unclear and raised questions about the colleague’s which were mentioned into this group.

Within this blog I want to answer the questions regarding the purpose of this group and I want to explain the steps which are required to clean up this group and makes sure that the group is filled with the proper colleague’s.

Purpose of the group
The group ‘People I Manage Calls for’ is part of the delegation model for Lync 2010 and 2013. Using this group users are able to receive and make calls on another persons behalf. By using the Lync options the user is able to configure whether or not the calls of the delegates needs to be picked-up. The initial filling of this group is based on the delegation that is configured within Exchange. Within Exchange delegation is also configured on a users mailbox. As Lync and Exchange have some good integrations, the delegates from Exchange are thus synchronized with Lync and will be displayed into this group. However users are still able to change their delegates manually within Lync.

By configuring the delegates section, users are also able to transfer calls to the configured delegates. This is especially useful when the Lync users goes on holiday’s and a direct colleague of the users should respond to the incoming calls. By transferring the calls to this particular colleague the calls aren’t missed and responded immediately.

Disable Exchange synchronization
As mentioned before the initial set-up of the group is done by the Exchange delegation. Within Exchange it is possible to delegate permissions to other users in order to send e-mails and to create and respond on meeting invitations. Setting these permissions will be done through Outlook from ‘Options’ –> ‘account settings’ –> ‘delegate permissions’.

During the implementation of Lync (2010 and 2013) the synchronization of the delegates between Exchange and Lync will be configured automatically. When the delegates in Exchange are configured they will also be added in Lync. In order to stop the synchronization between Exchange and Lync the first command listed below have to be executed. When delegation is not required at all, the second command have to be executed as well.

Set-CsVoicepolicy -EnableDelegation $false
Set-CsClientpolicy -EnableExchangeDelegateSync $false

Delete people from the group
It is possible to manually delete the delegates from this group. However it is important to disable the Exchange Synchronization first, cause if this isn’t done the changes that are made in the Lync delegate group are lost throughout the day when the Exchange synchronization is performed. Therefore it is important to disable the synchronization with Exchange.

Lync Delegation

To delete the people from this group, navigate within Lync to ‘options’ –> ‘Transfer calls’ –> ‘edit my delegates’. From this pop-up it is possible to delete the colleagues which are listed as delegates. See picture below for the pop-up that appears after clicking on ‘Edit my delegates’. By selecting a delegate and hit the ‘remove button’ the delegate is being removed.

Conclusion
Setting up delegates can be a powerful tool when being used within a department. Especially the director, secretary delegation is a powerful tool. However it is important to notice whether or not the Exchange delegation is configured properly and representative. Whenever this isn’t the case, the Exchange synchronization should be turned off in order to make sure that delegation can be configured independently for the Lync user.

When delegation is important into your organization, make sure that delegation is configured properly within Exchange. When the synchronization is configured these settings will be used within Lync as well. Even from the start of deploying Lync, these delegation permissions can be used within Lync in order to enable powerful scenario’s. When using this kind of synchronization, instruct the users very well that the delegation can be edited through Outlook and that this should be the only place where delegation needs to be configured.