2013 Session Abstracts

Overview

CollaborationLocation 1 MobileLocation 2 SecurityLocation 3 Tech1Location 4 Tech2Location 5

Session 1 Tuesday – 11:15 AM Our Experiences with Collaboration The Theology of Mobile Ministry Latest tools and trends in cyber security Leveraging Hyper-V DNS

Session 2 Tuesday – 4:15 PM Communication Skills for Techies A panel on “Bring your own device” Reading your IPTables and Wireshark CWIS – A Case Study in Developing Information Tools for Missions A Gentle Introduction to SQL Queries

Session 3 Thurs-11:15 General Session – The state of Missions Security

Session 4 Thursday – 1:45 Collaboration is about Information Security Mobile Workshop: Sharing Content FROM Your Mobile Using Technology for Funding: How, Why, Legalities and Best Practices Hands On with Exchange Part A Samba 4: Where is it Now?

Session 5 Thursday – 3:30 IT Collaboration within a Multi-Site/Multi-Agency Mission Environment J Query Mobile Security Incidents and Responses Hands On with Exchange Part B Intro to WPF and XAML

Session 5 Thursday – 5:00 Infrastructure As Code

Session 1

Collaboration 1
Title: Our Experiences with Calloboration
Presenter(s): Panel
Abstract: We the leadership of ICCM 2013 will discuss the good, the bad, and maybe the ugly, about our collaboration during the planning and preparations for ICCM. We’ll talk a bit about tools we used and how well they worked (or didn’t work).We will also invite several others with similar experience in collaborating, especially doing so at a distance, to join the panel.There certainly will be some talk about specific collaboration tools, but just as much about the general methods of collaboration.
Mobile 1
Title: The Theology of Mobile Ministry
Presenter(s): Antoine RJ Wright
Abstract: The speed of acquisition and use of mobile devices presents a sociological argument for understanding mobile ministry. The emphasis on services and applications presents the technological arguments we are already well familiar with. This presentation will present some of the theological points for understanding and engaging mobile ministry.
Security 1
Title: Latest tools and trends in cyber security
Presenter(s): David Rhoades
Abstract:
Tech 1-1
Title: Leveraging Hyper-V
Presenter(s): Joseph Kejr
Abstract: This will be as much of a hands-on session as possible in configuring Hyper-V in Windows 2012. It will cover Failover Clustering, VM Replication, Cluster Shared Volumes, and backup strategies, among other topics.
Tech 2-1
Title: DNS
Presenter(s): David White
Abstract: This session will cover the basics of DNS and BIND. David will first introduce DNS concepts and why (and how) DNS serves are the backbone of the internet. David will cover several types of DNS records including A & CNAME records, MX records, and TXT, SPF, DKIM, & DMARC records. David will also discuss the difference between authoritative name servers and recursive (caching) name servers, and some security practices to consider related to these.Next, David will introduce BIND and cover some of its history before providing a quick tutorial on how to configure BIND as an authoritative name server (from the Linux CLI).A time for questions and discussion will be included at the end of the session.

Session 2

Collaboration 2
Title: Communication Skills for Techies
Presenter(s): Roy Campbell
Abstract:
  • Why are some smart people such idiots?
  • Why do we get offended when someone’s question requires a 20 minute

answer and all they wanted was “Yes” or “No”?

  • You work in the home office of a Cross-Cultural ministry. How many

cultures do you come across on a daily basis?

  • What does the Bible say about Living in Community?
  • How do we break community every day?
  • How can we build community – in our families, our jobs, and our community?
  • What does this have to do with me as a missionary tech?

These and other questions will be discussed and partially answered in the open session on Interpersonal Skills.

Mobile 2
Title: A Panel on “Bring Your Own Device”
Presenter(s): Antoine Wright
Abstract: This is a panel discussion for how to deal with the Bring Your own Device syndrome in your ministry. Bring your questions, bring your comments, bring your answers…
Security 2
Title: Reading your IPTables and Wireshark
Presenter(s): Tim Young
Abstract: This session will briefly go over the various main packets you will see on your network. We will then look at how you can see those packets using wireshark, and finally, we will read some iptables rules to see how your firewall blocks those packets. The end goal is that you can look at a Linux-based firewall appliance (or a generated IPTables firewall) and see how complex, or how simple, the firewall is.
Tech 1-2
Title: CWIS – A Case Study in Developing Information Tools for Missions
Presenter(s): Paul Liu & Jon Bainbridge
Abstract: CWIS is an integrated system created for Crossworld, a mid-sized church planting agency. I will talk about how it was created. This includes the process of thinking through needs, developing the code, testing and then rolling into production. We will also discuss opportunities for other ministries to use the tool and extend it for their own special needs. The current version is based on SOA structure built by Microsoft technology (MS.NET 2008, WCF/Web service, WPF, Ajax, SQL Server 2005/2008, Crystal Report, etc). It includes a Windows application and a web browser application. It is used for bridging the gap between the needs of a missions and what the off-the-shelf donor/accounting software can provide. It includes Personnel system, Support Chart system, Accounting Statement/eStatement system, Medical Claim system, Donor Receipt/eReceipt/Postcal Office Barcode Receipt system and Reporting system, among others.
Tech 2-2
Title: A Gentle Introduction to SQL Queries
Presenter(s): Andy Sturt
Abstract:

Session 3

General Session
Title: The State of Missions Security
Presenter(s): Bram & Wouter
Abstract:

Session 4

Collaboration 4
Title: Collaboration is about Information Security
Presenter(s): Bob Blackwell
Abstract: For small to medium sized ministries, with the usual 1, 2 or even 3 man IT shops, the primary motivation to collaborate should be the need for information security and not to save money. If it is only to save money, there are better and easier ways. But, for those of us needing quality information security for our ministries, the needs and technologies, and opposition, have long since exceeded our resources…and are burning us out.But, IT collaboration for security, when IT is tightly staffed, ironically enough requires trust amongst the collaborators.Kevin Weaver will join in a short presentation of arguments on why we think these things are so, a presentation on concepts developed (and almost implemented) when 5 mission agencies in the Philadelphia area worked towards completely collaborating their IT resources, and an open discussion on how to move forward and some of the obstacles to such.At least half of the session will be devoted to open discussion. The hope is to be able to continue the discussion beyond ICCM towards implementation.
Mobile 4
Title: Mobile Workshop: Sharing Content FROM Your Mobile
Presenter(s): Antoine RJ Wright
Abstract: The challenge for many ministries who want to go about using mobiles in ministry is that the practice of sharing info when on the field doesn’t match what’s done at home. This will be a workshop demonstrating methods of how to share content from mobile devices using several conventional and unconventional methods. Attendees will be active participants and all will be required to use some kind of mobile device during this session.
Security 4
Title: Using Technology for Funding: How, Why, Legalities and Best Practices
Presenter(s): Mark Stephan
Abstract: Fundraising and Partnership development is vital to the missions effort. Not only for funding but also developing advocacy and mobilizing prayer and engagement for the missions effort. With the advent of technology there are a lot of options for fundraising, but not all of them are equal, or even legal for Missionaries and churches to use. This presentation will talk about these issues and best practices.
Tech 1-4
Title: Hands On with Exchange Part A
Presenter(s): Carl Armstrong
Abstract: In December of 2012 Microsoft released the newest version of Exchange. Exchange 2013 brings some changes to how you manage and use email. This session will be spread across Session 4 and Session 5 so there is enough time to do the hands on labs. This session will also familiarize you with Server 2012 because we will be installing Exchange 2013 into Server 2012 on Hyper-V 2012.Exchange 2013 Information: • Changes to Exchange 2013 • Upgrade Paths for existing Exchange users • Exchange 2013 Best Practices • Offline Outlook Web AccessHands On Labs: • Install Exchange 2013 on Server 2012 • Manage Exchange 2013 • Database Backup • Database Restore • Restore of single deleted items • Creation of Database Availability Group for High Availability • Litigation Hold
Tech 2-4
Title: Samba 4: Where is it Now?
Presenter(s): Chuck Tryon
Abstract:

Session 5

Collaboration 5
Title: IT Collaboration within a Multi-Site/Multi-Agency Mission Environment
Presenter(s): Panel, representing OM and SIM, among others
Abstract:
Mobile 5
Title: J Query Mobile
Presenter(s): Phil Senn
Abstract:
Security 5
Title: Security Incidents and Responses
Presenter(s): David White
Abstract: A roundtable sharing of the stories of our security mishaps, how we dealt with them, and what we learned from them. As well as things we could do to avoid having them next time.
Tech 1-5
Title: Hands On with Exchange Part B
Presenter(s): Carl Armstrong
Abstract: In December of 2012 Microsoft released the newest version of Exchange. Exchange 2013 brings some changes to how you manage and use email. This session will be spread across Session 4 and Session 5 so there is enough time to do the hands on labs. This session will also familiarize you with Server 2012 because we will be installing Exchange 2013 into Server 2012 on Hyper-V 2012.Exchange 2013 Information: • Changes to Exchange 2013 • Upgrade Paths for existing Exchange users • Exchange 2013 Best Practices • Offline Outlook Web AccessHands On Labs: • Install Exchange 2013 on Server 2012 • Manage Exchange 2013 • Database Backup • Database Restore • Restore of single deleted items • Creation of Database Availability Group for High Availability • Litigation Hold
Tech 2-5
Title: Intro to WPF and XAML
Presenter(s): Paul Nielsen
Abstract:

Session 6 (Mini Session)

Collaboration 6
Title:
Presenter(s):
Abstract:
Mobile 6
Title:
Presenter(s):
Abstract:
Security 6
Title:
Presenter(s):
Abstract:
Tech 1-6
Title: Infrastructure as Code
Presenter(s): James Gifford
Abstract: Modeling your IT infrastructure as code has numerous advantages, including the ability to version your infrastructure, find drastic changes, and to consistently create new systems. In this session, we will cover puppet and chef, two of the leading configuration management tools available, and the advantages, and disadvantages, of each.
Tech 2-6
Title:
Presenter(s):
Abstract:
Top