Most industrial safety-critical systems are developed and validated following safety standards. However even though all safety standards address similar concerns with similar objectives, they are also domain-specific standards. The presentation results from the activity of a working group (formerly CG2E, now part of the recently set-up Embedded France) gathering industrial safety experts from aeronautics, automotive, industrial automation, nuclear, railway and space. The lecture will combine a presentation focused on one industry specific standard (the recent ISO 26262 for automotive), and complementary perspective in comparison with the standards in the other five mentioned domains. After the presentation of the history and position and the various regulation regimes, we will highlight some more technical topics e.g., integrated or external safety systems, fault prevention vs. fault tolerance, objectives vs. means prescription, probabilistic vs. deterministic arguments and the notion of criticality, integrity or assurance levels.
As the intricacy of Electronic Control Units (ECU) in present day vehicles has expanded, the requirement for automotive functional safety standard has turned out to be more goal. ISO 26262 standard tends to the all inclusive security hones required for planning basic car segments. We take a gander from an optimistic standpoint rehearses that will help you to plan ISO 26262-agreeable ECU programming.
From the Amazon Web Services Singapore & Malaysia Summits 2015 Track 2 Breakout, 'Containerized Cloud Computing' Presented by Sivaram Shunmugam Manager, Infrastructure Practice - Redhat
Most industrial safety-critical systems are developed and validated following safety standards. However even though all safety standards address similar concerns with similar objectives, they are also domain-specific standards. The presentation results from the activity of a working group (formerly CG2E, now part of the recently set-up Embedded France) gathering industrial safety experts from aeronautics, automotive, industrial automation, nuclear, railway and space. The lecture will combine a presentation focused on one industry specific standard (the recent ISO 26262 for automotive), and complementary perspective in comparison with the standards in the other five mentioned domains. After the presentation of the history and position and the various regulation regimes, we will highlight some more technical topics e.g., integrated or external safety systems, fault prevention vs. fault tolerance, objectives vs. means prescription, probabilistic vs. deterministic arguments and the notion of criticality, integrity or assurance levels.
As the intricacy of Electronic Control Units (ECU) in present day vehicles has expanded, the requirement for automotive functional safety standard has turned out to be more goal. ISO 26262 standard tends to the all inclusive security hones required for planning basic car segments. We take a gander from an optimistic standpoint rehearses that will help you to plan ISO 26262-agreeable ECU programming.
From the Amazon Web Services Singapore & Malaysia Summits 2015 Track 2 Breakout, 'Containerized Cloud Computing' Presented by Sivaram Shunmugam Manager, Infrastructure Practice - Redhat
Securing and Automating Kubernetes with KyvernoSaim Safder
Kyverno is a CNCF Sandbox Project Created by Nirmata.
Kyverno is a policy engine designed for Kubernetes. With Kyverno, policies are managed as Kubernetes resources and no new language is required to write policies. This allows using familiar tools such as kubectl, git, and kustomize to manage policies. Kyverno policies can validate, mutate, and generate Kubernetes resources. The Kyverno CLI can be used to test policies and validate resources as part of a CI/CD pipeline.
In this session Shuting Zhao and Jim Bugwadia, both of whom are Kyverno maintainers will provide an overview of Kyverno and describe how you can get started with using it.
AUTOSAR compliant automotive software development is the new norms. From MCAL driver development to AUTOSAR migration and testing, the FAQ gives a lot of answers.
https://www.embitel.com/product-engineering-2/automotive/autosar/
Inroduction to Virtualization and Video Playback during a Live Migrated Virtual Machine hosting the server with its time analysis.
OS- Ubuntu
Hypervisor- KVM
Xen on ARM for embedded and IoT: from secure containers to dom0less systemsStefano Stabellini
Hypervisors are becoming increasingly widespread in embedded environments. Their use-case is different from server virtualization, and so are their requirements. The ability to run containerized applications is often a requirement. Xen on ARM is embracing the new challenges with innovative solutions.
This talk will discuss cutting-edge Xen on ARM features for embedded deployments, including dom0less, where multiple domains are started directly by Xen at boot. The presentation will explain the reasons why Xen is an excellent runtime environment for containerized apps and will introduce a new proposal for a Xen Project sub-project to create the ideal platform for secure containers in embedded.
This talk discusses the core concepts behind the Kubernetes extensibility model. We are going to see how to implement new CRDs, operators and when to use them to automate the most critical aspects of your Kubernetes clusters.
Trends in and features of automotive Linux, with an emphasis on Android. Presented at Google Developer Group in Mountain View, CA, USA on February 4, 2015.
GitOps with Amazon EKS Anywhere by Dan BudrisWeaveworks
Watch this recording here: https://youtu.be/U2n3oYuIIfc
Amazon EKS Anywhere is an open-source tool which helps you create and manage Kubernetes clusters on-premises. EKS Anywhere allows you to manage your Kubernetes clusters in a scalable and declarative manner with the help of GitOps, powered under-the-hood with CNCF Flux. In this session, Dan will share how EKS Anywhere integrates with Flux and uses GitOps workflows to manage the cluster lifecycle.
Resources:
AWS EKS Anywhere on GitHub: https://github.com/aws/eks-anywhere
AWS EKS Anywhere: https://aws.amazon.com/eks/eks-anywhere/
AWS EKS Anywhere docs site: https://anywhere.eks.amazonaws.com/
AWS EKS Anywhere: Managing a Cluster with GitOps: https://anywhere.eks.amazonaws.com/docs/tasks/cluster/cluster-flux/
Speaker Bio:
Dan is a Software Engineer on the AWS EKS Anywhere team, working on tools to help developers easily build and manage Kubernetes clusters on premises. In the past, Dan has worked as a System Administrator, DevOps Engineer, SRE, gardener, cook and professional door-knocker. When he’s not helping to build EKS Anywhere you can find him weeding the garden or in the kitchen working his way through another cookbook.
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and EntitlementsStefan Esser
iOS 8 specific security talk given at Ruxcon 2014 security conference. Includes description of kernel vulnerability used to break KASLR in Pangu 7.1 + TAIG 8.1.1 jailbreaks.
Find out about the requirement for ISO 26262 unit testing for car item improvement. Our Functional Safety experts additionally share with you the unit testing techniques and suggestion table, as characterized by ISO 26262 standard.
https://www.embitel.com/blog/embedded-blog/iso-26262-compliant-unit-testing-strategies-achieving-functional-safety-in-automotive
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
Securing and Automating Kubernetes with KyvernoSaim Safder
Kyverno is a CNCF Sandbox Project Created by Nirmata.
Kyverno is a policy engine designed for Kubernetes. With Kyverno, policies are managed as Kubernetes resources and no new language is required to write policies. This allows using familiar tools such as kubectl, git, and kustomize to manage policies. Kyverno policies can validate, mutate, and generate Kubernetes resources. The Kyverno CLI can be used to test policies and validate resources as part of a CI/CD pipeline.
In this session Shuting Zhao and Jim Bugwadia, both of whom are Kyverno maintainers will provide an overview of Kyverno and describe how you can get started with using it.
AUTOSAR compliant automotive software development is the new norms. From MCAL driver development to AUTOSAR migration and testing, the FAQ gives a lot of answers.
https://www.embitel.com/product-engineering-2/automotive/autosar/
Inroduction to Virtualization and Video Playback during a Live Migrated Virtual Machine hosting the server with its time analysis.
OS- Ubuntu
Hypervisor- KVM
Xen on ARM for embedded and IoT: from secure containers to dom0less systemsStefano Stabellini
Hypervisors are becoming increasingly widespread in embedded environments. Their use-case is different from server virtualization, and so are their requirements. The ability to run containerized applications is often a requirement. Xen on ARM is embracing the new challenges with innovative solutions.
This talk will discuss cutting-edge Xen on ARM features for embedded deployments, including dom0less, where multiple domains are started directly by Xen at boot. The presentation will explain the reasons why Xen is an excellent runtime environment for containerized apps and will introduce a new proposal for a Xen Project sub-project to create the ideal platform for secure containers in embedded.
This talk discusses the core concepts behind the Kubernetes extensibility model. We are going to see how to implement new CRDs, operators and when to use them to automate the most critical aspects of your Kubernetes clusters.
Trends in and features of automotive Linux, with an emphasis on Android. Presented at Google Developer Group in Mountain View, CA, USA on February 4, 2015.
GitOps with Amazon EKS Anywhere by Dan BudrisWeaveworks
Watch this recording here: https://youtu.be/U2n3oYuIIfc
Amazon EKS Anywhere is an open-source tool which helps you create and manage Kubernetes clusters on-premises. EKS Anywhere allows you to manage your Kubernetes clusters in a scalable and declarative manner with the help of GitOps, powered under-the-hood with CNCF Flux. In this session, Dan will share how EKS Anywhere integrates with Flux and uses GitOps workflows to manage the cluster lifecycle.
Resources:
AWS EKS Anywhere on GitHub: https://github.com/aws/eks-anywhere
AWS EKS Anywhere: https://aws.amazon.com/eks/eks-anywhere/
AWS EKS Anywhere docs site: https://anywhere.eks.amazonaws.com/
AWS EKS Anywhere: Managing a Cluster with GitOps: https://anywhere.eks.amazonaws.com/docs/tasks/cluster/cluster-flux/
Speaker Bio:
Dan is a Software Engineer on the AWS EKS Anywhere team, working on tools to help developers easily build and manage Kubernetes clusters on premises. In the past, Dan has worked as a System Administrator, DevOps Engineer, SRE, gardener, cook and professional door-knocker. When he’s not helping to build EKS Anywhere you can find him weeding the garden or in the kitchen working his way through another cookbook.
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and EntitlementsStefan Esser
iOS 8 specific security talk given at Ruxcon 2014 security conference. Includes description of kernel vulnerability used to break KASLR in Pangu 7.1 + TAIG 8.1.1 jailbreaks.
Find out about the requirement for ISO 26262 unit testing for car item improvement. Our Functional Safety experts additionally share with you the unit testing techniques and suggestion table, as characterized by ISO 26262 standard.
https://www.embitel.com/blog/embedded-blog/iso-26262-compliant-unit-testing-strategies-achieving-functional-safety-in-automotive
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
World renowned virtualization aficionados Eric Inch and Jason Cooper combine their collective 30 years of experience to provide a side-by-side comparison of the heavy hitters in application virtualization.
On one side: Microsoft App-V, part of the Desktop Optimization Pack and the Johnny-come-lately, streaming application packages to desktops and servers with ease.
On the other: VMware ThinApp, the 800-pound gorilla with a huge install base, incredible features, and a clear advantage over the up-and-comer.
Which of these sluggers will end up on top of the pile? View the Application Virtualization Smackdown slide deck to find out!
And for more information about this and other topics check our blog at www.cdhtalkstech.com.
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...VMworld
VMworld 2013
Anthony Davis, VMware
Bruce Perram, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld
VMworld 2013
Mark Ewert, VMware
Andy Philp, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Deploying PHP applications on the cloud can be a tricky task, especially when it comes to automation and clustered environments that scale up and down. If you’re looking for ways to improve or automate your code deployment methods and use continuous integration and delivery, this session is for you.
Application Explosion How to Manage Productivity vs SecurityLumension
Windows users today are more application oriented than ever, but that hunger often leads them to unsafe choices. In this presentation you’ll learn about the attributes of both free and commercial application security tools. You’ll also learn the key steps you need to follow to effectively accommodate user application needs without giving malefactors a foot in the door to your enterprise.
Željko je razvijalec pri podjetju INFINUM, kjer sodeluje pri razvoju različnih Android aplikacij. Na predavanju je detaljno predstavil kaj nam novega prinaša Android 5.0 kot so Material design, ART runtime, MultiDexSupport in drugo ter odgovoril na vprašanje, zakaj bo Android tudi v prihodnosti najbolj zastopljen operacijski sistem na področju mobilnih tehnologij.
Slides for a college course at City College San Francisco. Based on "Hacking Exposed Mobile: Security Secrets & Solutions", by Bergman, Stanfield, Rouse, Scambray, Geethakumar, Deshmukh, Matsumoto, Steven and Price, McGraw-Hill Osborne Media; 1 edition (July 9, 2013) ISBN-10: 0071817018.
Instructor: Sam Bowne
Class website: https://samsclass.info/128/128_S17.shtml
VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Ho...VMworld
VMworld 2013
Issy Ben-Shaul, VMware
Hanan Stein, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Similar to Application layering vs Application Isolation (20)
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
3. Agenda:
• Where we are today
• Application Virtualization
• ThinApp, App-V
• Application Layering
• Unidesk, AppVolumes, AppDisks
• Demo
• Summary
4. Where we are today
Application 1 Application 2
Group Policy
System Center
Script
Deployment
tools
Base image
Shared OS Resources
MSVCRT.DLLRegistry File explorer
Server
VM Template
VM Service
PXE Boot
MDT/System
Center
Some issues:
• Patch management
• Application Compability
• Application Security
• Software dependency
• Application testing
• Software rot & dll-hell
• The big bad image
• Application lifecycle
management
Fixes?
• Status Quo
• App virtualization
• App layering
5. Application Virtualization
Isolated
Application 1
Isolated
Application 2 Microsoft
App-V
Vmware
ThinApp
MSVCRT.DLL Registry
File explorer
Server
VM Template
VM Service
PXE Boot
MDT/System
Center
MSVCRT.DLL Registry
File explorer
Shared
Resources
Some common
properties:
• Virtual file tree and registry
• Includes its own software
dependency
• Can if allowed in the
package read/write to the
underlaying OS
• Each application is isolated
• Can be grouped together
• Streaming/Cached
6. Application Virtualization
Advantages
• No install required
• Fix application conflicts
• No registry and system
bloat
• Multiple runtime
enviroments
• Easier update
management
• Versioning
• Improved Security
• Easier to do app
customization
Disadvantages
• Bandwidth
Requirements
• I/O Requirements
• More Infrastructure
• Cost / Training
• Sequencing / Capturing
Apps that cannot be
virtualized
• Device drivers
• Boot services
• Applications part of the OS
• COM+
• Antivirus/firewalls
• VPN clients
7. Microsoft App-V 5
App-V Sequencing
machine
App-V
Management
Publishing
Reporting Server
App-V Database
Share
Non-persistent
SCS
Cache
Persistent ( RSDH)
Testing
Pros
• Infrastructure or
PowerShell
• Large support and
integration options
• App-V license included in
RDS CAL!
• Large Community
• Simple with Office
• Many recipies
Cons
• No support for Internet
Explorer sequencing
• Requires a client installed
on each host
• Consumes more disk I/O
8. Vmware ThinApp
ThinApp Capturing
File Repository
AppSync
Script/ESD
Testing
Pros
• Does not require any agent
• Deployed as reguler exe or
MSI
• Integrates into existing
deployment using MSI
• Can virtualize Internet
Explorer
• Autoupdates within
configuration
Cons
• No central management
unless you have Horizon
• No PowerShell support
• No built-in application
usage tracking
9. Application Layering
Some common
properties:
• Multiple virtual disks
merged
• May contain read/write
layers
• May seperated into
application/personal/os
layers
• Applications behave like
normal
• Mulitple applications can be
placed within the same
layer
• Write filters and seperating
I/O traffic Windows (OS)
Application 2
Application 1 (R)
Application 3
Personalization (R/W)
Layers
Machine
NTFS/File System Drivers
Mini filter driver
10. Application Layering
Advantages
• Simpler application
«capture»
• Delivery application
updates
• One image!
• Works with
drivers/services
• Can manage personal
data*
Disadvantages
• Some specific
hypervisor requirement
• No appliation isolation
• Yet another solution?
Things Apps that
cannot be layered
• Depending on the
vendor..
11. Unidesk
Windows (OS)
Application 2
Application 1
(R)
Application 3
Personalization (R/W)
Layers
Terminal Servers/VDI
Hypervisor
Unidesk Management
Applicance
Unidesk Cachepoint
Windows (OS)
Application 2
Application 1
(R)
Application 3
Personalization (R/W)
Layers
Copy layers to the host
Collection
Installation Machine
Advantages
• Can layer pretty much
everything
• Integrated within the
Hypervisor
• Support for Hyper-V, Azure
and ESX
• Support for RSDH, XenApp
and Horizon
Disadvantages
• Silverlight based console
• No instant app delivery
method
• Only on virtual machines
12. Citrix AppDisks*
Application 2
Application 1
Application 3
AppDisks
Terminal Servers/VDI
Hypervisor
Desktop Delivery
Controller
Orchestrate updates
Machine Catalog -
MCS
OS
MCS Master Image
Personalization layer
PVD
Preparation Machine
Advantages
• Integrated into Citrix
Studio
• Simple management
• Can be setup using Citrix
MCS or PVS
• Can be integrated with
either XenServer or ESX
Disadvantages
• Requires a Citrix
enviroment
• Virtual Machines only
• No Instant-app delivery
• Only layering for the
applications
Showing and regular machine with adobe reader installed and try to install a new version…..
Showing a simple application capturing on app-v and thinapp
Showing deployment of app-v using regular setup and SCS on App-V using multiple adobe reader versions
Showing I/O and network traffic
Showing rollout of ThinApp and auto updates using adobe readerShowing Internet explorer virtualized using ThinApp
Showing setup of application layering on appvolumes and and capturing process.
Show management and setup an application layering process (App volumes)
Show on how to attach and application layering at boot (Appvolumes)
Show how to attach an writeable volume to an machine (Appvolumes)
Show on how to create an collection of RSDH hosts using different layers in Unidesk management
Show how they merge on a virtual machine in Hyper-V manager
Login to the virtual machine
Add another applicaiton layer, reboot and notice the application
Bruke Client performance analyzer for å verifisere at det er en bra connection mot miljøet. Lage en configurasjonsfil for å laste ned office og innstallere med shared computer support (bruk eksisterende configurasjonsfil for å innstallere Office-pakken, UTEN OneDrive) mens den driver å laste inn, bruk tiden til å legge inn Office2016 Group Policy ADMX templates.
Når den er ferdig start den. Prøv deretter å innstallere 32-bits, vis at det ikke funker. Visst hvordan vi lager en app-v pakke i 32-bits, start den via App-V)
Vis hvilken versjon av Office som ligger der.
Start Office365 Pro Plus, vis at shared computer support ikke er aktivert, legg inn reg nøkkel for å fikse det. Vis at det ikke er noen produktnøkkel i imaget via cscript.exe "%programfiles%\Microsoft Office\Office15\ospp.vbs" /dstatus)
Authentiser og vis at tokenet blir generert i Lokal.
Start Skype for Buisness via RDP start video samtale via andre Pcen. Se på ytelsen som blir startet….Logg av.
Start Skype for Buisness via Citrix ICA, logg på Skype for Buisness. Start Video samtale på nytt, vis ytelsen på CPU og minne i sesjonen samt via i Performance monitor at traffiken går lokalt..