This document provides an overview of application streaming and virtualization technologies. It discusses what application streaming is, how application isolation environments work through file system, registry, and object redirection rules. It then summarizes several major application virtualization solutions including Microsoft App-V, VMware ThinApp, CloudVolumes, Symantec SVS, Spoon, Numecent Jukebox, FSLogix, and Sandboxie. It also discusses how Windows provides some virtualization capabilities through UAC and application compatibility shims. In conclusion, it recommends considering simple virtualization solutions or SaaS-based services and reviewing a detailed comparison of vendors.
Microsoft App-V 5.1 and Flexera AdminStudio WebinarFlexera
Steven Thomas, Senior Consultant at Microsoft specializing in Desktop and Application Virtualization talks with Flexera about current recommended processes and developments with App V 5.1 as well as the future of application virtualization.
Forrester Research on Globally Distributed Development Using SubversionWANdisco Plc
On December 3, 2009, Jeffrey Hammond, Senior Analyst at Forrester Research presented the findings of a WANdisco customer using Subversion MultiSite. Mr. Hammond and members of Forrester Research's consulting team will explain the reasons behind Subversion's rapid ascent to the leadership position in the SCM space, and discuss the findings of the TEI study.
The subject of the study was a Global Fortune 500 company in the semiconductor industry using Subversion MultiSite at locations in the United States and Asia.
Forrester found significant benefits and cost savings in a broad range of areas due to Subversion MultiSite's ability to provide remote users with real-time access to Subversion repositories and eliminate downtime.
System Center Operations Manager is a big deal.
On April 24th, Erik Gilreath discussed SCOM and uncovered: why SCOM is so rarely installed, why that's a mistake, easy steps to install, what you should be doing with it, and what it can do that other people's products can't.
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
Today, everything has to be patched. From desktop and laptop to server and every operating system in between. With compliance, what we have to pay attention to is what’s actually out there on our network – not just what you wish were there.
Servers (Windows, UNIX and Linux)Even Windows-centric environments have at least a few UNIX or Linux servers that need to be secure and patched. Linux and UNIX servers often fulfill critical functions with few and short maintenance windows. These can be a real pain point for admins who specialize in Windows or are managed by an entirely different admin.
Desktops (Windows and Macs)Maybe you are responsible for desktops instead of servers. Again it’s not just a Windows story any more. More and more people are opting for Macs instead of Windows. Watch the vulnerability lists and you’ll see that Macs need patching too.
The kicker though is the 80/20 rule. If at least 80% of the computers on your network are Windows and the remaining 20% are everything else – it’s a safe bet, given the maturity and ease of WSUS, that 20% of your patching effort goes to Windows but 80% of your effort is consumed with patching all the different flavors of UNIX, Linux and your Mac computers. We need one system to manage all our patches and one pane of glass to prove compliance from data center to desktop.
Believe it or not System Center 2012 R2 provides the infrastructure to do just that – it just needs a little help. Last time we showed you how you can patch 3rd party apps on Windows through System Center Update Manager. This time we’ll show you how you can patch non-Windows systems using the new System Center clients for UNIX, Linux and Mac.
Microsoft App-V 5.1 and Flexera AdminStudio WebinarFlexera
Steven Thomas, Senior Consultant at Microsoft specializing in Desktop and Application Virtualization talks with Flexera about current recommended processes and developments with App V 5.1 as well as the future of application virtualization.
Forrester Research on Globally Distributed Development Using SubversionWANdisco Plc
On December 3, 2009, Jeffrey Hammond, Senior Analyst at Forrester Research presented the findings of a WANdisco customer using Subversion MultiSite. Mr. Hammond and members of Forrester Research's consulting team will explain the reasons behind Subversion's rapid ascent to the leadership position in the SCM space, and discuss the findings of the TEI study.
The subject of the study was a Global Fortune 500 company in the semiconductor industry using Subversion MultiSite at locations in the United States and Asia.
Forrester found significant benefits and cost savings in a broad range of areas due to Subversion MultiSite's ability to provide remote users with real-time access to Subversion repositories and eliminate downtime.
System Center Operations Manager is a big deal.
On April 24th, Erik Gilreath discussed SCOM and uncovered: why SCOM is so rarely installed, why that's a mistake, easy steps to install, what you should be doing with it, and what it can do that other people's products can't.
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
Today, everything has to be patched. From desktop and laptop to server and every operating system in between. With compliance, what we have to pay attention to is what’s actually out there on our network – not just what you wish were there.
Servers (Windows, UNIX and Linux)Even Windows-centric environments have at least a few UNIX or Linux servers that need to be secure and patched. Linux and UNIX servers often fulfill critical functions with few and short maintenance windows. These can be a real pain point for admins who specialize in Windows or are managed by an entirely different admin.
Desktops (Windows and Macs)Maybe you are responsible for desktops instead of servers. Again it’s not just a Windows story any more. More and more people are opting for Macs instead of Windows. Watch the vulnerability lists and you’ll see that Macs need patching too.
The kicker though is the 80/20 rule. If at least 80% of the computers on your network are Windows and the remaining 20% are everything else – it’s a safe bet, given the maturity and ease of WSUS, that 20% of your patching effort goes to Windows but 80% of your effort is consumed with patching all the different flavors of UNIX, Linux and your Mac computers. We need one system to manage all our patches and one pane of glass to prove compliance from data center to desktop.
Believe it or not System Center 2012 R2 provides the infrastructure to do just that – it just needs a little help. Last time we showed you how you can patch 3rd party apps on Windows through System Center Update Manager. This time we’ll show you how you can patch non-Windows systems using the new System Center clients for UNIX, Linux and Mac.
https://f5.com/solutions/enterprise/reference-architectures/vmware-horizon-view-optimized-solution
Secure access, single sign-on, load balancing, and server health monitoring are just some of the ways F5 improves the user experience and manageability for VMware end-user computing.
VMware Horizon with View enables you to deliver rich, personalized virtual desktops to users while increasing your business agility, control, and security. But maintaining performance, availability, and a good user experience—no matter where users are or which device they’re using—is critical to the success of your VMware Horizon with View implementation.
With F5’s proven solutions for VMware Horizon with View, you can ensure that users enjoy fast, simple, and secure access to their virtual desktops. You gain greater access control and server efficiency while delivering high performance, high availability, and a more productive environment for your business.
Forrester On Using Subversion to Optimize Globally Distributed DevelopmentWANdisco Plc
This webinar discusses the findings of a recently commissioned Forrester Consulting Total Economic ImpactTM (TEI) study of WANdisco's SVN MultiSite. Forrester's TEI methodology measures costs and cost reduction and weighs the enabling value of a technology in increasing the effectiveness of overall business processes. The subject of the study was a Fortune 500 company with annual revenues of over $5 billion, with SVN MultiSite in production in the US, UK, and India. Forrester concluded that SVN MultiSite generated a return on investment (ROI) of 357% with a payback period of less than 2 months.
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
Quest endpoint systems management experts Sean Musil and Bruce Johnson will show you how securing your network can be made faster, safer and easier with the newest capabilities added to KACE Endpoint Systems Management Appliances. Watch the webcast here: http://bit.ly/2gIOc50.
Application Virtualization in Citrix XenAppdigitallibrary
Citrix's XenApp application virtualization prouct uses Isolation 2.0 technology, which means applications are not installed on the OS--each app is securely stored in its own container. Applications are also isolated from one another at runtime. And it eliminates tedioius regression testing. This results in an improved user experience, as users can use apps anywhere, even when no network connection is available. And it elminates compatibility issues between applications.
OUTLINE:
- What is uberSVN
- Download and installation
- Major features
- Adding repositories
- Adding users and groups
- Demonstration of main features
Virtualization: Security and IT Audit PerspectivesJason Chan
A brief overview of server virtualization for information security and audit professionals. I gave earlier versions of this talk at the SV and SF ISACA conferences in 2010, this version is for the UC Compliance and Audit Symposium.
Package, Stream, Manage. Application virtualiization isolates applications to create a conflict free environment with manageability as the cornerstone to successful service delivery in large organizations. With App-V, deploy applications in seconds to thousands of computers automagically.
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...eG Innovations
Microsoft System Center Operations Manager (SCOM) is a leading platform for performance monitoring and management of Microsoft applications (such as Active Directory, Microsoft SQL Server, Exchange Server, IIS and SharePoint). However, SCOM does not have extensive capabilities to monitor non-Microsoft systems and applications (like Citrix, SAP, Oracle, Java, Sybase, etc.), nor does SCOM have virtualization-awareness for platforms like VMware vSphere, Citrix XenServer, Red Hat Enterprise Virtualization, AIX LPARs and Solaris LDOMs, or virtual desktops (VDI).
To extend the scope of Microsoft SCOM to manage these environments, enterprises have to look at multiple third party products that provide individual management packs, one for each specific non-Microsoft platform. This traditional "multi-pack approach" creates complexity and only provides a fragmented view of the IT infrastructure. This approach leads to slow problem isolation and diagnosis, and often results in poor user experience and loss of user productivity.
Join performance monitoring expert Srinivas Ramanathan (CEO, eG Innovations) to learn about eG Enterprise for SCOM, a new universal management pack that fills this gap and provides a single, integrated solution with SCOM to address the performance management needs of today's enterprises. This webinar presentation will show you how to:
• Monitor and troubleshoot the entire IT service infrastructure end to end from the SCOM console
• Monitor applications and platforms not natively supported by System Center Operations Manager
• Instantly diagnose and get actionable insight into IT service health and performance
• Provide automatic, rapid root cause diagnosis for even the most complex performance problems
• Receive proactive problem detection and alerting before users call
• Maximize the return on your investment in System Center Operations Manager
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
-Configuring and deploying SCCM 2012 R2
-Data Quering using WQL and gathering collections
-Configuring Software and Hardware Inventory, asset intelligence and software metering.
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
https://f5.com/solutions/enterprise/reference-architectures/vmware-horizon-view-optimized-solution
Secure access, single sign-on, load balancing, and server health monitoring are just some of the ways F5 improves the user experience and manageability for VMware end-user computing.
VMware Horizon with View enables you to deliver rich, personalized virtual desktops to users while increasing your business agility, control, and security. But maintaining performance, availability, and a good user experience—no matter where users are or which device they’re using—is critical to the success of your VMware Horizon with View implementation.
With F5’s proven solutions for VMware Horizon with View, you can ensure that users enjoy fast, simple, and secure access to their virtual desktops. You gain greater access control and server efficiency while delivering high performance, high availability, and a more productive environment for your business.
Forrester On Using Subversion to Optimize Globally Distributed DevelopmentWANdisco Plc
This webinar discusses the findings of a recently commissioned Forrester Consulting Total Economic ImpactTM (TEI) study of WANdisco's SVN MultiSite. Forrester's TEI methodology measures costs and cost reduction and weighs the enabling value of a technology in increasing the effectiveness of overall business processes. The subject of the study was a Fortune 500 company with annual revenues of over $5 billion, with SVN MultiSite in production in the US, UK, and India. Forrester concluded that SVN MultiSite generated a return on investment (ROI) of 357% with a payback period of less than 2 months.
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
Quest endpoint systems management experts Sean Musil and Bruce Johnson will show you how securing your network can be made faster, safer and easier with the newest capabilities added to KACE Endpoint Systems Management Appliances. Watch the webcast here: http://bit.ly/2gIOc50.
Application Virtualization in Citrix XenAppdigitallibrary
Citrix's XenApp application virtualization prouct uses Isolation 2.0 technology, which means applications are not installed on the OS--each app is securely stored in its own container. Applications are also isolated from one another at runtime. And it eliminates tedioius regression testing. This results in an improved user experience, as users can use apps anywhere, even when no network connection is available. And it elminates compatibility issues between applications.
OUTLINE:
- What is uberSVN
- Download and installation
- Major features
- Adding repositories
- Adding users and groups
- Demonstration of main features
Virtualization: Security and IT Audit PerspectivesJason Chan
A brief overview of server virtualization for information security and audit professionals. I gave earlier versions of this talk at the SV and SF ISACA conferences in 2010, this version is for the UC Compliance and Audit Symposium.
Package, Stream, Manage. Application virtualiization isolates applications to create a conflict free environment with manageability as the cornerstone to successful service delivery in large organizations. With App-V, deploy applications in seconds to thousands of computers automagically.
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...eG Innovations
Microsoft System Center Operations Manager (SCOM) is a leading platform for performance monitoring and management of Microsoft applications (such as Active Directory, Microsoft SQL Server, Exchange Server, IIS and SharePoint). However, SCOM does not have extensive capabilities to monitor non-Microsoft systems and applications (like Citrix, SAP, Oracle, Java, Sybase, etc.), nor does SCOM have virtualization-awareness for platforms like VMware vSphere, Citrix XenServer, Red Hat Enterprise Virtualization, AIX LPARs and Solaris LDOMs, or virtual desktops (VDI).
To extend the scope of Microsoft SCOM to manage these environments, enterprises have to look at multiple third party products that provide individual management packs, one for each specific non-Microsoft platform. This traditional "multi-pack approach" creates complexity and only provides a fragmented view of the IT infrastructure. This approach leads to slow problem isolation and diagnosis, and often results in poor user experience and loss of user productivity.
Join performance monitoring expert Srinivas Ramanathan (CEO, eG Innovations) to learn about eG Enterprise for SCOM, a new universal management pack that fills this gap and provides a single, integrated solution with SCOM to address the performance management needs of today's enterprises. This webinar presentation will show you how to:
• Monitor and troubleshoot the entire IT service infrastructure end to end from the SCOM console
• Monitor applications and platforms not natively supported by System Center Operations Manager
• Instantly diagnose and get actionable insight into IT service health and performance
• Provide automatic, rapid root cause diagnosis for even the most complex performance problems
• Receive proactive problem detection and alerting before users call
• Maximize the return on your investment in System Center Operations Manager
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
-Configuring and deploying SCCM 2012 R2
-Data Quering using WQL and gathering collections
-Configuring Software and Hardware Inventory, asset intelligence and software metering.
Application Virtualization, University of New HampshireTony Austwick
Presentation to EDUCAUSE, NERCOMP by David Blezzard from University of New Hampshire.
More here http://www.educause.edu/nercomp-annual-conference/2016/2016/streamlining-application-deployment-and-management-through-virtualization
We will report how using the Application Jukebox application virtualization solution at the University of New Hampshire has saved time and simplified management of public and department-specific computer labs and our VDI environment. Traditionally, we used a combination of imaging and then various scripted deployments to install applications. With application virtualization, we have been able to move over a hundred Windows applications into virtual packages that can be "installed" by users on demand. We will discuss the general problem of managing large numbers of complex applications across a range of computer environments while also trying to be flexible and responsive to users.
Outcomes: Understand how application virtualization can overcome issues with deploying software * Appreciate the capabilities of Application Jukebox to be able to assess its utility to your campus * Obtain a model for evaluating a tool's potential savings
No BS, Vendor Neutral Comparison of Application Layering SolutionsUnidesk Corporation
Application layering is quickly becoming the standard for application packaging and lifecycle management. As this innovative technology has become mainstream, many vendors are bringing layering solutions to market. EUC Expert, Ron Oglesby cuts through the marketing BS to provide a vendor-neutral overview of Citrix AppDisk, FSLogix, Liquidware Labs FlexApp, Unidesk, and VMware App Volumes. Ron worked directly with experts in each of the products including third-party consultants, founders, CTOs, and product managers to develop the content for this session.
World renowned virtualization aficionados Eric Inch and Jason Cooper combine their collective 30 years of experience to provide a side-by-side comparison of the heavy hitters in application virtualization.
On one side: Microsoft App-V, part of the Desktop Optimization Pack and the Johnny-come-lately, streaming application packages to desktops and servers with ease.
On the other: VMware ThinApp, the 800-pound gorilla with a huge install base, incredible features, and a clear advantage over the up-and-comer.
Which of these sluggers will end up on top of the pile? View the Application Virtualization Smackdown slide deck to find out!
And for more information about this and other topics check our blog at www.cdhtalkstech.com.
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...VMworld
VMworld 2013
Anthony Davis, VMware
Bruce Perram, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Deploying PHP applications on the cloud can be a tricky task, especially when it comes to automation and clustered environments that scale up and down. If you’re looking for ways to improve or automate your code deployment methods and use continuous integration and delivery, this session is for you.
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld
VMworld 2013
Jared Cook, VMware
Ashish Jain, VMware
Andrew Johnson, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld
VMworld 2013
Mark Ewert, VMware
Andy Philp, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...David vonThenen
Presentation at Southern California Linux Expo (SCaLE 15x). Discussion on what happens when you take a Software-based Storage platform integrated with Container Schedulers and moving that into the Cloud.
Breakout presented by James Bayer, Director of Cloud Foundry Product Management, Pivotal Software. The Cloud Foundry mission is to build and evolve the best open platform for modern applications and services on both public and private clouds. Learn about the roadmap of future development plans for Cloud Foundry. Upcoming features and requests for enhancement will be discussed across categories for Applications, Services, and Platform.
How Container Schedulers and Software-based Storage will Change the CloudDavid vonThenen
Persistent applications can be complex to manage and operate at scale but tend to be perfect for modern schedulers like Apache Mesos. The current trend in Containers is taking their ephemeral nature and turning it upside-down by running databases, key/value stores, WordPress, and etc within them. Internal direct attached storage and external storage are both options in running your long-running, persistent applications. The problem is how do you run these applications and containers in production environments?
This talk outlines how 2 Layer Scheduling, as known as the Offer-Accept model, found in Mesos and Software-based Storage enables deployment of managed frameworks and tasks while maintaining high availability, scale-out growth, and automation. This combination of technology will help build a "Skynet" like architecture for persistent applications and containers in the cloud.
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....Denis Gundarev
Imagine that you just found the new job of your dreams: You are now a system administrator in a large enterprise. Everything is going like clockwork, except for one major problem: There are 5 different versions of Presentation Server in use and there is no documentation for any system. Now imagine you are a consultant ready to do an assessment of Citrix infrastructure, but nobody in the company knows how many farms and servers exist, or how they are configured. (Wanting a new imaginary job yet?) In this session, Denis Gundarev will share tips on how to document infrastructure and tricks on how to find all components or users that are "forgotten." Attendees will learn several methods for elevating permissions and taking ownership of forgotten systems.
На Citrix Synergy был представлен XenDesktop 5, как всегда, в пресс-релизах все стало лучше, быстрее, сильнее и чудесатее. Данный доклад поможет разобраться в деталях
Обратная сторона облака Чтобы Вы не витали в облаках от рассказов вендоров, настоящий практик – Антон Жбанков, гордо носящий титул vExpert расскажет про проблемы при внедрении «виртуализации всего» и опыт их решения в докладе «Обратная сторона Облака»
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...Denis Gundarev
Brian Madden, один из самых известных независимых экспертов по Citrix, RDS и Server-Based Computing. Брайан расскажет про парадокс имени себя и про борьбу «классиков» (Terminal Services) с «Современниками» (VDI). А также про то, почему проваливаются VDI проекты, и как этого избежать
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterDenis Gundarev
Думаете о BYOC? Опасайтесь периметра!
В маркетинговых презентациях Citrix и других вендоров часто проскакивает аббревиатура BYOC. Что это такое? Bring Your Own Computer, или по-русски ПРИходи СО Своим Компьютером (ПРИСОСКО J)). Про проблемы использования личных ПК (или iPad-ов) пользователей для доступа к корпоративным приложениям, и о том, как технически правильноих решать, расскажет Rick Dehlinger
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. Agenda
• What is Application Streaming (Virtualization)?
• Application Virtualization internals
• Overview of available solutions
3. Application Isolation Environments
• Was introduced in MetaFrame Presentation Server 4.0 (2005)
• Virtualization layer that redirects system resources
• Virtualizes:
– File system
– Registry
– Named objects (events, semaphores, etc)
• Transparent to the application
• Was a great compatibility aid for:
– Applications which are not multi user friendly
– Applications which have problems coexisting on the same server
– Applications that cannot have multiple instances running simultaneously
4. Launching initial process into AIE
File System Isolation
Isolation Environment
Launcher (aierun.exe)
Registry and
Object Isolation
Application
(eg winword.exe)
IMA
2. Launch application
suspended
4. Resume process
File System Object
Manager
Registry
5. Read rules
from driver
and start
isolating
6. Application
execution
continues
3. Tell driver
about AIE
being
launched.
Pass down
rules
File System redirection
Registry
redirection
Named Object
redirection
File System calls
1.Retrieve
AIE data
from IMA
5. Isolation Environment Roots
• Specifies directories and registry locations
• User Profile Root
– Changes made by the user reside here
– Suitable for Multi-user
incompatible applications
• Installation Root
– Per Isolation environment location
– Enables conflicting applications to
coexist
7. Isolation Environment: IGNORE Rule
• Used to create “holes” in an isolation environment
• Virtual address is not modified by the virtualization
system
• Used to allow access outside of the isolation
environment
8. Isolation Environment: REDIRECT Rule
• Redirects an application request for a file or registry
key to a specified location
– If an application creates the file, c:tempdata.txt, regardless
of the user, then it might be sensible to redirect those files
to c:aietemp%USERNAME%
– This means, if UserA ran the application isolated, then
c:tempdata.txt is created in c:aietempUserAdata.txt
9. Isolation Environment: ISOLATE Rule
• Per User:
– Ensure that each user gets his own copy of the
requested resource
• Per Isolation Environment:
– A single copy of the required system resource is
created in the installation root location and shared by
all users
10. Application Streaming
• Codenamed Project Tarpon
• Introduced in Citrix Presentation Server 4.5 (2007)
• Had 6 major releases before being deprecated
• Still available with XenApp 6.5 and XenDesktop 5.6
• Completely removed in XenDesktop 7
11. 1
Tarpon Client
Extension of CPS Foundation
remote
users
firewall
firewall
local
users
Access
Gateway Advanced
Access
Control
Web Servers Application
Servers
IMA Service
PN Agent
Persistent
Store
AIE
PN Agent
Access
Management
Console
Tarpon App
Subsystem
Tarpon Session
Subsystem
Tarpon Client
Tarpon Profiler
License
Server
Web
Interface
AIE
AIE
Tarpon Client
AIE
Presentation
Servers
DatabasesFile Servers
New Apps
License
Presentation Server
Data
Collector
12. 1
Project Tarpon Infrastructure
Profiling Station
File Share / NAS
Project Tarpon
Server Farm
Web Interface
Clients
SMB
SMB
HTTP/
HTTPS
XML
SMB
License Server
27000
14. How it works
• Two main components of Application Virtualization:
– Isolation/Redirection
– Delivery mechanism
• Optional features:
– File type associations and OS integration
– Rights Management and usage tracking
– Packaging
– Shareable sandboxes
15. File I/O Redirection options
• API Hooking
– at USER or Kernel Level
• Hooking CreateFile, OpenFile, DeleteFile, NtCreateFile, NtOpenFile, NtDeleteFile
etc
• Hooking into System Service Descriptor Table (SSDT)
–
• File System Filter Driver or Mini-Filter
– Write file system driver to redirect virtualized file requests.
16. Registry Redirection Options
• API Hooking at USER Level
– Hooking advapi32.dll - RegCreateKeyEx, RegDeleteKeyEx etc
– Hooking Ntdll.dll – NtCreateKey, NtDeleteKey etc
• API Hooking at Kernel Level
– Hooking SSDT – NtCreateKey, NtDeleteKey etc
18. • Microsoft App-V
• VMware ThinApp
• CloudVolumes
• Symantec/Altiris SVS
• Spoon (Novell ZENworks)
• Numecent Jukebox
• FSLogix
• Sandboxie
• Microsoft Windows
19. Microsoft App-V
• Version 2.0 was released in 2002 by Softricity
• ~8 major and ~50 minor releases before App-V 5.0
• App-V 5.0 is completely rewritten and released in 2012
• Available as a part of MDOP under SA
• App-V 5.0 is only supported version for XenDesktop 7
20. App-V 5.0 Cons
• Requires SA
• Requires management servers
• Requires SQL
• User-level apps only
• Cannot virtualize drivers
• Cannot isolate applications that are a part of the OS
21. App-V Pros
• Tons of information on Internet
• Huge user community
• Integration with System Center
• Integration with XenDesktop
• Managed by PowerShell
22. VMware ThinApp
• Uses user-mode hooks
• Application packaging solution, just like PortableApps.com
• emulates the Windows COM and DCOM
• Supports Streaming Execution (SMB/CIFS) and Deployed Execution
(i.e. USB)
• Does not support installed Apps
• No centralized management
• End of availability (“EOA”) of VMware ThinApp, effective on December
15, 2013. After that will be available only as a part of View or Horizon
23. CloudVolumes
• AppStack – basically a VHD or VMDK attached to a VM
• Web-based management console that communicates with hypervisor
• Full support for server software
• Available Now: VMware ESX 5.0, 5.1, Coming soon…
HyperV, Azure, Amazon EC2
26. CloudVolumes pros
• Server software support
• No streaming or any other delivery mechanism
• Combination of file system minifilters and a service
• Text file-driven configuration
• Storage segregation on the hypervisor layer
• Per-machine or per-user assignments
• No packaging
27. CloudVolumes cons
• Works with virtual workloads only
• Came out of stealth mode in 2013
• Text file-driven configuration
• No integration with VDI brokers
28. Symantec/Altiris SVS
• Now called Symantec Workspace Virtualization
• Kernel-level hooks
• Umanaged computers support
• Application license management
• Best in class integration with OS
29. Spoon
• Formerly Xenocode
• Web portal for app access
• Desktop integration
• Works over HTTP/HTTPS
• License management
• Available as SaaS offering
• Server software support
• Auditing
• Support for installed applications
• Application snapshots
30. Numecent Jukebox
• HTTP-based streaming
• Encrypted cache
• Virtualized File System
• DRM and license control
• OPSWAT integration
• Kernel-level file system driver
• Web portal for user access
• Currently targeted for ISVs and MSP
• No publicly available demos or code
31. Numecent Jukebox
• Patents:
• Software streaming system and method
• Intelligent Network Streaming and Execution System for
Conventionally Coded Applications
• Rule-based application access management
• Opportunistic block transmission with time constraints
• Deriving component statistics for a stream enabled application
32.
33.
34. FSLogix
• AIE:Ressurection
• Came out of stealth mode about in July 2013
• First release planned in Q3 2013
• No streaming, no packaging
• Combination of file system minifilter and user-level hooks
• Support changes in realtime
• Text-file based configs with a GUI editor
38. Sandboxie
• Isolated sandboxes for applications
• Virtualizes Files, Disk Devices, Registry Keys, Process and Thread
objects, Driver objects, and objects used for Inter-process
communication: Named Pipes and Mailbox Objects, Events, Mutexs
(Mutants in NT speak), Semaphores, Sections and LPC Ports
• Not designed for VDI
• Not designed for Enterprise
• Developed by one person
39. Microsoft Windows
• UAC Virtualization is available out of the box
• Application compatibility toolkit can be used to manage folder and
registry redirection
• No additional software needed
40. What Are Shims?
• Applied to specific apps
– Configured with Compatibility Administrator in the App Compat Toolkit
– Deployable to enterprise
• Changes what the app thinks it sees
• Does not change what app is allowed to do
41. What Are Shims Good For?
• Great for many kinds of bugs:
– Bad Windows version checks
– Writing to HKCR at runtime
– Unnecessary checks for “am I admin?”
– Writing to WRP-protected keys and files
– Windows thinks your app is an installer
– File/Registry redirections
43. Most Used Shims
• VirtualRegistry
– Fixes the problem with reading/writing
registry value
– AddRedirect ( HKLMKey ^ HKCUKey
^ HKLMKey2 ^ HKCUKey2)
• CorrectFilePaths
– Fixes the problem with reading/writing
a file
– c:Program.ini=
%AppData%Program.ini
• WRPRegDeleteKey
– Lie when app tries to delete protected
OS registry key
• ForceAdminAccess
– Spoofs queries of administrator group
membership
• VirtualizeDeleteFile
– Spoofs deletion of global file
• LocalMappedObject
– Forces global section objects into
user’s namespace
• VirtualizeHKCRLite, VirtualizeRegist
erTypeLib
– Redirects global registration of COM
objects
44. Conclusion
• There are many vendors on the market
• If you care about App compatibility, take a look at simple solutions
• Consider using SaaS-based services
• Check the Application Virtualization Smackdown from Ruben Spruijt
– http://www.pqr.com
– 61 pages cover major vendors on the market