Slides der Präsentation von Jörg Vosse, Citrix, am Citrix Day 2014 von Digicomp:
Citrix ShareFile ist für Unternehmen konzipiert und für Mobilanwender optimiert. Im Gegensatz zu unsicheren Consumer- und anderen einfachen Dateifreigabetools bietet ShareFile Funktionen für eine sichere Synchronisierung und Freigabe von Unternehmensdateien.
At a quick glance, ShareFile, Box and Dropbox all seem to do the same thing. Some people just close their eyes, point, and pick one. But it's all about the details. While these services are all about cloud storage, they are not equal. Here are five reasons to choose ShareFile as your company’s file exchange and data storage provider.
Users are rapidly introducing consumer file-sharing tools such as Dropbox into the enterprise. To the user, these are useful tools that enable files to be synchronised across devices and shared with partners and customers. But they can create compliance and data security problems for the organisation. What is the best way to address these organisational requirements while meeting end user needs? Learn why Citrix ShareFile is good for end users and good for IT.
SYN310: Deep dive into ShareFile Enterprise functionalityCitrix
Take a deep dive into the most popular features of Citrix ShareFile Enterprise: customer-managed StorageZones for on-premise deployments; StorageZone Connectors for mobile access to existing enterprise data; and Active Directory integration. Learn how to deploy ShareFile in your Microsoft Azure account. See demos of installation and configuration best practices, such as using Active Directory integration to provision user accounts. This session can help ensure success in your deployments.
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Identity Management for Office 365 and Microsoft AzureSparkhound Inc.
Sparkhound Senior Infrastructure Consultant David Pechon discusses Identity Management for O365 and Azure at the 2015 SharePoint TechFest Dallas event held at the Irving Convention Center. Learn how Active Directory Federation Services and DirSync allow you to synchronize your organization’s Active Directory and use it to authenticate users to Office 365 applications, such as Exchange Online, OneDrive for Business and SharePoint Online.
At a quick glance, ShareFile, Box and Dropbox all seem to do the same thing. Some people just close their eyes, point, and pick one. But it's all about the details. While these services are all about cloud storage, they are not equal. Here are five reasons to choose ShareFile as your company’s file exchange and data storage provider.
Users are rapidly introducing consumer file-sharing tools such as Dropbox into the enterprise. To the user, these are useful tools that enable files to be synchronised across devices and shared with partners and customers. But they can create compliance and data security problems for the organisation. What is the best way to address these organisational requirements while meeting end user needs? Learn why Citrix ShareFile is good for end users and good for IT.
SYN310: Deep dive into ShareFile Enterprise functionalityCitrix
Take a deep dive into the most popular features of Citrix ShareFile Enterprise: customer-managed StorageZones for on-premise deployments; StorageZone Connectors for mobile access to existing enterprise data; and Active Directory integration. Learn how to deploy ShareFile in your Microsoft Azure account. See demos of installation and configuration best practices, such as using Active Directory integration to provision user accounts. This session can help ensure success in your deployments.
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Identity Management for Office 365 and Microsoft AzureSparkhound Inc.
Sparkhound Senior Infrastructure Consultant David Pechon discusses Identity Management for O365 and Azure at the 2015 SharePoint TechFest Dallas event held at the Irving Convention Center. Learn how Active Directory Federation Services and DirSync allow you to synchronize your organization’s Active Directory and use it to authenticate users to Office 365 applications, such as Exchange Online, OneDrive for Business and SharePoint Online.
At Agile IT, we've been leading the trend in moving customers to the Microsoft Cloud. Along that roadmap is the need to secure and manage the devices that will access that data. The Microsoft Enterprise Mobility Suite (EMS) focuses on managing both the data that's accessible from the cloud as well as the devices that access it. In this webinar, we introduce you to EMS and focus on how cloud technologies work together to deliver a seamless solution for protecting your data.
The accompanying recording of the webinar can be found at https://youtu.be/NOWFI4xl-dM.
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITProceed
Active Directory Federation Services (AD FS) is the Microsoft technology to bridge your on-premises Identity systems towards cloud Identity providers like Azure Active Directory. Colleagues depend on a reliable, yet cost effective deployment of AD FS and it’s our jobs as IT Pros to make it happen. This session covers the 10 most common mistakes we see in the field In organizations that have deployed AD FS and performed a hybrid identity deployment. Learn from their mistakes, so you don’t have to make them.
Ian Jaffe, Ping Identity
How to manage identities, how you can get a
jump start for the identity revolution, and how
to do it all using your existing infrastructure
without having a duplicate identity in the
cloud, using PingOne
SMBStream™ Office to Office File Acceleration | Solution BriefHybrid Cloud
SMBStream™ is a site-to-site gateway that provides users accelerated, secure access to remote file servers. Through local access points from any office users and applications have easy access to file shares they need in real-time.
Slide deck containing basics for Microsoft Cloud Licensing. Discusses CAL equivalent licensing, Dynamics 365 licensing, Microsoft Azure licensing, M365 Licensing and more.
How to Split Your System into MicroservicesEberhard Wolff
Splitting a system into microservices is a challenging task. This talk shows how ideas like Bounded Context, migration scenarios and technical constraints can be used to build a microservice architecture. Held at WJAX 2016.
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...Citrix
Citrix NetScaler, Citrix XenDesktop and Citrix XenApp help companies benefit from virtualization for mobile users by providing secure access to Windows desktops and apps. Learn how Citrix XenMobile fits into the equation by allowing companies to securely deliver a complete enterprise app store to any device. This session will cover the backend architecture of this app store, as well as integration of XenApp/XenDesktop with XenMobile for delivery of Windows, web and native mobile apps.
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile device, Okta helps IT become more secure, make people more productive, and maintain compliance.
The Okta service provides directory services, single sign-on, strong authentication, provisioning, workflow, and built in reporting. It runs in the cloud on a secure, reliable, extensively audited platform and integrates deeply with on premises applications, directories, and identity management systems.
Businesses like yours use Syncplicity to modernize their legacy technology to drive productivity, collaborate and increase data governance. Users like accessing files remotely, anytime, anywhere on any device. Learn from this slide deck best practices on migrating your data and transitioning your users with the help of Syncplicity’s Customer Success team.
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
If you run a website, operate a customer or partner portal or your business is running a cloud service, you need a way to manage users and their access to applications. Okta’s enterprise grade, zero downtime identity service can help you innovate faster, decrease IT costs, increase revenue and ensure a seamless user experience.
Okta automates account creation and user registration, enabling single sign-on across your sites. The Okta UI is fully customizable, with built-in tools or by using Okta’s REST APIs.
Configuration is flexible and simple, with support for individual, 3rd party enterprise or social authentication. Okta comes pre-integrated with over 2,000 apps and can easily connect to custom cloud and on-premises applications.
This presentation provides an overview of external identity management and how Okta can provide identity services for your web presence.
Link for more information: http://www.okta.com/problems-we-solve/managing-external-identities.html
At Agile IT, we've been leading the trend in moving customers to the Microsoft Cloud. Along that roadmap is the need to secure and manage the devices that will access that data. The Microsoft Enterprise Mobility Suite (EMS) focuses on managing both the data that's accessible from the cloud as well as the devices that access it. In this webinar, we introduce you to EMS and focus on how cloud technologies work together to deliver a seamless solution for protecting your data.
The accompanying recording of the webinar can be found at https://youtu.be/NOWFI4xl-dM.
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITProceed
Active Directory Federation Services (AD FS) is the Microsoft technology to bridge your on-premises Identity systems towards cloud Identity providers like Azure Active Directory. Colleagues depend on a reliable, yet cost effective deployment of AD FS and it’s our jobs as IT Pros to make it happen. This session covers the 10 most common mistakes we see in the field In organizations that have deployed AD FS and performed a hybrid identity deployment. Learn from their mistakes, so you don’t have to make them.
Ian Jaffe, Ping Identity
How to manage identities, how you can get a
jump start for the identity revolution, and how
to do it all using your existing infrastructure
without having a duplicate identity in the
cloud, using PingOne
SMBStream™ Office to Office File Acceleration | Solution BriefHybrid Cloud
SMBStream™ is a site-to-site gateway that provides users accelerated, secure access to remote file servers. Through local access points from any office users and applications have easy access to file shares they need in real-time.
Slide deck containing basics for Microsoft Cloud Licensing. Discusses CAL equivalent licensing, Dynamics 365 licensing, Microsoft Azure licensing, M365 Licensing and more.
How to Split Your System into MicroservicesEberhard Wolff
Splitting a system into microservices is a challenging task. This talk shows how ideas like Bounded Context, migration scenarios and technical constraints can be used to build a microservice architecture. Held at WJAX 2016.
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...Citrix
Citrix NetScaler, Citrix XenDesktop and Citrix XenApp help companies benefit from virtualization for mobile users by providing secure access to Windows desktops and apps. Learn how Citrix XenMobile fits into the equation by allowing companies to securely deliver a complete enterprise app store to any device. This session will cover the backend architecture of this app store, as well as integration of XenApp/XenDesktop with XenMobile for delivery of Windows, web and native mobile apps.
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile device, Okta helps IT become more secure, make people more productive, and maintain compliance.
The Okta service provides directory services, single sign-on, strong authentication, provisioning, workflow, and built in reporting. It runs in the cloud on a secure, reliable, extensively audited platform and integrates deeply with on premises applications, directories, and identity management systems.
Businesses like yours use Syncplicity to modernize their legacy technology to drive productivity, collaborate and increase data governance. Users like accessing files remotely, anytime, anywhere on any device. Learn from this slide deck best practices on migrating your data and transitioning your users with the help of Syncplicity’s Customer Success team.
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
If you run a website, operate a customer or partner portal or your business is running a cloud service, you need a way to manage users and their access to applications. Okta’s enterprise grade, zero downtime identity service can help you innovate faster, decrease IT costs, increase revenue and ensure a seamless user experience.
Okta automates account creation and user registration, enabling single sign-on across your sites. The Okta UI is fully customizable, with built-in tools or by using Okta’s REST APIs.
Configuration is flexible and simple, with support for individual, 3rd party enterprise or social authentication. Okta comes pre-integrated with over 2,000 apps and can easily connect to custom cloud and on-premises applications.
This presentation provides an overview of external identity management and how Okta can provide identity services for your web presence.
Link for more information: http://www.okta.com/problems-we-solve/managing-external-identities.html
Cloud Security Fundamentals - St. Louis O365 Users GroupJ.D. Wade
This session will provide key Microsoft cloud security standards which will allow you to maximize your organization's security posture using existing licenses, align with Microsoft's cloud security strategy, and reduce attack surface from legacy technologies. The adoption of core cloud security standards included in this discussion are how to establish single sign-on, how to only allow modern authentication, what are trusted identities and trusted devices, how to classify and protect content, and how to monitor and report on security and breaches. All of this discussion will be done in mind with usage occurring on a zero trust network.
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...Brian Culver
How will SharePoint 2013 allow organizations to collaborate and share knowledge with clients and partners? SharePoint empowers organization to build extranet sites and partner portals inexpensively and securely. Learn about the Product Catalog site template and how you can to use it. Learn about the new improvements in SharePoint 2013 regarding extranets. Learn how SharePoint 2013 can help your organization open its doors to its clients and partners securely.
Vojtěch Morávek, Senior Systems Engineer, VMware
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision IT
In this Webinar, Envision IT demonstrates how ADFS federation can allow external users to access an Extranet, their DMZ accounts or other external identities, and use single sign-on to other systems beyond SharePoint. View more details and the webinar recording here: http://www.envisionit.com/products/events/Pages/SharePoint-Extranet-Spring-Webinar-Series-Federation-and-SharePoint-On-Premise.aspx
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...Amazon Web Services
The cloud is not an 'All or Nothing' approach with regards to replacing workloads inside your datacenter. Enterprises with existing datacenters can easily extend their Infrastructure into the cloud to seamlessly leverage the benefits of cloud while using the same set of controls familiar to their business. However availability and security still remain among the top two concerns for CIOs when deciding on cloud adoption for their organization.
Amazon Web Services has infrastructure across multiple geographical Regions spanning five continents, with multiple Availability Zones in each Region along with a set of global edge locations. Building a similar infrastructure for high availability with your traditional datacenter would be non-trivial and cost prohibitive. Join this session to understand how you can achieve high availability across geographies, deploy your applications close to your users, control where your data is located, achieve low latency, and migrate your applications around the world in a cost-effective and easy manner using AWS services. You will also learn how AWS builds services in accordance with security best practices, provides appropriate security features in those services, has achieved industry standard certifications, and other third-party attestations. In addition, in line with the shared security model on the cloud, AWS customers must leverage on security features and best practices to architect an appropriately secure application environment. Enabling customers to ensure the confidentiality, integrity, and availability of their data is of the utmost importance to AWS, as is maintaining trust and confidence.
Public sector customers can now leverage Amazon WorkSpaces; a fully managed desktop computing service in the cloud. With a few clicks in the AWS Management Console, customers can provision a high-quality cloud desktop experience for any number of users at a cost that is highly competitive with traditional desktops and half the cost of most virtual desktop infrastructure (VDI) solutions.
Unlike other mobile file access and collaborative file sharing solutions, Micro Focus Filr (formerly Novell Filr) has been designed with the enterprise in mind, resulting in less administration, better security, and more productive users.
T28 implementing adfs and hybrid share point Thorbjørn Værp
European SharePoint Conference 2014 in Barcelona.
Presentation Description:
In this session we look at modern forms of authentication . We’ll cover Windows Server Active Directory Federation Services (ADFS) concepts and look at federation with SharePoint. There are a number of difficulties that you’ll need to overcome implementing SAML claims with SP, for example people picker, user profile import, problematic use of some SharePoint apps. We’ll also cover the infrastructure side like making it work with host named site collections, reverse proxy servers and other user directories. Moving to the cloud we’ll look at the authentication architecture of the standards employed; like OAUTH, WS-* and OpenID Connect.
Presentation Benefit
Get a better understanding of Windows Server Active Directory Federation Services (ADFS) concepts and SAML claims connection with SharePoint.
You will learn...
Understand authentication architecture and standards employed.
ADFS concepts
How to implement SAML claims
Microsoft's massive investment into Cloud technologies are enough to make anyone stop and wonder if the Cloud is something they should be focusing on for SharePoint. During this full day workshop we will examine Microsoft's Cloud Strategy from an ITPro's perspective and understand how a hybrid scenario can be structured to maximize the On Premises, Infrastructure as a Service, & Cloud capabilities. We will deep dive into deployment planning and implementation across the hybrid stack. We will also discuss and demonstrate the management of the SharePoint platform across all tiers. Join us on this journey from the ground to the cloud and back again!
From classification to protection of your data, secure your business with azu...Joris Faure
With the explosion of digital technology that allows new forms of collaboration, companies of all sizes are facing growing needs to protect their sensitive information. At the same time, these companies must safely share the same information among the appropriate collaborators.
Azure Information Protection provides the ability to create and consult protected content present in your collaboration spaces. Thanks to this solution, you can protect your sensitive information better by simply applying classifications and access permissions ...
Live demos will be offered to further understand the interactions. To try it is to adopt it!
Speaker : Joris Faure
Vaultize Cloud Architecture - Enterprise File Sync and Share (EFSS)Vaultize
Enterprises are facing enormous security, data loss and compliance risks with increased mobility of workforce and proliferation of consumer file sharing services together with mobile devices in the enterprise network.
Vaultize is an enterprise-grade platform for secure file sharing, anywhere access, mobile collaboration, endpoint backup and mobility - together with mobile content maanagement (MCM), endpoint encryption, remote wiping and Google Apps backup - that helps enterprises mitigate these risks with complete enterprise control and visibility on the use of unstructured data. It is the only solution that does military-grade (AES 256bit) encryption together with de-duplication at source (patent pending) – making it the most secure and efficient solution in the world. Vaultize comes with highest level of enterprise-grade security, scalability, performance, robustness and reliability.
Vaultize is the first EFSS vendor to fully integrate EMM into a single offering – giving enterprises complete control and visibility over the sensitive corporate data, irrespective of the device used for accessing and sharing – facilitating increased adoption of Bring-Your-Own-Device (BYOD) even in highly regulated and security-conscious verticals. Vaultize now includes Mobile Device Management (MDM) features such as remote wipe, data containerization, storage and network encryption, PIN protection and white-listing of apps for mitigation of security and protection concerns with BYOD. Vaultize goes beyond MDM with features like automatic wiping based on geo-location or IP address or time-out. It further facilitates Mobile Content Management (MCM) through access rights and allows corporate IT to prevent data loss, security and compliance breaches by controlling what users can do with corporate data on their mobile devices using natively built-in document editor.
Similar to Citrix Day 2014: ShareFile Enterprise (20)
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
Agil ist ein Buzzword, viele wissen aber nicht, was wirklich dahintersteckt. In diesem Vortrag erfahren Sie, warum es weder hilft, mal schnell Scrum einzuführen, die Inneneinrichtung eines Büros zu verändern oder einen Tischkicker aufzustellen. Sehen Sie, warum wir uns in der VUCA-Welt anders bewegen müssen und warum Themen wie Kreativität, Haltung und ein geänderter Mindset die Grundvoraussetzung für agiles Arbeiten sind.
Christian Botta war 15 Jahre als Projektmanager und Führungskraft in der IT beschäftigt. 2015 gründete er gemeinsam mit Daniel Reinold die Firma Visual Braindump, mit dem Ziel, die Themen Visualisierung und Management näher zusammenzubringen. Mit Visual Braindump verheiratete er seine beiden Leidenschaften: Zeichnen und Projektmanagement. Heute ist er als Trainer, Coach und Speaker für Projektmanagement, Design Thinking und visuelles Denken unterwegs – sowohl in Präsenztrainings für Digicomp als auch in Videotrainings bei LinkedIn. Ein weiteres Standbein ist die visuelle Begleitung von Veranstaltungen mit Hilfe von Graphic Facilitation bzw. Graphic Recording. Botta schreibt darüber hinaus regelmässig auf dem Visual Braindump Blog und für das Projektmagazin und Capterra.
Sein Buch: Business Visualisierung - ein Reiseführer für Neugierige und Visionäre
https://digicomp.ch/landingpages/personalswiss
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
Die Implementierung mit IPv6 in Container Plattformen wie Docker, Kubernets oder OpenShift bietet einige Möglichkeiten, aber auch Herausforderungen. In seinem Vortrag erklärt Aarno Aukia den aktuellen Stand der IPv6-Implementierung dieser Technologien.
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
Die 7 Phasen des Digital Business Modelling
Wie schaffe ich den digitalen Wandel im Business-Modell? Im Referat zeigt Roger Basler anhand von 7 Phasen, wie der Wandel erfolgreich vollzogen werden kann.
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
Work Smarter Not Harder
Meetup: Work Smart – Digital Collaboration im Unternehmen
Lernen Sie das Potenzial mit der Verwendung von möglichen Smart-Work-Tools innerhalb Ihres Unternehmens kennen und seien Sie für die wichtigsten Anwendungsfälle gerüstet, um den Kulturwandel innerhalb Ihrer Organisation voranzutreiben.
Professor Richard H. Thaler hat Ende 2017 den Wirtschaftsnobelpreis für seine Forschung unter dem Begriff «Nudge - die psychologischen Faktoren, die hinter wirtschaftlichen Entscheidungen stehen» erhalten.
Der Kommunikations- und Marketingexperte Maurice Codourey der Neurokommunikationsagentur UNIT X zeigt eigene Experimente im Spitalwesen und internationale Best Practices.
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
Experte Artur Tomczak zeigte anhand von Praxisbeispielen der verschiedenen responsiven Frameworks auf, wie die nächsten Schritte Richtung Holacracy konkret aussehen könnten.
IPv6-Experte Joe Klein gab uns einen Überblick über den aktuellen Status der IPv6-Sicherheit, typische IPv6-Angriffspunkte, Auswirkungen von Technologien wie Cloud und Blockchain sowie Herausforderungen für effektive IoT-Sicherheitsmassnahmen (Internet of Things). Vor allem im Internet der Dinge, wenn es um Gesundheitsversorgung, selbstfahrende Autos, Flugzeugcockpits, Dämme, Kernkraftwerke und ähnliche kritische Infrastrukturen geht, ist es von entscheidender Bedeutung, dass Sicherheit gewährleistet werden kann.
Kein Command & Control, sondern Servant-Leadership. Flache Hierarchien, intrinsische Motivation, Kundenfokus – jede Firma möchte heutzutage agil sein. Offen bleibt jedoch meistens folgende Frage: «Was bedeutet das für unsere Führungskräfte?»
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
Sachliche Argumente funktionieren im Alltag oft nicht. Erst wer einmal erkannt hat, dass und wie er auf der irrationalen Ebene punkten muss, dem eröffnen sich neue Möglichkeiten bei seinen Mitmenschen
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
Kreatives Chaos ist Quatsch. Kreativität kann hoch systematisch sein und dabei maximal originell. Querdenken macht gute Laune und holt selbst die Neue-Ideen-Belächler, Kreativitätsbekämpfer und Ideen-Kopierer bei ihrer produktiven Laune ab.
Am vergangenen XING Expertendialog zeigte Referent Jiri Scherer von Denkmotor, wie das Ausbrechen aus Denkmustern funktioniert und warum jede Kreativitätsmethode einen roten Punkt hat.
Die digitale Transformation wirkt sich nicht nur auf Prozesse, sondern insbesondere auch auf ganze Geschäftsmodelle von Unternehmen aus.
Roger Basler zeigt in seinem Referat auf, was ein digitales Geschäftsmodell ist und welche Schritte ein Unternehmen tätigen muss, um sich dorthin zu entwickeln. Zentral dabei ist, dass nicht einfach ein bestehendes Geschäftsmodell digitalisiert wird, sondern Unternehmen anfangen im neuen Kundennutzen und Kundenverhalten zu denken.
Gerne stellen wir Ihnen die Slides von Roger Basler zur Verfügung:
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
Die monatlichen Anlässe in Zusammenarbeit mit dem Swiss IPv6 Council behandeln verschiedene technische Themenbereiche von IPv6.
Ist Dual-Stack ein guter Weg? Was sind Erfahrungen mit reinen IPv6-Netzwerken? Viele Unternehmen kämpfen mit diesen Fragen. Genau aus diesem Grund hat Cisco in San Jose einen reinen IPv6-Campus eingerichtet und sucht Antworten auf solche Fragen.
In seinem Referat präsentierte Khalid Jawaid die Bemühungen zur Einführung von IPv6 in einem einzelnen Campusgebäude und die Hürden, die dies mit sich bringt. Im Weiteren sprach er über die Herausforderungen, die sich aus der Erstellung des Business Case im Jahr 2010 und der Bereitstellung von mehr als 400 Remote-Standorten und den daraus gezogenen Lehren ergaben.
Die Inputs von Khalid Jawaid haben bei vielen Teilnehmern neue Perspektiven und Ideen für die Einführung von IPv6 geweckt.
Gerne stellen wir Ihnen die Slides von Manuel Schweizer zur Verfügung:
Vielleicht haben Sie schon einmal ein Zugbillett mit der SBB-App gekauft, per Smartphone eine Doodle-Umfrage verschickt oder in Google Docs eine Textdatei erstellt. Haben Sie sich dabei jemals gefragt, was diese Apps so erfolgreich macht?
Simon Raess, Gründer & Design Strategist bei Ginetta, weiss es. Er war massgeblich an der Kreation genau dieser Produkte beteiligt. Mit seiner Digitalagentur hat er zahlreichen Firmen – darunter Swisscom, Twint und Helsana – zum Erfolg in der digitalen Geschäftswelt verholfen.
In seiner Präsentation am Xing LearningZ vom 4. Juli 2017 zeigte Simon Raess, wie gutes UX Design nicht nur dafür sorgt, dass Webistes und Apps schön aussehen, sondern wie es digitale Produkte auch nachhaltig erfolgreich macht. Sehr spannend war auch der Einblick in die systematische Arbeitsweise, welche zu benutzerfreundlichem Design führt.
Design Thinking ist in aller Munde. Aber was ist Design Thinking denn nun genau? Lernen Sie in dieser Session die agile Innovationsmethode der Stanford University anhand eines kleinen Praxisbeispiels kennen. Tauchen Sie ein in die Welt der Kunden, generieren Sie Lösungsansätze und Prototypen. Ein interaktiver Kurzworkshop mit vielen Erkenntnissen.
Dieser Event des Swiss IPv6 Council befasste sich mit dem spannenden Case der ETH Zürich. Dort sind die IPV4-Adressen schon seit Jahren knapp.
Derk Valenkamp, Gruppenleiter der ID-Datennetze der ETH Zürich, zeigte auf, was er und sein Team seit 2007 unternommen haben. So mussten und müssen daher immer mehr NAT/PAT-Lösungen implementiert werden, die aus betrieblicher und Sicherheitssicht grosse Anforderungen an das Logging stellen. Damit die Netzwerkanforderungen auch langfristig das Wachstum der ETH Zürich und deren IT erfüllen können, wird schon seit Jahren auf IPv6 gesetzt. Besonders spannend für die engagierten Teilnehmer waren auch die Stolpersteine und Hürden, welche Derk Valenkamp aufgezeigt hat.
Gerne stellen wir Ihnen die Slides von Derk Valenkamp zur Verfügung.
Berät Sie bald ein Bot über die neusten Winterschuhe, weil Ihr Handy festgestellt hat, dass Sie zu kalte Zehen haben, wonach eine Drohne das Schuhwerk an Ihren über GPS georteten Standort fliegt?
Roger Basler ging in seinem Referat vom 2. Mai 2017 auf Trends und einige bereits existierende Pilot-Versuche ein. Seine Einschätzung der Wahrscheinlichkeit des Impacts dieser Trends auf unser Online-Shopping-Verhalten soll nicht in erster Linie die Wahrheit widerspiegeln, sondern die Basis für eine gute Diskussion und den Erfahrungsaustausch untereinander legen.
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
Zahlen & Fakten zur Entwicklung des Werbemarkts Schweiz: Michael Göldi (Digital Focus) & Michel Bächtiger (Media Focus) kreuzen die Klinge und klären die Frage aller Fragen: klassische Werbung oder Online-Werbung? Mögen die besseren Daten-Fakten gewinnen!
Zeit für ein Privacy-Programm. Datenschutz-Entwicklung in Europa (GDPR) und das neue Datenschutzgesetz in der Schweiz: Was bedeutet das für mein Unternehmen?
In diesem Referat zeigten wir Ihnen auf, was die Entwicklung des Datenschutzes in Europa für uns bedeutet und was auf die Schweiz zukommt.
Im Mai 2018 tritt die EU Datenschutz-Grundverordnung (GDPR – general data protection regulation) in Kraft. Über die enthaltenen Neuerungen wurden bereits in verschiedenen Veranstaltungen berichtet. An diesem Referat gaben wir Ihnen als Erstes eine kurze Zusammenfassung der Geschehnisse zur Orientierung.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
15. Microsoft Office Web Apps Integration
HTML rendering of Microsoft Office and Adobe PDF documents
•Supported with Citrix- managed StorageZones(only) today
•Rich file interaction without requiring download
•Leverages Microsoft web app viewer
ᵒPowerPoint animations
ᵒExcel calculations
ᵒMS Word & PDF rendering
17. Use Citrix Receiver to access published application or desktop
XenDesktop / XenApp integration
Open ShareFile documents from a published application
18. Use Citrix Receiver to access published application or desktop
XenDesktop / XenApp integration
Open ShareFile documents from a published desktop
19. Without On-Demand Sync
Every login to non-persistent desktop
•Full file download of
ᵒMy Files & Folders
ᵒShared Folders (if configured)
•Likely to cause a capacity issue on PVS or MCS differencing disk
•Increased write IO during sync
20. With On-Demand Sync
Designed for XenDesktopand XenApp
•Same look & feel as “normal” Windows Sync
•4 KB placeholder for each file
•Only brings over files when required
ᵒCopy
ᵒOpening/editing in application
•Files are uploaded when changed
•During next login the locally sync’d files are deleted
21. Before & After On-Demand Sync
Without On-Demand Sync -20 MB
With On-Demand Sync –4 KB
28. ShareFile Mobile Device Security
Provided by ShareFile
PoisonPill
Require password
Data retention
Encrypt files at rest
Passcode lock
Device lock
Jail-break detection
Remote wipe
Wipe status and auditing
Disable external applications
Secure Sharing
Network IP restrictions
Session inactivity timeout
Encryption at rest
•Requires passcode
Poison Pill
•Lost device protection / data expiration
Remote Wipe
•Wipes only ShareFileapp data
Disable External Applications
•Prevent “Open In” 3rd party apps
29. Mobile DLP Controls with XenMobile
Provided by ShareFile
Disable download
Require password
Data retention
Encrypt files at rest
Passcode lock
Device lock
Jail-break detection
Remote wipe
Wipe status and auditing
Disable external applications
Secure Sharing
Network IP restrictions
Session inactivity timeout
Provided by MDX Wrapping
Constrain clipboard cut and copy
Define maximum offline period
Constrain clipboard paste
Require regular re-authentication
Constrain external applications
Wipe data after security event
Constrain URL Schemes
Online access only
Block camera
Constrain Wi-Fi networks
Block microphone
Require internal network
Block screen capture
Constrain network access
Block email compose
App update grace period
Disable print
Require device encryption
Require Citrix Worx Homeauthentication
Require device pattern screen lock
30. Mobile Device Deployment
Public App Store
Mobile Application Management (MAM)
Mobile Device Management (MDM)
31. Mobile Device Deployment
Public App Store
Mobile Application Management (MAM)
Mobile Device Management (MDM)
32. Windows / OS X Device Registration
•Restricts login to devices only with a valid access key
33. Sharing Controls
Blacklist / Whitelist
•Prohibit sharing with specific email domains
•Restrict sharing to only specific email domains
Require Client Login
•Disables anonymous sharing of documents
•Restricts ability for recipients to forward shared documents to someone else
Client 2-step verification
•2-step verification on untrusted devices using SMS messages, Google Authenticator
35. ShareFilewith StorageZones
Choose where your data is stored
Meet compliance & security requirements
Best economics, most elastic
Cloud
On-Prem
36. ShareFilewith StorageZones
Choose where your data is stored
Meet compliance & security requirements
Best economics, most elastic
Cloud
On-Prem
Existing
Systems
StorageZone Connectors
Mobile productivity with existing data sources
43. Authentication Options
ShareFile Managed
•Uses email address and a ShareFile password
•Passwords are stored hashed in the ShareFile Control Plane
•Admin portal supports password policy management
•Unified storefront for all applications, data and services
•Instant user provisioning and de- provisioning
•Single sign-on with Citrix Worx
•Real-time SaaS application monitoring
•Comprehensive access control policies
Customer IdP
•Requires customer provided and configured SAML 2.0 identity provider
•Supports Forms, Basic, and Windows Integrated protocols
•Tested with ADFS 2.0, PingFederate, SiteMinder, Okta
•Supported only with ‘Enterprise’ tools
44. SAML Authentication
•Employee account is still required in ShareFile
•Folder Access Control
•Licensing
•Employees will be matched by email address
•Employee password will never be sent to SaaS Application Tier
•ShareFile Authentication can be blocked for Employee users
•Basic, Integrated Windows Authentication, and Forms are supported for all Enterprise clients
45. 7
8
9
1
2
3
Service Provider
(sharefile.com)
Identity Provider
(e.g. XenMobile,
ADFS)
4
5
6
1
Client requests ShareFile SSO login URL
2
Client discovers identity provider
3
Client redirected to identify provider
4
Client requests identity provider URL
5
Identity Provider identifies the user
6
User is authenticated and is redirected to Assertion Consumer Service URL with SAML response
7
User agent requests ACS URL
8
ACS validates SAML response and redirects user agent to ShareFile URL
9
User agent requests ShareFile URL
User has access
SAML
How it works
Client
46. IdP / SP Authentication
ShareFile.com Customer Active
Directory
Rights
SAML
Service
Provider
(SP)
SAML
Identity
Provider
(IdP)
Trust
Claims
LDAP
Signed
47. So how do we get the Identity?
•<NameIDFormat="urn:oasis:names:tc:SAML:1.1:nameid- format:emailAddress">joel.stocker@citrix.com</NameID>...
Attribute Store
(AD)
Rule
Transform
Claims
48. SAML: IDP-Initiated Sign-On
SAML Identity
Provider
(IDP)
ShareFile.com
Service Provier
(SP)
Go to sharefile.com
302 + Claims
https://account.sharefile.com/saml/acs + Claims
49. SAML: SP-Initiated Sign-On
SAML Identity
Provider
(IDP)
ShareFile.com
Service Provider
(SP)
../adfs/ls +
302 + Request
https://account.sharefile.com/saml/acs + Claims
https://account.sharefile.com/saml/login
Request
401(Auth Challenge)
../adfs/ls + R e q u e s t +
302 + Claims
61. StorageZonesController Req& Communication
StorageZonesController
•Windows Server 2008 R2 or 2012 R2
•IIS Services with ASP.NET
•.NET Framework 4.5
•2 vCPU, 4GB RAM
•Public IP address with DNS
•Public SSL certificate
SZC
SZC
ShareFile.com
SaaS Application Tier
•*.sharefile.com173.199.5.0/24
•*.sharefile.eu78.108.127.0/24
Object Store
Network
Shares
ShareFile Data
•CIFS/SMB file share
•Service account
SharePoint
•http/https
Network Shares
•CIFS/SMB
Internal
62. External Firewall
Internal Firewall
Port 80on localhost health check
Port 80on localhost health check
Port 443
Port80 or 443 (recommended)
Inbound from * on Port 443
FQDN on External DNS with valid Public SSL cert
Outbound to
*.sharefile.com 173.199.5.0/24
*.sharefile.eu78.108.127.0/24
Port 443
DMZ Proxy
(e.g. NetScaler)
ShareFIle StorageZone Controller(s)
(physical or virtual)
ShareFile StorageZones Networking Diagram
63. ShareFile
Client
NetScaler
App Controller
Device Manager
DMZ
Port 80 or 443
SZC.company.com
StorageZone
Controller
Internet & Remote Users
Internal Network
Port 443
Port 443
App Controller
User Provisioning
Worx Web
Worx Mail
Worx Home
SharePoint
File Server
Active Directory
Port 443
Port 443
Port 389 or 636
Port 80 or 443
SMB
Port 389 or 636
Optional
Optional
Citrix-Managed
Customer-Managed
64. ShareFile
NetScaler
DMZ
Port 80 or 443
SZC.company.com
StorageZone
Controller
Internet & Remote Users
Internal Network
Port 80 or 443
Port 443
App Controller
User Provisioning
SharePoint
File Server
Active Directory
Port 443
Port 443
Port 389 or 636
Port 80 or 443
SMB
Port 389 or 636
Optional
Optional
IdP
Citrix-Managed
Customer-Managed
65. DMZ
App Communication
SZC
SZC
Data /
Connectors
Identity Provider
StorageZone
Controller
ShareFile.com
NetScaler
SSO
/saml/login SSO URL
Download / Upload URL
Internal Network
Internet