This document contains quotes from various customers about how they have used Citrix solutions to transform their businesses. Some key points:
- Lucas Metropolitan Housing Authority used Citrix Cloud to enable more mobile employees and clients to access applications securely.
- Montefiore Health System was able to rollout an Epic system to thousands of users faster using Citrix solutions.
- Several healthcare organizations discussed how Citrix allows secure mobile access to critical patient information.
- Educational institutions discussed how Citrix extended the life of older devices and improved learning outcomes.
Digital workspaces
are becoming powerful competitive differentiators in all industries.
That’s because businesses are seeking new levels of agility in
their processes and service delivery methods. They also want
flexibility for their employees.
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseCitrix
For a growing number of IT organizations, the future lies in Unified Endpoint Management (UEM), which combines CMT with EMM (Enterprise Mobility Management) providing a single pane of glass to manage and secure, devices and operating systems, whether laptops, smart phones, tablets or any other device.
This white paper outlines the gaps in providing a secure
browser, including research into data breach trends and
provides a practical solution for centralizing and securing
browsers. The solution includes combining Citrix and
Bitdefender technologies in an innovative approach centered
on new virtualization and hypervisor introspection
technologies.
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
Eliminate the challenges and complexity of a Windows 10 migration with a virtual desktop solution.
Employees are upgrading their personal devices to Windows 10 at a record rate—and managing and performing a controlled OS migration is no longer in the hands of corporate IT. Businesses need to formulate a strategy to maintain productivity and support their employees regardless of the user’s chosen endpoint device or operating system.
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. It will enable organizations to pursue priorities such as mobility, flexwork and consumerization while effectively managing risk.
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors; engaging end users to protect business information; and meeting security-related compliance requirements.
Forrester interviewed a Citrix customer currently using Citrix XenApp to determine the cost savings and business benefits of XenApp. In the process, they discovered that the company reduced desktop support costs by $1.7 million, by delivering key business applications via XenApp. Read this white paper to examine the use cases and the cost savings and benefits achieved.
Digital workspaces
are becoming powerful competitive differentiators in all industries.
That’s because businesses are seeking new levels of agility in
their processes and service delivery methods. They also want
flexibility for their employees.
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseCitrix
For a growing number of IT organizations, the future lies in Unified Endpoint Management (UEM), which combines CMT with EMM (Enterprise Mobility Management) providing a single pane of glass to manage and secure, devices and operating systems, whether laptops, smart phones, tablets or any other device.
This white paper outlines the gaps in providing a secure
browser, including research into data breach trends and
provides a practical solution for centralizing and securing
browsers. The solution includes combining Citrix and
Bitdefender technologies in an innovative approach centered
on new virtualization and hypervisor introspection
technologies.
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
Eliminate the challenges and complexity of a Windows 10 migration with a virtual desktop solution.
Employees are upgrading their personal devices to Windows 10 at a record rate—and managing and performing a controlled OS migration is no longer in the hands of corporate IT. Businesses need to formulate a strategy to maintain productivity and support their employees regardless of the user’s chosen endpoint device or operating system.
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. It will enable organizations to pursue priorities such as mobility, flexwork and consumerization while effectively managing risk.
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors; engaging end users to protect business information; and meeting security-related compliance requirements.
Forrester interviewed a Citrix customer currently using Citrix XenApp to determine the cost savings and business benefits of XenApp. In the process, they discovered that the company reduced desktop support costs by $1.7 million, by delivering key business applications via XenApp. Read this white paper to examine the use cases and the cost savings and benefits achieved.
Citrix Customer Story: Southcoast Health SystemCitrix
Southcoast Health System employs approximately 7,000 workers, including 300 physicians and 250 visiting nurses, and it provides a wide range of medical services at each campus to
streamline the patient care experience. Discover how they use Citrix to do just that.
Need advice for desktop virtualization deployment? These 6 experts have over a hundred successful deployments under their belts, and they're sharing their key lessons.
Visit the Citrix Services Resource Library for more helpful insights, tricks and tips from Citrix consultants, trainers and support engineers: http://www.citrix.com/static/serviceslibrary/
Infographic: Enterprise mobile deployment shows strong advancementsCitrix
Enterprises are successfully mastering hybrid OS deployments with increasing use of app and data policies, granular VPN and white-listed app stores for user productivity. Citrix XenMobile offers mobile deployments that power your mobility.
Visit our website to learn more: http://bit.ly/1ClnMu9
Are you benefiting from billions of revenue opportunity available with Cloud Computing? Find out how Microsoft can help businesses and partners like you grow your company and migrate off of legacy technologies.
Join Richard Harbridge as he explains the state of the enterprise mobility industry today and what new innovations and capabilities have been introduced and how other organizations are realizing tremendous value with those new technologies.
What makes the next-generation firewall better than the traditional firewalls in protecting your data from hackers? Know more information from Netmagic!
Securing and Managing Offce 365 with XenMobileCitrix
This paper discusses securely deploying and managing Office 365, protecting data at rest on a mobile device and protecting data in transit. It also explains how to configure Worx Mobile Apps with hosted Exchange. Worx apps, which are enterprise-class apps from Citrix and its development partners, can help users gain additional productivity when using Office 365 hosted services and other Microsoft cloud products such as Azure Active Directory and Azure Rights Management Services.
Presentation given at HostingCon 2008 in Chicago for the Marketing tract. Designed to explain the differences between various Cloud Computing models as well as dispel myths and illustrate the features and benefits of Clouds.
The cloud platform is getting more and more attractive to the computing world. Azure is a new cloud system from Microsoft that allows applications to run from a remote connected system, hosted in a Microsoft data center, and store data in the cloud. The platform consists of three main parts – Development runtime, Azure runtime and Applications like SQL Azure. In this business focused session you will see the main business overview of this cloud platform.
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...Citrix
Windows 10 is poised to become the most rapid OS migration in history. Learn how you can streamline OS migrations now and in the future with your existing Citrix infrastructure.
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
2017 is set to be a year for growth for the channel industry
The shift to cloud services is marked as an important driver of this growth
Now is the time to capitalise on this opportunity
Digital or die? British boardrooms divided on digital transformationCitrix
Against the backdrop of Brexit and an even greater need for continued growth and innovation within the UK business community, Digital or Die—a new study by Citrix UK—examines YouGov research into the C-Suite’s viewpoint on digital technology and the extent of digital business transformation across the UK today.
Citrix Customer Story: Southcoast Health SystemCitrix
Southcoast Health System employs approximately 7,000 workers, including 300 physicians and 250 visiting nurses, and it provides a wide range of medical services at each campus to
streamline the patient care experience. Discover how they use Citrix to do just that.
Need advice for desktop virtualization deployment? These 6 experts have over a hundred successful deployments under their belts, and they're sharing their key lessons.
Visit the Citrix Services Resource Library for more helpful insights, tricks and tips from Citrix consultants, trainers and support engineers: http://www.citrix.com/static/serviceslibrary/
Infographic: Enterprise mobile deployment shows strong advancementsCitrix
Enterprises are successfully mastering hybrid OS deployments with increasing use of app and data policies, granular VPN and white-listed app stores for user productivity. Citrix XenMobile offers mobile deployments that power your mobility.
Visit our website to learn more: http://bit.ly/1ClnMu9
Are you benefiting from billions of revenue opportunity available with Cloud Computing? Find out how Microsoft can help businesses and partners like you grow your company and migrate off of legacy technologies.
Join Richard Harbridge as he explains the state of the enterprise mobility industry today and what new innovations and capabilities have been introduced and how other organizations are realizing tremendous value with those new technologies.
What makes the next-generation firewall better than the traditional firewalls in protecting your data from hackers? Know more information from Netmagic!
Securing and Managing Offce 365 with XenMobileCitrix
This paper discusses securely deploying and managing Office 365, protecting data at rest on a mobile device and protecting data in transit. It also explains how to configure Worx Mobile Apps with hosted Exchange. Worx apps, which are enterprise-class apps from Citrix and its development partners, can help users gain additional productivity when using Office 365 hosted services and other Microsoft cloud products such as Azure Active Directory and Azure Rights Management Services.
Presentation given at HostingCon 2008 in Chicago for the Marketing tract. Designed to explain the differences between various Cloud Computing models as well as dispel myths and illustrate the features and benefits of Clouds.
The cloud platform is getting more and more attractive to the computing world. Azure is a new cloud system from Microsoft that allows applications to run from a remote connected system, hosted in a Microsoft data center, and store data in the cloud. The platform consists of three main parts – Development runtime, Azure runtime and Applications like SQL Azure. In this business focused session you will see the main business overview of this cloud platform.
Windows 10 Migration: Extend Your Citrix Solution to Streamline Your OS Migra...Citrix
Windows 10 is poised to become the most rapid OS migration in history. Learn how you can streamline OS migrations now and in the future with your existing Citrix infrastructure.
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
2017 is set to be a year for growth for the channel industry
The shift to cloud services is marked as an important driver of this growth
Now is the time to capitalise on this opportunity
Digital or die? British boardrooms divided on digital transformationCitrix
Against the backdrop of Brexit and an even greater need for continued growth and innovation within the UK business community, Digital or Die—a new study by Citrix UK—examines YouGov research into the C-Suite’s viewpoint on digital technology and the extent of digital business transformation across the UK today.
Get the inside scoop on what Citrix and Nutanix are up to. In this session, you will discover the collaborative projects and visions that we are most excited about.
Watch the session on SynergyTV and follow along with these slides. http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=f2ededd4-64a0-47aa-bbbd-208d62128038
SYN 220: XenApp and XenDesktop Security Best Practices Citrix
You can differentiate your company simply by having great cybersecurity. This technical session will arm you with our best practices for ensuring security across the enterprise.
Watch the full session on SynergyTV and follow along with the slides here! http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=e75d7f25-2d01-4cd5-b77e-945e75905d08
SYN 305: Architecting Citrix on Microsoft AzureCitrix
You can deliver shared hosted apps, desktops, and Server VDI from Azure. We can show you how!
Watch the full session on SynergyTV and follow along with these slides.
http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=c520cdde-a60f-473b-914d-172b2bfbfe4f
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...Citrix
Rejoice! You can virtualize Linux workloads with XenApp and XenDesktop. That's great news for anyone in oil, natural gas, manufacturing, scientific modeling, and chipset design.
You can find out how to unlock the power of Linux virtual desktops in this Citrix Synergy session. Follow along with the recorded session on SynergyTV and use the slides here. http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=210af262-ea29-4666-b635-ab92382259cf
Browsers are historically one of the most vulnerable pieces of software. In SYN 321, we will cover:
• How to lock down browsers at the end point for accessing both virtualized and web environments
• Guidance for hardening published browsers, including group policy and PowerShell configuration of security policies
• How to tune browser components to be application-specific and further minimize the attack surface
Watch SYN 321 on SynergyTV and follow along using the slides here. http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=01feac45-e487-4a8e-8451-9ec41bb20d6c
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitaleCitrix
Sviluppate applicazioni. Distribuite applicazioni. Ma quanto siete bravi a distribuire le applicazioni?
Scoprite perché una distribuzione delle applicazioni di alta qualità conta e in che modo le organizzazioni affrontano tale sfida.
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Citrix
Вы разрабатываете приложения. Развертываете приложения. Но насколько эффективна ваша доставка приложений?
Узнайте, почему высококачественная доставка приложений играет большую роль и как организации решают эту задачу.
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...Citrix
Développement applicatif Déploiement applicatif Mais quelles sont les performances de votre mise à disposition d’applications ?
Découvrez pourquoi une mise à disposition d’applications haute qualité est vraiment importante et comment les entreprises procèdent pour s’en doter.
Waarom APPLICATION DELIVERY belangrijk is in de digitale economieCitrix
Apps ontwikkelen. Apps implementeren. En apps aanbieden. Maar hoe goed is uw application delivery eigenlijk?
Ontdek waarom een hoogwaardige application delivery belangrijk is en hoe organisaties die uitdaging aanpakken.
Some growing companies believe that Microsoft RDS is “good enough for now”, but they’re missing out on the 3 top reasons why they should consider Citrix XenDesktop. This introduction looks at why growing companies should look beyond Microsoft RDS including user experience, security and system support.
Learn more: https://www.citrix.com/
SYN 219 Getting Up Close and Personal With MCS and PVS Citrix
In SYN 219, take a closer look at:
- Provisioning in a virtual desktop environment.
- Machine creation services and provisioning services.
- Getting the most out of MCS and PVS.
Watch the whole session on SynergyTV and follow along with these slides.
http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=17298efa-f6d3-4c15-b1cc-b2f0bb0b65dc
Security is top-of-mind for all IT pros. Here's a look at the biggest expectations & obstacles facing the industry.
Learn more: https://www.citrix.com/
At Citrix, our mission is to power a world where people, organizations, and things are securely connected and accessible so our customers can make the extraordinary possible. This brief outlines our strategy – and how we plan to get there.
Visit our website to learn more: http://bit.ly/29dUBAJ
Unleash the power of your data and gain instant insights without additional investments in IT infrastructure. We review the state of data analytics, discuss the differences in long-term, medium-term and (near) real-time data and how companies can leverage it with PowerBI.
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesNitin Badjatia
The Federal Government is in the process of modernizing technologies across all agencies. As part of a new mandate issued by the OMB [2009], a major emphasis is being placed on cloud computing technology. This presentation was made to cabinet level agencies across the civilian sector of the Federal Government. The primary goal was to educate department, program and agency leaders on the basics of cloud computing and present some examples of success stories with RightNow's cloud computing based customer experience management products.
Modernization doesn't happen overnight. But by reassessing your existing IT portfolio, including infrastructure and applications, as well as your current processes and roles, you can better understand how you can leverage cloud technologies to deliver value faster.
Microsoft Services offers an end-to-end approach to modernization and DevOps. Our goal is to help you transform your environment so you can deliver continuous value. We’ve built our approach based on experience with thousands of customers, as well as our own transformation journey.
The Microsoft Cloud includes Azure, Office 365 and much more. During this presentation I give an overview of the platform and talk specifically about the productivity portion of the Microsoft Cloud and the services Oakwood provides to implement Office 365 for customers.
While use of the cloud today is generally associated with the ability to reduce costs and improve efficiency, widespread adoption of this technology is projected to have a transformative effect on all businesses of all sizes.
Webinar: DataStax and Microsoft Azure: Empowering the Right-Now Enterprise wi...DataStax
Today’s Right-Now Economy means employees and customers alike expect applications to be always on, real time, and contextual. But how do you manage applications that collect data from a variety of sources, at cloud scale, and provide instant insights? And, can you embrace the public cloud while still retaining control of your data? Join us to hear from Microsoft Cloud Architect and Azure Global Black Belt Ron Abellera to learn how an enterprise-ready hybrid cloud data layer can help to accelerate time to market and scale linearly, ensure continuous availability, and achieve data autonomy with a hybrid cloud strategy.
View webinar recording: https://youtu.be/_-GqmAk5C_I
Explore all DataStax webinars: https://www.datastax.com/resources/webinars
Oxford Economics worked with Citrix to survey 600 business and IT executives around the world and across industries to measure their progress toward digital work. We found that big changes are happening— but much work remains to be done.
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent.
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
Organizations are actively pursuing solutions that address application delivery in a multi-cloud world. A solution that assures applications, regardless of where they reside, are simply and reliably delivered to users – when, where, and how they need them.
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
The nature of work is changing for office professionals as a result of cloud-based technologies, new devices and evolving work practices. Wakefield Research partnered with Citrix to survey nearly 1,300 office professionals in the U.S. to uncover the latest trends and employee expectations around the Future of Work.
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
This paper provides guidance to customers wanting to draw economic comparisons between perpetually licensed Citrix software, and the newer Citrix Cloud service equivalents
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
This paper provides guidance to customers wanting to draw economic comparisons between perpetually
licensed Citrix software, and the newer Citrix Cloud service equivalents.
Compared to purchasing, installing, and maintaining traditional perpetually licensed software, the new
SaaS/Subscription approach offers unique technical, financial, and capability benefits.
Citrix is propelling into the future armed with smarter, more efficient, and more secure technology. See what SVP of Product PJ Hough, VP of Product Marketing Calvin HSU, Brad Anderson, and Abhishek Chauhan detailed at the Citrix Synergy 2017 Technology Keynote.
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
Malcolm Gladwell took to the stage at Synergy 2017 to explore the complexities we must conquer in the future. How do we approach difficult problems and accomplish meaningful work?
Comparing traditional workspaces to digital workspacesCitrix
The unprecedented adoption and convergence of mobility, cloud,
virtualization, and cyber security technologies is rendering
Traditional Workspaces a thing of the past. Digital workspaces are
becoming powerful competitive differentiators in all industries as
businesses are seeking new levels of agility in their processes and
service delivery methods and provide greater flexibility for their
employees.
We invite you to take a tour of our new office in Paddington, London, which opened recently at 20 Eastbourne Terrace. Set over two floors with stunning views of the city, this space encapsulates our vision of empowering people to work anywhere and at any time. We hope to welcome you here in person soon… And, don’t forget to check current openings at Citrix UK here: www.citrix.com/careers!
Photo credit: May Fawzy Design (http://www.mayfawzy.co.uk/)
[Infographic] Moving at the Speed of Byte: Ushering the Era of the Digitally ...Citrix
The financial services industry must embrace a digital business strategy to compete in today's environment by moving fast and yet be agile, without compromising security and compliance requirements.
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
Abstract: Educators realize the importance of enabling remote students. Mobility is key. This infographic outlines 12 basics that apply to learning environments and explains how Citrix can help.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.