Citrix provides cloud computing platforms and services that are used by 4 out of the 5 largest public clouds and 75% of internet users. Citrix's cloud solutions include CloudStack, an open source cloud computing platform that is powering over 150 large scale cloud deployments. Citrix learns from deploying CloudStack across 100 customer clouds to build its cloud offerings.
This presentation will discuss concerns and opportunities, business drivers, cisco solutions for enterprise cloud, the compute platform, cisco automation solutions and cloud enablement workshop.
Deep dive: Citrix CloudPlatform for Infrastructure as a ServiceCitrix
Citrix innovation continues to advance our cloud management technology at a rapid rate to keep pace with emerging enterprise customer needs. Learn about the core capabilities and newest innovations for Citrix CloudPlatform, which is powering the world's largest clouds today. CloudPlatform provides the latest and most advanced open source software platform to build highly scalable and reliable cloud computing environments. You’ll also see why Citrix cloud solutions differ from VMware and OpenStack offerings.
This presentation will discuss concerns and opportunities, business drivers, cisco solutions for enterprise cloud, the compute platform, cisco automation solutions and cloud enablement workshop.
Deep dive: Citrix CloudPlatform for Infrastructure as a ServiceCitrix
Citrix innovation continues to advance our cloud management technology at a rapid rate to keep pace with emerging enterprise customer needs. Learn about the core capabilities and newest innovations for Citrix CloudPlatform, which is powering the world's largest clouds today. CloudPlatform provides the latest and most advanced open source software platform to build highly scalable and reliable cloud computing environments. You’ll also see why Citrix cloud solutions differ from VMware and OpenStack offerings.
Did you know that 50 percent of desktop virtualization initiatives fail?
Most challenges are due to poor user satisfaction, poor performance and
escalating costs. With such an important initiative, you cannot afford to
take a 50/50 chance for success.
Join the webinar "VDI Best Practices - How to Ensure a Great
Customer Experience When Deploying Client Virtualization" to increase your odds of project success and
ensure user satisfaction from day one. You’ll learn from virtualization
expert Roy Francis of FusionStorm how to successfully deploy desktop
virtualization projects and overcome user problems.
Learn how to better prepare for your desktop virtualization initiative,
and then once deployed how to ensure a great user experience. We will
discuss:
• The pitfalls to avoid when implementing desktop virtualization
• Tips and tricks for overcoming user challenges
• Considerations for migrating to XenApp 6.5 and Windows 2008
• How to address performance and scalability concerns
Virtual Desktop Infrastructure (VDI) is still a relatively new technology. Most people are either unaware or have only a brief idea about this emerging technology. This Slide share will provide your 12 points which you must know before implementing VDI Technology in your business.
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
A growing number of companies are virtualising desktop environments to reduce cost and boost flexibility. The dizzying array of available solutions can make the first step quite difficult - what virtualization technology is right for my organization? Citrix alone offers XenDesktop, XenApp and VDI in a box. While Citrix desktop virtualisation often seems like a simple project; user experience problems, delayed deployments, and cost overruns can quickly turn this project into a nightmare.
Join the webinar "Desktop Virtualisation Choices: Citrix XenDesktop, XenApp or VDI in a Box - How to Decide" and learn from UK Citrix desktop virtualization expert Andrew Wood (Gilwood CS Ltd) how to decide what virtualisation technology best fits your needs.
Hear how to determine what technology is right for you based on:
• Your goals for desktop virtualisation
• Number of users, applications, and profiles
• Existing infrastructure issues
• Cost of ownership vs. cost savings
• Performance and scalability considerations
Who Are You? From Meat to Electrons - SXSW 2014Mike Schwartz
It’s an age old problem: how do you prove your identity? It’s the reason governments started issuing id cards. Since the advent of the Internet, identification has gotten even harder. To a website, you are a stream of electrons. Before you can transact business, the website needs to associate that stream of electrons with a person--a piece of meat. 80% of the Internet's security breaches have been traced back to bad passwords, but until recently, anything better than passwords meant expensive hardware tokens, or complex digital certificates. Luckily, authentication is experiencing a renaissance. New technologies have made it easier, more secure, and even less expensive to authenticate a person. Authentication is the front door to your network service. What device does the person have in their hands? Is your website or mobile app for customers or employees?
The slides from this SXSW 2014 presentation will help you understand your options, and how to use authentication for competitive advantage.
Did you know that 50 percent of desktop virtualization initiatives fail?
Most challenges are due to poor user satisfaction, poor performance and
escalating costs. With such an important initiative, you cannot afford to
take a 50/50 chance for success.
Join the webinar "VDI Best Practices - How to Ensure a Great
Customer Experience When Deploying Client Virtualization" to increase your odds of project success and
ensure user satisfaction from day one. You’ll learn from virtualization
expert Roy Francis of FusionStorm how to successfully deploy desktop
virtualization projects and overcome user problems.
Learn how to better prepare for your desktop virtualization initiative,
and then once deployed how to ensure a great user experience. We will
discuss:
• The pitfalls to avoid when implementing desktop virtualization
• Tips and tricks for overcoming user challenges
• Considerations for migrating to XenApp 6.5 and Windows 2008
• How to address performance and scalability concerns
Virtual Desktop Infrastructure (VDI) is still a relatively new technology. Most people are either unaware or have only a brief idea about this emerging technology. This Slide share will provide your 12 points which you must know before implementing VDI Technology in your business.
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
A growing number of companies are virtualising desktop environments to reduce cost and boost flexibility. The dizzying array of available solutions can make the first step quite difficult - what virtualization technology is right for my organization? Citrix alone offers XenDesktop, XenApp and VDI in a box. While Citrix desktop virtualisation often seems like a simple project; user experience problems, delayed deployments, and cost overruns can quickly turn this project into a nightmare.
Join the webinar "Desktop Virtualisation Choices: Citrix XenDesktop, XenApp or VDI in a Box - How to Decide" and learn from UK Citrix desktop virtualization expert Andrew Wood (Gilwood CS Ltd) how to decide what virtualisation technology best fits your needs.
Hear how to determine what technology is right for you based on:
• Your goals for desktop virtualisation
• Number of users, applications, and profiles
• Existing infrastructure issues
• Cost of ownership vs. cost savings
• Performance and scalability considerations
Who Are You? From Meat to Electrons - SXSW 2014Mike Schwartz
It’s an age old problem: how do you prove your identity? It’s the reason governments started issuing id cards. Since the advent of the Internet, identification has gotten even harder. To a website, you are a stream of electrons. Before you can transact business, the website needs to associate that stream of electrons with a person--a piece of meat. 80% of the Internet's security breaches have been traced back to bad passwords, but until recently, anything better than passwords meant expensive hardware tokens, or complex digital certificates. Luckily, authentication is experiencing a renaissance. New technologies have made it easier, more secure, and even less expensive to authenticate a person. Authentication is the front door to your network service. What device does the person have in their hands? Is your website or mobile app for customers or employees?
The slides from this SXSW 2014 presentation will help you understand your options, and how to use authentication for competitive advantage.
На Citrix Synergy был представлен XenDesktop 5, как всегда, в пресс-релизах все стало лучше, быстрее, сильнее и чудесатее. Данный доклад поможет разобраться в деталях
ID Next 2013 Keynote Slides by Mike SchwartzMike Schwartz
Slide deck from Mike Schwartz's keynote address at ID Next 2013 in The Hague, Netherlands. His speech discussed what tools and rules are needed for scaling federations to include networks of trusted Identity Providers (IDP's) and Service Providers (SP's).
Cloud Identity: A Recipe for Higher EducationMike Schwartz
The concept of cloud identity in higher education was recognized in November 2009 with the EDUCAUSE Catalyst Award, which honors IT-based innovations that provide groundbreaking solutions to major challenges in higher education.
But what is cloud identity?
The gist is that cloud identity enables a person's "user" information to be distributed on the Internet. This solves a common problem: the need to maintain a username at every website. In this paradigm shift, identity information is not stored within each website, but accessed on the wire as needed. Websites become "relying parties" (RPs) using the information of trusted "identity providers" (IdPs). Although it has taken a while, finally the recipe for federated identity seems clear.
Open Trust Taxonomy for Federation Operators - if you are interested in new technologies to enable trust across multiple domains, you should consider joining the OTTO WG at Kantara. These slides are a quick overview of the work, with links to enable you to find out more. Mutli-party Federations help drive down the legal and techincal cost of SSO and collaboration for technologies like SAML, OAuth, and PKI. It's a trust model that makes sense when you have a reasonably sized ecosystem--not millions, but thousands.
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Mike Schwartz
Increased trust in an online identity = increased mitigation of the risk of fraud. As an enterprise interacts with a person via the Internet, it may be prudent, for certain transactions, to have more evidence of that person’s identity. Web Access Management systems include some proprietary features to force “stepped-up authentication.” But luckily, new OAuth2 profiles like UMA and OpenID Connect offer a standards based approach to achieve inter-domain trust elevation. This slideshows includes a high level overview of the Enterprise UMA use case and some of the useful OpenID Connect features that can be leveraged to create centralized authentication policies.
It gives an overview about the WebRTC Identity and Security model, and our in-place SAML based Identity Federations. It gives detailed description about the combination and integration possibilities and difficulties. Demonstrating the integration with an example web application.
https://youtu.be/aeXaWDNU_sg
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!Mike Schwartz
Sometimes you need to be more sure your are connected to the right person. In those cases, to mitigate the risk of identity fraud, you should consider using a technique called trust elevation. Its easy with the OAuth2 profiles: OpenID Connect and UMA.
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyMike Schwartz
You can't re-invent the last 20 years of security. It took OpenID Connect and UMA working groups five years *each* to develop these standards. Not only do they address most of today's IoT security needs, but many hundreds more which will be teased out over time.
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)RightScale
Do you want to turn your existing data center into a private cloud? Exploring how to integrate your private cloud with a public cloud? In this webinar, we will discuss key considerations when designing a private cloud from internal resources and best practices for architecture of private and hybrid clouds. The webinar will include a demonstration, plus real-world examples of customers running their private cloud implementations on Citrix CloudPlatform using RightScale.
Topics to be covered:
• When to use private clouds
• Hardware selection
• Reference architectures and design considerations
• Use cases and real-life scenarios
• Managing your cloud resources effectively
Back that *aa s up – bridging multiple clouds for bursting and redundancyRightScale
Back that *aaS up – Bridging Multiple Clouds for Bursting and Redundancy
Peder Ulander, VP of Product Marketing, Cloud Platform Group, Citrix Systems
Bridging multiple cloud computing environments allows enterprises to plan for peak usage even while only building capacity for today’s needs. Using CloudStack, CloudBridge and RightScale can enable Enterprise IT to extend resource pools beyond physical datacenter boundaries and leverage additional private clouds or public clouds to meet peak usage requirements and smoothly manage planned or unplanned capacity spikes.
This is an updated talk on Cloud Computing and the Citrix Cloud Center.
From time to time the Citrix CTO Office is asked to give presentations at these and other events. I'm interested in any/all feedback from the Citrix and Cloud communities.
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....Denis Gundarev
Imagine that you just found the new job of your dreams: You are now a system administrator in a large enterprise. Everything is going like clockwork, except for one major problem: There are 5 different versions of Presentation Server in use and there is no documentation for any system. Now imagine you are a consultant ready to do an assessment of Citrix infrastructure, but nobody in the company knows how many farms and servers exist, or how they are configured. (Wanting a new imaginary job yet?) In this session, Denis Gundarev will share tips on how to document infrastructure and tricks on how to find all components or users that are "forgotten." Attendees will learn several methods for elevating permissions and taking ownership of forgotten systems.
Обратная сторона облака Чтобы Вы не витали в облаках от рассказов вендоров, настоящий практик – Антон Жбанков, гордо носящий титул vExpert расскажет про проблемы при внедрении «виртуализации всего» и опыт их решения в докладе «Обратная сторона Облака»
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...Denis Gundarev
Brian Madden, один из самых известных независимых экспертов по Citrix, RDS и Server-Based Computing. Брайан расскажет про парадокс имени себя и про борьбу «классиков» (Terminal Services) с «Современниками» (VDI). А также про то, почему проваливаются VDI проекты, и как этого избежать
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterDenis Gundarev
Думаете о BYOC? Опасайтесь периметра!
В маркетинговых презентациях Citrix и других вендоров часто проскакивает аббревиатура BYOC. Что это такое? Bring Your Own Computer, или по-русски ПРИходи СО Своим Компьютером (ПРИСОСКО J)). Про проблемы использования личных ПК (или iPad-ов) пользователей для доступа к корпоративным приложениям, и о том, как технически правильноих решать, расскажет Rick Dehlinger
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныDenis Gundarev
Robert Morris - консультант и архитектор североамериканского системного интегратора Advantec Global Services с рассказом про «Жизнь в окопах виртуальной войны», Про оптимизацию работы продуктов Citrix на техническом уровне и на 8-м уровне сетевых протоколов (люди)
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
We believe we have the experience and position to lead the VIRTUAL COMPUTING revolution…
Ich bin Najat Messaoud und bin bei der Firma Citrix für den Bereich Cloud Infrastructure Group imdeutschsparchigenRaumtätig.ZuunserenKundenzählensowohl Service Provider, Telcos, aberauchEnterpriseunternehmen und Organisationen der öffentlichen Hand. Ichwerdein den nächsten 15 Minutenkompakt und pragmatischeinige der Haupt-Learnings / Erkenntisseaus den zahlreichenImplementierungvorstellen , damitauchSieentsprechendfürIhr Cloud-Projektgerüstetsindund Siedabei das eineoderberücksichtigen.
Da wären zunächst natürlich die Telcos und Service-Providers die als erste auf dem Cloud-Zug gesprungen sind und das was sie im Rechenzentrum haben in irgendeiner form zu monetisieren. Darunter Go-Daddy, BT, Colt, Bell Canada Korea Telecom Leaseweb, Solvak Telecom und viele mehr.. Viele dieser Service Provider geht es darum Mehrwertdienste Ihren Kunden anbieten zu können oder den Erfolg von Amazon zu kopieren oder bei bei anderen wiederum ihr Managed Services, Outsourcing und Hosting Leistungen in Cloud umzuwandeln, um bessere Skalen-Effekte zu erzielen.Die zweite Gruppe repräsentiert Unternehmen die Ihr Geschäft im Internet betreiben und webbasierte Diente anbieten oder Ecommerce betreiben, ob Online-Gaming, Video-Streaming, Chatdienste . Diese Unternehmen vermarkten keine Cloud-dienste sondern nutzen unsere Orchestrieungsplatform für den Betrieb dieser Dienste, um die notwendige elastische und Dynamische Infrastruktur den stark schwankenden User-Zahlen entgegenzuwirken und auch um die Betriebskosten soweit wie möglich zu minimieren. Diese sind tatsächlich auch heute die Unternehmen, die auch Hybride-Cloud-Modelle fahren, so z.b. bedient zynga bis zu 50 millionen online gamer mit ihrer eigenen Infrastruktur im Rechenzentrum haben aber auch eine Koppelung an Amazon-Webservices um zu Pickzeiten die Kapazitäten automatisch zu erweiten.Seit ca. Jahren sehen wir aber auch die Anzahl der Cloud-Implementierung im Enterpriseumfeld und zu unserer alle Überraschung im öffentlichen Sektor.. Im Enterprisebereich sind es eher isolierte Cloudprojekte für Test/Entwicklung oder Training , aber auch Application Life Cyple Management, es geht vornehmlich um erhöhte Agilität. Im Goverment-Umfeld dagegen werden gerade Rechenzentrumskonsolidierung und Modernisierungen dazu genutzt die Rechenzentren auch in echte Cloud-Umgebungen inkl. Self-service und Verrechnung umzuwandeln..
Das ist das gesamte Spektrum an Unternehmen, aus denen wir die Erfahrungen gezogen haben.Ganz gleich um welche Clouds es sich handelt oder welches Unternehmen und Größe die Bausteine für unsere Implementierung sind ziemlich identisch. Wir setzen auf den Hypervisor-Layer mit einer Orchestrieungsplatform auf, um die unterliegende Infrastruktur bestehend aus Rechenleistung, Netzwerk und Storage in eine elastische Umgebung umzuwandel, die on-demand Computing, Verbrauchsmessung erlaubt, obendrauf wird ein Portal gesetzt für Self-Serrvice-Funktionen, automatische Provisionierung, Verrechnung und Berechnung mit Echzeit-Billing, und Bereitstellung eine Service-Katalogs. Meisten kommen dann noch Loadbalancing-Komponenten und Cloud-Briding –Technoloigien zum Einsatz , für bessere Performance und das Verbinden von verschiedenen Cloudsoder Rechenzentren. Ganz oben kommt es immer häufig vor, dass wir immer mehr Workplaceas a Service Implementierungen sehen, dabei werden den Usern komplette Dektop- und Applikationsumgebungen on Demand provisioniert.
Beim Aufbau der Cloudsollten Sie darauf achten, dass eine komplette Trennung der Software- von der Hardwareebene erfolgt.Dabei ist e wichtig, dass Sie eine Technologie zum Einsatz bringen, die die komplette Rechenzentrumsinfrastruktur abstrahiertund vom oben laufenden Software-Layer entkoppelt..Somit wird ein komplettes Vendor-Lockin vermieden und haben sie die Möglichkeit bestimmte workloads auf sehr günstige Infrastruktur komponenten zu betreiben und zum anderen lassen Sie auch die Karten offen was die künftigen Technologieentwicklungen angeht. Gerade bei den Service Providern war dies bisher immer ein wichtige Anforderung, da diese nicht wirklich voraussehen können was an Komponenten Sie von Ihren Kunden im Outsourcing oder Managed Services Umfeld übernehmen werden. Offenheit ist dabei auch wichtig in Bezug auf vorhandene Schnittstellen, um bestehende Umgebungen einzubinden oder für die Entwicklung erweiterter Funktionalitäten .
OffenheitbedeutetnichtzwangsläufigOpenscource, dennochistes so das geradeim Cloud-Umfeld die erfolgsgarantist.Die Unternehmen die die Top10 der erfolgreichtenclouds weltwitanführensetzenalleauf Openscource-Komponetenauf. AberauchimEnterpriseumfeldschauensichmehr 50% allerCIOs Opensource-Technologienan.. Deswegensolltensichtatsächlichauchdamitbeschäftigen, was in den Opensource-Communities passiert. Die grüneliniesindwir und die blauelinierepräsentierteinanderesProjektnamensOpenstack, welches wirdamalsmitbegründethaben. SeitAnfang des Jahreshabenwiruns von Openstackzurückgezogen und sindmitOpenstack in die Apache Foundation beigetretenund seitdemhabenwir ca. 30.000 Downloads pro Monat. Die tatsache, dassSieeine Cloud auf Basis von Opensource-TechnologienaufbauenbringteineriesigeInnovationkraftmitsich. Auch die Adoption und Glaubwürdigkeitinnerhalb der Entwickler, die tatsächlichauch die Early Adoptors von Cloudtechnologiensindwirdhiergestärkt.
Auch eröffnet Opensource die Türen zu vielen innovativen Unternehmen, die Mehrwertlösungen anbieten.. Dabei spielen die großen gesetzten Namen auch hier eine Rolle, aber vor allem sind es die kleinen sehr innovativen Unternehmen die, die Trends setzen. So hat kürzlich VMWare ein kleines Unternehmen im Bereich SDN für 1.2 billion übernommen, obwohl diese kaum Umsatz generieren, Aber auch
How do I take the cloud (on the RIGHT) that you have built to my target audience (on the LEFT)? Users of different profiles from different organizations – my customers, my partners and channels, and groups within my own business.I am in need of a (missing) layer that will make me market-ready. A layer that supports my Business and Operations (B/OSS). A layer that offers among other things the following:A SELF-SERVICE PORTAL with authentication and Single Sign On to some of my desired systemsA SERVICE CATALOG that exposes the items in the underlying cloud that I want to sellA way for my end-users to sign-up and subscribe to these items through E-COMMERCEAbility for me to support these users (SERVICE DESK) and manage my relationship with them (CRM)A way to communicate and share knowledge – techpubs, wikis, discussion forums (COMMUNITY)Importantly, a way for me to read metered data from the underlying cloud and convert it into billable information (BILLING)
Note:This is the single-pane-of-glass slide that represents the breadth of CloudPortal functionality. This information is shared under NDA.The development, release and timing of any features or functionality described fouctsNote:Top box represents breadth of functionality native to CloudPortalBottom (plug-ins) represents integrations to third-party systems to augment or override existing CloudPortal functionalityZuora and Amdocs are NOT needed for CloudPortal to provide Billing functionality. Items marked with (*) asterisk are in the roadmap. Integration not yet complete.Continuing focus will be placed on adding Partner/OEM Management functionality during the remainder of 2012.Integrations Fully integrated with CloudStack. Notifications and usage data from CloudStack provided in CloudPortal UI. Quick access to full CloudStack infrastructure administration UI Salesforce.com Service Cloud integration provides trouble ticketing functionality Authorize.net payment gateway integration for financial transaction processing Single sign-on supported for Liferay enterprise portal platformSecurity FeaturesCloudPortal provides a variety of security mechanisms to ensure that only authorized persons gain access to data. A payment gateway ID for each customer is used to securely exchange data with the payment gateway. All credit card information is stored by the gateway provider, not in the CloudPortal database. The CAPTCHA challenge-response test is used to ensure that new account requests are submitted by actual living persons. Encryption is applied to all sensitive data in the CloudPortal databases such as Email addresses and passwords. These values are encrypted using Advanced Encryption Standard standard AES-128. The Salesforce ID is encrypted using AES-128. It is also possible to encrypt the values in the cloud.properties configuration file, such as database passwords, using AES-128. The encryption key is stored in a properties file, which can also be encrypted.Reliability Features Ability to run multiple CloudPortal server instances Use with load balancer to manage system stress MySQL databases use InnoDB storage engine for greater data integrity and reliabilityCustomization Features Componentized for UX and functional customizations API support using XML over HTTP(S) Email templates can be modified to customize automatically generated Email Terms of Service link can be configured to your own organization's ToSContent and Messaging Features Alerts and notifications triggered by events related to usage and spend levels, account status, customer payment failures, and service health Authorized users can publish updates on events such as scheduled maintenance, disruptions, and issues Customizable templates for outbound Email Basic Internationalization framework
BietehöchteVerfügbarkeitfürAnwendungen in einer ZoneAuch die Verfügbarkeit der einzelnenNodes istsehrhochAlleSpeicherkompontensind in echzeit backup miteinerzweiten Storage-Platform verbunden (synchronoderasynchron)BeiAusfall, können Images innerhalbwenigersekundenwiederhergestelltwerdenBestehendetraditionelle Workloads werdenhierverlässlichlaufenNachteildabeiist , dass der KostenvorteilgegenübereinernormalenvirtualisierungsansaztnichtsehrhochistLink AggregationStorage Multi-pathingVM HA, Fault ToleranceVM Live MigrationExpect reliability. Back-up entire cloud. Admin controlled failure handlingThink Server Virtualization 1.0Can achieve significant reliability for applications running in one zone. Reliability of individual nodes is very high.All zone storage is replicated to a second storage platform (synchronous or asynchronous)In event of failure, images are recovered from second storage array.Existing workloads will run reliably.Little cost benefit over existing approaches
Workloads werden auf verschiedeneAvailibiltyZonenverteiltDabeigibteskeineGarantiedarauf auf die Verfügbarkeit der einzelnenZonenDie Applikationen die hierlaufenkönnenmitInfrastruktur- Node /AusfällenumgehenDBs und Templates werden in Object Store gesnappedBeimAusfällwerden die Images in einerneuenavailabilty zone wiederhergestelltVorteil: riesigeEinsparungen in den Betriebs- und Infrastrukturkosten.Nachteil: nichtalleVM Backup/Snapshots Ephemeral ResourcesChaos MonkeyMulti-site RedundancyExpect failure. Design app for failure. Self-service failure handlingThink Amazon Web ServicesWorkloads are distributed across availability zonesNo guarantee on zone reliabilityApplications designed to handle node level failureDBs and Templates snapped to object store.In event of failure, images are recreated on new availability zone.Dramatically less expensive
This is pretty complicated, we have a lot of offerings…Partners have the ability to deliver private clouds, hybrid clouds, and now with the addition of subscription pricing for our products and the purchase of Cloud.com they can support building public clouds for the customers and for themselves. No other company offers the breadth of products to support the cloud through their channel.
Note:This statement describes what CloudPortal Business Manager is today.(Presenter) know that our vision is for this product is to evolve from this go-to-market enabler to a Services Aggregation platform. See slide on CloudPortal storyBSS = Business Support SystemOSS = Operations Support SystemCloudPortal™ is a purpose-built Business/Operational Support System (B/OSS) platform that enables Service Providers to quickly get to market with an Infrastructure-as-a-Service (IaaS) cloud that has been built on the Citrix CloudPlatform™ platform.
Note:The previous slide seen in detail and the questions remain:How do I take the cloud (on the RIGHT) that you have built to my target audience (on the LEFT)? Users of different profiles from different organizations – my customers, my partners and channels, and groups within my own business.I am in need of a (missing) layer that will make me market-ready. A layer that supports my Business and Operations (B/OSS). A layer that offers among other things the following:A SELF-SERVICE PORTAL with authentication and Single Sign On to some of my desired systemsA SERVICE CATALOG that exposes the items in the underlying cloud that I want to sellA way for my end-users to sign-up and subscribe to these items through E-COMMERCEAbility for me to support these users (SERVICE DESK) and manage my relationship with them (CRM)A way to communicate and share knowledge – techpubs, wikis, discussion forums (COMMUNITY)Importantly, a way for me to read metered data from the underlying cloud and convert it into billable information (BILLING)
Note:This is the single-pane-of-glass slide that represents the breadth of CloudPortal functionality. Note:Top box represents breadth of functionality native to CloudPortalBottom (plug-ins) represents integrations to third-party systems to augment or override existing CloudPortal functionalityZuora and Amdocs are NOT needed for CloudPortal to provide Billing functionality. Continuing focus will be placed on adding Partner/OEM Management functionality during the remainder of 2012.Integrations Fully integrated with Citrix CloudPlatform. Notifications and usage data from CloudStack provided in CloudPortal UI. Quick access to full CloudStack infrastructure administration UI Salesforce.com Service Cloud integration provides trouble ticketing functionality Authorize.net payment gateway integration for financial transaction processing Single sign-on supported for Liferay enterprise portal platformSecurity FeaturesCloudPortal provides a variety of security mechanisms to ensure that only authorized persons gain access to data. A payment gateway ID for each customer is used to securely exchange data with the payment gateway. All credit card information is stored by the gateway provider, not in the CloudPortal database. The CAPTCHA challenge-response test is used to ensure that new account requests are submitted by actual living persons. Encryption is applied to all sensitive data in the CloudPortal databases such as Email addresses and passwords. These values are encrypted using Advanced Encryption Standard standard AES-128. The Salesforce ID is encrypted using AES-128. It is also possible to encrypt the values in the cloud.properties configuration file, such as database passwords, using AES-128. The encryption key is stored in a properties file, which can also be encrypted.Reliability Features Ability to run multiple CloudPortal server instances Use with load balancer to manage system stress MySQL databases use InnoDB storage engine for greater data integrity and reliabilityCustomization Features Componentized for UX and functional customizations API support using XML over HTTP(S) Email templates can be modified to customize automatically generated Email Terms of Service link can be configured to your own organization's ToSContent and Messaging Features Alerts and notifications triggered by events related to usage and spend levels, account status, customer payment failures, and service health Authorized users can publish updates on events such as scheduled maintenance, disruptions, and issues Customizable templates for outbound Email Basic Internationalization framework
These key features are all encompassed within Citrix CloudPlatform
These organizations all have built successful solutions using the flexibility and agility of next generation cloud architectures. Citrix cloud solutions enable these companies to provide the level of service their customers demand. Several of these accounts leverage CloudPlatform and XenServer as part of their overall cloud orchestration strategy.