A presentation on the challenges around BYOD – and more importantly how to make a successful transition to the next-generation workspace that addresses the technology, security, legal and change management aspects.
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
Healthcare/Pharmaceutical -IT departments, under constant pressure to do more with less, face an ever increasing volume of regulatory requirements, infrastructure challenges, and demands from clinical end-users to support applications anytime, anywhere, on any device. Healthcare/Pharma CIOs have a hard enough time “keeping the lights on” and find it difficult to drive strategic initiatives that improve patient care or support growth.
Cloud computing can improve the efficiency of IT, increase organizational agility, and control costs, but how do organizations adopt interoperable, scalable solutions while minimizing industry concerns such as vendor lock-in and data breach?
In this session, attendees will learn about the key trends that are driving healthcare organizations toward cloud solutions that “balance” compute, network and storage concerns based on open, scalable infrastructure. We will look at real-world examples of how healthcare organizations are using the cloud today. Finally, we will discuss how healthcare cloud solutions can be improved with Intel platform capabilities.
In the first fortnight of the Otago Polytechnic Bachelor of Information Technology project we invite local industry leaders "The Dragons". They provide critique of projects as early as possible. This is a chance to get feedback, and hopefully unearth opportunities and risks.
Next generation desktop backup must do more than simply store files. Learn how Digitiliti’s innovative cloud-based platform helps maintain compliance, continuity and control with zero business disruption. See how frictionless user experience is coupled with your security and your policy keeping control where it belongs – with you.
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
Healthcare/Pharmaceutical -IT departments, under constant pressure to do more with less, face an ever increasing volume of regulatory requirements, infrastructure challenges, and demands from clinical end-users to support applications anytime, anywhere, on any device. Healthcare/Pharma CIOs have a hard enough time “keeping the lights on” and find it difficult to drive strategic initiatives that improve patient care or support growth.
Cloud computing can improve the efficiency of IT, increase organizational agility, and control costs, but how do organizations adopt interoperable, scalable solutions while minimizing industry concerns such as vendor lock-in and data breach?
In this session, attendees will learn about the key trends that are driving healthcare organizations toward cloud solutions that “balance” compute, network and storage concerns based on open, scalable infrastructure. We will look at real-world examples of how healthcare organizations are using the cloud today. Finally, we will discuss how healthcare cloud solutions can be improved with Intel platform capabilities.
In the first fortnight of the Otago Polytechnic Bachelor of Information Technology project we invite local industry leaders "The Dragons". They provide critique of projects as early as possible. This is a chance to get feedback, and hopefully unearth opportunities and risks.
Next generation desktop backup must do more than simply store files. Learn how Digitiliti’s innovative cloud-based platform helps maintain compliance, continuity and control with zero business disruption. See how frictionless user experience is coupled with your security and your policy keeping control where it belongs – with you.
Channel Partners: Lead with Dell Software SolutionsDell World
Deliver real value to your customers as you expand your reach and increase your revenue with Dell Software (For Channel partners only).
Your customers are facing monumental challenges on managing and securing applications, data and their infrastructure. These challenges are driving cost and complexity into the IT environment. Dell Software’s end to end portfolio allows channel partners to expand their sales of solutions and services to both existing new customers while demonstrating tangible value by:
• Improving the efficiency of IT organizations through the centralized management and security
• Speeding the pace of business through better application availability, data protection and rapid recovery
• Enabling cloud and mobile application delivery through modernizing infrastructure software
• Securing the endpoint, the data and the network
Join Roy Appelbaum for this interactive break out session on how the Dell Software portfolio provides you the blueprint to help your customers build the future ready enterprise.
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
The Big Decision – What, when, and why?
Enterprises are aware that the Cloud is changing IT, but security and performance remain a concern. Each cloud model has potential risks: reliability, adaptability, application compatibility, efficiency, scaling, lock- in, security and compliance. Companies must select an enterprise cloud solution to suit a complex mix of applications; these decisions require great care. Uni Systems’ Uni|Cloud was built to be enterprise class. The essential reason that many businesses today are using Uni Systems Cloud for their enterprise IT, is because it offers the only enterprise-class cloud solution in the Greek market, designed for mission-critical applications, coupled with application performance SLAs and security built for the enterprise, combined with cloud efficiency and consumption-based pricing/chargeback.
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Citrix
With the release of System Center 2012, Microsoft added a valuable new tool for Configuration Manager admins: the ability to specify how apps are delivered to specific users based on what device they are using. Join us to learn how you can deploy, manage and monitor desktop and application delivery through Excalibur and Microsoft System Center 2012. NOTE: This session will be recorded.
See how hosting Sage 300 CRE (formerly Sage Timberline Office) or Sage 100 Contractor on the Cloud will save you time money and headaches. Increase data security, improve response times, gain anywhere, anytime access and reduce IT maintenance! Hosting and data migration services from Ledgerwood Associates are customized for Sage software (Timberline and Master Builder). Get up on the Cloud quickly and painlessly with Timbercloud.
Key Security Insights: Examining 2014 to predict emerging threats Dell World
Cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this session, we’ll present the most common attacks Dell SonicWALL observed since 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises moving forward. This session is perfect for anybody who is interested in learning more about the state of the union in security.
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
The Briefing Room with Malcolm Chisholm and Druva
Live
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
Building enterprise Internet of Things (IoT) systems must start with reviewing and strengthening your current IT security to prepare for potential additional risk exposure. Then, understanding the security posture of connected devices being added to the network determines what smarter edge architectural components, such as IoT gateways, are needed to establish and defend functional integrity and enable protection from risks of less capable connected sensors and legacy equipment. This session will discuss the unique security risks in IoT ecosystems and the strategies and tools for addressing them.
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
Learn where to start when it comes to developing a security package for your small to medium-sized nonprofits. Talking points will cover the current landscape of security threats and how the WFH environment has changed our need to secure our organizations and the communities we serve. Additionally, we’ll cover why security matters and where to start with opportunities to ask questions and get advice along the way.
Channel Partners: Lead with Dell Software SolutionsDell World
Deliver real value to your customers as you expand your reach and increase your revenue with Dell Software (For Channel partners only).
Your customers are facing monumental challenges on managing and securing applications, data and their infrastructure. These challenges are driving cost and complexity into the IT environment. Dell Software’s end to end portfolio allows channel partners to expand their sales of solutions and services to both existing new customers while demonstrating tangible value by:
• Improving the efficiency of IT organizations through the centralized management and security
• Speeding the pace of business through better application availability, data protection and rapid recovery
• Enabling cloud and mobile application delivery through modernizing infrastructure software
• Securing the endpoint, the data and the network
Join Roy Appelbaum for this interactive break out session on how the Dell Software portfolio provides you the blueprint to help your customers build the future ready enterprise.
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
The Big Decision – What, when, and why?
Enterprises are aware that the Cloud is changing IT, but security and performance remain a concern. Each cloud model has potential risks: reliability, adaptability, application compatibility, efficiency, scaling, lock- in, security and compliance. Companies must select an enterprise cloud solution to suit a complex mix of applications; these decisions require great care. Uni Systems’ Uni|Cloud was built to be enterprise class. The essential reason that many businesses today are using Uni Systems Cloud for their enterprise IT, is because it offers the only enterprise-class cloud solution in the Greek market, designed for mission-critical applications, coupled with application performance SLAs and security built for the enterprise, combined with cloud efficiency and consumption-based pricing/chargeback.
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Citrix
With the release of System Center 2012, Microsoft added a valuable new tool for Configuration Manager admins: the ability to specify how apps are delivered to specific users based on what device they are using. Join us to learn how you can deploy, manage and monitor desktop and application delivery through Excalibur and Microsoft System Center 2012. NOTE: This session will be recorded.
See how hosting Sage 300 CRE (formerly Sage Timberline Office) or Sage 100 Contractor on the Cloud will save you time money and headaches. Increase data security, improve response times, gain anywhere, anytime access and reduce IT maintenance! Hosting and data migration services from Ledgerwood Associates are customized for Sage software (Timberline and Master Builder). Get up on the Cloud quickly and painlessly with Timbercloud.
Key Security Insights: Examining 2014 to predict emerging threats Dell World
Cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this session, we’ll present the most common attacks Dell SonicWALL observed since 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises moving forward. This session is perfect for anybody who is interested in learning more about the state of the union in security.
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
The Briefing Room with Malcolm Chisholm and Druva
Live
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
Building enterprise Internet of Things (IoT) systems must start with reviewing and strengthening your current IT security to prepare for potential additional risk exposure. Then, understanding the security posture of connected devices being added to the network determines what smarter edge architectural components, such as IoT gateways, are needed to establish and defend functional integrity and enable protection from risks of less capable connected sensors and legacy equipment. This session will discuss the unique security risks in IoT ecosystems and the strategies and tools for addressing them.
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
Learn where to start when it comes to developing a security package for your small to medium-sized nonprofits. Talking points will cover the current landscape of security threats and how the WFH environment has changed our need to secure our organizations and the communities we serve. Additionally, we’ll cover why security matters and where to start with opportunities to ask questions and get advice along the way.
To determine whether BYOD is simply a U.S. — or even just a “U.S. enterprise” — phenomenon, the Cisco® Internet Business Solutions Group (IBSG) expanded its original “BYOD and Virtualization” study to include IT decision makers in both enterprises (1,000 or more employees) and midsize companies (500-999 employees) in eight countries across three regions. Cisco IBSG's results show that BYOD’s growth isn’t limited to the United States or to large companies.
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
Smart phones and tablets are invading the business environment at top speed, with “bring your own device” (BYOD) providing a number of benefits for organisations across all sectors. With the right implementation, and ongoing secure support, performance through technology can be achieved in areas such as employee satisfaction, cost reduction, team work and collaboration and productivity.
Charlie Hales and Nigel Robson cover the important considerations a business should make before implementing an MDM/BYOD strategy, and will consider the ongoing implications of allowing corporate data to be accessed on personal devices ensuring the maximum benefit to businesses, customers and the end users.
Bring your own device (BYOD) is a strategy that allows employees and business partners to use personally owned devices—usually smartphones or tablets—to execute enterprise applications and access data. It can allow organizations to take advantage of the latest technology features and capabilities, without the pain and expense of a large-scale hardware refresh or software upgrade.
The consumerization trend is here to stay, and devices are only the beginning. By implementing a comprehensive BYOD strategy that includes robust policies, processes, resources, and education, enterprises can set the foundation for securing corporate data and providing safe, productive access. With well-supported mobility and security programs in place, companies can strike the right balance between security and usability, and leverage the next generation of consumer technology.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
Sphere 3D presentation for Credit Suisse technology conference 2014Peter Bookman
Peter Tassiopoulos presented this at the Credit Suisse technology conference in Arizona sharing what Sphere 3D is doing, where we are going, and some of the validations we have received to date.
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterSunbird DCIM
Led by Jennifer Cooke, Research Director, Datacenter Management, IDC, this webinar explores how to overcome the chaos and uncertainty of managing a lights-out data center. In this webinar, you’ll learn:
*Best practices for efficient capacity utilization.
*Tips to avoid downtime during a move to a lights-out data center.
*Benefits of using DCIM for remote monitoring and asset management processes.
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillJeff Kiesel
Product development organizations are dealing with changing dynamics due to corporate downsizing, outsourcing, and partnerships. Despite these changes, organizations still must empower teams to innovate and produce their design deliverables on time and on budget. This paper will describe how a secure Internet- based Windchill® environment is helping many world-class organizations meet their challenges and effectively get their products to market to meet their goals.
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
A presentation on eDiscovery and the cloud by Brian Babineau, Senior Consulting Analyst at Enterprise Strategy Group, and Steve d'Alencon, Chief Marketing Officer at CaseCentral.
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
To watch the full Making Cloud Security Part of Your DNA webinar video, please go to: https://resources.netskope.com/h/i/65967799-making-cloud-security-part-of-your-dna
Summary:
As Chief Security Officer for leading cancer diagnostic company Genomic Health, Craig Guinasso makes cloud a strategic advantage while solving some of today’s most complex security challenges.
Join Craig, along with Sanjay Beri, CEO of Netskope, Missy Krasner, Managing Director of Healthcare at Box, and David Baker, CSO of Okta, for a webinar on the top five strategies that healthcare technology leaders should adopt to get the most out of the cloud while also protecting patient health data and keeping their organizations compliant.
In this powerpoint, you will get a glimpse into the webinar where we discussed how to:
- Think about cloud services in relation to business objectives
- Triage Shadow IT and consolidate on the most enterprise-ready cloud services
- Create checks and policies to identify and prevent PHI leaks
- Turn their business stakeholders into security champions
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
Despite the rapid evolution and growth of public cloud usage, enterprises are finding value in on-premises IT infrastructure. As a result, some organizations are moving their workloads back, partially or entirely, to their own data centers. In fact, according to a survey conducted by IDC, over ½ of the IT spent on servers and storage is still driven by on-prem deployments, and over 70% of those surveyed said they plan to repatriate workloads back from public cloud to an On-Prem Infrastructure.
So you’ve bought into the concept of “cloud” technologyCisco Canada
This presentation will discuss research based on various customer interviews and surveys, insights into what customers found to have worked well versus what they might have changed or done differently, answers to concerns that may exist around the concept of deploying a cloud solution within your environment.
Bringing the Power of Cloud Computing to Your User DesktopsDizzion, Inc.
Dallas-based Clearview International is leading the desktop virtualization wave by adding Desktops-as-a-Service to their portfolio of service offerings. Join TJ Karklins, CEO of Clearview International, LLC, Brady Ranum, VP Product and Strategy of Dizzion, Inc, and Sean Teague, President of ManageWatch, Inc for a 30-minute introductory webcast of how virtual desktops can work to improve your business. These are the slides from that webcast.
Katpro Technology, a IT solutions company, announced it has been selected by Microsoft Co-corporations as a windows Azure Circle Partner.The Partnership will provide katpro with the ability to service customers needs in the area of cloud, training and support material provided by Microsoft.
Cloud delivered desktop is the perfect answer for those companies that need to have complete control over their information. These are virtual desktops delivered via the cloud allowing you to enable you and your employees to securely access your applications and data from any device, from anywhere and at any time –– with the same access, security and productivity as from your own office environment.
Dizzion Control Center: Bringing Transparency, Productivity & Insights to VDIDizzion, Inc.
See how the Dizzion Control Center with new Business Insights expands traditional virtual desktop management into the world of deep data insights and increased productivity for the entire organization.
IT organizations are looking to cloud automation for its opportunities for their infrastructures and are finding a solution to the madness. Cloud management services allow for predictability and adaptability — both valuable properties of infrastructure agility. Cloud computing shoulders some of the burden for IT professionals in offering scalability and adjustability, all while being cost effective. In doing so, cloud services have the capabilities for you to fight planned obsolescence.
Internap’s John Freimuth and Steve LeClair of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a provider to meet your virtualization goals.
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
Mobility is no longer about the provisioning of remote access or BYOD. Mobility is about enabling organisations to communicate with customers in different ways, create new revenue streams, reduce infrastructure costs and obtain a competitive advantage in the market, without compromising on security or manageability.
It’s not about “picking the right cloud” but choosing the right strategy that matches workloads to the most appropriate delivery model. Logicalis provides an overview of some of the challenges of moving to “the Cloud” and how we help customer determine the most effective cloud model.
It’s not about “picking the right cloud” but choosing the right strategy that matches workloads to the most appropriate delivery model. Logicalis provides an overview of some of the challenges of moving to “the Cloud” and how we help customer determine the most effective cloud model.
Logicalis outlines a methodology for simplifying data centre infrastructure and moving to a fully automated and orchestrated data centre environment. Our six step process provides an effective way to move to a private cloud.
How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.
Confused by cloud? Logicalis at how and why to move to an enterprise cloud platform:
What type of Cloud do I need?
Cloud value elements
What does Cloud mean to you?
Are you ready for "The New Normal" - where new technologies are disrupting traditional business models and changing how we communicate and work. What does this mean for IT Depts and how can you address this proactively?
Logicalis Cloud Briefing - get some "Cloud Clarity"!
Three perspectives on why and how to migrate to Cloud on your terms - change leadership, legal and technology considerations
Work is something you do, not a place you go: flexible working means creating a a workplace model that enables communication and collaboration regardless of location or device.Done well, flexible working creates sustainable competitive advantage in the form of top talent retention and a reduction in the fixed-cost for property.
This business briefing discussion focuses on:
What is this new IPv6 everyone is talking about?
What new features is IPv6 going to give us?
Technically, IPv6 offers very little that IPv4 cannot do presently. However, it does offer your business a chance for continual growth and expansion into areas that are developing rapidly, and a chance to have a business edge on some of your competitors.
The days of deskbound work are waning. Instead, employees, and especially younger employees, are looking for the same technology at work that they have at home. When asked about investment drivers, IT professionals prioritise location flexibility, including mobility and telework.
In today’s consumer technology world,
the quality of the experience is
everything. So why shouldn’t the
business IT experience be as good as
the one we enjoy at home, during our
leisure time?
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. Our BYOD Panel
Stan Sotiropoulos is Data Centre Ross Miller set up the IT department at
Practice Manager at Logicalis, and is GPT Group in his previous role, where
responsible for developing the Logicalis he led a complete transformation of
Virtual Workspace solution. Stan has GPT’s IT environment to support an
worked within the IT industry for more activity-based workplace. After a long
than twenty years and has extensive career at a senior level in Finance and
experience in delivering IT infrastructure IT in Lend Lease and GPT, Ross is now
solutions to organisations, from end user MD at NOI Strategies, a global services
computing, enterprise storage, company, where he assists companies
enterprise management and consulting embarking on programs to deliver the
and support services. workplace of the future.
Stuart Driver is Director, WW Regional Dudley Kneller, Partner at Madgwicks,
IT Operations at Citrix Systems. A specialises in technology, intellectual
member of the Citrix APAC geo property, telecommunications and
executive management team, Stuart is outsourcing transactions
responsible for the IT operations of the in Australia and overseas. Dudley
regional data centres at Citrix (located in advises on all aspects of information
Sydney, Bangalore, London and Silicon technology, intellectual property and
Valley) which support the business telecommunications transactions and
outside of Citrix corporate HQ in advice work. He also advises clients on
Florida.. Having worked in various IT their regulatory obligations including
roles over the past 13 years at Citrix in privacy, spam, data security and
EMEA and Asia Pacific, Stuart was also document retention.
responsible for designing and deploying
Citrix’s BYOC program.
1
4. Trends and Expectations
CIO
• Employee productivity
• Global competitiveness
• Strategic value through TCO
IT: Server Manager
The Evolving • Control, manageability, and security
Workplace • Reduction in new deployments and data center sprawl
Landscape: • Initial purchase and lifecycle costs
Heterogeneous
end-point devices
IT: Desktop Manager
• Control, manageability, and security
Mobile workers • Deployment speed and versatility with reduced costs
• Near-native experience
Geographically
dispersed resources
End User
Windows 7 migration
• Geographically dispersed users expect LAN performance
Data leakage and loss • Anywhere, Anytime, Any Device
prevention • Alignment to Existing Desktop Experience
3
5. Market Assessment - Secure mobility is a key CIO Challenge
Desktop virtualisation a key part of IT strategy
45% of respondents to Logicalis survey indicate plans within 12
months or part of IT strategy
44% of respondents to Fujitsu CIO survey indicate “mobile working
solutions” are of High or Top interest
Desktop virtualisation a “Top 5” technology – 20% users implementing
next 12mths / 40% next 24mths [IDC]
91% of organisations to have implemented some form of desktop
virtualisation by the end of 2013 [Citrix]
62% of Australian organisations planning to procure tablets next
12mths (compared to an APAC average of 31%) [IDC]
Countries like China, Germany, the US, India, Australia and NZ have
the most aggressive client virtualisation deployment plans [Forrester]
Adoption of BYOD models by major Australian companies like
Suncorp and Qantas
4
6. Traditional PC Challenges
Difficult to Manage
• Standardising on physical desktop is becoming increasingly
complicated
Mobility
• Users want access to everything, everywhere
High TCO
• Low CapEx is offset by high OpEx
• Costly to deploy new software, patches
Difficult to Secure
• Lost or Stolen equipment
• Users fail to backup
Inefficient use of Resources
• Underutilised hardware resources and cannot be shared
• Green IT
5
7. Business Case for Virtual Desktop
Hardware Costs
• Extended the life of desktops or deploy thin clients
Compliance and Data Security
• All data contained and stored in the Data Centre
IT Productivity
• Centrally managed reducing operational administration
Growth
• Instantaneous deploying of new desktops
Resilience
• Virtual Desktops provides fault tolerance and improves DR
Mobility, BYOD and Branch Office Enablement
• Anytime, Anywhere access via a choice of end point devices
6
12. Why offer a BYOC program
• Employee chooses the
laptop & OS
• Same experience as a
managed device
• Reduce dependency on IT
• Self Service via our BYOC
website
• Control the service, not the
hardware
13. Creating a BYOC program
Survey Stipend Corporate Security Program
Your Policies Rules
Employees
14. Start with an internal survey 1 2 3 4 5
Employees were enthused
Employees were enthused
Their choice was outside what IT
Their choice was outside what IT
offered
offered
Willing to take on the added
Willing to take on the added
responsibility
responsibility
Believed they would be more
Believed they would be more
productive
productive
and also happier
and also happier
15. Identify existing cost, then the Stipend 1 2 3 4 5
Review your existing Procure
cost
Image
• Identify your existing Three Year Cost:
Secure
costs $2,500 ~ $2,600
Deploy
• Define the cost savings
Monitor
target
• Offer a stipend that $2,100 Stipend Maintain
motivates employees Back-up
• Align the duration of Retire
the program
• Define proration policy
if someone leaves
16. Review the program with HR and
Legal 1 2 3 4 5
• Do your existing policies apply?
• Our focus was to keep the rules
the same for all
• Policies are in effect for managed
and BYOC devices
We Found That All Existing Policies Did
In Fact, Apply to BYOC Participants
17. From the datacenter to the endpoint 1 2 3 4 5
Citrix NetScaler Access
Receiver Gateway XenApp
SSL VPN ™
Network
Data
Center
Perimeter Firewall
Intrusion Detection and Prevention User Data
Antivirus
(IDS / IPS) Single Sign On
Two-factor Authentication
Web Filtering Active Directory
Threat Management App Virtualization
Desktop
18. Develop the rules, then present the
concept 1 2 3 4 5
1. Manager’s approval 6. Antivirus required on
2. $2,100 stipend for a all
laptop and 3 year BYOC laptops
maintenance 7. Remote connection
3. If you leave the through the Receiver
company before 3 / Access Gateway
years, we will pro- 8. All apps delivered
rate the stipend (online and offline)
4. Return your managed from the datacenter
laptop to your 9. Provision your apps
manager to create a through Receiver™
loaner program 10. All existing corporate
5. BYOC hardware policies apply
issues are addressed
by the vendor
23. Getting Started Page
• Discount on purchases
• Download the Citrix Receiver and Antivirus
• Section for Windows and Mac
Discounts
Windows + Mac
Citrix Confidential - Do Not Distribute
31. Consumer devices
• Consumer technology is useful in the enterprise
• Simple, intuitive and inexpensive
• Users want to bring their device to work
• Beyond BYOC… to BYO-3
42%
34%
16%
6%
Alert me 2%
Empower me
1 2 3 4 5+
How many computing devices do you use on
a daily basis
Worldwide Survey of Corporate Employees
February 2011, Citrix Systems
32. Same infrastructure supports consumer
devices
NetScaler Access
Gateway
SSL VPN
Network
Data
Center
Perimeter Firewall
Web Filtering User Data
Threat Management Single Sign On
Intrusion Detection and Active Directory
Prevention (IDS / IPS) App Virtualization
Desktop
35. STRATEGY | TECHNOLOGY | SERVICES
Case Study – the New GPT Work Environment
17 February, 2012
Slide 34 Operational Excellence for Commercial Real Estate
36. What is does the future of Work Space
Look Like?
Activity Based Working is One Solution
• Work anywhere, anytime, anyplace
• Work the way that suits you best
• Judged on outcomes not on being there
• Many varied spaces to collaborate
• Technology enables the workplace
• No Allocated Desks, choose a desk every day to work at
• Clean desk policy
• Paperless (or significantly reduced paper usage)
Slide 35 Operational Excellence for Commercial Real Estate
37. Why Would You Do It?
• Overall reduction in space gives a great economic outcome
• Why pay expensive rent to store paper
• Enables companies to achieve great sustainability outcomes
• Builds collaboration and breaks down silos
• Empowers the workforce by making them accountable for their
own outputs
• Leverages latest technologies to improve efficiencies
Slide 36 Operational Excellence for Commercial Real Estate
38. Technologies Delivered
• Desktop Upgrade including Windows 7 and Office 2010
– Key challenge to remediate all apps to run on Windows 7
• Installed Cisco Wireless Technology to deliver Video
grade wireless to all Staff
• Relocated Data Room to support 6 green star intiative
• Unified Communications coupled with OCS
– Vast majority staff on softphone
• Remote Access to work anywhere anytime
– Using Juniper VPN with 2 factor authentication and Virtual
Desktop
Slide 37 Operational Excellence for Commercial Real Estate
39. Technologies Delivered
• Integrated security single card to access lockers and
printing
• Swipe to Print
• Room Booking System integrated with Outlook
• Audio and Video conferencing, integrated controllers
with lighting
• Wireless Presenter and Electronic Whiteboards
• Sharepoint Doc Management
• Universal Docking Stations
Slide 38 Operational Excellence for Commercial Real Estate
40. BUT… It’s not about Technology
Successfully delivering a fundamental workspace change
means addressing:
• Culture
• Process
• Space
Slide 39 Operational Excellence for Commercial Real Estate
41. The Change Management Process
• Dedicated team of organisational and IT Change People
• Start Early
• Set Programs to engage the business
– e.g. Biggest Loser, Passports
• CEO and Leadership Team Support critical
• Engage the doubters early and constantly
Slide 40 Operational Excellence for Commercial Real Estate
42. Outcomes
• Activity based Workplace
• 350 desks for 322 staff reduced to only 277 desks
• Paper use less than a third
• Paper Storage was more than 900 lineal metres now 300 lineal
metres
• No major outages or technology failures
• 6 Green Star
Slide 41 Operational Excellence for Commercial Real Estate
44. Logicalis Overview
Logicalis brings differentiated solutions to address business issues in
the ICT infrastructure space utilising multi-vendor technologies
Focused ICT infrastructure
provider
Integrated “architectural
approach” to addressing
business issues
Differentiated by our support
and managed service
offerings
43
45. Logicalis Capabilities Overview
Certifications
Citrix Gold Partner
VMware Enterprise Partner
Cisco Gold and “MSCP” Partner
EMC Velocity “Premier” Partner
NetApp Gold Partner
Microsoft Partner (Server,
Virtualisation, UC)
Vblock (First accredited
Australian partner)
Cisco Technology Specialisations
Advanced Routing and Switching
Advanced Security
Advanced Unified
Communications
Advanced Wireless LAN
Cisco UCS and Cisco ISE
FlexPod solutions with single
number support (FlexOne)
44
46. Citrix Overview
Citrix Systems, Inc. (NASDAQ:CTXS) Corporate Snapshot
transforms how businesses and IT work and
people collaborate in the cloud era. With US$2.21B in 2011
market-leading cloud, collaboration,
networking and virtualization technologies,
260,000 Customers and 10,000 Partners in 100
Citrix powers mobile workstyles and countries
cloud services, making complex enterprise IT
6,900 Employees in 35 countries
simpler and more accessible for 260,000
organizations. Citrix products touch 75 percent 100% of the Fortune 100 and Fortune Global 100
of Internet users each day and it partners with use Citrix to deliver IT as an on-demand service
more than 10,000 companies in 100 countries.
Annual revenue in 2011 was US$2.21 billion. 75% of Internet users
The workplace of the 21st century is Year Founded: 1989
undergoing a remarkable transformation,
driven in part by innovation in consumer
Employees' Choice - 50 Best Places to Work
technology. People are increasingly bringing (Glassdoor, 2012)
the smartphones, tablets and other devices
Top 50 Most Innovative Companies (Forbes,
they use ubiquitously in their personal lives
into the workplace and expecting the same kind 2011)
of rich, self-service experience they have at Top 10 Places to Work in Silicon Valley
home. This "consumerization" is driving rapid
change in business and IT, dissolving the lines (Workplace Dynamics, 2011_
between work and play, the office, home or Top 25 Best Tech Companies to Work For
anywhere in between. Today's "workplace" is
no longer a building you go to; it's wherever
(Business Insider, 2011)
you find inspiration.
45
47. About NOI Strategies
NOI is a global services company Expert Consulting.
that provides expert consulting,
Established in 2002, NOI consists of the top experts in
technology, and outsourcing commercial real estate business process and
services to the world’s leading technologies.
commercial real estate owners,
operators, and investors. Our Technology Leadership.
consultants have deep experience NOI maintains strong working knowledge and partnerships
transforming real estate processes with all of the major software solution providers in our
and applying technology to industry.
improve operations:
Operational Support Services.
NOI has significant expertise in Customized to your operation, our exclusive blend of
delivering state of the art activity domestic and offshore resources will help your company
based work environments. From reduce non-core FTE, increase its depth of capability, and
advice on technology to minimize technology overhead.
organisational change NOI can
Global Enterprise Capability.
assist companies embarking on
programs to deliver the workplace We provide services to global tier-one real estate
of the future companies.
46
Editor's Notes
- leading with space - architects key- culture / how people want to work / project team / stakeholder interviews / what's wrong- technology to support this