This document discusses the state of the network storage industry. It covers market drivers and forecasts, emerging technologies, the basis of competition between suppliers, and future opportunities. Charts show the worldwide storage systems market is expected to grow from $20 billion in 2002 to over $25 billion by 2006, with storage area networks (SANs) and network-attached storage (NAS) growing faster than direct-attached storage (DAS). Diagrams depict example network architectures including high availability secure data centers and how iSCSI SANs work.
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks
A presentation shared by Stefan Dyckerhoff, Juniper’s EVP of Platform Systems Division, and Bob Muglia, EVP of Software Solutions Division during Mobile World Congress in Barcelona, Spain.
This presentation was displayed at MWC 2011 covering the following topics: Traffic Management, Internet Offload Gateway, DPI, Adaptive Traffic Shaping, and Policy Enforcement.
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks
A presentation shared by Stefan Dyckerhoff, Juniper’s EVP of Platform Systems Division, and Bob Muglia, EVP of Software Solutions Division during Mobile World Congress in Barcelona, Spain.
This presentation was displayed at MWC 2011 covering the following topics: Traffic Management, Internet Offload Gateway, DPI, Adaptive Traffic Shaping, and Policy Enforcement.
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...Continuous Computing
Presentation delivered at Broadband Traffic Management Congress on November 2010 entitled, "Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway and Esuring Scalability"
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
AACIMP 2010 Summer School lecture. "Information Technologies" stream. "Problems of Contemporary Communication Companies. Ways and Tools for Solving Them" course.
More info at http://summerschool.ssa.org.ua
From a philosophical point of view, everybody loves open source software: you, your wife or girl friend, your father, your mother, grand-father or grand-mother, your children, your boss, your employees, your custormers, your students, your teachers, your cat even your fish, everybody.
Once the first enthusiasm gone (it takes arount 10 minutes for persons and 3 sec. for the fish), a simple question arises : ok, open source is not gratis, however, a consequence of the open redistribution is gratuity, so how are you making a living with open source software ? Is it viable in the long term ?
The conference will present the mechanisms (the "business models") around open source software and especially those for software editors.
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...Continuous Computing
Presentation delivered at Broadband Traffic Management Congress on November 2010 entitled, "Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway and Esuring Scalability"
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
AACIMP 2010 Summer School lecture. "Information Technologies" stream. "Problems of Contemporary Communication Companies. Ways and Tools for Solving Them" course.
More info at http://summerschool.ssa.org.ua
From a philosophical point of view, everybody loves open source software: you, your wife or girl friend, your father, your mother, grand-father or grand-mother, your children, your boss, your employees, your custormers, your students, your teachers, your cat even your fish, everybody.
Once the first enthusiasm gone (it takes arount 10 minutes for persons and 3 sec. for the fish), a simple question arises : ok, open source is not gratis, however, a consequence of the open redistribution is gratuity, so how are you making a living with open source software ? Is it viable in the long term ?
The conference will present the mechanisms (the "business models") around open source software and especially those for software editors.
Learn how to setup Samba and NFS in ubuntu server-ubuntu client and ubuntu server-windows client. Also, comparsion of NAS vs SAN, NAS vs DAS, why we are using NAS, its comonents and challanges with actual real world scenario that what if we use NAS and what if we not use NAS.
To View this webinar replay:
http://ecast.opensystemsmedia.com/316
As Operational Technologies (OT) like embedded devices, control and monitoring systems are increasingly integrated with Information Technology (IT) systems running in the back office, interaction patterns between systems are becoming more complex and diverse. Publish-Subscribe is the most commonly used messaging pattern for OT systems. It provides the real-time information access, scalability, and loose coupling required for integration of these types of systems. IT and OT integration, however, commonly requires messaging patterns that provide stronger end-to-end properties, such as Guaranteed Delivery, Request-Reply, and (load-balancing) Queues. RTI is greatly enhancing its infrastructure software with new messaging patterns that combine the performance, scalability, and reliability needed by OT systems with the integration and flexible messaging capabilities of IT systems.
P2P - Real Time Communications in the EnterpriseMead Eblan
"Mainstreaming Peer-to-Peer Connectivity:
Real-Time Communications in the Enterprise"
- Presented at Digital Government Institute Conference on IPv6
- September 2007
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Radisys Corporation
ETSI Workshop – RCS VoLTE and Beyond
Kranj, Slovenia
October 11, 2012
Adnan Saleem discusses the advantages of moving to VoLTE/RCS for mixed mobile operators – and addresses the key challenges along the way.
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...Cisco Canada
This presentation discusses market trends and its impact on Network infrastructure, Cisco carrier Ethernet Transport Architecture, Cisco carrier Ethernet portfolio and TCO Leadership.
The Cloud Computing China Congress (CCCC http://www.cloudcomputingchina.org ) is specially designed for senior IT and line of business executives evaluating and making purchasing decisions in the areas of on-demand infrastructure and software services.
The Cloud Computing China Congress (CCCC http://www.cloudcomputingchina.org ) is specially designed for senior IT and line of business executives evaluating and making purchasing decisions in the areas of on-demand infrastructure and software services.
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
Presentation by Dan York at AstriCon 2007 about how to secure VoIP systems with a focus on the Asterisk open source PBX. The presentation outlines the issues involved with VoIP security, the tools out there to attack/test VoIP systems, best practices to defend against attacks and ends with some specific security recommendations for Asterisk. Audio will soon be available at http://www.blueboxpodcast.com/ (and will be synced to this presentation).
Deploying Cisco ISR G2 and ASR 1000 in the EnterpriseCisco Canada
This presentation discusses the disrupting networking trends that are changing the Enterprise landscape, scope of these changes include the areas of network security, services delivery, application performance optimization and cloud access in tomorrow's borderless networks. The biggest challenge is to help Enterprise IT scale. Borderless Networks is an architectural approach to networking that, if designed correctly, can automate business and network processes driving down operational cost, thus allowing IT to scale. Cisco ISR G2 and ASR 1000 platforms offer the best in class service richness and flexibility that is needed to deliver the promise of borderless networks and allow users to turn on services on-demand.
SIP Trunking & Security in an Enterprise NetworkDan York
How secure are your VoIP systems as you deploy SIP-based systems in an enterprise environment? In this slide deck presented by VOIPSA Best Practices Chair Dan York at the Ingate SIP Trunking Seminars at ITEXPO September 17, 2008, Dan York walks through the security issues related to VoIP (with a focus on SIP trunking), the tools out there to attack/test VoIP systems, best practices and resources. (An audio recording of this session was made and will be available.)
Emergence of Software Defined Storage
SDS role in Software Defined Data Center
The value SDDC/SDC will bring to developers. System Integrators and IT community.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.