Citrix Provisioning Services has been invigorated with new storage optimisations. Every storage vendor that got into business providing a solution to I/O problems may have to think twice about the value they add given new services within PVS. But, does that mean that creating a viable PVS service has become a breeze? In Preventing Possible PVS Performance Pain Points we set out to look at the performance of PVS server including networking, host configuration, the importance of being earnest about memory, the good, bad and ugly of RAM+HDD write cache and Windows Storage or hyper-converged environments, migration and availability.
Catálogo Oriflame Costa Rica Octubre 2023Karol Vargas
Solicita tu afiliación GRATIS al Whatsapp +506 6122-8752. Afíliate en línea https://bit.ly/afiliateOriflame ¡Gana Dinero con Oriflame! Hay 3 formas: • Compra tus productos preferidos ¡con descuento del 35% • Véndele a tus conocidos y gana dinero extra. • Invítalos a ser parte de Oriflame y cambia tu estilo de vida disfrutando de comisiones, premios y viajes. Visítanos http://www.oriflamecostarica.net https://www.youtube.com/c/KarolOriflameCR
Manage it all with Citrix Life Cycle ManagementAndrew Wood
Session SYN508 from the Geek Speak live track form Citrix Synergy 2015 by Citrix Technology Professionals Jim Moyle (@jimmoyle) and Andrew Wood (@gilwood_cs)
Catálogo Oriflame Costa Rica Octubre 2023Karol Vargas
Solicita tu afiliación GRATIS al Whatsapp +506 6122-8752. Afíliate en línea https://bit.ly/afiliateOriflame ¡Gana Dinero con Oriflame! Hay 3 formas: • Compra tus productos preferidos ¡con descuento del 35% • Véndele a tus conocidos y gana dinero extra. • Invítalos a ser parte de Oriflame y cambia tu estilo de vida disfrutando de comisiones, premios y viajes. Visítanos http://www.oriflamecostarica.net https://www.youtube.com/c/KarolOriflameCR
Manage it all with Citrix Life Cycle ManagementAndrew Wood
Session SYN508 from the Geek Speak live track form Citrix Synergy 2015 by Citrix Technology Professionals Jim Moyle (@jimmoyle) and Andrew Wood (@gilwood_cs)
How to deploy SQL Server on an Microsoft Azure virtual machinesSolarWinds
Running apps on Microsoft Azure Virtual Machines is tempting; promising faster deployments and lower overall TCO. But how easy is it really to configure and run SQL Server in an Azure VM environment? Learn what you should know about tuning, optimizing, and key indicators for monitoring performance, as well as special considerations for High-Availability and Disaster Recovery.
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...Nagios
Dan Wittenberg's presentation on using Nagios at a Fortune 50 Company
The presentation was given during the Nagios World Conference North America held Sept 25-28th, 2012 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
Before you make the plunge, take into consideration every aspect of your VDI project: user experience, admin time, storage capacity, and ongoing costs related to datacenter space. Our experiences with Dell EMC PowerEdge FX2s enclosures outfitted with PowerEdge FC630 compute modules and Dell EMC XtremIO arrays show that this solution is a compelling one for VDI deployments. The Dell EMC XtremIO solution supported 6,000 virtual desktops with a good user experience, offered flexibility by supporting both full and linked clones, recomposed the desktops quickly and easily, and reduced data dramatically through inline deduplication and compression. And it did all this in less than a single rack of datacenter space, to keep server sprawl in check and costs down.
Get Your GeekOn with Ron - Session One: Designing your VDI ServersUnidesk Corporation
Join virtualization expert and industry veteran Ron Oglesby as he breaks down how to select and configure servers, including:
• Server CPU selection - they were not made equal!
• Desktop-to-core guesstimation?
• Memory - and its temperamental relationship with disk design
• Local storage options - yes, it's an option
• And, overall best practices for VDI implementation
The IBM System Storage® TS7650G ProtecTIER® Deduplication Gateway is designed to meet the disk-based data protection needs of the enterprise data center while enabling significant infrastructure cost reduc-tions. The solution offers industry-leading inline deduplication perfor-mance and scalability up to 1 petabyte (PB) of physical storage capacity per system that can provide up to 25 PB or more backup storage capacity. Combined with IBM or third-party storage, the TS7650G ProtecTIER Deduplication Gateway provides a powerful disk-based repository to improve the performance, retention and availability of backup and archive data. Learn more: http://ibm.co/ONeH7m
VMworld 2013
John Dodge, VMware
Andre Leibovici, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
More Related Content
Similar to Preventing Possible PVS Performance Pain Points
How to deploy SQL Server on an Microsoft Azure virtual machinesSolarWinds
Running apps on Microsoft Azure Virtual Machines is tempting; promising faster deployments and lower overall TCO. But how easy is it really to configure and run SQL Server in an Azure VM environment? Learn what you should know about tuning, optimizing, and key indicators for monitoring performance, as well as special considerations for High-Availability and Disaster Recovery.
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...Nagios
Dan Wittenberg's presentation on using Nagios at a Fortune 50 Company
The presentation was given during the Nagios World Conference North America held Sept 25-28th, 2012 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
Before you make the plunge, take into consideration every aspect of your VDI project: user experience, admin time, storage capacity, and ongoing costs related to datacenter space. Our experiences with Dell EMC PowerEdge FX2s enclosures outfitted with PowerEdge FC630 compute modules and Dell EMC XtremIO arrays show that this solution is a compelling one for VDI deployments. The Dell EMC XtremIO solution supported 6,000 virtual desktops with a good user experience, offered flexibility by supporting both full and linked clones, recomposed the desktops quickly and easily, and reduced data dramatically through inline deduplication and compression. And it did all this in less than a single rack of datacenter space, to keep server sprawl in check and costs down.
Get Your GeekOn with Ron - Session One: Designing your VDI ServersUnidesk Corporation
Join virtualization expert and industry veteran Ron Oglesby as he breaks down how to select and configure servers, including:
• Server CPU selection - they were not made equal!
• Desktop-to-core guesstimation?
• Memory - and its temperamental relationship with disk design
• Local storage options - yes, it's an option
• And, overall best practices for VDI implementation
The IBM System Storage® TS7650G ProtecTIER® Deduplication Gateway is designed to meet the disk-based data protection needs of the enterprise data center while enabling significant infrastructure cost reduc-tions. The solution offers industry-leading inline deduplication perfor-mance and scalability up to 1 petabyte (PB) of physical storage capacity per system that can provide up to 25 PB or more backup storage capacity. Combined with IBM or third-party storage, the TS7650G ProtecTIER Deduplication Gateway provides a powerful disk-based repository to improve the performance, retention and availability of backup and archive data. Learn more: http://ibm.co/ONeH7m
VMworld 2013
John Dodge, VMware
Andre Leibovici, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
7. Storage with Citrix PVS
Operating System
(Win 7, 8, 10),
2008R2/2012R2
User/Department
Applications
User Profiles/
Settings
Corporate
Applications
User Data
(Docs,Spreadsheets
,Pictures of Family)
PVS vDisk PVS Write Cache Personal vDisk AppDisk
Home
Directories
Hypervisor
SMB/Local NFS/Local NFS/SMB SMB SMB
10GB Ethernet Other
10. RAM Overflow to HDD - What Can Overflow?
PVS Non
Paged
memory
Pool
Page File Space for
Crash Dump
Anti-Virus
Definitions
Log Files
Hard Drive associated with target VM
In RAM On Disk
Overflow
File
RAM
11. Many say “take the raw
performance counter details for
Non Paged Pool memory and
assume this is the size of the
cache”. That’s like looking into a
can of beans and trying
to determine which one gave you
gas.
12. Using WPA to Really Dig Into PVS
https://www.citrix.com/blogs/2015/08/19/digging-into-pvs-with-poolmon-and-wpa/
30. Turn Off ASLR?
You can forcibly enable or disable ASLR for all executables
and libraries:
If you’re still on Windows XP –
HKLMSYSTEMCurrentControlSetControlSessio
n ManagerMemory ManagementMoveImages
specifying "MoveImages"=dword:00000000 to disable it
system-wide (current user).
Another option is to use the "Enhanced Mitigation
Experience Toolkit" (EMET):
https://technet.microsoft.com/en-us/security/jj653751
https://support.microsoft.com/en-gb/kb/2458544
allowing to enable/disable ASLR it on a system or process
basis.
31.
32. “When a decision is required on whether or
not a server should be provisioned as (or
migrated to) a virtual server, several criteria
should be considered. In each case the
amount of use, potential hardware
utilization, number of users, and any other
special hardware requirements will have to
be reviewed before a decision is made”
Ron Oglesby
47. SYSTEM CACHE RAM = 512MB + #active vdisks * avg data read from vdisk
For example, assume the following configuration:
• A running Provisioning Services server under load showing 2 GB of
committed memory
• 4 unique vDisk files hosting Windows 7 for various target devices
• 2 GB of data read on average from each vDisk
• System Cache RAM = 512 MB + (4 * 2 GB) = 8.5 GB
• Total RAM = 2 GB + 8.5 GB = 10.5 GB
48. Multi-threaded BNI Stack
IP Acquisition
Bootstrap
download
PVS Logon
Process
Single Read
Mode
BNIStack/MIO
http://support.citrix.com/article/CTX136378
https://www.citrix.com/blogs/2016/01/12/turbo-charging-boot-times-with-pvs-7-7/
51. Reducing Creation and Merge Time
http://blog.itvce.com/2016/01/11/citrix-provisioning-services-pvs-7-6-vs-7-7-vhd-vs-
vhdx-and-scale-out-file-server-update
52. More Ports vs More Threads
Ports Range Threads per
port
Average Boot
time first 10
Guest VMs
Average Boot
time last 10
Guest VMs
Baseline 6910 to 6945 40 49.8 83.2
Test 1 6910 to 6945 8 28.2 60.2
Test 2 6910 to 6968 8 29.4 48.9
Test 3** 6910 to 6968 8 36.1 92.5
https://www.citrix.com/blogs/2016/03/30/updated-guidance-on-pvs-ports-and-threads/
Jeff Qiu
“# of ports” x “# of threads/port” = “max clients”.
**I/O limit set to 0
55. Local Storage vDisk Stores
– No networking layer
– Removal of Point Failure
– No storage service to configure
– Increases storage requirements
– Synchronisation of stores
56. RoboCopy vs DFS-R vs A.N.Other?
PVS-A PVS-B PVS-B
vDisk on Local Storage vDisk on Local Storage vDisk on Local Storage
DFS-R Full Mesh Replica