Synergy 2015 Session Slides: SYN319 Tech Update For XenApp and XenDesktop - M...Citrix
Get this slide deck from the SYN319 session at Citrix Synergy 2015 to learn about all the new features and technology in XenApp and XenDesktop as of May 2015.
SYN240: Next-Generation Management and AnalyticsCitrix
See what the new generation of NetScaler management and analytics can do. NetScaler MAS brings automation, data-driven insights, and platform freedom to a whole new level.
Watch the whole session on SynergyTV and follow along with these slides. http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=8b32a1df-78bd-47b0-bbda-5c9a0f1b1bc1
Strengthen Security and Traffic Visibility on Amazon EKS with NGINXNGINX, Inc.
On-Demand Link:
https://www.nginx.com/resources/webinars/strengthen-security-traffic-visibility-on-amazon-eks-with-nginx/
About the Webinar
Zipwhip was the first company to enable texting on existing business phone numbers, and today is the world’s leading business-texting software and API provider. More than 35,000 companies use Zipwhip to increase customer engagement and drive growth through texting on their existing landline, VoIP, or toll-free phone number.
To achieve this scale, Zipwhip transformed its traditional core architecture (physical data centers, VMware clusters, storage arrays, firewalls, and switches) to a modern architecture that incorporates cloud providers, Infrastructure-as-Code, repeatability, and Kubernetes. In building out this large, complex infrastructure, Zipwhip prioritized simplification whenever possible, choosing NGINX Ingress Controller as the main ingress into its Kubernetes environment and so much more.
In this webinar, Zipwhip’s Principal Architect, Kolby Allen, describes:
The business and technical challenges his team faced
Why they chose NGINX Ingress Controller and AWS to power their modern apps
The benefits of the joint solution
How Zipwhip Site Resiliency Engineering (SRE) and DevOps teams are leveraging these technologies
We also demo how easy it is to deploy NGINX Ingress Controller in Amazon EKS.
In diesem Meetup möchten wir über Service Meshes sprechen. Was ist ein Service Mesh genau und wie funktioniert es? Wir klären euch auf!
Wir starten den Abend mit einem Beispiel-Anwendung an der wir euch zeigen wie man Retry-, Timeout-Management sowie Circuit Breaker als Code implementiert um eine widerstandsfähige und belastbare Microservice zu erhalten. Des Weiteren zeigen wir auch die Implementierung von mutual TLS mit der eine sichere Kommunikation gewährleistet ist.
Im Anschluss schauen wir uns nach einer Einleitung zu den Grundlagen von Service Meshes an wie man mit Hilfe von Istio die oben beschriebenen Funktionen abstrahieren und vom Code in die Infrastruktur verlagern kann. Abschließen geben wir einen Ausblick auf weitere Funktionen von Istio wie A/B testing und Fault Injection.
Driving Success In The Cloud With NGINXNGINX, Inc.
NGINX’s open source technology is to be found at the core of many cloud and end user initiatives, from massive-scale CDNs and Load Balancers to individual Security and Application Delivery solutions. Millions of users worldwide have deployed NGINX to improve the performance, scale, reliability and security of their applications. In this presentation, we’ll look at several case studies, and dive into some of the powerful ways that NGINX can be deployed on cloud and container-lead environments. We will consider application delivery techniques from cloud providers such as Amazon, and compare them with solutions you can tailor to your needs yourself. Concluding, we’ll look at some of the emerging projects and products from the NGINX team, including the Unit application server and Controller management platform.
What You Need to Know About Operationalizing Your AWS Transit HubKhash Nakhostin
You’ll see a demonstration of the best practices we’ve gleaned from working with operations teams, who all require:
Visibility. Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details?
Deep Analytics. Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools?
Monitoring and Troubleshooting. Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues?
Alert Management. When issues do occur, what real-time alerting is available?
Synergy 2015 Session Slides: SYN319 Tech Update For XenApp and XenDesktop - M...Citrix
Get this slide deck from the SYN319 session at Citrix Synergy 2015 to learn about all the new features and technology in XenApp and XenDesktop as of May 2015.
SYN240: Next-Generation Management and AnalyticsCitrix
See what the new generation of NetScaler management and analytics can do. NetScaler MAS brings automation, data-driven insights, and platform freedom to a whole new level.
Watch the whole session on SynergyTV and follow along with these slides. http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=8b32a1df-78bd-47b0-bbda-5c9a0f1b1bc1
Strengthen Security and Traffic Visibility on Amazon EKS with NGINXNGINX, Inc.
On-Demand Link:
https://www.nginx.com/resources/webinars/strengthen-security-traffic-visibility-on-amazon-eks-with-nginx/
About the Webinar
Zipwhip was the first company to enable texting on existing business phone numbers, and today is the world’s leading business-texting software and API provider. More than 35,000 companies use Zipwhip to increase customer engagement and drive growth through texting on their existing landline, VoIP, or toll-free phone number.
To achieve this scale, Zipwhip transformed its traditional core architecture (physical data centers, VMware clusters, storage arrays, firewalls, and switches) to a modern architecture that incorporates cloud providers, Infrastructure-as-Code, repeatability, and Kubernetes. In building out this large, complex infrastructure, Zipwhip prioritized simplification whenever possible, choosing NGINX Ingress Controller as the main ingress into its Kubernetes environment and so much more.
In this webinar, Zipwhip’s Principal Architect, Kolby Allen, describes:
The business and technical challenges his team faced
Why they chose NGINX Ingress Controller and AWS to power their modern apps
The benefits of the joint solution
How Zipwhip Site Resiliency Engineering (SRE) and DevOps teams are leveraging these technologies
We also demo how easy it is to deploy NGINX Ingress Controller in Amazon EKS.
In diesem Meetup möchten wir über Service Meshes sprechen. Was ist ein Service Mesh genau und wie funktioniert es? Wir klären euch auf!
Wir starten den Abend mit einem Beispiel-Anwendung an der wir euch zeigen wie man Retry-, Timeout-Management sowie Circuit Breaker als Code implementiert um eine widerstandsfähige und belastbare Microservice zu erhalten. Des Weiteren zeigen wir auch die Implementierung von mutual TLS mit der eine sichere Kommunikation gewährleistet ist.
Im Anschluss schauen wir uns nach einer Einleitung zu den Grundlagen von Service Meshes an wie man mit Hilfe von Istio die oben beschriebenen Funktionen abstrahieren und vom Code in die Infrastruktur verlagern kann. Abschließen geben wir einen Ausblick auf weitere Funktionen von Istio wie A/B testing und Fault Injection.
Driving Success In The Cloud With NGINXNGINX, Inc.
NGINX’s open source technology is to be found at the core of many cloud and end user initiatives, from massive-scale CDNs and Load Balancers to individual Security and Application Delivery solutions. Millions of users worldwide have deployed NGINX to improve the performance, scale, reliability and security of their applications. In this presentation, we’ll look at several case studies, and dive into some of the powerful ways that NGINX can be deployed on cloud and container-lead environments. We will consider application delivery techniques from cloud providers such as Amazon, and compare them with solutions you can tailor to your needs yourself. Concluding, we’ll look at some of the emerging projects and products from the NGINX team, including the Unit application server and Controller management platform.
What You Need to Know About Operationalizing Your AWS Transit HubKhash Nakhostin
You’ll see a demonstration of the best practices we’ve gleaned from working with operations teams, who all require:
Visibility. Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details?
Deep Analytics. Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools?
Monitoring and Troubleshooting. Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues?
Alert Management. When issues do occur, what real-time alerting is available?
Seven Criteria for Building an AWS Global Transit NetworkKhash Nakhostin
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
Network Troubleshooting in the Cloud: Tools, Techniques and GotchasKhash Nakhostin
When someone reports an EC2 connectivity failure, what do you do? Open your Amazon VPC Console, launch an SSH session, and start typing CLI commands in search of clues.
Common root causes include problems related to:
Route table updates
Phantom network ACLs
Security policies
Missing BGP routes
Overfilling route tables or summarization mistakes
Moreover, in many cases, networking is not an issue, but valuable time is lost eliminating the network as a cause before you can progress. Unfortunately, AWS does not natively provide the visibility and troubleshooting features needed by CloudOps and DevOps teams to identify and resolve problems quickly.
Getting the Most Value from Your Aviatrix Controller & GatewaysKhash Nakhostin
The Aviatrix AVX Software-Defined Cloud Router establishes an abstraction layer between the public cloud provider’s networking primitives and the application to simplify the creation of logical cloud networks and services for hybrid connectivity, data security, multicloud connectivity, monitoring and troubleshooting. The solution consists of two components: Aviatrix Controller; and the Aviatrix Gateways, all of which are deployed in your VPCs or the on-premises environment.
Three Innovations that Define a “Next-Generation Global Transit Hub”Khash Nakhostin
Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world.
We’ll share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that meet those requirements:
Software-defined and centrally managed – so anyone can run it.
Built-in security with fully encrypted tunnels, egress filtering, and VPC segmentation.
Operational readiness with integrated monitoring, alerting and troubleshooting that’s easy to hand off to an operations team.
Security Requirements and Tradeoffs for Controlling VPC-to-Internet Egress Tr...Khash Nakhostin
Limitations of Existing Firewalls and AWS NAT Gateways
There are legitimate reasons why AWS VPCs or Azure VNets need Internet access; for example, to receive software updates from vendors or integrate with native AWS services or third-party SaaS services. But this is substantially different from an on-premises use case, where traditional, full-featured firewalls are needed to filter co-mingled end-user traffic and application traffic. And while AWS provides a NAT gateway, it can be configured only on a per-VPC basis against a limited number of IP addresses.
More info at http://cloudify.co
We are happy to announce Cloudify 4. This version of Cloudify brings a whole new meaning to cloud orchestration and cloud management. Read more at http://cloudify.co/2017/04/27/cloudify-4-landed-next-gen-orchestration-first-cmp.html
Adopting Azure, Cloud Foundry and Microservice Architecture at Merrill Corpor...VMware Tanzu
SpringOne Platform 2016
Speakers: Thomas Fredell; Chief Product Officer, Merrill & Ashish Pagey; Architecture Team Lead, Merrill
Come learn how Merrill Corporation is solving real business challenges and transforming their business directly from Merill's product and architecture leaders. By partnering with Pivotal and Microsoft Merill can rapidly deliver software as Java microservices deployed to Pivotal Cloud Foundry running on Microsoft Azure.
SYN 305: Architecting Citrix on Microsoft AzureCitrix
You can deliver shared hosted apps, desktops, and Server VDI from Azure. We can show you how!
Watch the full session on SynergyTV and follow along with these slides.
http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=c520cdde-a60f-473b-914d-172b2bfbfe4f
Service Mesh: Two Big Words But Do You Need It?DevOps.com
Today, one of the big concepts buzzing in the app development world is service mesh. A service mesh is a configurable infrastructure layer for microservices application that makes communication flexible, reliable and fast. Let’s take a step back, though, and answer this question: Do you need a service mesh?
Join this webinar to learn:
What a service mesh is; when and why you need it — or when and why you may not
App modernization journey and traffic management approaches for microservices-based apps
How to make an informed decision based on cost and complexity before adopting service mesh
Learn about NGINX Service Mesh in a live demo, and how it provides the best service mesh option for container-based L7 traffic management
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSWeaveworks
Did your company start down the path of building a cloud native platform using Kubernetes with the goal of enabling developers to innovate faster and increase productivity, but then run into challenges keeping it operating in an optimal way?
In this session, Weaveworks will discuss how to migrate from self-managed Kubernetes on EC2 to a GitOps managed Shared Services Platform (SSP) on EKS. A SSP built on EKS and managed with Weave GitOps provides developers and operators with common workflows to update both applications and infrastructure. With every change in version control, full audit trails are available, and security is enforced. While at the same time enabling easier rollbacks and faster mean-time-to-recovery (MTTR). In short, a Weave GitOps managed SSP increases developer velocity while boosting stability.
How to operate a hybrid Kubernetes architecture, using managed EKS in the AWS Cloud and EKS-Distro on premises.
How to structure your infrastructure repository to efficiently manage multiple teams.
How to use Kubernetes RBAC to provide secure cluster multi-tenancy.
How to use GitOps to promote releases across a hybrid set of independent clusters.
How to accomplish data and operational sovereignty.
Production-Grade Kubernetes With NGINX Ingress ControllerNGINX, Inc.
Did you know that NGINX is the most widely used ingress controller with more than 1 Billion downloads? Join us for this exclusive event and learn why NGINX owns over 64% of the market and is by far, the most used Kubernetes Ingress Controller in the world.
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?Khash Nakhostin
Now that you’ve designed and implemented your Global Transit Network, it’s time to revisit one of those seven considerations: security. What are the right questions to start asking to verify that your security posture is adequate for your AWS cloud environment?
Your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? Unfortunately, even this is not the right starting question. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options.
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesKhash Nakhostin
Whether your cloud applications are multi-tenanted SaaS solutions or standalone instances hosted for individual customers, ensuring reliable and secure VPC connectivity poses a variety of challenges. Within minutes of signing up a new customer, your operations team will be expected to:
Build IPsec tunnels to, for example, support API connectivity or secure data as it moves between an on-premises database and the hosted app
Provision your customers’ administrative and end users with easy yet secure app access
Ensure internal teams have secure access to perform maintenance and support
Data Plane Matters! A Deep Dive and Demo on NGINX Service MeshNGINX, Inc.
On-Demand Link: https://www.nginx.com/resources/webinars/service-mesh/
About the Webinar
Join us for a special launch webinar as we introduce you to NGINX Service Mesh, our new offering as part of the NGINX product suite.
In this webinar, you’ll learn about using NGINX Plus and NGINX Controller as part of your microservices journey, why your organization may need a service mesh to improve performance and reliability of your applications, and how NGINX Service Mesh can help you meet these needs. Our presenter(s) will also provide a demonstration of NGINX Service Mesh, giving you an insight into the new experience that awaits you and your team.
Micro services, reactive manifesto and 12-factorsDejan Glozic
Learn how micro-services, Reactive Manifesto and 12-factors answer us the 'What, Why and How' questions of creating modern distributed systems. One concept, four tenets, twelve factors - rules to live by in cloud.
Bringing Security to DevOps
Bringing AppSec to Development is like bringing Operations Engineering to Development: improving Software Engineering by aligning goals, speed of development and incremental improvement.
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015Lee Bushen
Lee Bushen and Patrick Irwin discuss and demonstrate how to deliver Microsoft Lync using XenApp and XenDesktop. We’ll take a close look at the four options for delivering the Lync client so you can make an informed decision on what’s best for your business.
Recording here: http://www.citrix.com/tv/#videos/13071 or https://www.youtube.com/watch?v=0B6Vx_T75EI
Citrix Synergy: Opening Keynote with CEO Mark TempletonCitrix
Enterprise IT organizations, and the people they serve, are experiencing disruption and change at an accelerating pace. More than ever, IT decision making is being shaped by the forces of BYO devices, personal cloud services and a Millennial generation with new ideas about where, when and how work is done.
Always insightful and entertaining, Citrix CEO Mark Templeton shares a vision of the future of mobile workstyles and the roles and responsibilities of IT in empowering them. The keynote debuts the latest Citrix innovations that enable mobile workstyles, helping businesses embrace rapid change in the workforce, in the workplace and in how services are delivered.
Seven Criteria for Building an AWS Global Transit NetworkKhash Nakhostin
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
Network Troubleshooting in the Cloud: Tools, Techniques and GotchasKhash Nakhostin
When someone reports an EC2 connectivity failure, what do you do? Open your Amazon VPC Console, launch an SSH session, and start typing CLI commands in search of clues.
Common root causes include problems related to:
Route table updates
Phantom network ACLs
Security policies
Missing BGP routes
Overfilling route tables or summarization mistakes
Moreover, in many cases, networking is not an issue, but valuable time is lost eliminating the network as a cause before you can progress. Unfortunately, AWS does not natively provide the visibility and troubleshooting features needed by CloudOps and DevOps teams to identify and resolve problems quickly.
Getting the Most Value from Your Aviatrix Controller & GatewaysKhash Nakhostin
The Aviatrix AVX Software-Defined Cloud Router establishes an abstraction layer between the public cloud provider’s networking primitives and the application to simplify the creation of logical cloud networks and services for hybrid connectivity, data security, multicloud connectivity, monitoring and troubleshooting. The solution consists of two components: Aviatrix Controller; and the Aviatrix Gateways, all of which are deployed in your VPCs or the on-premises environment.
Three Innovations that Define a “Next-Generation Global Transit Hub”Khash Nakhostin
Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world.
We’ll share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that meet those requirements:
Software-defined and centrally managed – so anyone can run it.
Built-in security with fully encrypted tunnels, egress filtering, and VPC segmentation.
Operational readiness with integrated monitoring, alerting and troubleshooting that’s easy to hand off to an operations team.
Security Requirements and Tradeoffs for Controlling VPC-to-Internet Egress Tr...Khash Nakhostin
Limitations of Existing Firewalls and AWS NAT Gateways
There are legitimate reasons why AWS VPCs or Azure VNets need Internet access; for example, to receive software updates from vendors or integrate with native AWS services or third-party SaaS services. But this is substantially different from an on-premises use case, where traditional, full-featured firewalls are needed to filter co-mingled end-user traffic and application traffic. And while AWS provides a NAT gateway, it can be configured only on a per-VPC basis against a limited number of IP addresses.
More info at http://cloudify.co
We are happy to announce Cloudify 4. This version of Cloudify brings a whole new meaning to cloud orchestration and cloud management. Read more at http://cloudify.co/2017/04/27/cloudify-4-landed-next-gen-orchestration-first-cmp.html
Adopting Azure, Cloud Foundry and Microservice Architecture at Merrill Corpor...VMware Tanzu
SpringOne Platform 2016
Speakers: Thomas Fredell; Chief Product Officer, Merrill & Ashish Pagey; Architecture Team Lead, Merrill
Come learn how Merrill Corporation is solving real business challenges and transforming their business directly from Merill's product and architecture leaders. By partnering with Pivotal and Microsoft Merill can rapidly deliver software as Java microservices deployed to Pivotal Cloud Foundry running on Microsoft Azure.
SYN 305: Architecting Citrix on Microsoft AzureCitrix
You can deliver shared hosted apps, desktops, and Server VDI from Azure. We can show you how!
Watch the full session on SynergyTV and follow along with these slides.
http://live.citrixsynergy.com/2016/player/ondemandplayer.php?presentation_id=c520cdde-a60f-473b-914d-172b2bfbfe4f
Service Mesh: Two Big Words But Do You Need It?DevOps.com
Today, one of the big concepts buzzing in the app development world is service mesh. A service mesh is a configurable infrastructure layer for microservices application that makes communication flexible, reliable and fast. Let’s take a step back, though, and answer this question: Do you need a service mesh?
Join this webinar to learn:
What a service mesh is; when and why you need it — or when and why you may not
App modernization journey and traffic management approaches for microservices-based apps
How to make an informed decision based on cost and complexity before adopting service mesh
Learn about NGINX Service Mesh in a live demo, and how it provides the best service mesh option for container-based L7 traffic management
Migrating from Self-Managed Kubernetes on EC2 to a GitOps Enabled EKSWeaveworks
Did your company start down the path of building a cloud native platform using Kubernetes with the goal of enabling developers to innovate faster and increase productivity, but then run into challenges keeping it operating in an optimal way?
In this session, Weaveworks will discuss how to migrate from self-managed Kubernetes on EC2 to a GitOps managed Shared Services Platform (SSP) on EKS. A SSP built on EKS and managed with Weave GitOps provides developers and operators with common workflows to update both applications and infrastructure. With every change in version control, full audit trails are available, and security is enforced. While at the same time enabling easier rollbacks and faster mean-time-to-recovery (MTTR). In short, a Weave GitOps managed SSP increases developer velocity while boosting stability.
How to operate a hybrid Kubernetes architecture, using managed EKS in the AWS Cloud and EKS-Distro on premises.
How to structure your infrastructure repository to efficiently manage multiple teams.
How to use Kubernetes RBAC to provide secure cluster multi-tenancy.
How to use GitOps to promote releases across a hybrid set of independent clusters.
How to accomplish data and operational sovereignty.
Production-Grade Kubernetes With NGINX Ingress ControllerNGINX, Inc.
Did you know that NGINX is the most widely used ingress controller with more than 1 Billion downloads? Join us for this exclusive event and learn why NGINX owns over 64% of the market and is by far, the most used Kubernetes Ingress Controller in the world.
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?Khash Nakhostin
Now that you’ve designed and implemented your Global Transit Network, it’s time to revisit one of those seven considerations: security. What are the right questions to start asking to verify that your security posture is adequate for your AWS cloud environment?
Your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? Unfortunately, even this is not the right starting question. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options.
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesKhash Nakhostin
Whether your cloud applications are multi-tenanted SaaS solutions or standalone instances hosted for individual customers, ensuring reliable and secure VPC connectivity poses a variety of challenges. Within minutes of signing up a new customer, your operations team will be expected to:
Build IPsec tunnels to, for example, support API connectivity or secure data as it moves between an on-premises database and the hosted app
Provision your customers’ administrative and end users with easy yet secure app access
Ensure internal teams have secure access to perform maintenance and support
Data Plane Matters! A Deep Dive and Demo on NGINX Service MeshNGINX, Inc.
On-Demand Link: https://www.nginx.com/resources/webinars/service-mesh/
About the Webinar
Join us for a special launch webinar as we introduce you to NGINX Service Mesh, our new offering as part of the NGINX product suite.
In this webinar, you’ll learn about using NGINX Plus and NGINX Controller as part of your microservices journey, why your organization may need a service mesh to improve performance and reliability of your applications, and how NGINX Service Mesh can help you meet these needs. Our presenter(s) will also provide a demonstration of NGINX Service Mesh, giving you an insight into the new experience that awaits you and your team.
Micro services, reactive manifesto and 12-factorsDejan Glozic
Learn how micro-services, Reactive Manifesto and 12-factors answer us the 'What, Why and How' questions of creating modern distributed systems. One concept, four tenets, twelve factors - rules to live by in cloud.
Bringing Security to DevOps
Bringing AppSec to Development is like bringing Operations Engineering to Development: improving Software Engineering by aligning goals, speed of development and incremental improvement.
XenDesktop Master Class - Virtualising Microsoft Lync - March 2015Lee Bushen
Lee Bushen and Patrick Irwin discuss and demonstrate how to deliver Microsoft Lync using XenApp and XenDesktop. We’ll take a close look at the four options for delivering the Lync client so you can make an informed decision on what’s best for your business.
Recording here: http://www.citrix.com/tv/#videos/13071 or https://www.youtube.com/watch?v=0B6Vx_T75EI
Citrix Synergy: Opening Keynote with CEO Mark TempletonCitrix
Enterprise IT organizations, and the people they serve, are experiencing disruption and change at an accelerating pace. More than ever, IT decision making is being shaped by the forces of BYO devices, personal cloud services and a Millennial generation with new ideas about where, when and how work is done.
Always insightful and entertaining, Citrix CEO Mark Templeton shares a vision of the future of mobile workstyles and the roles and responsibilities of IT in empowering them. The keynote debuts the latest Citrix innovations that enable mobile workstyles, helping businesses embrace rapid change in the workforce, in the workplace and in how services are delivered.
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...Brian Pulito
WebRTC is finally cracking the enterprise market. Maturing standards and wider platform adoption are helping WebRTC to find its way into mission critical enterprise applications. Whether it\'s financials like American Express or smaller businesses looking for innovative ways to engage their customers, WebRTC is changing the way business views real-time communications. Conversational media is Big Data to the enterprise and extracting every ounce of insight from every customer interaction requires middleware that plays well with existing Systems of Engagement. Issues like enterprise application integration, federation, analytics and their related security models bring with it requirements that must be well understood to succeed in this market. This session will explore what middleware means to WebRTC and what you need to make it work both in the cloud or on premise.
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...Joy Patra
This deck describes the basics of Bluemix, how it is a true developer-friendly cloud, how you can use Bluemix for IoT development, and leads to an IoT demo developed on Bluemix.
Keeping Pace with Citrix XenApp and XenDesktop 7.x EvolutioneG Innovations
Citrix XenApp and XenDesktop 7.x have introduced radical enhancements in the delivery architecture of virtual applications and desktop infrastructures, key enhancements include new components, delivery mechanisms, protocols, configurations, and policies. Additionally, Citrix has also introduced new services, features and enhancements in the Citrix Cloud to deliver Secure Digital Workspace. In light of the magnitude of these enhancements, the best practices used for monitoring earlier versions of XenApp and XenDesktop are not sufficient any longer.
Here are some performance monitoring best practices you need to have in place to deliver a great digital workspace experience for Citrix XenApp and XenDesktop 7.x and Citrix Cloud Services.
Best Practices for Streaming Connected Car Data with MQTT & KafkaHiveMQ
Automotive organizations today are looking to stream Internet of Things (IoT) data generated from connected cars to Apache Kafka. However, connecting thousands or even millions of cars over unreliable networks can create architectural challenges.
In this session, Florian Raschbichler, Head of Support at HiveMQ, identifies and demonstrates the best practices for implementing a large-scale connected car platform that can stream MQTT messages to Kafka.
Key topics and takeaways:
- Why MQTT is the de-facto communications protocol for a scalable & reliable connected car platform
- Why Kafka is the most used data streaming and processing protocol in the enterprise backend
- How MQTT and Kafka work perfectly together to establish reliable IoT data streaming and processing
About the Speaker
Florian Raschbichler serves as the head of the HiveMQ support team with years of first-hand experience overcoming challenges in achieving reliable, scalable, and secure IoT messaging for enterprise customers.
To watch the webinar recording: https://www.hivemq.com/webinars/best-practices-for-streaming-connected-car-data-with-mqtt-and-kafka/
Real-time Communications at Internet SpeedBrian Pulito
Keeping Current Seminar for University of Kentucky - Abstract: What if real-time communications was born on the web? Would we use context instead of telephone numbers to initiate real-time interactions? Would quality and ubiquity be less important than flexibility and differentiation? WebRTC is changing the way people communicate in real-time. Whether it be Google Hangouts or a web startup, WebRTC is free, simple and coming to a web page near you. This discussion will focus on this emerging HTML5 standard, providing insights into how developers and businesses are using WebRTC to drive innovation in their Systems of Engagement.
Slides der Präsentation von Simeon Bosshard, Citrix, am Citrix Day 2014 von Digicomp.
Entdecken Sie mit uns die neuen Funktionen der CloudBrige Version 7.3. Unter anderem: Unterstützung für HDX Inisght, Optimierung für RPC über HTTPS, Video Caching Pre-Population sowie Erweiterungen in den Bereichen IPv6 und Logging-Möglichkeiten.
Citrix Desktop Master Class – New in XA/XD 7.9, Skype for Business, HDX Raspb...Lee Bushen
Recording: https://www.youtube.com/watch?v=B2f_GbelkFs
Join technology experts Lee Bushen and Patrick Irwin as they unpack the latest XenApp & XenDesktop news from Citrix Synergy 2016 with a special focus on Skype for Business.
- What’s New in XenApp & XenDesktop 7.9?
- Spotlight on Skype for Business Optimization, co-development with Microsoft
- What do the Microsoft partnership announcements from Synergy mean to you? Get the lowdown from Nabeel Youakim.
- Fancy some Raspberry Pi? ViewSonic talk about their revolutionary $99 Thin Client
Does Using Citrix Cloud Make Performance Monitoring Easier?eG Innovations
Achieving a single pane of glass for performance management has been an elusive goal for most organizations, as they are faced with an increasingly complex mix of legacy, physical, virtual and cloud technologies.
Organizations now have a variety of cloud-based options for delivering virtualized applications and desktops. A key question to answer on their cloud adoption journey is: “Does Citrix Cloud services make performance monitoring easier than it was for on-premise deployments?”
Check out these slides and learn:
-- What Citrix Cloud is and how it works
-- What deployment options are available
-- What performance challenges to expect
-- What monitoring options are available
You will also learn best practices for setting up end-to-end performance management for Citrix Cloud environments.
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoideG Innovations
Citrix performance monitoring has been gaining a lot of attention and interest. In this presentation, we outline key requirements that any Citrix monitoring solution should support. We analyze the built-in Citrix monitoring tools: Citrix Director, Citrix NetScaler Insight and the Microsoft SCOM management packs and discuss their capabilities and limitations. The need to have at least three different consoles for monitoring a Citrix infrastructure makes monitoring and diagnosis very inefficient. We discuss how the eG Enterprise solution integrates with the built-in Citrix tools and provides 360 degree unified monitoring for a Citrix infrastructure with automated root-cause diagnosis.
Designing an Edge to Cloud Architecture for IIoTHiveMQ
A key aspect of IIoT systems is moving data from the factory and factory equipment to the cloud so the factory data can be used for machine learning, predictive analytics, and integration into IT systems. Understanding how to design an architecture that moves data from the edge to the cloud in a reliable, scalable, and secure manner is critical to the success of IIoT deployments.
In this webinar, experts from Tatsoft and HiveMQ discussed the key components of a modern edge to cloud IIoT architecture and identified key challenges to its implementation. During the session, Marc Taccolini demonstrated how Tatsoft’s FrameworX combined with HiveMQ is built to address some of the key technical challenges organizations face when building new IIoT applications.
We are very excited to announce that Tatsoft and HiveMQ have entered into a partnership to make HiveMQ available to Tatsoft customers. Together, both the companies will ensure the customers receive world-class support and products for their IIoT deployments.
About the Speakers.
Ian Skerrett is Vice President of Marketing at HiveMQ. He has over 25 years of experience in the software industry and is one of the top experts for creating Open Source Strategies for enterprise software products. He was instrumental in creating the Eclipse IoT open source community with more than 15 different open source projects that provide the building blocks developers require for building IoT solutions. He is also a frequent speaker on IoT and MQTT.
Marc Taccolini is founder and CTO of Tatsoft.
To watch the webinar recording: https://www.hivemq.com/webinars/designing-an-edge-to-cloud-architecture-for-iiot/
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Samy Fodil
Webinar recording: https://youtu.be/t30Aa-mq93Q
Do you need to build scalable 5G and IoT applications? Or, maybe distribute the computing required by AR/VR throughout the data path? Perhaps you need to implement Digital Twins? Well you've come to the right place.
Edge Computing is a paradigm that distributes computing and data storage between the Cloud and the users. In fact, the data center infrastructure that sits between you and the Cloud is actually larger than all the Cloud data centers combined. For over two decades, thanks to that Edge infrastructure you've been able to watch videos and smoothly surf the web. Today the "Edge" is powering all the automation around you; for example, smart cities, smart cars, smart factories, etc.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2022/07/a-platform-approach-to-developing-networked-visual-ai-systems-a-presentation-from-network-optix/
Nathan Wheeler, Chairman and CEO, and Tony Luce, Vice President of Product Marketing, both of Network Optix, present the “Platform Approach to Developing Networked Visual AI Systems” tutorial at the May 2022 Embedded Vision Summit.
Connected cameras are becoming ubiquitous. Coupled with CV and ML, they enable a growing range of applications that monitor people, facilities and other objects and environments. But creating robust, scalable applications requires more than connected cameras and algorithms. For example, applications require robust video storage management, including the ability to manage limited bandwidth and recover from hardware failures. In addition, applications often must be able to discover and interact with a variety of camera and stream types on a network.
Applications also typically require media servers and clients that can run on mobile, desktop, server and cloud. And they need the ability to integrate with a variety of software stacks and ecosystems. In this presentation, Wheeler and Luce introduce the Nx Meta intelligent video platform, which enables developers to quickly create cross-platform networked visual AI solutions that incorporate device and stream discovery and interoperability, robust storage management and extensibility. They also show application examples.
Rtp bluemix meetup june 2016 anki and node redTom Boucher
Slides that were used at the IBM RTP Bluemix Meetup to demonstrate using Node-RED and the IBM IoT Kit on IBM Bluemix to control Anki Overdrive cars and keep them from colliding
Oxford Economics worked with Citrix to survey 600 business and IT executives around the world and across industries to measure their progress toward digital work. We found that big changes are happening— but much work remains to be done.
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent.
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
Organizations are actively pursuing solutions that address application delivery in a multi-cloud world. A solution that assures applications, regardless of where they reside, are simply and reliably delivered to users – when, where, and how they need them.
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
The nature of work is changing for office professionals as a result of cloud-based technologies, new devices and evolving work practices. Wakefield Research partnered with Citrix to survey nearly 1,300 office professionals in the U.S. to uncover the latest trends and employee expectations around the Future of Work.
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
This paper provides guidance to customers wanting to draw economic comparisons between perpetually licensed Citrix software, and the newer Citrix Cloud service equivalents
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
This paper provides guidance to customers wanting to draw economic comparisons between perpetually
licensed Citrix software, and the newer Citrix Cloud service equivalents.
Compared to purchasing, installing, and maintaining traditional perpetually licensed software, the new
SaaS/Subscription approach offers unique technical, financial, and capability benefits.
Citrix is propelling into the future armed with smarter, more efficient, and more secure technology. See what SVP of Product PJ Hough, VP of Product Marketing Calvin HSU, Brad Anderson, and Abhishek Chauhan detailed at the Citrix Synergy 2017 Technology Keynote.
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
Malcolm Gladwell took to the stage at Synergy 2017 to explore the complexities we must conquer in the future. How do we approach difficult problems and accomplish meaningful work?
Digital workspaces
are becoming powerful competitive differentiators in all industries.
That’s because businesses are seeking new levels of agility in
their processes and service delivery methods. They also want
flexibility for their employees.
Comparing traditional workspaces to digital workspacesCitrix
The unprecedented adoption and convergence of mobility, cloud,
virtualization, and cyber security technologies is rendering
Traditional Workspaces a thing of the past. Digital workspaces are
becoming powerful competitive differentiators in all industries as
businesses are seeking new levels of agility in their processes and
service delivery methods and provide greater flexibility for their
employees.
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
Eliminate the challenges and complexity of a Windows 10 migration with a virtual desktop solution.
Employees are upgrading their personal devices to Windows 10 at a record rate—and managing and performing a controlled OS migration is no longer in the hands of corporate IT. Businesses need to formulate a strategy to maintain productivity and support their employees regardless of the user’s chosen endpoint device or operating system.
We invite you to take a tour of our new office in Paddington, London, which opened recently at 20 Eastbourne Terrace. Set over two floors with stunning views of the city, this space encapsulates our vision of empowering people to work anywhere and at any time. We hope to welcome you here in person soon… And, don’t forget to check current openings at Citrix UK here: www.citrix.com/careers!
Photo credit: May Fawzy Design (http://www.mayfawzy.co.uk/)
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath